Protocol Filtering and Controlling LAN Floods

Attackers can cause broadcast floods to disrupt communications over the LAN. You saw an example of this in the section "MAC Address Floods and Port Security." Therefore, it is important to control flooding on the switches. There are two main ways to do this: Set up threshold limits for broadcast...

Local-Area Networks and Technologies

Local-area network ( LAN) technologies, as the name suggests, are extremely localized, covering a small geographic area up to only a few thousand meters. For example, they can connect computers within or between buildings, or within a particular department, such as Accounting or Marketing. Whenever ...

DHCP Snooping

A DHCP server normally provides all the basic information a client PC needs to operate on a network. For example, the client might receive an IP address, a subnet mask, a default gateway address, DNS addresses, and so on.   Suppose that an attacker could bring up a rogue DHCP server o...

OSPF Network Types

OSPF can support multiple network types. For example, a multiaccess network such as Ethernet is considered to be an OSPF broadcast network. Table 7-6 shows a listing of supported OSPF network types and characteristics of each.

Analyzing ACL Log Entries

The Perl script in Example 19-1 parses a router syslog file and builds a detailed report of packets that were denied by logging ACLs. By default, the script will parse every ACL log message that it finds in the syslog file on a server. You can also look for messages associated with a p...

Contact Us


© 2011 CathaySchool, an ANDA Technology Group company, All Rights Reserved Privacy Policy | Refund Policy | Disclaimer | Sitemap | Resources Tags