Mac address table overflow attack
mac address flood attack

Mac address table overflow attack

Mac address table overflow attack (mac address flood):-

A MAC Overflow attack relies on flooding the switch with many invalid source MAC addresses until the table is full. When the attack causes the switch act as a hub, the threat actor can monitor traffic passing through it.

A MAC Overflow attack

The Mitigation:-

Port security:

- Allows an administrator to statically specify MAC Addresses for a port or to permit the switch to dynamically learn a limited number of MAC addresses.

- Limits the number of MAC addresses to be learned on an access switch port.

- Port security controls how many MAC addresses can be learned on a single switch port.

port security

The violation: -

When the number of secure MAC addresses reaches the limit allowed on the port:

  1. protect: -packets with unknown source addresses are dropped. You are not notified that a security violation has occurred.
  2. restrict: - packets with unknown source addresses are dropped. you are notified that a security violation has occurred. The counter increases by one.
  3. shutdown: - packets with unknown source addresses are dropped. you are notified that a security violation has occurred. The counter increases by one. The interface dropped in error-disable state.
  4. shutdown per VLAN: - only the VLAN on which the violation occurred is error-disabled.

The configuration: -

Switch(config-if)# switchport mode access

Switch(config-if)# switchport port-security

Switch(config-if)# switchport port-security maximum 2

Switch(config-if)# switchport port-security violation shutdown

Switch(config-if)# switchport port-security mac-address sticky

Switch(config-if)# switchport port-security aging time 120

Aging parameters

Note:-

port security can't be set on the dynamic mode.


Ahmed Tarek

Network Security & SOC | FortiGate | ASA | Cisco ISE || NSE4 | CCNP Security | Cisco CyberOps | IBM QRadar | CEH v 10 | MCSA | Network Security Content Creator

1 年

?????

要查看或添加评论,请登录

Ahmed Shawky的更多文章

  • SD-WAN in FortiGate

    SD-WAN in FortiGate

    SD-WAN is a software-defined approach to managing Wide-Area Networks (WAN). When creating SD-WAN it is required that no…

    5 条评论
  • FortiGate Antivirus

    FortiGate Antivirus

    -?? virus ????? ?? ?????? ?? (0,1) ??? ??? ???? ??? antivirus ?? ????? ?????? ????? ???? ???? ????? ?? viruses ????…

  • Site-to-Site VPN

    Site-to-Site VPN

    Site-to-Site VPNs connect multiple remote networks or branch offices, allowing them to communicate securely over the…

  • Virtual Private Network

    Virtual Private Network

    is a technology that provides a secure and encrypted connection between a user's device and a remote server or network.…

  • VLAN Attacks

    VLAN Attacks

    VLAN Hopping attack (Switch spoofing) VLAN hopping attack -Spoofing DTP Messages from the attacking host to cause the…

    2 条评论
  • DHCP Server Spoofing

    DHCP Server Spoofing

    DHCP Server Spoofing If an attacker connects a rogue DHCP server to the network, the rogue DHCP server can respond to a…

    2 条评论

社区洞察

其他会员也浏览了