<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Native Vlan - Double tagging attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299076#M1078879</link>
    <description>&lt;HR /&gt;&lt;P&gt;Excuse me DTP however I read newly other comments. VLAN 1 no access Port and dtp Disable Is under Attack yet because stp use bpdu frame on VLAN1 default also if&amp;nbsp;&lt;SPAN&gt;Logic vtp hopping and double tagging Say that the Attack Is good if the attacker Is connect ti the Port assigned ti native VLAN, but if I move all Port from VLAN1 in VLAN 2, frames bpdu Will through on VLAN 1 yet.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 28 Feb 2021 20:40:43 GMT</pubDate>
    <dc:creator>PietroPoliseno27977</dc:creator>
    <dc:date>2021-02-28T20:40:43Z</dc:date>
    <item>
      <title>Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298380#M1078831</link>
      <description>&lt;P&gt;Hello everyone&lt;/P&gt;&lt;P&gt;I would like a clarification on the native vlan.By default a vlan is used, for example 99 as a native vlan without assigning any access port to avoid double tagging attacks.What is not clear to me is:&lt;/P&gt;&lt;P&gt;1) Why do I have to set as a native vlan a number that makes no sense like 99 or 44?Can I also set number 2 ?&lt;/P&gt;&lt;P&gt;2) I know it takes more work, but can I leave the native vlan 1 and delete the ports from vlan 1 by disabling it?Can there be security issues? I repeat Vlan 1 with no access port I move them all to other vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thank those who respond in advance&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 14:08:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298380#M1078831</guid>
      <dc:creator>PietroPoliseno27977</dc:creator>
      <dc:date>2021-02-26T14:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298388#M1078832</link>
      <description>&lt;P&gt;The &lt;STRONG&gt;Native VLAN&lt;/STRONG&gt; is simply the&amp;nbsp;&lt;EM&gt;one&lt;/EM&gt; VLAN which traverses a Trunk port&amp;nbsp;&lt;EM&gt;without&lt;/EM&gt; a VLAN tag.&lt;/P&gt;
&lt;PRE&gt;1) Why do I have to set as a native vlan a number that makes no sense like 99 or 44?Can I also set number 2 ?&lt;/PRE&gt;
&lt;P&gt;You can use any VLAN ( by default VLAN1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) I know it takes more work, but can I leave the native vlan 1 and delete the ports from vlan 1 by disabling it?Can there be security issues? I repeat Vlan 1 with no access port I move them all to other vlan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco suggest do not use default vlan 1&amp;nbsp; for security reason.,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 14:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298388#M1078832</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-02-26T14:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298416#M1078833</link>
      <description>&lt;P&gt;You can use the Vlan you want as native, ´for security reasons it is not recommended to use vlan 1 since most attacks occur through this vlan since it is configured by default.&lt;/P&gt;&lt;P&gt;The recommendation is that you use the Native Vlan that you define in your design, this vlan will only pass without tagging in the trunk communication&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;remember to give the star with this you contribute in the community&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 14:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298416#M1078833</guid>
      <dc:creator>Javier Acuña</dc:creator>
      <dc:date>2021-02-26T14:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298628#M1078837</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On Catalyst switches you never really disable vlan 1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even if you have no access ports in it, you change the native vlan and you make sure it is not allowed on any trunk links, still there is certain traffic in vlan 1 such as control protocols etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is the problem with vlan 1, it is the default vlan, the vlan that is the native vlan unless you change it and it is used by Cisco for protocols such as STP, VTP etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So you should not make any use of it if you can help it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 22:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298628#M1078837</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2021-02-26T22:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298679#M1078840</link>
      <description>&lt;P&gt;...&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2021 13:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298679#M1078840</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-27T13:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298712#M1078842</link>
      <description>&lt;P&gt;It Is clear that changing native VLAN hacker cannot Attack. What Is not clear i why VLAN 1. I could set VLAN1 as VLAN native on trunk but simultaneously I move all ports in other vlans removing all access Port F01 f02 etc..... So&amp;nbsp; In this case:&lt;/P&gt;&lt;P&gt;TRUNK LINK: VLAN 1 NATIVE VLAN&lt;/P&gt;&lt;P&gt;VLAN1: NO ACCESS PORT&amp;nbsp;&lt;/P&gt;&lt;P&gt;VLAN 2: PORTS FOR F01 TO F12&amp;nbsp;&lt;/P&gt;&lt;P&gt;VLAN3: PORTS FOR F13 TO F24&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this case how spese the hacker do the Attack?&lt;/P&gt;&lt;P&gt;We suppose that hacker Is located and connect Port fa0/8 of the VLAN 2 and wanted attaché VLAN3.&lt;/P&gt;&lt;P&gt;He should add both VLAN2&amp;nbsp; AND VLAN3 in the frame ethernet&amp;nbsp;&lt;/P&gt;&lt;P&gt;On trunk Is VLAN1 native.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When switch 1 (where Is connect hacker) see the frame, It see First tag so VLAN2 and not VLAN3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I might be wrong ( correct me of I'm wrong) but hacker Is limited to comunicate VLAN 2 only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could think only best practice change VLAN1 in VLAN99 because VLAN1 Is default (as all you said), and then if there are free ports on switch with VLAN1 native, un attacker connect One Port and Attack&amp;nbsp;&lt;/P&gt;&lt;P&gt;Correct me of I wrong&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2021 08:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298712#M1078842</guid>
      <dc:creator>PietroPoliseno27977</dc:creator>
      <dc:date>2021-02-27T08:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298744#M1078844</link>
      <description>&lt;P&gt;So if I disable all Port It Will remain Always default for other traffic as stp or vtp. But if I Will change native VLAN in VLAN2 without 99 It Is good. VLAN99 or 44 are used so for convenience only.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2021 12:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298744#M1078844</guid>
      <dc:creator>PietroPoliseno27977</dc:creator>
      <dc:date>2021-02-27T12:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298754#M1078846</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Double Tag Attack,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;you admin and you are separate the Server from the Host by using VLAN,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;VLAN 100 for Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;VLAN 1 for Host&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;the attacker which can access to VLAN 1 easily BUT to access to Server it must pass through Router L3 or FW... Here the attacker couldn't attack Server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So attacker use the limitation of SW to see only one tag of VLAN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How attacker Work ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW1-SW2 in-between there is trunk with VLAN 1 as native,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;attacker connect to SW1,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;attacker send double tag packet&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;outer is native VLAN "VLAN1"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;inner is VLAN 100 "VLAN 100 for Server ??"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW1 receive this packet It see Native VLAN 1 it will flood to all port include trunk between the two SW,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW1 will remove the outer tag "VLAN1 " and here is limitation of SW" and flood it through trunk&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW2 receive the frame with inner tag VLAN 100!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW2 will flood it through all port of VLAN 100 include the port for Server&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;here the attacker can attack the Server even if it not in same VLAN, i.e. it pass R/FW.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;after ALL&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;do you see how the attacker is start attack?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;by native VLAN, if we can broke this series by change native VLAN with value not predict by attacker what will happened?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;let see again but this time we change the native VLAN from VLAN 1 to VLAN 99 "as your example"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;attacker connect to SW1,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;attacker send double tag packet&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;outer is native VLAN "VLAN1"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;inner is VLAN 100 "VLAN 100 for Server ??"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW1 receive this packet It see OUTER VLAN 1 it will flood to all port NOT include trunk between the two SW,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WoW and attacker stop here..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So that is why we change the native VLAN to not predict VLAN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and this is why make default native VLAN 1 without ports.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;UPDATE REPLY.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2021 13:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298754#M1078846</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-27T13:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298757#M1078847</link>
      <description>&lt;P&gt;There is two attack for switch spoofing,&amp;nbsp;&lt;BR /&gt;first which is explain before "double tag"&lt;BR /&gt;the attack connect to Access port of SW&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Second is VLAN Hopping&amp;lt;- this new&lt;/P&gt;&lt;P&gt;Why VLAN1 native must change ???&lt;BR /&gt;the attack connect to Trunk port, DTP is enable, the SW will make port trunk &amp;nbsp;and native VLAN 1 "Here as you suggest only trunk have native VLAN1, no other ports for vlan1".&lt;BR /&gt;&lt;BR /&gt;What if we change the native VLAN from VLAN1 to NO predict VLAN "for example 99"&lt;BR /&gt;&lt;BR /&gt;the SW never make port as trunk since the native VLAN is mismatch and hence we prevent the attacker from form trunk with SW and attack all vlan allowed in trunk.&lt;BR /&gt;&lt;BR /&gt;Note:- Cisco recommend to disable DTP and enable trunk only on port you want to be trunk "trust port" and also change native VLAN1.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2021 13:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298757#M1078847</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-27T13:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298771#M1078848</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes it will still be used for certain traffic ie. some control protocols.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use any number you want for native vlan, it makes no difference which number you use.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2021 15:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298771#M1078848</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2021-02-27T15:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298934#M1078850</link>
      <description>&lt;P&gt;Ok let's see if I understand. Only if DTP is enabled on a switch A (default is enabled), an attacker can also connect with his pc makes switch A believe that his PC is a switch B and since by default the dtp service enables the vlan as native vlan 1, the attacker automatically makes a vlan hopping attack. Then the problem would be solved by disabling the DTP service and setting the trunk manually. But maybe since a company would like to adopt a solution with DTP for convenience, it is always useful to set a different native vlan which can also be vlan 2 but since usually vlan 2-3-4 etc are used for convenience it is used as native vlan a vlan example 99 or 120 that is it doesn't make sense.Correct?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 08:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298934#M1078850</guid>
      <dc:creator>PietroPoliseno27977</dc:creator>
      <dc:date>2021-02-28T08:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298943#M1078851</link>
      <description>&lt;P&gt;That is (I know that in reality it will never happen but it is to better understand) if I have switch A and switch B on both switches I disable the DTP, I move all the ports from VLAN1 to VLAN 2 - 3 - 4 for example I leave on the trunk switch A and switch B vlan native VLAN 1, would you attacker be able to do a hopping and double tagging? There is no auto-negotiation between A and B, the ports have not been assigned to VLAN 1 at this point unless there is another service that would allow an attacker to make another type of attack, I don't see how it can succeed to make an attack with a VLAN 1 as native. Obviously mine is a consideration based on theoretical concepts if I miss something correct me&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 09:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298943#M1078851</guid>
      <dc:creator>PietroPoliseno27977</dc:creator>
      <dc:date>2021-02-28T09:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298984#M1078861</link>
      <description>&lt;P&gt;OK, how many native VLAN in SW ?&lt;BR /&gt;there is only one, so when you config native VLAN 1 between two SW, that meaning that both SW use native VLAN 1 for all trunk port.&lt;BR /&gt;attacker as I explain above will form trunk to one of SW, using DTP and native VLAN 1, the victim SW will make port trunk with attacker "SW don't know this is attacker or other SW".&lt;BR /&gt;this make Attacker now allow to use all VLAN, and hence VLAN hopping happened.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 12:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4298984#M1078861</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-28T12:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299026#M1078870</link>
      <description>&lt;P&gt;So&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VLAN1: all Port moved for example VLAN2&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DTP: Disable&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Native VLAN : VLAN1&amp;nbsp;&lt;/P&gt;&lt;P&gt;If hacker not find access Port in VLAN 1 and sto Disable hacker can still Attack&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 15:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299026#M1078870</guid>
      <dc:creator>PietroPoliseno27977</dc:creator>
      <dc:date>2021-02-28T15:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299037#M1078872</link>
      <description>&lt;P&gt;sorry what is sto ?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 16:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299037#M1078872</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-28T16:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299076#M1078879</link>
      <description>&lt;HR /&gt;&lt;P&gt;Excuse me DTP however I read newly other comments. VLAN 1 no access Port and dtp Disable Is under Attack yet because stp use bpdu frame on VLAN1 default also if&amp;nbsp;&lt;SPAN&gt;Logic vtp hopping and double tagging Say that the Attack Is good if the attacker Is connect ti the Port assigned ti native VLAN, but if I move all Port from VLAN1 in VLAN 2, frames bpdu Will through on VLAN 1 yet.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 20:40:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299076#M1078879</guid>
      <dc:creator>PietroPoliseno27977</dc:creator>
      <dc:date>2021-02-28T20:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: Native Vlan - Double tagging attack</title>
      <link>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299077#M1078880</link>
      <description>&lt;P&gt;I ask my self same Q when I study VLAN security then I end with&amp;nbsp;&lt;BR /&gt;1- using VLAN1 as Native VLAN&amp;nbsp;&lt;BR /&gt;2- using other VLAN as Native VLAN&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;still the L2 protocol use VLAN1 as tag vlan when send through trunk&amp;nbsp;&lt;BR /&gt;BUT&amp;nbsp;&lt;BR /&gt;it tag if the VLAN 1 is not native&amp;nbsp;&lt;BR /&gt;it not tag if the VLAN1 is native&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.fragmentationneeded.net/2011/01/revisiting-vlan-1-myth-again.html" target="_blank"&gt;https://www.fragmentationneeded.net/2011/01/revisiting-vlan-1-myth-again.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so change the native VLAN not make other L2 protocol not use VLAN1.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 21:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/native-vlan-double-tagging-attack/m-p/4299077#M1078880</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-28T21:00:57Z</dc:date>
    </item>
  </channel>
</rss>

