03-12-2018 05:32 AM - edited 03-08-2019 02:13 PM
Hi,
we have cisco l2 switches and broadcast with together. if hacker trying to access our network using mac spoofing? is it possible. cisco switches first time learn mac address and maintained one mac table. if hacker trying to send unknown mac address able to access? my query is initially cisco switches learned mac address stored in mac table. if any new mac address comes it will stored new mac address table.
how to identify if its spoofing Mac?
03-12-2018 06:05 AM
Hi,
Q: if hacker trying to access our network using mac spoofing? is it possible?
Q: cisco switches first time learn mac address and maintained one mac table. if hacker trying to send unknown mac address able to access?
Ans: MAC spoofing attacks involve the use of a known MAC address of another host to attempt to make the target switch forward frames destined for the remote host to the network attacker. When a single frame is sent with the source Ethernet address of the other host, the network attacker overwrites the CAM table entry so that the switch forwards packets destined for the host to the network attacker. Until the host sends traffic, it does not receive any traffic. When the host sends out traffic, the CAM table entry is rewritten once more so that it moves back to the original port.
Use the port security feature to mitigate MAC spoofing attacks. Port security provides the capability to specify the MAC address of the system connected to a particular port. This also provides the ability to specify an action to take if a port security violation occurs.
Q: my query is initially cisco switches learned mac address stored in mac table. if any new mac address comes it will stored new mac address table.
Ans: As mentioned, It will store permanent mac address in the table (CAM table) with switch port security configuration. But it is not possible to make a seperate table.
How to identify: Monitoring the mac table.
Regards,
Deepak Kumar
03-12-2018 12:45 PM
The question doesn't make any sense.
If network users do not have any authentication credentials then anyone can plug in and access the network. No spoofing necessary.
The only time one would "spoof" the MAC address is when someone has "locked down" the port (LOL!) by configuring the MAC address of the port.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide