Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello, I have read a little about the vlan hopping attack, especially the double tagging.One of the conditions is that the atacker switch port has to be configured in access mode in the same VLAN as the native VLAN off the trunk port.I tried to repro...
Hello, there is a CISCO recomendation that says the native vlan has to be an unused vlan (a dummy vlan) in order to prevent VLAN hopping attacks.How to achieve this in a wireless scenario?I have a virtual wireless controller and a lot of flex connect...
My 2960g are ios 12.2, 2960x 15.0, 3750g 12.2 and 4506 15.1. I tried to find something in bug tracker or security advisories about this but didn't found. Do you know in whick IOS version this got patched?
But if the port of the attacker must be trunk whats the point in doing all of this? The attacker could simple set the vlan he wants on the interface configuration.
But if the port of the attacker must be trunk whats the point in doing all of this? The attacker could simple set the vlan he wants on the interface configuration.