Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I have 2 Access Points. Much of the readings suggest that one uses channels 1,6 and 11 on the 2.4GHz band. Since I have 2 AP, could not I use a different combination of non-overlapping channels such as:3 & 85 & 10, etc. Am I missing something if I d...
I am reading about non-blind spoofing which defines that a hackers have access to the subnet so that they can sniff sequence and acknowledgement numbers to hijack a TCP connection or do malicious things. How does a hacker sniff the seq/ack numbers? ...
I am reading the CCNAv7 materials within the Security chapter, specifically the 'Spoofed Gratuitous ARP Replies. The logic makes sense but the diagram to this attack leads me to other questions:1. When an attacker sends gratuitous ARP replies (which ...
I am fumbling with the understanding of Wi-Fi channel configurations with multiple nodes in a mesh network. 1. Is it a best practice for each mesh node to utilize a different channel for home device access? For example, I have 3 mesh nodes in my hom...
I have read and understand how to configure port security, along with secure MAC address aging.My question is 1)Why and 2)When would an administrator configuring secure MAC address aging. Could someone please share a popular use-case? Thanks in advan...
Thanks Balaji. My issue was how to get around the switch forwarding traffic only between two clients (since the attacker is on a third port, it would not be able to intercept this traffic.) I see that a MITM must be setup first such as through ARP p...
Thanks Haydn,My example is for 'general' mesh networks such as a Google Wi-Fi mesh. From your reply, I see that N1=CH1; N2= Ch6; N3=Ch11 (so the channels in this 2.4GHz setup do not overlap.) Basic Observations (ignoring advanced features):1. A devi...