首页 | 本学科首页   官方微博 | 高级检索  
     

基于VLAN的攻击与安全防范
引用本文:黄金波,郭丽春.基于VLAN的攻击与安全防范[J].办公自动化,2008(24).
作者姓名:黄金波  郭丽春
作者单位:辽宁工程技术大学职业技术学院;
摘    要:在交换技术的网络中VLAN为网络的管理与有效抑制广播风暴提供了技术支持,同时在Trunk端口配置、802.1Q协议封装以及VTP配置等实施中也为黑客的攻击留下隐患。常见的攻击形式有MAC洪泛攻击、802.1Q和ISL标记攻击、双封装802.1Q/嵌套式VLAN攻击、VLAN跳跃攻击、VTP攻击等。针对以上攻击文中提出了端口安全配置、Trunk端口配置以及VTP协议的安全配置等措施,有效地防范黑客对网络的攻击。

关 键 词:VLAN  Trunk  端口  VTP协议  攻击  

Attacks and Security Guards Based on VLAN System
Huang Jinbo Guo Lichun.Attacks and Security Guards Based on VLAN System[J].Office Automation,2008(24).
Authors:Huang Jinbo Guo Lichun
Affiliation:Huang Jinbo Guo Lichun (Vocational College,Liaoning Technical University Fuxin 123000)
Abstract:In the network of exchange technology,VLAN provides technical support for network management and restricting network broadcast storm effectively,at the same time it brings hidden danger for hackers attack at the Trunk port configuration,802.1Q protocol encapsulation as well as the VTP configuration.These common attacks include MAC flooding attack,802.1Q and ISL tag attacks,two-package 802.1Q/nested VLAN attacks,VLAN hopping attack as well as VTP attack.Aiming at above attacks,this paper puts forward some me...
Keywords:VLAN  Trunk  Port  VTP Protocol  Attack  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号