STP MiTM Attack and L2 Mitigation Techniques on the Cisco Catalyst 6500

Get the White Paper

By Cisco Systems

Spanning-Tree Protocol (STP) can be easily compromised by eavesdropping in a switched corporate environment, but this vulnerability can be mitigated using L2 security features that are available on the Cisco® Catalyst® 6500. STP Man in The Middle (MiTM) attack compromises the STP “Root Bridge” election process and allows a hacker to use their PC to masquerade as a “Root Bridge,” thus controlling the flow of L2 traffic. To understand the attack, the reader must have a basic understanding of the “Root Bridge” Election process and the initial STP operations that build the loop free topology. This paper provides an overview of the STP Root Bridge Election Process, STP MiTM Attack Guide and Mitigation Techniques for STP attacks.

Find out how by downloading this white paper

2 Debates over STP MiTM Attack and L2 Mitigation Techniques on the Cisco Catalyst 6500

  1. Nick Lippis said:

    STP MiTM Attack and L2 Mitigation Techniques on the Cisco Catalyst 6500 http://bit.ly/bENgNv

  2. Nick Lippis said:

    STP MiTM Attack and L2 Mitigation Techniques on the Cisco Catalyst 6500 http://bit.ly/bENgNv