: Automatically disables a port if it receives an STP BPDU, preventing unauthorized devices from influencing the STP topology.
: While often associated with switches, this attack fills a switch's CAM table with fake MAC addresses, forcing it to act like a hub and broadcast all traffic to every port, where an attacker can sniff it. Common Mitigations ARP a STP Гєtoky.pptx
These protocols are foundational to local area networks (LANs) but lack built-in security, making them common targets for network-level attacks: : Automatically disables a port if it receives
: Automatically disables a port if it receives an STP BPDU, preventing unauthorized devices from influencing the STP topology.
: While often associated with switches, this attack fills a switch's CAM table with fake MAC addresses, forcing it to act like a hub and broadcast all traffic to every port, where an attacker can sniff it. Common Mitigations
These protocols are foundational to local area networks (LANs) but lack built-in security, making them common targets for network-level attacks: