Attacks on Switches
Compromised server in DMZ
Denial-of-Service (boring)
MAC flooding: the “fail-open” problem
Trunk protocol spoofing
Is DMZ a good Defense-in-depth?
What device is the network boundary in this case?
Previous slide
Next slide
Back to first slide
View graphic version