The primary recommendations from the listed sources are:
- Don't use VLAN 1 (the default VLAN) for anything
- Any ports that do VLAN trunking should use a dedicated VLAN ID
- Do explicit tagging of the native VLAN on trunking ports
- Set all end-user ports to non-trunking (a.k.a. "access ports"?)
- Disable unused ports and put them in a separate VLAN
- Disable Spanning Tree Protocol (STP) on end-user ports
- Use MD5 authentication for Virtual Trunking Protocol (VTP)
- Physically secure the switch and control access to the management functions
Reference Links:
- Virtual LAN Security: weaknesses and countermeasures (SANS)
- VLAN Hacking (InfoSec Institute)
- VLAN Hopping (Wikipedia)
No comments:
Post a Comment