Bill Marquette wrote:
Low end switches have a tendency to not have enough ram or cpu to
handle a high volume mac spoofing attack and will usually end up
turning into a hub under this kind of attack, rendering your vlans
useless.

Any switch's CAM table can be overflowed by directly connected users, but good switches won't fully turn into a hub in that scenario. Good switches keep one CAM table per VLAN, and in the case of overflow, only the overflowed VLAN turns into a hub and only on the ports it's configured. I know Cisco switches do this properly, from personal experimentation and reading other sources that confirm the same. I can't vouch one way or another for any other switch vendors.

I have no doubt some (maybe many) switches behave exactly as Bill described, and it's difficult for most people to perform the type of testing required to validate a VLAN switch config and determine what "bad things" can be done to said config. Be careful with VLAN's, but also don't be completely averse to using them. Whether or not to trust them, and for what particular usage, will vary depending on your environment and level of risk tolerance.

Reply via email to