Category Archives Networking

Securing layer 2 is an important fundamental aspect which must be covered as there are many different possible attack vectors in the layer 2 realm. Below I'll be detailing some of the more common attack vectors and how to mitigate them. Port Security Attack type: CAM/MAC table overflow Mitigation method: Port Security CAM overflow attacks are caused by a client…

At the time of this post, I had limited exposure to ASA 9.2 code and particularly using FQDN access-lists. Essentially what you can do is create an object with the Fully Defined Domain Name (FQDN) of a domain nested within. You can create multiple of these and place them inside a single object-group to keep things tidy (and you should!).…

Close