chaser7783 wrote: » Went to a talk @ Defcon one year where they talked about VLAN layer 2 attacks and MAC floodding. Here is the link to the pdf about the presentation. Starts on pg.10 MAC Flooding/CAM table overflow attack:https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-figueroa-williams.pdf
the_hutch wrote: » Okay, so having a brainfart here. There is an attack that helps you monitor traffic on a switch by overloading the flash memory of a switch with port and MAC address associations. The switch then reacts to the memory overload by beginning to broadcast all traffic. I can't remember what this is called. Anybody???
docrice wrote: » I've heard referred to it as CAM table overflowing. Port-security on Cisco switches (and whatever it's called on other vendors of managed switches) should help mitigate this. I'd say try it on a dumb switch for easier results.
MAC address monitoring is a feature present on Cisco Catalyst 6500 Series switches. This feature helps mitigate MAC address flooding and other CAM overflow attacks by limiting the total number of MAC addresses learned by the switch on per-port or per-VLAN basis. With MAC Address Monitoring, a maximum threshold for the total number of MAC addresses can be configured and enforced on a per-port and/or per-VLAN basis. MAC address monitoring in Cisco IOS Software allows the definition of a single upper (maximum) threshold. In addition, the number of MAC addresses learned can only be monitored on a per-port or per-VLAN basis, and not a per-port-per-VLAN. By default, MAC address monitoring is disabled in Cisco IOS Software. However, the maximum threshold for all ports and VLANs is configured to 500 MAC address entries, and when the threshold is exceeded the system is set to generate a system message along with a syslog trap. These default values take effect only when MAC address monitoring is enabled. The system can be configured to notify or disable the port or VLAN every time the number of learned MAC addresses exceeds the predefined threshold. In our test, we used the "mac-address-table limit" command on the access layer port interface to configure the MAC address monitoring feature.