Using State Model Diagrams to Manage Secure Layer 2 Switches
Document Type
Journal Article
Publisher
International Journal of Computer Science and Network Security (I J C S N S)
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Security Science
RAS ID
10206
Abstract
A secure network is only as strong as its weakest link. It is recognized that the source of many security breaches are from users within an organization. User endpoints or hosts may be a variety of different devices such as laptops, IP phones and servers. All these user devices are connected via a switch fabric. This switch infrastructure must therefore be appropriately secured. There are standard techniques to provide protection against common attacks such as MAC spoofing, MAC table overflow etc. However, management of OSI layer 2 devices is typically text based using the Command Line Interface. The increasingly prevalent Security Device Manager graphical user interface can be used to configure and manage routers but, currently, cannot be used for securing switches. This paper presents details of using the State Model Diagram user interface for ensuring switches are securely configured.
Access Rights
free_to_read
Comments
Maj, S. P., & Veal, D. R. (2010). Using State Model Diagrams to Manage Secure Layer 2 Switches. International Journal of Computer Science and Network Security, 10(9), 141-144. Available here