Hello, i have read many doc about this exploit but there are any contradictions.
I hnow that this exploit exist in 3 ways :
1) Basic=> The attacker spoof a switch and gains the trunked states of the switch's port. Rely on auto-negotiate feature turned ON. This ways is simple to understand and to block2) Complex 1 => This attack is described on
In this scenario my doubts is :
- Why the first SW accepts tagged frame ? Is this behavior an anomaly of work ?
- Why the last switch that receives native frame on trunk port reads the VLAN-ID ? Is this normal or anomaly ? I think that sw does'nt read VLAN-ID because the frame on trunk is native .
2)Complex 2 => In other docs per ex:on the access-port ? Is this behavior another anomalies ?
Sorry about lenght of post but i want to understand if this vulnerability were resolved or not .
Thanks
Giuseppe Citerna ccie#10503