Detection of Rogue Switches in a Local Area Network (LAN)

Presenter Information

Yesaswini Vellaboina

Location

Hager-Lubbers Exhibition Hall

Description

PURPOSE: This study examines methods to detect and mitigate unauthorized rogue switches on local area networks (LANs) through the use of PortFast, BPDU guard configurations, and advanced techniques. PROCEDURES: Analyses: Case studies evaluating LANs before and after implementing the proposed security measures were conducted, measuring effectiveness metrics. OUTCOME: The PortFast and BPDU guard configurations significantly reduced risks from rogue devices and improved network performance. When combined with advanced detection techniques, over 95% of attempted rogue switch connections were identified and blocked proactively. IMPACT: Integrating PortFast, BPDU guard, and sophisticated rogue switch detection techniques provides a robust, multi-layered approach to enhancing LAN security posture against unauthorized access. This methodology equips organizations with critical capabilities to maintain network integrity and availability.

This document is currently not available here.

Share

COinS
 
Apr 23rd, 3:00 PM

Detection of Rogue Switches in a Local Area Network (LAN)

Hager-Lubbers Exhibition Hall

PURPOSE: This study examines methods to detect and mitigate unauthorized rogue switches on local area networks (LANs) through the use of PortFast, BPDU guard configurations, and advanced techniques. PROCEDURES: Analyses: Case studies evaluating LANs before and after implementing the proposed security measures were conducted, measuring effectiveness metrics. OUTCOME: The PortFast and BPDU guard configurations significantly reduced risks from rogue devices and improved network performance. When combined with advanced detection techniques, over 95% of attempted rogue switch connections were identified and blocked proactively. IMPACT: Integrating PortFast, BPDU guard, and sophisticated rogue switch detection techniques provides a robust, multi-layered approach to enhancing LAN security posture against unauthorized access. This methodology equips organizations with critical capabilities to maintain network integrity and availability.