Port security is used so that someone can't plug a new device into your
network and mess with your VLAN info.  That's the purest form of security.
A VTP domain password will also prevent an unauthorized switch from learning
VTP information however if someone manages to crack the password, your
information isn't safe.

Remember that VTP advertisements are multicast - so unless a password has
been specified for the VTP domain, any device (PC or otherwise) in
promiscuous mode will be able to access VTP information.

By default, most (if not all) Cisco devices have VTP server mode set as the
default.  By connecting any new switch to the network, the switch will
automatically learn VTP information advertised in VTP messages and
self-configure.  The behaviour you experienced is expected and by design.


  -- Leigh Anne

PS.  Think about how RIP would operate if an unauthorized router running RIP
were to be connected to your network.  All sorts of funky routes could be
injected unless a password protecting updates were specified.


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Phil Wallisch
Sent: Thursday, December 12, 2002 7:20 AM
To: [EMAIL PROTECTED]
Subject: 2924 adopting VTP info [7:59074]


Has anyone seen this following situation?  I have a stable network at a
facility that's been running for some time.  It has  a VTP version 1
domain with no password.  I add a 2924M-XL with a valid IP address to the
network and then all of the sudden it has become apart of the VTP
domain.  I did not go into the VLAN database and configure the VTP domain
name or enter the database at all actually.  The way I understand VTP is
that the reason you have a VTP domain name is so someone can't plug a new
device into your network and mess with your VLAN info.

------------------------------------------------------------------------

Add photos to your e-mail with MSN 8. Get 2 months FREE*.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=59124&t=59074
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to