There are a few drawbacks of multilayer protocols:
- Covert channels are allowed.
- Filters can be bypassed.
- Logically imposed network segment boundaries can be overstepped.
- Chapter 11 Secure Network Architecture and Securing Network Components
- from (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
- Publisher: Sybex
- Released: May 2018
Filters - HTTP over ICMP
Logically implemation - Eg: VLAN hopping for stepping the boundaries
Share this highlighthttp://www.safaribooksonline.com/a/isc2-cissp-certified/21716934/