1. Trang chủ
  2. » Giáo Dục - Đào Tạo

16 switch security kho tài liệu bách khoa

32 58 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 32
Dung lượng 721,98 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Configuration Guidelines• Only on static access ports • Not on trunk or dynamic access ports • Not on SPAN port • Not on EtherChannel port • Not configurable on per-VLAN basis • No aging

Trang 1

BSCI v3.0—2-1

Switch Security

Trang 2

Types of Attacks

CAM table overflow

VLAN hopping

Spanning tree manipulation

MAC address spoofing

DHCP attacks

Trang 3

CAM Table Overflow Attack

B D

Trang 4

Port Security

MAC A

MAC E MAC F

Attacker

Attacker

Trang 5

Secure MAC Addresses

Static

Dynamic

Sticky

Trang 6

Sticky address learning

Port security aging

Default Setting

Disabled 1

Shutdown Disabled Disabled Aging time is 0 When enabled, the default type is

absolute.

Trang 7

Configuration Guidelines

Only on static access ports

Not on trunk or dynamic access ports

Not on SPAN port

Not on EtherChannel port

Not configurable on per-VLAN basis

No aging of sticky addresses

No simultaneous enabling of protect and restrict options

Trang 8

Configuring Port Security

switchport mode access

switch(config-if)#

 Set the interface mode as access

switchport port-security

switch(config-if)#

 Enable port security on the interface

switchport port-security maximum value

switch(config-if)#

 Set the maximum number of secure MAC addresses for the interface (optional)

Trang 9

Configuring Port Security (Cont.)

switchport port-security mac-address sticky

switch(config-if)#

 Enable sticky learning on the interface (optional)

switchport port-security violation {protect | restrict | shutdown}

switch(config-if)#

 Set the violation mode (optional)

switchport port-security mac-address mac-address

switch(config-if)#

 Enter a static secure MAC address for the interface (optional)

Trang 10

Configuring Port Security Aging

switchport port-security aging {static | time time | type

{absolute | inactivity}}

switch(config-if)#

 Enable or disable static aging for the secure port, or set the aging time or type

Trang 11

sw-class# show port-security

Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action

(Count) (Count) (Count) -

Fa0/12 1 0 0 Shutdown - Total Addresses in System (excluding one mac per port) : 0

Max Addresses limit in System (excluding one mac per port) : 1024

Verifying Port Security

Trang 12

Verifying Port Security (Cont.)

sw-class# show port-security interface fa0/12

Port Security : Enabled

Port Status : Secure-down

Violation Mode : Shutdown

Aging Time : 0 mins

Aging Type : Absolute

SecureStatic Address Aging : Disabled

Maximum MAC Addresses : 1

Total MAC Addresses : 1

Configured MAC Addresses : 1

Sticky MAC Addresses : 0

Last Source Address : 0000.0000.0000

Security Violation Count : 0

Trang 13

Verifying Port Security (Cont.)

sw-class# show port-security address

Secure Mac Address Table - Vlan Mac Address Type Ports Remaining Age

(mins) - - -

1 0000.ffff.aaaa SecureConfigured Fa0/12

- Total Addresses in System (excluding one mac per port) : 0

-Max Addresses limit in System (excluding one mac per port) : 1024

Trang 14

Auto recovery from err-disable state

If the port – security feature has shutdown a port, the port can be restored to an operational state using the error-

disable recovery procedure.

Enable recovery cause is port – security:

Switch(config)#errdisable recovery cause psecure-violation

Set a global recovery timeout by using the command:

Switch(config)#errdisable recovery interval seconds

Trang 15

VLAN 10

Trang 16

Mitigating VLAN Hopping

switchport mode access

switch(config-if)#

 Configure port as an access port

Trang 17

Spanning Tree Manipulation

Root

Bridge

Root Bridge

Trang 18

Implementing BPDUGuard to Mitigate

Spanning Tree Manipulation

 The BPDU – guard feature shuts down ports when ports receive BPDU.

Switch(config)#spanning-tree portfast bpduguard

or

Switch(config-if)#spanning-tree bpduguard enable

Trang 19

Auto recovery from err-disable state

If the BPDU – guard feature has shutdown a port, the port can be restored to an operational state using the error- disable recovery procedure.

Enable recovery cause is BPDU – guard :

Switch(config)#errdisable recovery cause bpduguard

Set a global recovery timeout by using the command:

Switch(config)#errdisable recovery interval seconds

Trang 20

DHCP Attacks

DHCP Server

DHCP requests with spoofed MAC addresses

Attacker attempting to starve DHCP server

Attacker attempting to set up rogue DHCP server

Untrusted

Trang 21

DHCP Snooping

Rouge DHCP Attacker

Client

Legitimate DHCP Server

DHCP snooping allows the

Trang 23

IEEE 802.1x

Standard set by the IEEE 802.1 working group

A framework designed to address and provide port-based access control using authentication

Layer 2 protocol for transporting authentication messages between supplicant (user/PC) and authenticator (switch

or access point)

Actual enforcement is via MAC-based filtering and port-state monitoring

Trang 24

Corporate Network

No Access

Identity-Based Authentication

Trang 25

802.1x and Port Security

Cisco Secure ACS/RADIUS

Port Security

andIdentity

B = Legitimate User

I do not know A,

I do know B.

A = Attacker

Port unauthorized

Hub

Trang 26

BSCI v3.0—2-26

SPAN

Implementing Switch Port Analyzer

Trang 27

Switch Port Analyzer

The Switch Port Analyzer (SPAN) feature is used to mirror traffic from one source switch port or VLAN to a destination port.

It allows a monitoring device, such as a network analyzer or

“sniffer”, to be attached to the destination port for capturing traffic.

SPAN is available in two different forms:

SPAN: Both the SPAN source and destination are located on the same switch.

Remote SPAN (RSPAN): The SPAN source and destination are located on different switches Mirrored traffic is copied over a special – purpose VLAN across trunks between switches from the source to the destination.

Trang 28

Both the SPAN source and destination are located on the same switch.

Trang 29

SPAN Configuration

Define the source of the SPAN session data:

Switch(config)#monitor session-id source {vlan vlan-list

| interface interface-number} [tx | rx | both]

session-id: Uniquely identify the SPAN session.

source interface interface-number: Specify the interface

which traffic incoming or outgoing traffic will be monitored.

source vlan vlan-list: Specify the VLANs which traffic transit

through will be monitored.

tx | rx | both: Traffic can be selected for mirroring based on the direction it is traveling the SPAN source (tx: transmitted from the source, rx: received from the source, both: traffic in both directions).

Trang 30

SPAN Configuration (Cont.)

Identify the SPAN destination:

Switch(config)#monitor session-id destination interface

interface-number [encapsulation replicate][ingress {vlan vlan-id | dot1q vlan vlan-id | isl}]

session-id: Uniquely identify the SPAN session.

destination interface interface-number: Identify the

destination interface used by the session.

encapsulation replicate: Capture any VLAN tagging

information of the Layer 2 Protocol packets.

ingress vlan vlan-id: Allows sending traffic into the destination

port Sending traffic will be sent untagged to VLAN vlan-id.

ingress {dot1q vlan vlan-id | isl}: Allows sending traffic

into the destination port Sending traffic will be sent with tag dot1q

or ISL With dot1q tag, native VLAN is specified.

Trang 31

SPAN Configuration (Cont.)

Monitoring traffic going to and coming from a device connected

to the interface g1/0/1 and the network analyzer is connected to the interface g1/0/48.

Ngày đăng: 08/11/2019, 18:00

TỪ KHÓA LIÊN QUAN