Skip to main content

Ccie exam fee Switch Security Introduction

Ccie exam fee Switch Security Introduction

As the most common device in the LAN, the switch faces a major threat to security.Some of these threats are directed at vulnerabilities in switch management, where an attacker attempts to control the switch;Ccie exam fee.Some are aimed at the function of the switch, and the attacker tries to disrupt the normal operation of the switch, thereby achieving the purpose of destroying or even stealing data.

There are several types of attacks against switches:

1. Switch configuration/management attack

2, MAC flood attack

3, DHCP spoofing attacks

4, MAC and IP spoofing attacks

5, ARP fraud

6, VLAN jump attack

7, STP attack

8, VTP attack

First, the access security of the switch

In order to prevent the switch from being detected or controlled by an attacker, basic security must be configured on the switch.

1, use a qualified password

2, use ACL to limit management access

3, configure the system warning language

4, disable unwanted services

5, close CDP

6, enable system log

7, use SSH instead of Telnet

8, turn off SNMP or use SNMP V3

Second, the port security of the switch

The switch relies on the MAC address table to forward data frames. If the MAC address does not exist, the switch forwards the frame to each port on the switch (flooding).However, the size of the MAC address table is limited, and the MAC flooding attack exploits this restriction to bomb the switch with a fake source MAC address until the switch MAC address table becomes full.The switch then enters a mode called Fail-open and starts working like a hub, broadcasting packets to all machines on the network.Therefore, an attacker can see all frames sent to another host without a MAC address table entry.To prevent MAC flood attacks, you can configure port security features, limit the number of valid MAC addresses allowed on a port, and define the actions of the port when the attack occurs: shutdown, protection, and restriction.Ccie exam fee

Third, DHCP Snooping - anti-DHCP spoofing

After DHCP-Snooping is enabled on the switch, DHCP packets are listened to and the IP address and MAC address information can be extracted and recorded from the received DHCP Request or DHCP Ack packets.In addition, DHCP-Snooping allows a physical port to be set to either a trusted port or an untrusted port. Ccie exam fee.The trusted port can receive and forward DHCP Offer packets normally. The untrusted port will discard the received DHCP Offer packets.In this way, the switch can block the fake DHCP server and ensure that the client obtains an IP address from a valid DHCP server.

1. The main function of dhcp-snooping is to isolate the illegal dhcp server and configure the untrusted port.

2. Cooperate with switch DAI to prevent the spread of ARP virus.

3.establish and maintain a dhcp-snooping binding table, this table is generated by the ip and mac address in the dhcp ack package, and the second can be manually specified.Ccie exam fee.This table is the basis for subsequent DAI (dynamic arp inspect) and IPSource Guard.These two similar techniques use this table to determine whether the ip or mac address is legal to restrict users from connecting to the network.

4.The trusted DHCP server is isolated by establishing a trusted port and an untrusted port. The trusted port forwards the DHCP packet normally. After the DHCP offer and DHCPACK received by the server received by the untrusted port, the packet is processed and lost.



Fourth, DAI - prevent ARP spoofing



Dynamic ARP Inspection (DAI) prevents ARP spoofing, which helps ensure that the access switch only passes "legal" ARP request and response information.The DAI works based on DHCP snooping. Ccie exam fee.The DHCP snooping listens to the binding table, including the binding information of the IP address and the MAC address, and associates it with a specific switch port.Dynamic ARP Inspection (DAI-Dynamic ARP Inspection) can be used to check ARP requests and responses (active ARP and inactive ARP) for all untrusted ports, ensuring that the response comes from the real MAC owner.The switch determines whether it is the real MAC owner by checking the DHCP binding information recorded by the port and the IP address of the ARP reply. The illegal ARP packet will be rejected.

The DAI is configured for the VLAN. For the interface in the same VLAN, the DAI can be enabled or disabled. If the ARP packet is received from a trusted interface, no check is required;Ccie exam fee.if an ARP packet is received from an untrusted interface, the packet can only be forwarded if the binding information is proven to be legitimate.In this way, DHCP Snooping is also essential for DAI. DAI is used dynamically, and the connected client host does not need to make any changes in settings.For servers that do not use DHCP, individual machines can be implemented by statically adding a DHCP binding table or an ARP access-list.

In addition, DAI can control the frequency of ARP request packets of a port.Once the ARP request frequency exceeds a preset threshold, the port is immediately closed. This feature can prevent the use of network scanning tools, and can also block viruses or attacks with a large number of ARP packet features.

Five, VLAN jump attack

There are two main ways for Vlan jump attacks:

1. IEEE 802.1q and ISL tag attacks

The IEEE 802.1q and ISL markup attacks mainly utilize the omission of the administrator to not explicitly configure "switch mode access" on the interface.By default, the switch port may be DTP (Dynamic Trunk Protocol) auto or DTP desirable.Ccie exam fee If an attacker sends a DTP negotiation packet, the interface becomes a trunk port and can receive traffic to any VLAN. As a result, an attacker can communicate with other VLANs through the port being controlled.For this type of attack, simply set all untrusted interface modes to access mode to prevent this attack.

2, double label

The attacker sends a frame with two tags to another switch through a trunk link. After the peer switch strips a tag, there is a tag in the data frame.The switch forwards the packet to the VLAN specified by that tag, and the attacker implements the purpose of accessing another VLAN from one VLAN.For this type of attack, you can set the native VLAN on the trunk link to a non-existing VLAN and prevent data from this VLAN from passing through the trunk link.

Publisher:IE LAB

publish Website: http://ielab.network

WhatsApp: +8617782638871

Skype:live:ielab.anna


Ccie exam fee Switch Security Introduction

Comments

Popular posts from this blog

Cisco ccie exam Linux overview and history

      Cisco ccie exam Linux overview and history Simply put, the Linux operating system is a clone of the UNIX operating system, which was born on October 5, 1991 (the first time it was officially announced). It's the same as Microsoft's Windows, apple's MAC OS and android on mobile phones. Cisco ccie exam.Compared to ordinary people, Linux system may be relatively unfamiliar, and most of them are probably familiar with Windows system. Since the graphical interface of Windows is simpler and easier to use, Windows occupies more markets, and Linux systems are mainly command-line operations, which are more demanding for professionalism.Cisco ccie exam Linux systems are stable, secure, and have strong concurrency, so they are widely used in the server field. The professional servers are almost all Linux systems. Linux is open source, free, everyone can see the source code of Linux, you can use Linux for free. And the Linux kernel is short and lean, and some can only be a ...

Cisco ccie exam Introduction to the OpenFlow protocol

Cisco ccie exam Introduction to the OpenFlow protocol OpenFlow, a network communication protocol, belongs to the data link layer and can control the forwarding plane of the network switch or router, thereby changing the network path of the network packet. OpenFlow protocol background: Forwarding and control separation is one of the essential features of SDN networks.In the SDN network architecture, the control plane is separated from the forwarding plane, the management and state of the network are logically grouped together, and the underlying network infrastructure is independent from the application, thereby enabling the network to achieve unprecedented programmable, controllable, and automated capabilities.Cisco ccie exam. This makes it easy for users to build highly scalable elastic networks based on business needs. To implement the transfer separation architecture of the SDN network, a communication interface standard needs to be established between the SDN controller and the dat...

CISCO CCIE EXAM 5G and WIFI6, still can't tell? (1)

cisco ccie exam 5G and WIFI6, still can't tell? (1) Ⅰ. the opening: On October 3, 2018, the Wi-Fi Alliance officially incorporated WiFi based on the 802.11ax standard into the regular army and became the sixth generation WiFi technology. The WiFi specification was renamed, the standard 802.11n was renamed to WiFi 4, the standard 802.11ac was renamed to WiFi 5, and the new standard 802.11ax was renamed to WiFi 6. (Of course, the previous generation of 802.11b/a/g can be chased as WiFi 1/2/3) Not only changed the naming convention of WiFi, but also in the network connection of WiFi devices. Also all use the new UI icon. The icon will display the level of the WiFi network you are currently connected to through the most intuitive numbers. Wi-Fi is well known to us. Wi-fi has evolved from 802.11b in 1999 and has gone through five generations. The Wi-Fi Alliance announced the simplification of the name of the new Wi-fi to Wi-fi6 when it introduced the new generation of 802.11ax stan...