1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
Mitigating Layer 2 Attacks
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
CCNPv5 Minimizing Service Loss and Data Theft in a Campus Network 1 Minimizing Service Loss and Data Theft in a Switched BCMSN Module 8 – Sec 2.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against Spoofing Attacks.
1 © 2003, Cisco Systems, Inc. All rights reserved. Vyncke ethernet security Ethernet: Layer 2 Security Eric Vyncke Cisco Systems Distinguished Engineer.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Understanding Switch Security Issues.
Securing the Local Area Network
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Describing STP Stability Mechanisms.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Configuring VLANs.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
Layer 2 Security – No Longer Ignored Security Possibilities at Layer 2 Allan Alton, BSc CISA CISSP NetAnalyst UBC October 18, 2007.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—2-1 Implementing VLANs in Campus Networks Applying Best Practices for VLAN Topologies.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Configuring a Catalyst Switch.
Secure LAN Switching Layer 2 security Introduction Port-level controls
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
– Chapter 5 – Secure LAN Switching
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VLANs.
Chapter 3 test.  VLANS group hosts _____________________ logically or physically?  Logically—regardless of physical location  Devices in one VLAN do.
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Bypass a VPN, ACL, and VLAN ECE 4112 Alaric Craig and Pritesh Patel.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
Lecture2 Secured Network Design W.Lilakiatsakun.  ARP  Problems with ARP / Countermeasures  VLAN  Attacking on VLAN / Countermeasures Topics.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part III Working with Redundant Links.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless VLANs Chapter 3 Modified by Pete Brierley.
CHAPTER 10 Voice Security. VoIP Security Requirements: Integrity: The recipient should receive the packets that the originator sends without and change.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
Chapter 6: Securing the Local Area Network
Switching Topic 2 VLANs.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against VLAN Attacks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Virtual Local Area Networks (VLANs) Part II
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 VLAN Trunking Protocol Cisco Networking Academy.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
Layer-2 Switching and STP
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
انجمن سیسکو به پارسی آشنایی با برخی حملات در لایه 2 آشنایی با برخی حملات در لایه 2 علیرضا.
CCNA1 v3 Module 8 v3 CCNA 1 Module 8 JEOPARDY S Dow.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Understanding Switch Security.
Cisco Implementing Cisco IP Switched Networks (SWITCH )
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
CCNA Practice Exam Questions
Instructor Materials Chapter 5: Network Security and Monitoring
Exploiting Layer 2 By Balwant Rathore.
Chapter Six Securing the Local Area Network
Layer 2 Attacks and Security
Switching and VLANs.
– Chapter 5 – Secure LAN Switching
حملات به شبکه های محلی و راه های مقابله
Chapter 2: Basic Switching Concepts and Configuration
Introduction to Networking
Chapter 5: Network Security and Monitoring
Chapter 3: Implementing VLAN Security
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Sécurisation au niveau 2 pour certains matériels Cisco
Presentation transcript:

1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.

2 © 2005 Cisco Systems, Inc. All rights reserved. Network Security 1 Module 10 – Configure Filtering on a Switch

3 © 2005 Cisco Systems, Inc. All rights reserved. Learning Objectives 10.1 Introduction to Layer 2 Attacks 10.2 MAC Address, ARP, and DHCP Vulnerabilities 10.3 VLAN Vulnerabilities 10.4 Spanning-Tree Protocol Vulnerabilities

4 © 2005 Cisco Systems, Inc. All rights reserved. Module 10 – Configure Filtering on a Switch 10.1 Introduction to Layer 2 Attacks

5 © 2005 Cisco Systems, Inc. All rights reserved. Types of Attacks CAM table overflow Media Access Control (MAC) address spoofing DHCP starvation

6 © 2005 Cisco Systems, Inc. All rights reserved. Module 10 – Configure Filtering on a Switch 10.2 MAC Address, ARP, and DHCP Vulnerabilities

7 © 2005 Cisco Systems, Inc. All rights reserved. CAM Table Overflow Attack AB C D VLAN 10 ABC Attacker sees traffic to servers B and D 3/25 3/25 MAC E 3/25 MAC F 3/25 MAC G ABC B D

8 © 2005 Cisco Systems, Inc. All rights reserved. Mitigating the CAM Table Overflow Attack switch(config-if)# switchport port-security Enable port security on interface. switch(config-if)# switchport port-security [mac_addr] Enable port security and set specific MAC address (H.H.H).

9 © 2005 Cisco Systems, Inc. All rights reserved. Mitigating the CAM Table Overflow Attack switch(config-if)# switchport port-security maximum (1-132) Set maximum number of MAC addresses. switch(config-if)# switchport port-security violation shutdown [protect | restrict | shutdown] Set action on violation.

10 © 2005 Cisco Systems, Inc. All rights reserved. MAC Spoofing – Man in the Middle Attacks A B C ABC SWITCH PORT 123 MAC A A B C ABC SWITCH PORT 123 Attacker

11 © 2005 Cisco Systems, Inc. All rights reserved. Mitigating MAC Spoofing Attacks – Cisco IOS switch(config-if)# port security max-mac-count {1-132} Enable port security and set maximum MAC address. switch(config-if)# port security action {shutdown|trap} Specify action to take when violation occurs. switch(config-if)# arp timeout seconds Specify ARP timeout.

12 © 2005 Cisco Systems, Inc. All rights reserved. ARP Spoofing /24.2 Attacker.1 ARP for.1 I’m.1!

13 © 2005 Cisco Systems, Inc. All rights reserved. Mitigating ARP Spoofing with DHCP Snooping ip dhcp snooping switch(config)# Enable DHCP Snooping. ip dhcp snooping vlan vlan_id {,vlan_id} switch(config)# Enable DHCP Snooping for specific VLANs. ip dhcp snooping trust switch(config-if)# Configure an interface as trusted for DHCP snooping purposes.

14 © 2005 Cisco Systems, Inc. All rights reserved. Mitigating ARP Spoofing with DHCP Snooping ip dhcp snooping limit rate rate switch(config-if)# Set rate limit for DHCP Snooping.

15 © 2005 Cisco Systems, Inc. All rights reserved. DHCP Starvation DHCP Server DHCP Requests with spoofed MAC addresses Attacker attempting to set up rogue DHCP Server

16 © 2005 Cisco Systems, Inc. All rights reserved. Commands to Mitigate DHCP Starvation Attacks ip dhcp snooping switch(config)# Enable DHCP Snooping. ip dhcp snooping vlan vlan_id {,vlan_id} switch(config)# Enable DHCP Snooping for specific VLANs. ip dhcp snooping trust switch(config-if)# Set interface to trusted state.

17 © 2005 Cisco Systems, Inc. All rights reserved. Commands to Mitigate DHCP Starvation Attacks (Cont.) ip dhcp snooping limit rate rate switch(config-if)# Set rate limit for DHCP Snooping.

18 © 2005 Cisco Systems, Inc. All rights reserved. Module 10 – Configure Filtering on a Switch 10.3 VLAN Vulnerabilities

19 © 2005 Cisco Systems, Inc. All rights reserved. Double 802.1q Encapsulation VLAN Hopping Attack Send 802.1q double encapsulated frames Switch performs only one level of decapsulation Unidirectional traffic only Works even if trunk ports are set to off VLAN 1,VLAN 2 The first 802.1q header is removed Note: Only works if the trunk is configured with the native VLAN of the network attacker

20 © 2005 Cisco Systems, Inc. All rights reserved. Double 802.1q Encapsulation VLAN Hopping Attack Send 802.1q double encapsulated frames Switch performs only one level of decapsulation Unidirectional traffic only Works even if trunk ports are set to off The frame is forwarded with the second 802.1q header VLAN 1 Note: Only works if the trunk is configured with the native VLAN of the network attacker

21 © 2005 Cisco Systems, Inc. All rights reserved. Double 802.1q Encapsulation VLAN Hopping Attack Send 802.1q double encapsulated frames Switch performs only one level of decapsulation Unidirectional traffic only Works even if trunk ports are set to off The frame reaches a host on a VLAN that the attacker does not belong to VLAN 1 Note: Only works if the trunk is configured with the native VLAN of the network attacker

22 © 2005 Cisco Systems, Inc. All rights reserved. Security Best Practices for VLANs and Trunking Always use a dedicated VLAN ID for all trunk ports Disable unused ports and put them in an unused VLAN Be paranoid – Do not use VLAN 1 for anything Disable auto-trunking on user facing ports (DTP off) Explicitly configure trunking on infrastructure ports Use all tagged mode for the native VLAN on trunks

23 © 2005 Cisco Systems, Inc. All rights reserved. Module 10 – Configure Filtering on a Switch 10.4 Spanning-Tree Vulnerabilities

24 © 2005 Cisco Systems, Inc. All rights reserved. Spanning Tree Attack Example The attacker sends BPDU messages to become the root bridge Access Switches Root X BPDU BPDU Blocked

25 © 2005 Cisco Systems, Inc. All rights reserved. Spanning Tree Attack Example The attacker sends BPDU messages to become the root bridge The attacker then sees frames he shouldn’t Man in the middle and DoS attacks become possible This attack requires that the attacker is connected to two different switches. This can be done with either multiple NICs or a with a hub. Access Switches Root X Blocked

26 © 2005, Cisco Systems, Inc. All rights reserved.