– Chapter 5 – Secure LAN Switching

Slides:



Advertisements
Similar presentations
Access Control List (ACL)
Advertisements

Mitigating Layer 2 Attacks
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Networking Components
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
We will be covering VLANs this week. In addition we will do a practical involving setting up a router and how to create a VLAN.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Secure LAN Switching Layer 2 security Introduction Port-level controls
Chapter 4: Managing LAN Traffic
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Semester 3, v Chapter 3: Virtual LANs
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
Chapter 8: Virtual LAN (VLAN)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
1 CSCD 433 Network Programming Fall 2011 Lecture 5 VLAN's.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
LAN Switching and Wireless Basic Switch Concepts and Configuration.
W&L Page 1 CCNA CCNA Training 2.7 Configure and verify trunking on Cisco switches Jose Luis Flores / Amel Walkinshaw Aug, 2015.
Security fundamentals Topic 10 Securing the network perimeter.
Switching Topic 2 VLANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Cisco 3 - Switch Perrine. J Page 12/4/2016 Chapter 9 Which protocol is Cisco proprietary and designed to carry traffic from multiple VLANs? A Q.
+ Lecture#8: VLAN Asma AlOsaimi Topics VLAN Segmentation VLAN Implementation VLAN Security and Design 3.0.
Virtual Local Area Networks In Security By Mark Reed.
Security fundamentals
Instructor Materials Chapter 5: Network Security and Monitoring
Exploiting Layer 2 By Balwant Rathore.
Instructor Materials Chapter 7: Access Control Lists
SECURITY ZONES.
© 2002, Cisco Systems, Inc. All rights reserved.
Virtual Local Area Networks or VLANs
Instructor Materials Chapter 6: VLANs
Instructor Materials Chapter 5: Ethernet
Chapter 4 Data Link Layer Switching
– Chapter 5 – Secure LAN Switching
Chapter 2: Basic Switching Concepts and Configuration
VLAN Trunking Protocol
Virtual LANs.
Chapter 5: Network Security and Monitoring
Chapter 4: Access Control Lists (ACLs)
Routing and Switching Essentials v6.0
CCNA Routing and Switching Routing and Switching Essentials v6.0
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 3: Implementing VLAN Security
© 2002, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

– Chapter 5 – Secure LAN Switching Layer 2 security Port security IP permit lists Protocol filtering Controlling LAN floods (using port filtering, protocol filtering, etc.) Private VLANs Using IEEE 802.1x for port authentication and access control Network Security

Switch and Layer 2 security Security of lower layer devices is important, because some threats are initiated on Layer 2 rather than Layer 3 and above. Example: A firewall or a router cannot block a compromised server on a DMZ LAN from connecting to another server on the same segment.  because the connection occurs at Layer 2 More example attacks: http://www.cisco.com/ca/events/pdfs/L2-security-Bootcamp-final.pdf Focus of the chapter: Cisco Catalyst 5000 series switches Network Security

Switch and Layer 2 security (cont.) Rules of thumb: Use VLANs to create logical groupings of devices  Each of the groups may have different security levels. Disable unused ports, and place them in a VLAN with no Layer 3 access. Besides VLANs, other mechanisms must be used. Separate devices should be used for zones at different security levels. Disable Layer 3 connection (e.g., Telnet, HTTP) to the switch. Disable trunking on ports that do not require it. A trunk is an interface on a switch that can carry packets for any VLAN. When packets get sent between switches, each packet gets tagged, based on the IEEE standard for passing VLAN packets between bridges, 802.1Q. The receiving switch removes the tag and forwards the packet to the correct port or VLAN in the case of a broadcast packet.  “VLAN Insecurity” (http://www.spirit.com/Network/net0103.html) Network Security

Switch and Layer 2 security (cont.) How about attacks launched from hosts sitting on a LAN? In general, those hosts are considered as trusted entities. So it is difficult to stop a host when it becomes an attacker. Solution: Make sure access to the LAN is secured.  MAC address filtering (e.g., Cisco’s port security, DHCP) Network Security

Port security A mechanism to restrict the MAC addresses that can connect via a particular port of the switch Allows a range of MAC addresses to be specified for a particular port Only frames with a right MAC address can go through the switch. Useful for preventing MAC address flooding attacks CAM overflow: Content-Addressable Memory (aka. associated memory) CAM table stores information such as MAC addresses available on physical ports, with their associated VLAN params. CAM table has fixed size. When a CAM table is full, the switch is unable to create a new entry.  It forwards a received frame to all ports, resulting in increased traffic and allowing the attacker to examine all frames. So, CAM overflow attacks may lead to subsequent DoS and traffic analysis attacks (next slide) Network Security

MAC Address Flooding Network Security

MAC Address Flooding (cont.) Counter-measures: Hard-coding the MAC addresses that are allowed to connect on a port, or Limiting the number of hosts that are allowed to connect on a port Example 5-1: approach 1 + timed suspension Example 5-2: approach 2 Network Security

IP permit lists Purpose: To restrict higher layer traffic, such asTelnet, SSH, HTTP, and SNMP, from entering a switch Allows IP addresses to be specified that are allowed to send these kinds of traffic through the switch Example 5-3 Network Security

Protocol Filtering Purpose: To limit broadcast/multicasts for certain protocols With Cisco Catalyst 5000 series of switches, packets are classified into protocol groups: IP 2. IPX AppleTalk, DECnet, Banyan VINES 4. Other protocols A port is configured to belong to one or more of these groups. For each of the groups a port belong to, the port is in one of the following states (for that group): On  Receive all broadcast/multicast traffic for that protocol Off  no broadcast/multicast traffic for that protocol Auto  auto-configured port The port becomes a member of the protocol group only after the device connected to the port transmits packets of that specific protocol group. Once the attached device stops transmitting packets for that protocol for 60 minutes, the port is removed form that protocol group. Example 5-4 Network Security

Controlling LAN floods Attackers may cause frame flood (e.g., CAM flooding), or send broadcast/multicast messages to flood the LAN. Counter-measures: Protocol filtering Setting up threshold limits for broadcast/multicast traffic on ports Catalyst switches allow thresholds for broadcast traffic to be set up on a per-port basis. The thresholds can depend on either the bandwidth consumed by broadcasts or the number of broadcast packets being sent across a port. ‘Bandwidth consumed’ is a preferred measure. (Why?) Example: Console> (enable) set port broadcast 2/1-6 75% Other broadcast/multicast traffic is dropped when the bandwidth consumed by broadcast/multicast traffic reaches 75%. Network Security

Private VLANs An enhancement to Catalyst 6000 switches Traditional VLAN: no layer 2 segregation of devices of the same VLAN  So when one of the devices in a VLAN is compromised, other devices on the same VLAN may be compromised as well. Purpose of private VLANs: To allow restrictions to be placed on the Layer 2 traffic of a VLAN. Three types of private VLAN ports: Promiscuous ports: communicate with all other private VLAN ports Isolated ports: have complete Layer 2 isolation from other ports within the same private VLAN Community ports: communicate among themselves and with their promiscuous ports Network Security

Using IEEE 802.1x Purpose: (a) port authentication; (b) access control Other usage: used in 802.11i for WLAN security Network Security

Summary Next: NAT and security Network Security