Chapter 6: Securing the Local Area Network

Slides:



Advertisements
Similar presentations
Mitigating Layer 2 Attacks
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Switched Networks Routing And Switching 2.0.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
CCNPv5 Minimizing Service Loss and Data Theft in a Campus Network 1 Minimizing Service Loss and Data Theft in a Switched BCMSN Module 8 – Sec 2.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against Spoofing Attacks.
Wireless and Switch Security NETS David Mitchell.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 4 – Implementing Firewall Technologies.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Understanding Switch Security Issues.
Securing the Local Area Network
Layer 2 Security – No Longer Ignored Security Possibilities at Layer 2 Allan Alton, BSc CISA CISSP NetAnalyst UBC October 18, 2007.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. CCNA DHCP Deepdive November, 2011 Jaskaran Kalsi & Anton Merckushov Assoc.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Secure LAN Switching Layer 2 security Introduction Port-level controls
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
DHCP Security DHCP Snooping and Security David Mitchell 03/19/2008.
Chapter 11: Managing a Secure Network
Securing Wired Local Area Networks(LANs)
Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Chapter 8: Implementing Virtual Private Networks
Chapter 3: Authentication, Authorization, and Accounting
Chapter 7: Cryptographic Systems
FIRST TC 2002 John Kristoff - DePaul University 1 Local Network Attacks John Kristoff DePaul University Chicago, IL
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—15-1 Chapter 15 Blocking Configuration.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 4: Implementing Firewall Technologies
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against VLAN Attacks.
Chapter 1: Modern Network Security Threats
انجمن سیسکو به پارسی آشنایی با برخی حملات در لایه 2 آشنایی با برخی حملات در لایه 2 علیرضا.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
CCNP Routing and Switching Exam Pass4sure.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Cisco Implementing Cisco IP Switched Networks (SWITCH )
Instructor Materials Chapter 5: Network Security and Monitoring
Exploiting Layer 2 By Balwant Rathore.
Working at a Small-to-Medium Business or ISP – Chapter 8
Layer 2 Attacks and Security
– Chapter 5 – Secure LAN Switching
Chapter 5: Switch Configuration
Firewalls.
Introduction to Networking
Chapter 2: Basic Switching Concepts and Configuration
Chapter 2: Introduction to Switched Networks
Switch Concepts and Configuration Part II
Virtual LANs.
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Pass4itsure Cisco Dumps
Chapter 5: Network Security and Monitoring
What’s New in Fireware v12.1.1
2018 Huawei H Real Questions Killtest
Cisco Real Exam Dumps IT-Dumps
Valid Cisco Exam Study Material - Cisco Questions Answers Realexamdumps.com
IIS.
Cisco networking CNET-448
Network hardening Chapter 14.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Sécurisation au niveau 2 pour certains matériels Cisco
Presentation transcript:

Chapter 6: Securing the Local Area Network CCNA Security v2.0

Chapter Outline 6.0 Introduction 6.1 Endpoint Security 6.2 Layer 2 Security Threats 6.3 Summary Chapter Outline

Section 6.1: Endpoint Security Upon completion of this section, you should be able to: Describe endpoint security and the enabling technologies. Explain how Cisco AMP is used to ensure endpoint security. Explain how Cisco NAC authenticates and enforces the network security policy.

Topic 6.1.1: Introducing Endpoint Security

Securing LAN Elements 6.1.1.1 Securing LAN Elements

Traditional Endpoint Security

The Borderless Network

Securing Endpoints in the Borderless Network Post malware attack questions: Where did it come from? What was the threat method and point of entry? What systems were affected? What did the threat do? Can I stop the threat and root cause? How do we recover from it? How do we prevent it from happening again? Host-Based Protection: Antivirus/Antimalware SPAM Filtering URL Filtering Blacklisting Data Loss Prevention (DLP) 6.1.1.4 Securing Endpoints in the Borderless Network

Modern Endpoint Security Solutions

Hardware and Software Encryption of Local Data 6.1.1.7 Activity – Identify Endpoint Security Terminology (DND)

Topic 6.1.2: Antimalware Protection

Advanced Malware Protection

AMP and Managed Threat Defense Image is missing 6.1.2.2 AMP and Managed Threat Defense

AMP for Endpoints Image is missing 6.1.2.3 AMP for Endpoints

Topic 6.1.3: Email and Web Security

Securing Email and Web 6.1.3.1 Securing Email and Web

Cisco Email Security Appliance Features and benefits of Cisco Email Security solutions: Global threat intelligence Spam blocking Advanced malware protection Outbound message control 6.1.3.2 Cisco Email Security Appliance

Cisco Web Security Appliance Client Initiates Web Request WSA Forwards Request 6.1.3.3 Cisco Web Security Appliance Reply Sent to WSA and Then To Client

Topic 6.1.4: Controlling Network Access

Cisco Network Admission Control

Cisco NAC Functions 6.1.4.2 Cisco NAC Functions

Cisco NAC Components 6.1.4.3 Cisco NAC Components

Network Access for Guests Three ways to grant sponsor permissions: to only those accounts created by the sponsor to all accounts to no accounts (i.e., they cannot change any permissions) 6.1.4.4 Network Access for Guests

Cisco NAC Profiler 6.1.4.5 Cisco NAC Profiler

Section 6.2: Layer 2 Security Considerations Upon completion of the section, you should be able to: Describe Layer 2 vulnerabilities. Describe CAM table overflow attacks. Configure port security to mitigate CAM table overflow attacks. Configure VLAN Truck security to mitigate VLAN hopping attacks. Implement DHCP Snooping to mitigate DHCP attacks. Implement Dynamic Arp Inspection to mitigate ARP attacks. Implement IP Source Guard to mitigate address spoofing attacks.

Topic 6.2.1: Layer 2 Security Threats

Describe Layer 2 Vulnerabilities

Switch Attack Categories

Topic 6.2.2: CAM Table Attacks

Basic Switch Operation

CAM Table Operation Example

CAM Table Attack Intruder Runs Attack Tool Fill CAM Table

CAM Table Attack Switch Floods All Traffic Attacker Captures Traffic 6.2.2.3 CAM Table Attack (Cont.) Attacker Captures Traffic

CAM Table Attack Tools 6.2.2.4 CAM Attack Tools

Topic 6.2.3: Mitigating CAM Table Attacks

Countermeasure for CAM Table Attacks

Port Security Enabling Port Security Verifying Port Security Port Security Options

Enabling Port Security Options Setting the Maximum Number of Mac Addresses Manually Configuring Mac Addresses 6.2.3.3 Enabling Port Security Options Learning Connected Mac Addresses Dynamically

Port Security Violations Security Violation Modes: Protect Restrict Shutdown 6.2.3.4 Port Security Violations

Port Security Aging 6.2.3.5 Port Security Aging

Port Security with IP Phones

SNMP MAC Address Notification

Topic 6.2.4: Mitigating VLAN Attacks

VLAN Hopping Attacks 6.2.4.1 VLAN Hopping Attacks

VLAN Double-Tagging Attack Step 1 – Double Tagging Attack Step 2 – Double Tagging Attack 6.2.4.2 VLAN Double-Tagging Attack Step 3 – Double Tagging Attack

Mitigating VLAN Hopping Attacks 6.2.4.3

PVLAN Edge Feature 6.2.4.4 PVLAN Edge Feature

Verifying Protected Ports

Private VLANs 6.2.4.6 Private VLANs 6.2.4.7 Video Demonstration – Private VLAN tutorial and demonstration

Topic 6.2.5: Mitigating DHCP Attacks

DHCP Spoofing Attack 6.2.5.1 DHCP Spoofing Attack

DHCP Starvation Attack Attacker Initiates a Starvation Attack DHCP Server Offers Parameters 6.2.5.2 DHCP Starvation Attack

DHCP Starvation Attack Client Requests all Offers DHCP Server Acknowledges All Requests 6.2.5.2 DHCP Starvation Attack (Cont.)

Mitigating VLAN Attacks The switch will deny packets containing specific information: Unauthorized DHCP server messages from an untrusted port Unauthorized DHCP client messages not adhering to the snooping binding table or rate limits DHCP relay-agent packets that include option-82 information on an untrusted port 1.2.3.3 Trojan Horses 1.2.3.4 Trojan Horse Classification

Configuring DHCP Snooping 6.2.5.5 Configuring DHCP Snooping Example

Configuring DHCP Snooping Example DHCP Snooping Reference Topology Configuring a Maximum Number of MAC Addresses 6.2.5.5 Configuring DHCP Snooping Example

Configuring DHCP Snooping Example Verifying DHCP Snooping 6.2.5.5 Configuring DHCP Snooping Example (Cont.) Configuring a Maximum Number of MAC Addresses

Topic 6.2.6: Mitigating ARP Attacks

ARP Spoofing and ARP Poisoning Attack

Mitigating ARP Attacks Dynamic ARP Inspection: 6.2.6.2 Mitigating ARP Attacks

Configuring Dynamic ARP Inspection 6.2.6.5 Configuring Dynamic ARP Inspection Example

Configuring DHCP Snooping Example ARP Reference Topology 6.2.6.4 Configuring Dynamic ARP Inspection Example Configuring Dynamic ARP Inspection

Configuring DHCP Snooping Example Checking Source, Destination, and IP 6.2.6.4 Configuring Dynamic ARP Inspection Example (Cont.)

Topic 6.2.7: Mitigating Address Spoofing Attacks

Address Spoofing Attack

Mitigating Address Spoofing Attacks For each untrusted port, there are two possible levels of IP traffic security filtering: Source IP address filter Source IP and MAC address filter 6.2.7.2 Mitigating Address Spoofing Attacks

Configuring IP Source Guard IP Source Guard Reference Topology Configuring IP Source Guard 6.2.7.3 Configuring IP Source Guard Checking IP Source Guard

Topic 6.2.8: Spanning Tree Protocol

Introduction to the Spanning Tree Protocol

Various Implementations of STP

STP Port Roles 6.2.8.3 STP Port Roles

STP Root Bridge 6.2.8.4 STP Root Bridge

STP Path Cost 6.2.8.5 STP Path Cost

802.1D BPDU Frame Format 6.2.8.6 802.1D BPDU Frame Format

BPDU Propagation and Process

Extended System ID 6.2.8.8 Extended System ID

Select the Root Bridge 6.2.8.9 Select the Root Bridge 6.2.8.10 Activity – Identify the 802.1D RSTP Port Roles 6.2.8.11 Activity – Troubleshoot STP Configuration Issues 6.2.8.12 Video Demonstration – Observing Spanning Tree Protocol Operation

Topic 6.2.9: Mitigating STP Attacks

STP Manipulation Attacks Spoofing the Root Bridge 6.2.9.1 STP Manipulation Attacks Successful STP Manipulation Attack

Mitigating STP Attacks

Configuring PortFast 6.2.9.3 Configuring PortFast

Configuring BDPU Guard 6.2.9.4 Configuring BPDU Guard

Configuring Root Guard 6.2.9.5

Configuring Loop Guard

Section 6.3: Summary Chapter Objectives: Explain endpoint security. Describe various types of endpoint security applications. Describe Layer 2 vulnerabilities. 6.3.1.1 Packet Tracer – Layer 2 Security 6.3.1.2 Packet Tracer – Layer 2 VLAN Security 6.3.1.3 Lab – Securing Layer 2 Switches 6.3.1.4 Summary

Instructor Resources Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com) These resources cover a variety of topics including navigation, assessments, and assignments. A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2 https://www.netacad.com