Podcast
Questions and Answers
What is a zero-day attack?
What is a zero-day attack?
- An attack that occurs on a system that is fully up to date
- An attack that exploits a vulnerability before a patch is available (correct)
- An attack that occurs at midnight
- An attack on older, unsupported software
What is a key advantage of an Intrusion Detection System (IDS)?
What is a key advantage of an Intrusion Detection System (IDS)?
- Requires traffic to be mirrored in order to reach it (correct)
- Does not require network traffic monitoring
- Instantly stops all malicious traffic
- Works in-line to actively block threats
Which of the following describes how an IPS is implemented?
Which of the following describes how an IPS is implemented?
- In an inline mode (correct)
- Without monitoring traffic
- As a passive monitoring tool
- In an offline mode
Which layer of the OSI model does an IPS inspect for malicious traffic?
Which layer of the OSI model does an IPS inspect for malicious traffic?
Which of the following is a common characteristic of both IDS and IPS?
Which of the following is a common characteristic of both IDS and IPS?
Which of these is an advantage of using an IDS?
Which of these is an advantage of using an IDS?
What factor does NOT affect IPS sensor selection?
What factor does NOT affect IPS sensor selection?
What is a disadvantage of network-based IPS?
What is a disadvantage of network-based IPS?
In which mode does an IPS operate when it is directly in the path of network traffic?
In which mode does an IPS operate when it is directly in the path of network traffic?
What is the purpose of a SPAN port?
What is the purpose of a SPAN port?
A zero-day attack exploits vulnerabilities that are unknown to the vendor.
A zero-day attack exploits vulnerabilities that are unknown to the vendor.
An Intrusion Detection System (IDS) operates in-line, actively blocking malicious traffic.
An Intrusion Detection System (IDS) operates in-line, actively blocking malicious traffic.
An IPS is deployed to only monitor network traffic and generate alerts.
An IPS is deployed to only monitor network traffic and generate alerts.
IDS and IPS technologies both cannot be deployed as sensors.
IDS and IPS technologies both cannot be deployed as sensors.
An advantage of an IDS is that it has a significant impact on network performance.
An advantage of an IDS is that it has a significant impact on network performance.
A disadvantage of using an IPS is that sensor issues might affect network traffic.
A disadvantage of using an IPS is that sensor issues might affect network traffic.
Host-based IPS is operating system independent.
Host-based IPS is operating system independent.
In promiscuous mode, an IPS sensor sits directly in the path of network traffic.
In promiscuous mode, an IPS sensor sits directly in the path of network traffic.
SPAN ports are configured to mirror network traffic for analysis by security devices.
SPAN ports are configured to mirror network traffic for analysis by security devices.
A signature only uses a trigger and action attribute.
A signature only uses a trigger and action attribute.
What is the primary focus of endpoint security?
What is the primary focus of endpoint security?
Which of these is considered a traditional method of endpoint security?
Which of these is considered a traditional method of endpoint security?
What is the purpose of URL filtering in host-based protection?
What is the purpose of URL filtering in host-based protection?
What does NAC primarily do in network security?
What does NAC primarily do in network security?
What is the function of a Web Security Appliance (WSA)?
What is the function of a Web Security Appliance (WSA)?
What is a key feature of Cisco Email Security solutions?
What is a key feature of Cisco Email Security solutions?
Which OSI layer is most associated with Ethernet frames?
Which OSI layer is most associated with Ethernet frames?
What is a CAM table overflow attack designed to do?
What is a CAM table overflow attack designed to do?
What is the primary function of port security?
What is the primary function of port security?
What type of attack is DHCP snooping used to prevent?
What type of attack is DHCP snooping used to prevent?
Endpoint security only focuses on protecting devices physically connected to the LAN.
Endpoint security only focuses on protecting devices physically connected to the LAN.
Cisco AMP helps ensure endpoint security.
Cisco AMP helps ensure endpoint security.
A host-based firewall is an example of traditional endpoint security.
A host-based firewall is an example of traditional endpoint security.
URL filtering is a reactive approach to host-based protection.
URL filtering is a reactive approach to host-based protection.
NAC stands for Network Authentication Control.
NAC stands for Network Authentication Control.
Cisco Email Security solutions include advanced malware protection.
Cisco Email Security solutions include advanced malware protection.
A web server sends a reply directly to the client, bypassing the Cisco Web Security Appliance.
A web server sends a reply directly to the client, bypassing the Cisco Web Security Appliance.
Layer 3 vulnerabilities are the primary focus of LAN security.
Layer 3 vulnerabilities are the primary focus of LAN security.
CAM table overflow attacks rely on flooding the network with legitimate MAC addresses.
CAM table overflow attacks rely on flooding the network with legitimate MAC addresses.
DHCP snooping helps prevent DHCP spoofing attacks.
DHCP snooping helps prevent DHCP spoofing attacks.
Flashcards
What are Zero-Day Attacks?
What are Zero-Day Attacks?
Attacks that exploit previously unknown vulnerabilities, leaving systems with no existing defenses.
What is an IDS?
What is an IDS?
An Intrusion Detection System is the passive monitoring of network traffic, requiring mirroring to reach it.
What is an IPS?
What is an IPS?
An Intrusion Prevention System acts immediately on malicious traffic, operating in an inline mode to monitor Layers 3 and 4.
Similarities: IDS and IPS?
Similarities: IDS and IPS?
Signup and view all the flashcards
Advantages and Disadvantages: IDS vs IPS?
Advantages and Disadvantages: IDS vs IPS?
Signup and view all the flashcards
What are Host-Based IPS?
What are Host-Based IPS?
Signup and view all the flashcards
What are Network-Based IPS?
What are Network-Based IPS?
Signup and view all the flashcards
Cisco SPAN's Role?
Cisco SPAN's Role?
Signup and view all the flashcards
What is a Signature?
What is a Signature?
Signup and view all the flashcards
Signature Types?
Signature Types?
Signup and view all the flashcards
How does an IDS monitor attacks?
How does an IDS monitor attacks?
Signup and view all the flashcards
How does an IPS detect and stop attacks?
How does an IPS detect and stop attacks?
Signup and view all the flashcards
What part of traffic does IPS focus on?
What part of traffic does IPS focus on?
Signup and view all the flashcards
Advantages and Disadvantages of Network IPS?
Advantages and Disadvantages of Network IPS?
Signup and view all the flashcards
What is Pattern-based Detection?
What is Pattern-based Detection?
Signup and view all the flashcards
Atomic Signature with Pattern-Based Detection?
Atomic Signature with Pattern-Based Detection?
Signup and view all the flashcards
Pattern Detection: Composite Signature?
Pattern Detection: Composite Signature?
Signup and view all the flashcards
IPS Alarm: False Positive?
IPS Alarm: False Positive?
Signup and view all the flashcards
IPS Alarm: False Negative?
IPS Alarm: False Negative?
Signup and view all the flashcards
IPS Signature Actions?
IPS Signature Actions?
Signup and view all the flashcards
Endpoint Security
Endpoint Security
Signup and view all the flashcards
Anti-malware software
Anti-malware software
Signup and view all the flashcards
Borderless network
Borderless network
Signup and view all the flashcards
Web Security Appliance (WSA)
Web Security Appliance (WSA)
Signup and view all the flashcards
Email Security Appliance (ESA)
Email Security Appliance (ESA)
Signup and view all the flashcards
Network Admission Control (NAC)
Network Admission Control (NAC)
Signup and view all the flashcards
Layer 2 Security Threats
Layer 2 Security Threats
Signup and view all the flashcards
CAM Table Overflow Attack
CAM Table Overflow Attack
Signup and view all the flashcards
Port Security
Port Security
Signup and view all the flashcards
DHCP Spoofing Attack
DHCP Spoofing Attack
Signup and view all the flashcards
Traditional Endpoint Security
Traditional Endpoint Security
Signup and view all the flashcards
What is AMP?
What is AMP?
Signup and view all the flashcards
Cisco Email Security Benefits
Cisco Email Security Benefits
Signup and view all the flashcards
What is NAC?
What is NAC?
Signup and view all the flashcards
What are Layer 2 Vulnerabilities?
What are Layer 2 Vulnerabilities?
Signup and view all the flashcards
What is Macof?
What is Macof?
Signup and view all the flashcards
What are Switch Attack Categories?
What are Switch Attack Categories?
Signup and view all the flashcards
CAM Table Attack Result
CAM Table Attack Result
Signup and view all the flashcards
Port Security Countermeasure
Port Security Countermeasure
Signup and view all the flashcards
What is DHCP Spoofing?
What is DHCP Spoofing?
Signup and view all the flashcards
Study Notes
Chapter 6: Securing the Local Area Network
- This chapter focuses on securing local area networks, covering endpoint security and Layer 2 security threats.
- Authored by Dr. Nadhir Ben Halima
6.0 Introduction
- The chapter introduces the concepts and methods for securing LANs.
6.1 Endpoint Security
- Endpoint security and its enabling technologies are a key focus.
- How Cisco AMP is used for endpoint security is examined.
- Cisco NAC's role in authenticating and enforcing network security policies is explained.
Securing LAN Elements
- A typical LAN setup includes elements like the internet, web server, VPN, email server, firewall, ESA/WSA, DNS, IPS, hosts, and ACS (Access Control System).
Traditional Endpoint Security
- Traditional endpoint security involves host-based protection, including antivirus/antimalware software, host-based IPS, and host-based firewalls.
Securing Endpoints in the Borderless Network
- Securing endpoints considers questions post-attack, such as origin, threat method, affected systems, impact, mitigation, recovery, and prevention.
- Host-based protection measures include antivirus/antimalware, SPAM filtering, URL filtering, and blacklisting.
Modern Endpoint Security Solutions
- Modern solutions incorporate AMP (Advanced Malware Protection), NAC (Network Admission Control), ESA (Email Security Appliance), and WSA (Web Security Appliance).
Antimalware Protection
- Advanced Malware Protection involves stages: before (discover, enforce, harden), during (detect, block, defend), and after (scope, contain, remediate).
AMP and Managed Threat Defense
- Talos teams gather real-time threat intelligence from 1.6 million deployed security devices, including firewalls, IPS, web, and email appliances, and 150 million endpoints.
- 100 TB of security intelligence is analyzed daily, along with 13 billion web requests per day, and 35% of global enterprise email traffic
Email and Web Security
- Focuses on securing email and web traffic in the LAN environment.
Cisco Email Security Appliance
- Features include spam blocking, advanced malware protection, and outbound message control.
Cisco Web Security Appliance
- Handles web requests, forwards them, and filters replies to protect the network.
- Client initiates a web request, the WSA forwards the request, and then the reply is sent to WSA and then to the client.
Controlling Network Access
- Managing and securing network access are critical components of LAN security.
Cisco NAC Functions
- NAC functions include authentication, authorization, and posture assessment for network access.
6.2 Layer 2 Security Threats
- The section focuses on Layer 2 vulnerabilities.
- CAM table overflow attacks are discussed.
- Mitigating attacks by configuring port security is covered.
- VLAN Trunk security minimizes VLAN hopping attacks.
- DHCP Snooping is implemented to mitigate DHCP attacks.
- Dynamic ARP Inspection is implemented to mitigate ARP attacks.
- IP Source Guard mitigates address spoofing attacks.
Layer 2 Vulnerabilities
- Layer 2 vulnerabilities exist at the Data Link layer, corresponding to Ethernet frames; initial compromise occurs at this level.
Switch Attack Categories
- Switch attacks fall into categories: CAM table attacks, STP attacks, VLAN attacks, address spoofing attacks, DHCP attacks, and ARP attacks.
CAM Table Attacks
- CAM table attacks exploit the switch's MAC address table.
Basic Switch Operation
- Switches maintain a MAC address table, mapping MAC addresses to ports.
CAM Table Operation Example
- Shows how a switch forwards traffic based on the CAM table.
CAM Table Attack Explained
- CAM table attack involves flooding the switch with bogus MAC addresses to fill the CAM table, causing the switch to flood all traffic.
- Intruder uses a tool to begin sending unknown bogus MAC addresses.
- Fill the CAM table to cause switch flooding.
CAM Table Attack Tools
- Tools are available to flood the network with MAC addresses for CAM table attacks.
Mitigating CAM Table Attacks
- Port security can limit MAC addresses allowed on a port.
Countermeasures for CAM Table Attacks
- Implementing port security allows only specific MAC addresses on a port, blocking unauthorized traffic.
Port Security
- Provides options to secure switch ports. Verification and implementation commands of switch-port security are featured.
Port Security Options
- Includes aging settings, MAC address control, maximum MAC addresses, and violation settings.
Enabling Port Security Options
- Setting the maximum number of MAC addresses that can be learned on the port.
- Configuring MAC addresses manually.
- Dynamically learning connected MAC addresses.
Port Security Violations
- Security violation modes include Protect, Restrict, and Shutdown.
- Protect forwards traffic, sends no syslog message, and does not increase the violation counter, whilst not shutting down the port.
- Restrict does not forward traffic, sends a syslog message, increases the violation counter but does not shut down the port.
- Shutdown does not forward traffic, sends a syslog message, increases the violation counter and also shuts down the port.
Port Security with IP Phones
- Securing ports used by IP phones is discussed.
Mitigating DHCP Attacks
- DHCP attacks, like spoofing and starvation, are considered.
DHCP Spoofing Attack
- A rogue DHCP server provides incorrect IP configuration information to clients.
DHCP Starvation Attack
- An attacker exhausts the DHCP address pool, preventing legitimate clients from obtaining IP addresses. -Attacker initiates discovery protocol request (size of scope), the DHCP server sends out offers(size of scope), attacker then requests all offers(size of scope) which are then acknowledged(size of scope).
Configuring DHCP Snooping
- Trusted and untrusted ports are specified and used to combat rogue DHCP servers.
Configuring DHCP Snooping Example
-
DHCP snooping is configured on trusted interfaces to forward DHCP traffic and on untrusted interfaces to prevent rogue DHCP servers
-
Includes configuring a maximum number of MAC addresses for DHCP snooping.
-
Verifying DHCP snooping through the command line.
S1# show ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
- -------------------- --------------- ---------- --------------- ---- --------------------
00:03:47:B5:9F:AD 192.168.10.10 193185 dhcp-snooping 5 FastEthernet0/5
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.