Podcast
Questions and Answers
What command is used to enable PortFast globally on a Cisco device?
What command is used to enable PortFast globally on a Cisco device?
Enabling PortFast on an inter-switch link can lead to which of the following issues?
Enabling PortFast on an inter-switch link can lead to which of the following issues?
Which command is used to verify if PortFast is enabled on a specific interface?
Which command is used to verify if PortFast is enabled on a specific interface?
BPDU Guard is a feature that prevents which of the following?
BPDU Guard is a feature that prevents which of the following?
Signup and view all the answers
If an access port receives an unexpected BPDU while BPDU Guard is enabled, what happens?
If an access port receives an unexpected BPDU while BPDU Guard is enabled, what happens?
Signup and view all the answers
What is a primary reason for Layer 2 being considered a weak link in network security?
What is a primary reason for Layer 2 being considered a weak link in network security?
Signup and view all the answers
Which of the following accurately describes a MAC address flooding attack?
Which of the following accurately describes a MAC address flooding attack?
Signup and view all the answers
Which attack technique aims to exploit the limitation of MAC address table size?
Which attack technique aims to exploit the limitation of MAC address table size?
Signup and view all the answers
What happens when a switch's MAC address table is full due to flooding?
What happens when a switch's MAC address table is full due to flooding?
Signup and view all the answers
Which attack is categorized under VLAN attacks?
Which attack is categorized under VLAN attacks?
Signup and view all the answers
Which type of attack can manipulate the Spanning Tree Protocol (STP)?
Which type of attack can manipulate the Spanning Tree Protocol (STP)?
Signup and view all the answers
Address spoofing attacks can involve which type of addresses?
Address spoofing attacks can involve which type of addresses?
Signup and view all the answers
What is one consequence of a successful DHCP starvation attack?
What is one consequence of a successful DHCP starvation attack?
Signup and view all the answers
What method can a threat actor use to keep a switch from returning to its correct port assignment?
What method can a threat actor use to keep a switch from returning to its correct port assignment?
Signup and view all the answers
How can IP address and MAC address spoofing be mitigated?
How can IP address and MAC address spoofing be mitigated?
Signup and view all the answers
What is one way attackers manipulate the Spanning Tree Protocol (STP)?
What is one way attackers manipulate the Spanning Tree Protocol (STP)?
Signup and view all the answers
What is the function of BPDU Guard in network security?
What is the function of BPDU Guard in network security?
Signup and view all the answers
Which command disables CDP globally on a Cisco device?
Which command disables CDP globally on a Cisco device?
Signup and view all the answers
What type of information does Cisco Discovery Protocol (CDP) include in its broadcasts?
What type of information does Cisco Discovery Protocol (CDP) include in its broadcasts?
Signup and view all the answers
What command is used to disable CDP on an individual interface?
What command is used to disable CDP on an individual interface?
Signup and view all the answers
Which protocol is also mentioned to be vulnerable to reconnaissance attacks?
Which protocol is also mentioned to be vulnerable to reconnaissance attacks?
Signup and view all the answers
What is the effect of a rogue DNS server providing an incorrect address?
What is the effect of a rogue DNS server providing an incorrect address?
Signup and view all the answers
What is a characteristic of ARP attacks?
What is a characteristic of ARP attacks?
Signup and view all the answers
How can Dynamic ARP Inspection (DAI) help address ARP spoofing?
How can Dynamic ARP Inspection (DAI) help address ARP spoofing?
Signup and view all the answers
What happens during an IP address spoofing attack?
What happens during an IP address spoofing attack?
Signup and view all the answers
What happens during a gratuitous ARP attack?
What happens during a gratuitous ARP attack?
Signup and view all the answers
What is a challenge with MAC address spoofing?
What is a challenge with MAC address spoofing?
Signup and view all the answers
What does IP address spoofing make difficult?
What does IP address spoofing make difficult?
Signup and view all the answers
What does IPv6 use for Layer 2 address resolution instead of ARP?
What does IPv6 use for Layer 2 address resolution instead of ARP?
Signup and view all the answers
Which command is used to set a static MAC address on a port?
Which command is used to set a static MAC address on a port?
Signup and view all the answers
What happens when a switch is rebooted after dynamically learning MAC addresses?
What happens when a switch is rebooted after dynamically learning MAC addresses?
Signup and view all the answers
Which command allows dynamically learned MAC addresses to be saved to NVRAM?
Which command allows dynamically learned MAC addresses to be saved to NVRAM?
Signup and view all the answers
What is the main purpose of port security aging?
What is the main purpose of port security aging?
Signup and view all the answers
When an administrator wants to configure the aging type to 10 minutes of inactivity, which command would they use?
When an administrator wants to configure the aging type to 10 minutes of inactivity, which command would they use?
Signup and view all the answers
What is the correct command to view the current port security configuration on an interface?
What is the correct command to view the current port security configuration on an interface?
Signup and view all the answers
What is the maximum number of secure MAC addresses that can be manually configured on a port in the example scenario?
What is the maximum number of secure MAC addresses that can be manually configured on a port in the example scenario?
Signup and view all the answers
What happens when a port experiences a violation due to an unknown MAC address?
What happens when a port experiences a violation due to an unknown MAC address?
Signup and view all the answers
Which command is used to set the port security violation mode?
Which command is used to set the port security violation mode?
Signup and view all the answers
In restrict mode, what action does the switch take when a security violation occurs?
In restrict mode, what action does the switch take when a security violation occurs?
Signup and view all the answers
What does the command 'show port-security interface' reveal when there is a port in error-disabled state?
What does the command 'show port-security interface' reveal when there is a port in error-disabled state?
Signup and view all the answers
What must an administrator do to re-enable a port that is in the error-disabled state due to a violation?
What must an administrator do to re-enable a port that is in the error-disabled state due to a violation?
Signup and view all the answers
What is the default action of the switch when it encounters a security violation?
What is the default action of the switch when it encounters a security violation?
Signup and view all the answers
Which mode is the least secure option for port security violation?
Which mode is the least secure option for port security violation?
Signup and view all the answers
What happens to packets with unknown MAC source addresses in protect mode?
What happens to packets with unknown MAC source addresses in protect mode?
Signup and view all the answers
Flashcards
Manually Configured MAC Address
Manually Configured MAC Address
Static MAC addresses configured manually by an administrator on a port.
Dynamically Learned MAC Address
Dynamically Learned MAC Address
Automatically learned MAC addresses that are not saved after reboot.
Sticky MAC Address
Sticky MAC Address
Dynamically learned MAC addresses that are saved in running configuration.
Port Security Configuration
Port Security Configuration
Signup and view all the flashcards
Port Security Aging
Port Security Aging
Signup and view all the flashcards
Absolute Aging
Absolute Aging
Signup and view all the flashcards
Inactivity Aging
Inactivity Aging
Signup and view all the flashcards
Port Security Commands
Port Security Commands
Signup and view all the flashcards
PortFast
PortFast
Signup and view all the flashcards
Enable PortFast Globally
Enable PortFast Globally
Signup and view all the flashcards
Verify PortFast Status
Verify PortFast Status
Signup and view all the flashcards
BPDU Guard
BPDU Guard
Signup and view all the flashcards
Enable BPDU Guard Globally
Enable BPDU Guard Globally
Signup and view all the flashcards
Wrong DNS Server
Wrong DNS Server
Signup and view all the flashcards
DoS Attack via Wrong IP
DoS Attack via Wrong IP
Signup and view all the flashcards
ARP Request
ARP Request
Signup and view all the flashcards
Gratuitous ARP
Gratuitous ARP
Signup and view all the flashcards
ARP Spoofing Attack
ARP Spoofing Attack
Signup and view all the flashcards
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
Signup and view all the flashcards
IP Address Spoofing
IP Address Spoofing
Signup and view all the flashcards
MAC Address Spoofing
MAC Address Spoofing
Signup and view all the flashcards
Layer 2 Security Threats
Layer 2 Security Threats
Signup and view all the flashcards
MAC Table Attack
MAC Table Attack
Signup and view all the flashcards
MAC Address Flooding
MAC Address Flooding
Signup and view all the flashcards
VLAN Attack
VLAN Attack
Signup and view all the flashcards
DHCP Attack
DHCP Attack
Signup and view all the flashcards
ARP Spoofing
ARP Spoofing
Signup and view all the flashcards
Address Spoofing
Address Spoofing
Signup and view all the flashcards
STP Attack
STP Attack
Signup and view all the flashcards
IP Source Guard (IPSG)
IP Source Guard (IPSG)
Signup and view all the flashcards
STP Manipulation Attack
STP Manipulation Attack
Signup and view all the flashcards
BPDUs
BPDUs
Signup and view all the flashcards
Cisco Discovery Protocol (CDP)
Cisco Discovery Protocol (CDP)
Signup and view all the flashcards
Limiting CDP Exposure
Limiting CDP Exposure
Signup and view all the flashcards
Link Layer Discovery Protocol (LLDP)
Link Layer Discovery Protocol (LLDP)
Signup and view all the flashcards
Port Security
Port Security
Signup and view all the flashcards
Port Security Violation
Port Security Violation
Signup and view all the flashcards
Error-Disabled State
Error-Disabled State
Signup and view all the flashcards
Violation Modes
Violation Modes
Signup and view all the flashcards
Shutdown Mode
Shutdown Mode
Signup and view all the flashcards
Restrict Mode
Restrict Mode
Signup and view all the flashcards
Protect Mode
Protect Mode
Signup and view all the flashcards
Error Messages
Error Messages
Signup and view all the flashcards
Study Notes
LAN Security
- LAN security is a critical component of protecting network resources.
- Attacks on a network may result in loss of time and money due to damage or theft of information or assets.
- Intruders gain network access through software vulnerabilities, hardware attacks, or by guessing usernames and passwords.
- Threat actors gain access to modify software or exploit vulnerabilities.
- After network access, four types of threats may arise:
- Information Theft
- Data loss and manipulation
- Identity Theft
- Disruption of service
Types of Vulnerabilities
- Vulnerability is the degree of weakness in a network or device.
- Routers, switches, desktops, servers, and security devices have inherent vulnerabilities.
- Network devices under attack are typically endpoints such as servers and desktop computers.
- Three primary vulnerabilities include:
- Technological: TCP/IP issues, OS weaknesses, Network Equipment weaknesses
- Configuration: unsecured accounts, easily guessed passwords, misconfigured services and network equipment, unsecure default settings.
- Security Policy: Lack of written policy, inadequate authentication, missing logical access controls.
- All three of these can leave a network or device open to various attacks, including malicious code and network attacks.
Physical Security
- Network resources can be compromised physically, denying network resource usage by a threat actor.
- Four classes of physical threats are:
- Hardware: physical damage to servers, routers, switches, and workstations.
- Environmental: temperature extremes (hot/cold) and humidity extremes.
- Electrical: voltage spikes, inadequate power, brownouts, and power loss.
- Maintenance: improper handling of electrical components, lack of critical spare parts, and inadequate labeling.
Network Attacks Today
- Common network attacks include:
- Distributed Denial of Service (DDoS): a coordinated attack from multiple devices (zombies) to halt public access to websites and resources.
- Data Breach: an attack compromising organizational data servers or hosts to steal confidential information.
- Malware: an attack infecting hosts with malicious software causing various problems, e.g., ransomware.
Endpoint Protection
- Endpoints are laptops, desktops, servers, and IP phones as well as employee-owned devices.
- Vulnerable to malware-related attacks originating from email or web browsing.
- Security features include antivirus/antimalware, host-based firewalls, host-based intrusion prevention systems (HIPSs).
- Combination of NAC, AMP, email security appliance (ESA), and web security appliance (WSA).
Authentication with a Local Password
- Authentication methods offer varying security levels.
- Simplest method is using login and password combinations on console, vty lines, and aux ports.
- SSH is a more secure form of remote access requiring a username and password that can be authenticated locally.
- Local database method has limitations as it is not scalable and lacks fallback authentication.
AAA Components
- AAA stands for Authentication, Authorization, and Accounting, providing a framework to control access on network devices.
- Authentication verifies who can access a network.
- Authorization defines what users can do while connected to the network.
- Accounting audits actions performed while accessing the network.
Local and Server-Based AAA Authentication
- Local AAA stores usernames and passwords locally on network devices, ideal for small networks.
- Server-based uses a central AAA server storing usernames and passwords for all users, using RADIUS or TACACS+ protocols to communicate with the AAA server, more suitable for larger networks with multiple routers/switches.
Authorization
- AAA authorization is automatic, doesn't require additional steps after authentication.
- Authorization governs users' actions on the network after authentication.
- Authorization uses attributes describing the user's network access level, used by the AAA Server to determine privileges and restrictions.
Accounting
- AAA accounting collects and reports usage details like connection times, commands, packet and byte counts.
- Serves for auditing and billing purposes.
- Combines with AAA authentication to create detailed logs of user actions, useful for troubleshooting and detecting malicious activity.
802.1X
- A port-based access control and authentication protocol.
- Restricts unauthorized workstation connections to a LAN through switch ports.
- The authentication server authenticates each workstation before granting access to switch services or the LAN.
- Device roles in 802.1X include Client (Supplicant), Switch (Authenticator), and Authentication Server.
Layer 2 Security Threats (Attacks)
- Layer 2 is a weak link in security because LANs are often trusted for all persons/devices connected.
- Common attacks on Layer 2 include MAC table attacks, VLAN attacks, DHCP, ARP, Address Spoofing, and STP attacks.
- If Layer 2 is compromised, the entire layered network is under attack and can cause significant damage.
ARP Attacks (Addressing Protocols)
- Hosts broadcast ARP requests to find the MAC address of a host with a destination IP address in the subnet.
- The host with a matching IP address responds with ARP replies.
- A client can send an unsolicited ARP reply, called a "gratuitous ARP".
- Attackers can send unsolicited ARP replies with a spoofed MAC address to a switch to compromise it.
- Mitigation techniques include DHCP snooping and Dynamic ARP Inspection (DAI).
VLAN Hopping Attacks
- Attackers potentially bypass the router and utilize a switch's automatic trunking port feature to access all VLANs.
- Double-tagging attacks can encapsulate a frame within a frame enabling access to a different VLAN than expected.
DHCP Attacks
- DHCP starvation attacks flood the network with bogus requests, exhausting resources (DoS).
- DHCP spoofing attacks mislead clients with false IP and gateway/DNS information.
- Mitigating measures involve DHCP snooping.
MAC Address Table Attacks
- MAC address table flooding overwhelms the switch memory, leading to all frames being forwarded on all ports within the same VLAN.
- Attackers can capture traffic meant for other hosts on the local network.
- Port security mitigates this issue by limiting the number of allowed MAC addresses on a switch port, only allowing configured or dynamically learned MAC addresses.
Mitigation of LAN Attacks
- Multitude of mitigation techniques exist
- Port security
- DHCP snooping
- Dynamic ARP Inspection (DAI)
- IP Source Guard (IPSG)
Port Security
- Secures switch ports against unauthorized access.
- Disables unused ports or limits allowed MAC addresses.
- Static or dynamic learning is implemented for secure MAC addresses.
- Port Security violation modes (shutdown, restrict, protect) manage potential unauthorized access when MAC addresses do not match.
- Configured maximum number of validated MAC addresses on a port.
CDP Reconnaissance
- Cisco Discovery Protocol (CDP) is a proprietary Layer 2 protocol used for discovering network devices by administrators for configuration/troubleshooting.
- Sending unencrypted, unauthenticated broadcasted information useful for network mapping/reconnaissance.
- Disable CDP on edge ports connecting to untrusted devices.
STP Attacks
- Attackers use STP to capture network traffic.
- Attackers spoof root bridges and modify network topologies.
- Mitigation involves employing BPDU Guard on all access ports.
- PortFast enables immediate forwarding for access ports, bypassing listening and learning stages to speed up network convergence, but may create spanning-tree loops when used in non-access ports.
Summary of VLAN Hopping Attacks
- Techniques for VLAN hopping include spoofing DTP, using rogue switches with trunk links, and using double-tagging.
- Counter-measures involve disabling DTP on non-trunking ports, disabling unused ports or placing them in unused VLANs, enabling trunk mode on trunking ports, and setting native VLAN to a value other than 1.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential aspects of LAN security, including vulnerabilities and potential threats to network resources. Understand the types of vulnerabilities that can affect routers, switches, and computers while exploring the consequences of network attacks. Test your knowledge on protecting against information theft and service disruptions.