© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v3.08-1 Minimizing Service Loss and Data Theft in a Campus Network Protecting Against VLAN Attacks.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Protecting Against Spoof Attacks.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Securing Network Switches.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Layer 2 Security Examining Layer 2 Attacks.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Understanding Switch Security.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Defining VLANs Implementing Trunks.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Implementing Inter-VLAN Routing Enabling Routing Between VLANs on a Multilayer Switch.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Implementing Inter-VLAN Routing Describing Routing Between VLANs.
© 2004, Cisco Systems, Inc. All rights reserved. CSIDS Lesson 17 Capturing Network Traffic for Intrusion Detection Systems.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary An external router can be configured to route packets between the VLANs on.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Module Summary A poorly designed network leads to large broadcast domains. Global configuration.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Using Cisco Catalyst Switch Security Features.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Applying Security Policies to Network Switches.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary Key switch security issues should be identified on a switched network and.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Defining VLANs Correcting Common VLAN Configuration Errors.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Describing STP Security Mechanisms.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Implementing Spanning Tree Configuring Link Aggregation with EtherChannel.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Completing ISDN Calls Configuring ISDN BRI and PRI.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Protecting Against VLAN Attacks

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Explaining VLAN Hopping Attacking system spoofs itself as a legitimate trunk negotiating device. Trunk link is negotiated dynamically. Attacking device gains access to data on all VLANs carried by the negotiated trunk.

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v VLAN Hopping with Double Tagging Double tagging allows a frame to be forwarded to a destination VLAN other than the sources VLAN.

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Mitigating VLAN Hopping Switch(config-if)#switchport access vlan vlan-id Statically assigns the ports to specific unused VLAN Switch(config-if)#switchport mode access Configures the ports as access ports and turns off DTP Selects a range of interfaces to configure Switch(config)# interface-range type mod/port-port

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Types of ACLs

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Configuring VACLs Switch(config)#vlan access-map map_name [seq#] Defines a VLAN access map Switch(config-access-map)# match {ip address {1-199 | | acl_name} | ipx address { | acl_name}| mac address acl_name} Configures the match clause in a VLAN access map sequence Switch(config-access-map)#action {drop [log]} | {forward [capture]} | {redirect {type slot/port} | {port-channel channel_id}} Configures the action clause in a VLAN access map sequence Switch(config)#vlan filter map_name vlan_list list Applies the VLAN access map to the specified VLANs

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Private VLANS

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v PVLAN Port Types Isolated: Communicate with only promiscuous ports Promiscuous: Communicate with all other ports Community: Communicate with other members of community and all promiscuous ports

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Configuring PVLANs Switch(config-vlan)#private-vlan [primary | isolated | community] Configures a VLAN as a PVLAN Switch(config-vlan)#private-vlan association {secondary_vlan_list | add svl | remove svl} Associates secondary VLANs with the primary VLAN Switch#show vlan private-vlan type Verifies PVLAN configuration

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Configuring PVLAN Ports Switch(config-if)#switchport mode private-vlan {host | promiscuous} Configures an interface as a PVLAN port Switch(config-if)#switchport private-vlan host-association {primary_vlan_ID secondary_vlan_ID Associates an isolated or community port with a PVLAN Switch#show interfaces private-vlan mapping Verifies PVLAN port configuration Switch(config-if)#private-vlan mapping primary_vlan_ID {secondary_vlan_list | add svl | remove svl } Maps a promiscuous PVLAN port to a PVLAN

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Summary VLAN hopping can allow Layer 2 unauthorized access to another VLAN. VLAN hopping can be mitigated by: –Properly configuring 802.1Q trunks –Turning off trunk negotiation Access lists can be applied to VLANs to limit Layer 2 access. VACLs can be configured on Cisco Catalyst switches. PVLANs are configured to allow traffic flows to be restricted between ports within the same VLAN. PVLAN configurations can be applied to provide Layer 2 isolation between VLANS.

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v