Difference between revisions of "CCNP SWITCH/Securing the Campus Infrastructure"

From Teknologisk videncenter
Jump to: navigation, search
m (VLAN Hopping)
m (VLAN Attacks)
Line 17: Line 17:
 
===VLAN Hopping===
 
===VLAN Hopping===
 
By altering the VLAN ID on packets encapsulated for trunking, an attacking device can send or receive packets on various VLANs, bypassing Layer 3 security measures.<br/>
 
By altering the VLAN ID on packets encapsulated for trunking, an attacking device can send or receive packets on various VLANs, bypassing Layer 3 security measures.<br/>
'''Mitigation'''<br/>
+
'''Mitigation:'''<br/>
 
Tighten up trunk configurations and the negotiation state of unused ports. Place unused ports in a common VLAN.
 
Tighten up trunk configurations and the negotiation state of unused ports. Place unused ports in a common VLAN.
  
 
===Attacks between devices on a common VLAN===
 
===Attacks between devices on a common VLAN===
 
Devices might need protection from one another, even though they are on a common VLAN. This is especially true on service-provider segments that support devices from multiple customers.<br/>
 
Devices might need protection from one another, even though they are on a common VLAN. This is especially true on service-provider segments that support devices from multiple customers.<br/>
'''Mitigation'''<br/>
+
'''Mitigation:'''<br/>
 
Implement private VLANs (PVLAN).
 
Implement private VLANs (PVLAN).
 +
 
==Spoofing Attacks==
 
==Spoofing Attacks==
 
===DHCP starcation and spoofing===
 
===DHCP starcation and spoofing===

Revision as of 10:54, 2 September 2011

Securing the Campus Infrastructure

Security Infrastructure Services

Infrastructure Security

Rouge Devices

Company employees sometimes plug inexpensive APs into company network devices to extend the network. But securing the wireless APs is not always a priority. Wired Rouge Devices could also be a problem, because of its nature.

Layer 2 Attack Categories

MAC Layer Attacks

MAC address flooding

Frames with unique, invalid source MAC addresses flood the switch, exhausting content addressable memory (CAM) table space, disallowing new entries from valid hosts. Traffic to valid hosts is subsequently flooded out all ports.
Mitigation:
Port security. MAC address VLAN access maps.

VLAN Attacks

VLAN Hopping

By altering the VLAN ID on packets encapsulated for trunking, an attacking device can send or receive packets on various VLANs, bypassing Layer 3 security measures.
Mitigation:
Tighten up trunk configurations and the negotiation state of unused ports. Place unused ports in a common VLAN.

Attacks between devices on a common VLAN

Devices might need protection from one another, even though they are on a common VLAN. This is especially true on service-provider segments that support devices from multiple customers.
Mitigation:
Implement private VLANs (PVLAN).

Spoofing Attacks

DHCP starcation and spoofing