A Link Layer Discovery Protocol Fuzzer
|
|
|
- Kathlyn Willis
- 9 years ago
- Views:
Transcription
1 The University of Texas at Austin, Department of Computer Sciences, Technical Report TR A Link Layer Discovery Protocol Fuzzer Jeremy Hollander Department of Computer Sciences The University of Texas at Austin Abstract We developed the first Link Layer Discovery Protocol (LLDP) fuzzer with ten test cases to find security vulnerabilities in LLDP-enabled network devices. The current test cases look for off-by-one errors, consistency errors, buffer overflows and stack injections. Furthermore, our fuzzer can easily be extended with additional test cases. Index terms Link Layer Discovery Protocol, Fuzzer, Security, Penetration Testing I. INTRODUCTION A common issue for system and network administrators is finding out which devices are connected to their network and finding out more information about these. It would be especially useful for network administrators in large organizations with thousands of connected nodes to discover which devices are connected as well as data such as their MAC address and IP address. In 1994 Cisco Systems introduced in their network equipment a new layer two protocol which they call the Cisco Discovery Protocol (CDP) [1]. The purpose of this protocol is to share information about the equipment with other devices by multicasting messages such that each device can learn about other devices on the local network. Other network manufacturers such as Foundry Networks and Nortel Networks followed suit with FDP [2] and NDP respectively. While each of these protocols use a similar structure they contain significant differences such as the MAC address messages are sent to, the type of information that is sent out and how information is accessed. This is one of the reasons the IEEE ratified the Link Layer Discovery Protocol (LLDP) as 802.1AB in 2005 [3]. The Link Layer Discovery Protocol incorporates all of the advantages of the three protocols mentioned above in addition to being standardized such that devices from different manufacturers are able to exchange information with one another. One major problem with LLDP however is that messages which devices send out are not authenticated. This makes it easy for malicious users to send out LLDP packets purporting to be from some device on the local network. Some administrators may perform tasks based on the information they received using LLDP. This may in some cases be fatal for the network device whose identity was forged in an LLDP packet. For instance, a malicious user may choose to forge a message in which it states that some router supports Power over Ethernet. The administrator may then decide to transmit electrical power over the twisted pair cable to that device in order to switch it on. If the router does not support that functionality this may prove to be lethal for that device. At this time there is however no plan to introduce an authenticated version of LLDP. An additional security issue is that recipients of the LLDP packets may not always check that the information obtained adheres to the protocol prior to storing it locally. This may lead to a large number of security vulnerabilities as the malicious user may inject any type of information in any LLDP recipient. Both of these problems lead to the development of our Link Layer Discovery Protocol fuzzer which we present in this paper. In the next section we provide a summary of LLDP. In the third section we briefly introduce the reader to fuzzers following which we explain the structure and test cases included in our fuzzer. In the fourth section we show how to simply and efficiently add test cases. Finally, we conclude on our work and provide some ideas for future work in the fifth section.
2 II. THE LINK LAYER DISCOVERY PROTOCOL The Link Layer Discovery Protocol is one-way such that an agent is not able to solicit information from other LLDP agents. An agent only ever transmits information about the current status of the device it is active on. Information which is transmitted and received is stored in a Management Information Base (MIB) to allow it to be accessed by a Network Management System (NMS) using a protocol such as the Simple Network Management Protocol (SNMP). While there are several MIBs in an LLDP-enabled device only two are required for the protocol to function correctly: the LLDP local system MIB and the LLDP remote system MIB. The former stores information about the local device, which is transmitted on the local network, while the latter stores information received from neighboring devices. LLDPDU TLV. They must always appear in that specific order. The first compulsory TLV, the, whose TLV type is 1, identifies the chassis containing the LLDP agent. There are several ways to identify the chassis, one of which is by its MAC address. Other types of information that may be provided include the Interface alias, Port Component and Network Address. The string s length may range between 1 and 255 bytes. string length subtype 7 bits 9 bits 1 byte bytes Fig. 2 The TLV string LLDP Agent LLDP Transmit Module Organizationally defined local device LLDP MIB Extension (optional) PTOPO MIB Entity MIB LLDP local system MIB Local Device Information Fig. 1 The LLDP Agent LLDP Receive Module Organizationally defined remote device LLDP MIB Extension (optional) LLDP remote systms MIB Remote Device Information Interfaces MIB Other MIBs The second compulsory TLV, the Port ID, whose TLV type is 2, identifies the port component of the MAC Service Access Point associated with the transmitting LLDP agent. This TLV is very similar to the with the difference being that it works at a more refined level. In addition the transmitting agent is able to send an Agent Circuit ID. RFC 3046 [4] specifies that it is used to encode an agent-local identifier of the circuit from which a DHCP client-toserver packet was received. It is intended for use by agents in relaying DHCP responses back to the proper circuit. The size of the information string length may also vary between 1 and 255 bytes. An LLDP packet contains two major types of information: the LLDP Ethertype (0x88cc) and the LLDP Data Unit (LLDPDU). An LLDP packet is always sent out to the same Multicast address to ensure that it is not forwarded by MAC Bridges that conform to the IEEE 802.1D-2004 standard. The LLDPDU consists of a series of information elements known as TLVs, which stands for Type-Length- Value. Each element contains the following three fields: 1. The type of data being sent 2. The length in bytes of the data being sent 3. The value of the information that is being sent Each LLDPDU must contain four compulsory TLVs in addition to any number of optional TLVs. The four compulsory TLVs are the TLV, the Port ID TLV, the Time To Live TLV and the End of TLV type = 2 string length Port ID subtype Port ID 7 bits 9 bits 1 byte bytes Fig. 3 The Port ID TLV string The third compulsory TLV, the Time To Live (TTL) TLV, whose TLV type is 3, specifies in seconds how long the information contained in an LLDP packet may be considered fresh. For instance, if the TTL is 60 then the recipient agent may automatically discard the information received after 60 seconds as it is considered out-of-date. If an LLDP packet with a TTL of 0 is received the agent may delete all the information associated with the sender.
3 TLV type = 3 Fig. 4 The TTL TLV string length = 2 Time To Live 7 bits 9 bits 2 byte TLV Information String The fourth and final compulsory TLV, the End of LLDPDU TLV, whose TLV type is 0, is used to mark the end of the LLDP packet. Because there is never any payload attached to this TLV the information string length is always 0. TLV type = 0 string length = 0 7 bits 9 bits Fig. 5 The End of LLDPDU TLV As shown in figure 6 a number of optional TLVs may be added to the LLDP packet between the TTL TLV and the End of LLDPDU. These optional TLVs are the Port Description TLV, System Name TLV, System Description TLV, System Capabilities TLV, Management Address TLV and Organizationally Specific TLVs. B. The LLDP Fuzzer The LLDP fuzzer we developed aims to find security vulnerabilities in the LLDP receiving agent by sending malformed packets. We have devised a specific set of ten test cases which we feel would find vulnerabilities in the device under test. Any one of these test cases could prove fatal for the receiving agent if illegal or malicious data is not handled properly or not discovered prior to its insertion in the MIB. In addition, we shall show in the next section how to add new test cases. 1) Test Case 1 In the first test case we overload the payload for the TLV. The LLDP specification specifies that the maximum payload size for the TLV is 255 bytes. In this first test case we send 510 bytes. We correctly store the information string length as being 511 bytes. If the receiving agent does not perform any verification on the size of the TLV when receiving LLDP packets it may only assign 255 bytes for this TLV. This may have as a result that the Port ID TLV, or any information stored in sequence after the TLV, will be overwritten with the last 255 bytes of the information string. TLV Port ID TLV Time To Live TLV Optional TLV Optional TLV End of LLDPDU TLV string length = 511 subtype Fig. 6 The compulsory and optional TLVs 7 bits 9 bits 1 byte 510 bytes string III. THE LLDP FUZZER A. Introduction to fuzzing Fuzzing is a black-box testing technique used to find bugs in software or hardware devices. While regular testing techniques must still be used to find bugs, fuzzing is used to discover input combinations which the developers of the software or hardware device under test may not have taken into consideration. Prior to building a fuzzer one must understand the protocol used to attack the device under test. Once knowledge of the protocol has been acquired the fuzzer s architecture can be built. Using the fuzzer security researchers generate well-formed and malformed network packets aimed at the device under test in order to find out whether it was properly set up to handle input of legal as well as illegal data. Fig. 7 Test case 1, sending an overloaded payload for the TLV 2) Test Case 2 In the second test case we send an LLDP packet which contains a TLV with no payload. On parsing this TLV we should expect the receiving agent to discard the message because the minimum string length is two bytes: one byte for the subtype and at least one byte for the information string.
4 mechanism in place which would restrict it from receiving a large amount of packets in a short period of time, especially if the Time To Live TLV states that the information received is fresh for 15 seconds. Fig. 8 Test case 2, sending a TLV with no payload 3) Test Case 3 In the third test case we investigate whether the TLV information string length is tested against the real size of the information string in the. In this packet we set the string length to 1 such that the receiving agent may only reserve a single byte for this TLV. However we provide a fourbyte payload. Similarly to the first test case it is possible that the information string will overwrite the Port ID TLV, if both are stored in sequence in the MIB. Otherwise it may overwrite random information in the MIB. string length = 1 subtype 7 bits 9 bits 1 byte 4 bytes string Fig. 9 Test case 3, sending a false information string length 4) Test Case 4 In the fourth test case we send a malformed packet with a 256 byte information string. This is one byte larger than allowed by the protocol. The information string length is therefore, including the subtype, 257 bytes. In this case we wish to find out if the device under test may have an off-byone error. Fig. 11 Test case 5, sending a burst of packets with a TTL of 15 seconds 6) Test Case 6 According to the LLDP specification the End Of LLDPDU TLV may never contain any payload. In the sixth test case we send a packet with a two-byte payload attached to the End Of LLDPDU TLV. In addition we leave the information string length field to zero. Since the End Of LLDPDU TLV is always placed at the end of a packet it has a crucial location in terms of finding a vulnerability in the remote system. Because the recipient of the packet may not allocate any storage for the payload as the information string length states that there is no payload, it is possible that the payload which in this case is two bytes long may overwrite some data located on the recipient s executable stack. This may prove to be fatal as the recipient may unknowingly execute malicious code injected by the sender in the payload of this packet if that payload overwrites memory from the executable stack. TLV type = 0 string length = 0 7 bits 9 bits payload = bytes string string length = 257 subtype Fig. 12 Test case 6, sending an End of LLDPDU with a nonzero payload and zero information string length 7 bits 9 bits 1 byte 256 bytes string Fig. 10 Test case 4, sending an overloaded payload 5) Test Case 5 In the fifth test case we send a burst of 1000 LLDP packets with a TTL TLV of 15 seconds. While each LLDP packet is legal according to the protocol we wish to test whether the receiving agent may have a 7) Test Case 7 The seventh test case is very similar in fashion to the previous test case. The only difference is that we provide the actual payload in the information string length. The purpose of this test case is to determine whether the recipient of this LLDP packet would malfunction if it receives an End Of LLDPDU TLV with an information string length not equal to zero.
5 TLV type = 0 string length = 2 payload = bits 9 bits 2 bytes string Fig. 13 Test case 7, sending an End of LLDPDU with payload and information string length equal to 2 8) Test Case 8 In the eighth test case we send an illegal System Capabilities string. The optional System Capabilities TLV is used to identify the primary functions of the sender and whether or not these primary functions are enabled. These functions may include a repeater capability, bridge capability, wireless LAN access point capability or router capability. There are in total seven functions with another eight reserved for future use. An example of a legal message would include information about a device being capable of acting as a bridge and wireless LAN access point however at the time the message is sent only the wireless LAN access point functionality is enabled. In this test case the malformed packet specifies that the sender s system may only function as a bridge (the third lowest bit specifies the bridge functionality) however at the time the message is sent the bridge and wireless LAN access point functionalities enabled (the fourth lowest bit specifies the wireless LAN access point functionality). This is an inconsistency which must be rejected by the recipient of this packet. In this test case we attempt to determine whether the recipient has consistency-checks in place. If no such checks are present an error may occur. string length = 4 enabled capabilities = bits 9 bits 2 bytes 2 bytes system capabilities = string Fig. 14 Test case 8, sending a malformed System Capabilities TLV 9) Test Case 9 In the ninth test case we wish to find out whether the recipient s LLDP agent has implemented the protocol at its most basic level. In this test case the Port ID TLV is missing. According to the specification the LLDPDU must be checked to ensure that it contains the correct sequence of mandatory TLVs. Fig. 15 Test case 9, sending an LLDPDU with the Port ID TLV missing 10) Test Case 10 The tenth test case sends a TLV with an IPv4 address yet specifies that it is providing an IPv6 address. The purpose of this test case is to find out whether the recipient s LLDP agent will fail upon receiving the wrong type of IP address even though the address provided is a valid version 4 address. string length = 6 = bits 9 bits 1 byte 1 byte 4 bytes subtype = 5 IP version = 6 string Fig. 16 Test case 10, sending a TLV with a false IP version IV. HOW TO EXTEND THE LLDP FUZZER While we have written ten test cases for the LLDP fuzzer a major part of this work is also to provide the necessary architecture to allow security researchers to complement the existing test cases with their own. We have ensured that doing so is straightforward by automatically setting default values for all the compulsory and optional TLVs when instantiating a new LLDP packet. The advantage is two-fold. First, it is not necessary to set each TLV each time one creates a new test case. Second, when performing security testing one will usually only modify a single parameter in a test case such that every single TLV but the one under test will remain similar across several test cases. This is done in order to easily pinpoint to the source of a vulnerability, if one is found. The following test case demonstrates the steps required to write a new test case in the LLDP fuzzer. 1. def test_case7(): 2. p=lldppacket() 3. p.end_of_lldpdu_data_customsize=2 4. p.mod_end_of_lldpdu() 5. p.mod_assemble_packet() 6. p.packet+=new_field(0,65535,"short") 7. p.send_packet(self_iface,self_mac)
6 In the first line we define a new test case. In the second line we instantiate a new LLDP packet. This new packet comes along with default values set for each compulsory and optional TLV. For instance, the default value for the Time To Live TLV is 60 seconds. In the third line we set the information string length of the End Of LLDPDU TLV to 2 bytes. The mod_end_of_lldpdu() function in the fourth line is used to store the modifications in the End Of LLDPDU TLV. Similarly, if one were to change the value of the Time To Live TLV from 60 seconds to 120 seconds one would first set p.ttl_payload_data to 120 followed by p.mod_ttl(). Because we have modified a TLV in the LLDP packet we must regenerate the packet so we use mod_assemble_packet() once we have performed all the necessary changes in the TLVs. This function assembles the LLDP packet by running through all the TLVs. This test case is somewhat unusual as we add a payload to the End Of LLDPDU. Thus, in the sixth line, following the assembly of the packet, we add a two-byte field with the largest integer value that can fit in such a field. Finally, in the seventh line we send the packet. Two parameters must always be provided when sending an LLDP packet: the interface on which to send the packet and the MAC address from which it should appear to be sent from. In addition to being able to add new test cases one may also create a wrapper to run through a list of input combinations. For example, one may wish to send LLDP packets with a combination of legal and optional TLVs as well as TLVs which are currently unassigned. The type numbers for the reserved (unassigned) TLVs range from 9 to 126. test is prone to off-by-one errors, consistency errors, buffer overflows and stack injections. While we have provided a fuzzing architecture for LLDP, as there is currently no way to tell whether the recipients of the LLDP packets have crashed or misbehaved it would be useful to run a module on receiving agents. This module could send back the information that was stored in the LLDP local MIB such that it may be easier to analyze the results of the vulnerability testing. In addition, as more LLDPenabled devices emerge, newer test cases should be devised. VI. REFERENCES [1] Cisco Systems, The Cisco Discovery Protocol Packet Format, srb/frames.htm#xtocid12, viewed on 04/30/2007 [2] Foundry Networks, Enabling the Foundry Discovery Protocol, iron_rx_config/cdp_fdp.html, viewed on 04/30/2007 [3] The IEEE, The Link Layer Discovery Protocol, pdf, viewed on 04/30/2007 [4] M. Patrick, DHCP Relay Agent Information Option, RFC 3046, January 2001 V. CONCLUSION AND FUTURE WORK We have shown our LLDP fuzzer and ten test cases we devised for it. While we have been unable to test our fuzzer against a network device we strongly believe that at least one of our test cases will prove to be problematic when tested on an LLDP-enabled device. We have furthermore also created an easy-touse architecture such that security researchers may add their own test cases as more LLDP-compliant devices arise on the market. The purpose of the LLDP fuzzer is to find security vulnerabilities which may not be easily found using regular testing techniques. The test cases we have devised attempt to find out whether the device under
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Chapter 46 Link Layer Discovery Protocol (LLDP)
Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
Correlating different network topology layers in heterogeneous environments
Correlating different network topology layers in heterogeneous environments Dennis Pellikaan, Diederik Vandevenne February 11, 2013 Abstract Network Topology Discovery is the process to automatically generate
Link Layer Discovery Protocol and MIB
Link Layer Discovery Protocol and MIB v0.0 Paul Congdon 3/7/02 Acknowledgements This document is heavily leveraged from an Internet-Draft developed for the IETF PTOPO working group. The original draft,
L2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide
L2 / L3 Switches Link Layer Discovery Protocol (LLDP) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes
Configuring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
Link Layer Discovery Protocol (LLDP)
Extreme etworks Technical Brief Link Layer Discovery Protocol () A ew Standard for Discovering and Managing Converged etwork Devices If there is any certainty in the access layer of a network, it is that
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches
APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,
DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES
APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
LLDP-MED and Cisco Discovery Protocol
White Paper LLDP-MED and Cisco Discovery Protocol DEVICE DISCOVERY PROTOCOLS Device discovery protocols enable directly connected devices to discover information about each other. They advertise information
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Deploying IP Telephony with EX-Series Switches
Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Link Layer Discovery Protocol
12 Link Layer Discovery Protocol Contents Overview..................................................... 12-2 LLDP..................................................... 12-2 LLDP Messages............................................
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
HARTING Ha-VIS Management Software
HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded
48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W
GEP-5070 Version: 1 48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W The LevelOne GEP-5070 is an intelligent L2 Managed Switch with 48 x 1000Base-T PoE-Plus ports and 2 x 100/1000BASE-X SFP (Small Form
Tools for Attacking Layer 2 Network Infrastructure
Tools for Attacking Layer 2 Network Infrastructure Kai-Hau Yeung, Dereck Fung, and Kin-Yeung Wong Abstract Data Link layer is considered as the weakest link in a secured network. If an initial attack comes
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Avaya Wireless AP Device Manager User Guide
Avaya Wireless AP Device Manager User Guide February 2003 Avaya Wireless AP Device Manager User Guide Copyright Avaya Inc. 2003 ALL RIGHTS RESERVED The products, specifications, and other technical information
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Local Address Management in IoT environments
Local Address Management in IoT environments Pat Thaler, Senior Technical Director, Broadcom 29 September 2014 3 rd IEEE 802 and IETF Leadership Meeting 1 PROBLEM STATEMENT 2 MAC address consumption ramps
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones Abstract The purpose of this document is to discuss 802.1X Authentication and Link Layer Discovery Protocol (LLDP) in
Configuration of the DHCP server
104 Page 91 of 294 Contents This section contains information on the following topics: Overview................................................ 91 i2004 Internet Telephone....................................
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
The Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA [email protected] February, 4 2002 Abstract. This paper describes
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
ZyXEL MGS-3712F V3.90(BBB.4)C0 Release Note/Manual Supplement
Date: Jun 8, 2011 ZyXEL MGS-3712F V3.90(BBB.4)C0 Release Note/Manual Supplement This document describes the features in the MGS-3712F product for its 3.90(BBB.4)C0 release. Support Platforms: ZyXEL MGS-3712F
Using SolarWinds Orion for Cisco Assessments
Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling
MBP_MSTR: Modbus Plus Master 12
Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER
1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet
Adjusting IP MTU, TCP MSS, and PMTUD on Windows and Sun Systems
Adjusting IP MTU, TCP MSS, and PMTUD on Windows and Sun Systems Document ID: 13709 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Problem Description
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Ha-VIS FTS 3000 Introduction and features
Ha-VIS Introduction and features Ethernet Switch Ha-VIS FTS 3100s-A 10-port Ethernet Switch with Fast Track Technology configurable via USB General Description Features The Fast Ethernet Switches of the
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
Level 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches
AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches Please read this document before you begin to use the management software. NOTE This
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Auditing the LAN with Network Discovery
Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and
Chapter 5 Customizing Your Network Settings
Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Cisco IOS NetFlow Version 9 Flow-Record Format
Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: February 007 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1
Local Area Networks LAN Security and local attacks TDC 363 Winter 2008 John Kristoff - DePaul University 1 Overview Local network attacks target an internal network Some attacks can be launched remotely
