A STUDY OF SECURITY LIMITATIONS IN VIRTUAL LOCAL AREA NETWORK IMPLEMENTATION



Similar documents
MODELING OF TRANSPORT PROCESSES FOR AIR POLLUTANTS ENHANCED WITH GEOGRAPHIC INFORMATION SYSTEM

DEVELOP AND DESIGN SHEMATIC DIAGRAM AND MECHANISM ON ONE SEATER DRAG BUGGY MUHAMMAD IBRAHIM B MD NUJID

DEVELOPING AN ISP FOR HOTEL INDUSTRY: A CASE STUDY ON PUTRA PALACE HOTEL

IMPROVING SERVICE REUSABILITY USING ENTERPRISE SERVICE BUS AND BUSINESS PROCESS EXECUTION LANGUAGE AKO ABUBAKR JAAFAR

FRAMEWORK FOR EVALUATING PROGRAMMING LANGUAGES FOR COMPUTER GRAPHICS

LIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY UNIVERSITI TEKNOLOGI MALAYSIA

PRODUCTIVITY IMPROVEMENT VIA SIMULATION METHOD (MANUFACTURING INDUSTRY) HASBULLAH BIN MAT ISA

INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN

UNIVERSITI TEKNIKAL MALAYSIA MELAKA FAKULTI TEKNOLOGI MAKLUMAT DAN KOMUNIKASI

HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF A PRODUCTION PLANNING AND CONTROL SOFTWARE IN TOTAL PRODUCTIVITY MAINTENANCE ENVIRONMENT

EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH

TRANSFORMATIONAL PROJECT MANAGER: AN ENABLER OF AN ENTERPRISE RESOURCE PLANNING (ERP) IMPLEMENTATION SUCCESS JOHN ONYEKACHI OKUGO

CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING ABDIRASHID HASSAN ABDI

SPAM FILTERING USING BAYESIAN TECHNIQUE BASED ON INDEPENDENT FEATURE SELECTION MASURAH BINTI MOHAMAD

MASTER S PROJECT REPORT SUMMARY

WEB-BASED PROPERTY MANAGEMENT SYSTEM SAFURA ADEELA BINTI SUKIMAN

A STUDY ON MOTIVATION TO START UP A BUSINESS AMONG CHINESE ENTREPRENEURS

Car Rental Management System (CRMS) Lee Chen Yong

UNIVERSITI PUTRA MALAYSIA

DEVELOPMENT OF DATA ACQUISITION SOFTWARE FOR CENTRALIZED RADIATION MONITORING SYSTEM

DEPARTMENT OF ESTATE -MANAGEMENT FACULTY OF ARCHITECTURE, PLANNING AND SURVEYING UNIVERSITI TEKNOLOGI MARA

THE RELATIONSHIP BETWEEN HUMAN RESOURCE INFORMATION SYSTEM (HRIS) AND HUMAN RESOURCE MANAGEMENT (HRM) ALFRED PUN KHEE SEONG

STRESS EFFECT STUDY ON 6 DIFFERENT PATTERN OF TYRES FOR SIZE 175/70 R13 SYAHRIL AZEEM ONG BIN HAJI MALIKI ONG. for the award of the degree of

BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE

Faculty of Computer Science & Information Technology

UNIVERSITI PUTRA MALAYSIA CLUSTERING ALGORITHM FOR MARKET-BASKET ANALYSIS: THE UNDERLYING CONCEPT OF DATA MINING TECHNOLOGY

UNIVERSITI PUTRA MALAYSIA REAL TIME TRACKING AND FACE RECOGNITION USING WEB CAMERA

HOME AUTOMATION SYSTEM USING POWER LINE COMMUNICATION DARLENE BINTI MOHAMAD DOUGLAS

JOB AGENT MANAGEMENT SYSTEM LU CHUN LING. A thesis submitted in partial fulfillment of. the requirements for the award of the degree of

K-BASED HELPDESK SYSTEM SISTEM MEJA BANTUAN BERASASKAN PENGETAHUAN

UNIVERSITI PUTRA MALAYSIA INTERNET - BASED SECURITY AND MONITORING SYSTEM ISAMELDIN MOHAMMED SULIMAN FK

DEVELOPMENT OF SCHEDULING SYSTEM FOR STAMPING DIE PRODUCTION USING SIMULATION DISPATCH APPROACH

Implementation of Virtual Local Area Network using network simulator

UNIVERSITI PUTRA MALAYSIA IMPLEMENTATION OF AN ELECTRONIC QUALITY MANAGEMENT SYSTEM OF A MANUFACTURING COMPANY NAGUR AZIZ BIN KAMAL BASHAH FK

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

TABLE OF CONTENTS. SUPERVISOR S DECLARATION ii STUDENT S DECLARATION iii DEDICATION ACKNOWLEDGEMENTS v ABSTRACT LIST OF TABLES

UNIVERSITI PUTRA MALAYSIA THE NATURE OF HUMAN RESOURCE MANAGEMENT AND ORGANIZATIONAL CHANGE IN MALAYSIAN SMALL AND MEDIUM SIZED ENTERPRISES (SMES)

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF PROTOTYPE SCHEDULING AND SEQUENCING SOFTWARE FOR JOB SHOP MANUFACTURING IN SHEET METAL FABRICATION

UNIVERSITI PUTRA MALAYSIA FRAUD DETECTION SYSTEM FOR ROTOR PAY PHONE NURWARDIAH BINTI SPIAN FK

UNIVERSITI PUTRA MALAYSIA KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK FOR COLLABORATIVE OPEN SOURCE SOFTWARE DEVELOPMENT

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF AN ELECTRIC VEHICLE DASHBOARD MONITORING SYSTEM USING MICROCONTROLLER MOHAMMED E. SALEM ABOZAED FK

UNIVERSITI PUTRA MALAYSIA TELETRAFFIC PERFORMANCE OF HIERARCHICAL CELLULAR NETWORK IN DIFFERENT POPULATIONS OF SLOW MOBILE GENERATED TRAFFICS

MODELING AND SIMULATION OF SINGLE PHASE INVERTER WITH PWM USING MATLAB/SIMULINK AZUAN BIN ALIAS

THE FINGERPRINT IDENTIFICATION OF ATTENDANCE ANALYSIS & MANAGEMENT. LEE GUAN HENG (Software Engineering)

UNIVERSITI PUTRA MALAYSIA INJURY CHARACTERISTICS OF MOTORCYCLISTS INVOLVED IN MOTORCYCLE CRASHES IN KLANG VALLEY, MALAYSIA PANG TOH YEN FK

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

DEVELOPING A WIRELESS PENETRATION TESTING TOOL IN LINUX PLATFORM NOR ARLIZA BINTI ABDULLAH

RFID BASED SYSTEMATIC STUDENT S ATTENDANCE MANAGEMENT SYSTEM HANISAH BINTI HAMID. Faculty of Electrical and Electronic Engineering

What is VLAN Routing?

IMPACT OF SELF-CORRECTION ON EXTROVERT AND INTROVERT STUDENTS IN THE EFL WRITING PROGRESS REZA HAJIMOHAMMADI

TN. MOHD FAKHRUZZAMAN B. TN ISMAIL

CTS2134 Introduction to Networking. Module Network Security

SMART SHOES CHARGER TAN CHEE CHIAN

UNIVERSITI PUTRA MALAYSIA

CONTROL HOME APPLIANCES VIA INTERNET (CoHAVI) SOFTWARE DEVELOPMENT SHIRRENE A/P NAI SOWAT

Manpower Planning Utilizing Work Study at Data Storage Manufacturing Company

TABLE OF CONTENTS CHAPTER TITLE PAGE

NOOR HANIRA BINTI MAHIDIN

SPA BEAUTY MANAGEMENT SYSTEM NAJIHAH BINTI RUSSLI

THE FACTORS THAT HINDER THE INTENTION OF BUSINESS MANAGEMENT GRADUATE TO CHOOSE ENTREPRENEUR AS THEIR CAREER NURUL HAZLYANA BINTI NOR AZLI

SWAY REDUCTION ON GANTRY CRANE SYSTEM USING DELAYED FEEDBACK SIGNAL (DFS) NORASHID BIN IDRUS

NOR BAHYAH BINTI ABDUL RASHID

Switching in an Enterprise Network

VEHICLE TRACKING AND SPEED ESTIMATION SYSTEM CHAN CHIA YIK. Report submitted in partial fulfillment of the requirements

UNIVERSITI PUTRA MALAYSIA A STUDY ON HUMAN RESOURCE MANAGEMENT PRACTICES IN SELECTED FINANCIAL INSTITUTIONS IN MALAYSIA ANITA BINTI ISMAIL FEP

UNIVERSITI PUTRA MALAYSIA AN EXPERT SYSTEM FOR FIRE PREVENTION IN HIGH RISE BUILDINGS SENGDAO WAYAKONE FK

FACTORS INFLUENCING GENDER GAP IN HIGHER EDUCATION OF MALAYSIA: A UNIVERSITY OF MALAYA SAMPLE

Lab Developing ACLs to Implement Firewall Rule Sets

UTM10 in multi-ssid, multi-vlan network with WMS5316. Network diagram

MOHD KHALIL BIN ABDUL KADJR

UNIVERSITI TEKNOLOGI MALAYSIA (UTM) SYARAT KEMASUKAN BAGI PROGRAM LEPASAN STPM/SETARAF SESI AKADEMIK 2012/2013

UNIVERSITI PUTRA MALAYSIA CURRENT TRENDS AND PRACTICES IN HUMAN RESOURCE MANAGEMENT: A CASE STUDY IN YTL POWER SERVICES SDN. BHD.

DEVELOPMENT OF STATISTICAL PROCESS CONTROL (SPC) MATLAB- BASED SOFTWARE FOR AUTOMOTIVE INDUSTRIES APPLICATION SITI HAZLINA BINTI MOKHTAR

UNIVERSITI PUTRA MALAYSIA THE EFFECT OF COMPUTER-BASED MUSIC EDUCATION SOFTWARE ON THE IDENTIFICATION OF NOTE-NAMES

CASE STUDY: PROPOSED APPLICATION OF PROJECT MANAGEMENT TECHNIQUES FOR CONSTRUCTION OF NUCLEAR POWER PLANT IN MALAYSIA

CCT vs. CCENT Skill Set Comparison

HELP DESK MANAGEMENT SYSTEM. LOW SlEW PEI

Page 1 of 1. Page 2 of 2 % &! " '! ( ' ( $) * +, - % -. !" # $

FRONT DESK CUSTOMER SERVICE FOR QUEUE MANAGEMENT SYSTEM MOHAMAD FAZLI BIN ALIAS

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

How To Configure Voice Vlan On An Ip Phone

Keywords: System Identification, Least Square Method, RC circuits. Kata kunci : Sistem Identifikasi, Least Square Method, Litar RC

IMPLEMENTING CRYPTOGRAPHY IN DATABASE KWAN SHONG HANN

KRITERIA BORANG NYATA CUKAI PENDAPATAN (BNCP) TIDAK LENGKAP CRITERIA ON INCOMPLETE INCOME TAX RETURN FORM (ITRF) PEMBERITAHUAN

GSM BASED HOME SECURITY SYSTEM CHENG KAR LOCK

Marketing Analysis of the Higher Education Service Sector in Malaysia: Consumer Perspective

VLANs. Application Note

Tarkh BOOK INVENTORY SYSTEM USING RFID NURUL NADIA BINTI MAT JALALUDDIN

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) KIT FOR VEHICLE S ALARM SYSTEM NIK MOHD KHAIRULFAHMI BIN NIK MAT

CLINICAL MANAGEMENT SYSTEM (CMS)

IMPLEMENTING HONEYPOT LAN DETECTION: PORT DETECTION AND NETWORK MONITORING AMRAN BIN SALLEH

HOME AUTOMATION USING X-10 TECHNOLOGY MOHAMAD RIDHWAN BIN MOHAMED RODZI UNIVERSITY MALAYSIA PAHANG

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

TOTAL QUALITY MANAGEMENT APPROACH, A CASE STUDY IN MANUFACTURING INDUSTRY YAP PEI XIANG

SMART SUN TRACKING WITH AUTOMATED CLEANING SYSTEM FOR PV MODULES AMIRAH AFIQAH BINTI AHMED

Student Application Form

Network Simulator Lab Study Plan

Transcription:

A STUDY OF SECURITY LIMITATIONS IN VIRTUAL LOCAL AREA NETWORK IMPLEMENTATION By ARUMUGAM BALASUNDARAM Thesis Submitted to the School of Graduate Studies,, in Fulfillment of the Partial Requirements for the Degree of Master of Science December 2003

DEDICATION This thesis is dedicated to my loving parents, brothers and wife ii

Abstract of thesis presented to the Senate of in fulfilment of the partial requirements for the degree of Master of Science A STUDY OF SECURITY LIMITATION IN VIRTUAL LOCAL AREA NETWORK IMPLEMENTATION By ARUMUGAM BALASUNDARAM December 2003 Chairman: Faculty: Associate Professor Abdul Rahman Ramli, Ph.D. Engineering Virtual Local Area Network (VLAN) in simple terms is defined as a group of Local Area Network (LAN) that has different physical connections, but communicates as if they are connected on a single network segment. VLAN was developed mainly for the need in network segmenting solution, since network traffic increases in proportional to the network size in the same time to offer additional network security. This technology has now become possible by the advancement of various LAN Switches which offer the VLAN feature. Few researches has been carried out which explain the technology part of the system. This thesis provides a study on VLAN mainly covering the implementation of the system and the security weakness present in certain conditions of implementation. For the VLAN system, an onsite study was conducted to explore the implementation of the system in real life environment followed by a practical test conducted to iii

examine the weaknesses part of the system. The results obtained from the test showed that under certain type of implementation, the security features of the VLAN system can be exploited. Solutions are proposed to further improve the security of the system in which certain part of the solution was gathered upon verifying the issue with the switch manufacturer. iv

Abstrak tesis yang dikemukakan kepada Senat Univeristi Putra Malaysia sebagai memenuhi sebahagian keperluan untuk ijazah Master Sains KAJIAN KESELAMATAN KEKANGAN DALAM PENGIMPLIMENTASIAN RANGKAIAN KAWASAN SETEMPAT MAYA Oleh ARUMUGAM BALASUNDARAM Disember 2003 Pengerusi: Fakulti: Profesor Madya Abdul Rahman Ramli, Ph.D. Kejuruteraan Rangkaian Kawasan Setempat Maya ( Virtual Local Area Network (VLAN) ) didefinisikan sebagai satu kumpulan rangkaian kawasan setempat (LAN) yang mempunyai sambungan fizikal yang berbeza, tetapi berkomunikasi seperti ia disambung pada rangkaian segmen tunggal. VLAN dibangunkan kerana ia amat diperlukan dalam penyelesaian pengasingan rangkaian. Ini adalah kerana trafik rangkaian meningkat sejajar dengan pertambahan saiz rangkaian dan pada yang sama untuk memperbaiki lagi keselamatan rangkaian. Kini, teknologi ini menjadi nyata dengan adanya pelbagai suis rangkaian kawasan setempat (LAN) berteknologi tinggi yang mempunyai ciri-ciri VLAN. Beberapa kajian telah dijalankan yang menerangkan ciri-ciri teknologi sistem tersebut. Tesis ini merupakan kajian terhadap VLAN terutamanya bagi membincangkan perlaksanaan sistem dan kelemahan keselamatan pada masa sekarang. v

Bagi sistem VLAN ini, kajian telah dijalankan untuk mengkaji perlaksanaan sistem ini dalam persekitaran yang sebenar diikuti dengan ujian praktikal yang dijalankan untuk menguji bahagian kelemahan dalam system ini. Daripada keputusan yang diperolehi dari ujian yang dijalankan, didapati ciri-ciri keselamatan sistem VLAN boleh dieksploitasikan. Beberapa penyelesaian didapati untuk memperbaiki lagi keselamatan sistem di mana beberapa bahagian penyelesaian telah digabungkan bagi mengesahkan isu ini dengan pembuat suis (switch manufacturer). vi

ACKNOWLEDGEMENTS I would like to thank my advisor, Dr. Abdul Rahman Ramli, for his thoughtful, patient guidance and support throughout this work. His friendship and selfless role modeling have contributed to my professional development. I would extend my gratitude to members of my committee, Mr. Syed Abdul Rahman and Mdm Wan Azizun Adnan, for their helpful comments and suggestions. I would like to thank Mr. R. Krishnamurthi from Philips Semiconductor (M) Sdn Bhd for allowing me to carry out the onsite study, Enterasys Network Systems Engineer Mr. Pranjat Indrajaya Inc for providing technical information for this research. Shell Refining Company (M) Bhd Mr. Ambikaipalan in allowing me to use the required equipment for this project and Cisco Support Engineer Mr. Talminder Bhangle for giving his feedback related to the thesis. Thanks to my parents, wife and brothers for their moral support given to me to towards this studies, Most of all, I thank my brother Mr Pandian for his advice from the very beginning that helped to bring this research to completion. Special thanks also go to all the colleagues and fellow friends, Jeevan Rao Subramaniam, Subbarao Sinnanaidu and R.Kalaiselvi, for their assistance through my research. vii

I certify that an Examination Committee met on 26 th December 2003 to conduct the final examination of Arumugam Balasundaram on his Master of Science thesis entitled A Study of Security Limitation in Virtual Local Area Network (VLAN) Implementation, in accordance with Universiti Pertanian Malaysia (Higher Degree) Act 1980 and Universiti Pertanian Malaysia (Higher Degree) Regulations 1981. The Committee recommended that the candidate be awarded the relevant degree. Member of the Examination Committee are as follows: Borhanuddin Mohd. Ali, Ph.D. Professor (Chairman) Abdul Rahman Ramli, Ph.D. Associate Professor (Member) Syed Abd. Rahman Al-Hadad Syed Mohamed Lecturer (Member) Wan Azizun Adnan Lecturer (Member) GULAM RUSUL RAHMAT ALI, Ph.D. Professor / Deputy Dean School of Graduate Studies Date: viii

This thesis submitted to the Senate of and has been accepted as fulfillment of the partial requirements for the degree of Master of Science. The members of the Supervisory Committee are as follows: Abdul Rahman Ramli, Ph.D. Associate Professor (Chairman) Syed Abd. Rahman Al-Hadad Syed Mohamed Lecturer (Member) Wan Azizun Adnan Lecturer (Member) AINI IDERIS, Ph.D. Professor/Dean School of Graduate Studies Date : ix

DECLARATION I hereby declare that the thesis is based on my original work except for quotations and citations which have been duly acknowledged. I also declare that it has not been previously or currently submitted for any other degree at UPM or other institutions. ARUMUGAM BALASUNDARAM Date: 23 rd April 2004 x

TABLE OF CONTENTS DEDICATION ABSTRACT ABSTRAK ACKNOWLEDGEMENT APPROVAL DECLARATION LIST OF FIGURES LIST OF ABBREVIATIONS Page ii iii v vii viii x xiv xvi CHAPTER 1 INTRODUCTION 1.1 Problem Statements 2 1.2 Research Objective 3 1.3 Organization of the Thesis 4 2 LITERATURE REVIEW 2.1 Introduction 5 2.2 Overview of Virtual Local Area Network 5 (VLAN) 2.3 VLAN Operation 10 2.4 Various Benefits Of VLAN 13 2.4.1 Increased Performance 13 2.4.2 Improved Manageability 13 2.4.3 Network Tuning And Simplification Of 14 Software Configuration 2.4.4 Physical Topology Independence 14 2.4.5 Advantage for Mobile Users 14 2.4.6 Increase Security Options 15 2.5 Limitations Of VLAN 15 2.5.1 Broadcast Limitations 16 2.5.2 Device Limitations 16 2.5.3 Port Constraints 17 2.6 VLAN Technical Details 17 xi

2.6.1 VLAN Tagging and Trunking 19 2.6.2 VLAN Trunking and Types Of Connection 19 2.7 Method of Frame Handling in VLAN System 21 2.8 Processing Incoming Frames (Ingress Rules) 22 2.8.1 Untagged Frame based on VLAN 22 Membership 2.8.2 Untagged Frame based on Priority 23 Assignment 2.8.3 Tagged Frame based on VLAN Membership 23 2.8.4 Tagged Frame based on Priority Assignment 23 2.9 Ingress Filtering 26 2.10 Forwarding Frames 26 2.10.1 VLAN Forwarding (Egress) List 26 2.10.2 Acceptable Frame Type 28 2.11 VLAN Security 29 2.12 VLAN Security Model 29 2.13 Security Issue Related To IP Address Authentication 32 and Firewalls 2.14 Security Problem by Using Default VLAN ID 34 2.15 Conclusion 35 3 VLAN IMPLEMENTATIONS AND CASE STUDIES 3.1 Methods of Implementations 36 3.1.1 Port-Based VLAN 36 3.1.2 MAC Address-Based VLAN 37 3.1.3 Layer 3 (or protocol)-based VLAN 38 3.2 Requirements To Set Up VLAN 39 3.3 Implementation Approach 40 3.3.1 Infrastructural VLAN 40 3.3.2 Serviced-Based VLAN 41 3.4 Implementation of VLAN 43 3.5 Details of Hub Room with VLAN Enabled Switch 44 3.5.1 Main Hub Room 45 3.5.2 Maintenance Area Hub Room 45 3.5.3 Production Hub Room 46 3.6 Problems Encountered during Implementation 48 3.7 Communication Process in Philip s Seremban 48 VLAN Setup 3.8 Centralized Management of VLAN 49 3.9 SPECTRUM VLAN Manager 51 3.9.1 SPECTRUM VLAN Manager Features 51 3.9.2 VLAN Server 51 3.9.3 VLAN Manager Client 53 3.10 VLAN Maintenance 56 3.10.1 Troubleshooting VLAN 56 3.11 Conclusion 57 xii

4 VLAN SECURITY AND TEST METHODOLOGY 4.1 Introduction 59 4.2 Port Based Security Features Used in the Test 60 4.3 Cisco VLAN Specification 60 4.4 Cisco Layer 2 VLAN Model 61 4.5 Cisco Layer 3 VLAN Model 62 4.6 VLAN with ISL Protocol 63 4.7 Communications Between VLAN in Cisco Switch 64 4.8 Methodology 65 4.8.1 Equipment Used in Test and Technical 65 Specification 4.8.2 Network Associates Sniffer Pro 1.2.0.01 65 Software 4.8.3 Preparation 65 4.9 Configuring Cisco Switches 68 4.9.1 Backup Process 68 4.9.2 General Configuration tasks on Both 68 Switches 4.10 Configuring Switches 69 5 RESULTS AND DISCUSSION 5.1 Results from Insertion into Same VLAN Port 75 5.2 Results from Frames Insertion into different VLAN 77 5.3 VLAN Hopping Test Using Same Switch 78 5.4 VLAN Hoping Test and Result by Changing Trunk 81 Port 5.5 Summary of Results 82 5.6 Proposed Solutions to Overcome the VLAN Hopping Problem 83 6 CONCLUSION 6.1 Summary 85 6.2 Contributions 87 6.3 Further and Relevant Work 88 REFERENCE 89 APPENDICES 92 BIODATA OF THE AUTHOR 109 xiii