Securing end devices



Similar documents
CCNA Security - Implementing Network Security 6 Securing the Local Area Network 6.0 Chapter Introduction Chapter Introduction

CCT vs. CCENT Skill Set Comparison

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Securing Cisco Network Devices (SND)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Network security includes the detection and prevention of unauthorized access to both the network elements and those devices attached to the network.

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Implementing Cisco IOS Network Security

Switching in an Enterprise Network

Solutions for LAN Protection

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon Paul Coggin Senior Principal Cyber Security

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Tim Bovles WILEY. Wiley Publishing, Inc.

Interconnecting Cisco Networking Devices Part 2

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

Course Contents CCNP (CISco certified network professional)

Network Security. Ensuring Information Availability. Security

: Interconnecting Cisco Networking Devices Part 2 v1.1

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA Security v1.0 Scope and Sequence

VLANs. Application Note

Recommended IP Telephony Architecture

Security Considerations in IP Telephony Network Configuration

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1

Chapter 1 The Principles of Auditing 1

Best Practices for Outdoor Wireless Security

Tools for Attacking Layer 2 Network Infrastructure

IINS Implementing Cisco Network Security 3.0 (IINS)

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configure WorkGroup Bridge on the WAP131 Access Point

TABLE OF CONTENTS NETWORK SECURITY 1...1

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH)

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Configuring EtherChannels

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Lab VI Capturing and monitoring the network traffic

9 Simple steps to secure your Wi-Fi Network.

Chapter 3. Enterprise Campus Network Design

Configuring the Transparent or Routed Firewall

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Configuring DHCP Snooping

"Charting the Course...

Building Secure Network Infrastructure For LANs

Section 12 MUST BE COMPLETED BY: 4/22

Bypassing Network Access Control Systems

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

CCNA Security v1.0 Scope and Sequence


WLAN Information Security Best Practice Document

How To Learn Cisco Cisco Ios And Cisco Vlan

Network Virtualization Network Admission Control Deployment Guide

How To Understand and Configure Your Network for IntraVUE

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

CISCO IOS NETWORK SECURITY (IINS)

Own your LAN with Arp Poison Routing

CTS2134 Introduction to Networking. Module Network Security

Wireless Security: Secure and Public Networks Kory Kirk

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

- Virtual LANs (VLANs) and VTP -

8 Steps for Network Security Protection

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

8 Steps For Network Security Protection

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

VMware ESX Server Q VLAN Solutions W H I T E P A P E R

How To Classify A Dnet Attack

WiFi Security Assessments

Wireless Networks. Welcome to Wireless

White Paper. Using VLAN s in Network Design. Kevin Colo

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Networking Devices. Lesson 6

Configuring LLDP, LLDP-MED, and Location Service

Network Access Security. Lesson 10

Packet Sniffing on Layer 2 Switched Local Area Networks

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

What is VLAN Routing?

Architecture Overview

Configuring Port Security

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Cisco Networking Professional-6Months Project Based Training

48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W

Design and Implementation Guide. Apple iphone Compatibility

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Wireless Local Area Networks (WLANs)

Lab Organizing CCENT Objectives by OSI Layer

Transcription:

Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices.

Endpoint Security If users are not practicing security in their desktop operations, no amount of security precautions will guarantee a secure network.

Endpoint security applications IronPort security appliances Network admission control (NAC) Cisco Security Agent (CSA).

Securing Layer 2 MAC address spoofing STP manipulation attacks. Layer 2 security configurations include: Enabling port security BPDU guard Root guard Storm control Cisco switched port analyzer (SPAN) Remote SPAN (RSPAN).

Endpoint security Cisco Network Admission Control (NAC) complies with network security policies Endpoint protection Cisco Security Agent (CSA) IronPort Network infection containment automating key elements of the infection response process SDN ->NAC, CSA, IPS

Operating systems Trusted code the operating system code is not compromised Trusted path the system is a genuine one and not a Trojan Horse Privileged context of execution Provides identity authentication and certain privileges based on the identity. Process memory protection and isolation Provides separation from other users and their data. Access control to resources Ensures confidentiality and integrity of data.

Operating systems Protect an endpoint from operating system vulnerabilities: Least privilege concept Isolation between processes Reference monitor An access control concept that mediates all access to objects. Small, verifiable pieces of code

Endpoint security solution IronPort C-Series - An email security appliance for virus and spam control. S-Series - A web security appliance for spyware filtering, URL filtering, and anti-malware. M-Series - A security management appliance that compliments the email and web security appliances by managing and monitoring an organization's policy settings and audit information.

SenderBase IronPort SenderBase is the world's largest email traffic monitoring service. SenderBase collects data from more than 100,000 ISPs, universities, and corporations. It measures more than 120 different parameters for any email server on the Internet. This massive database receives more than five billion queries per day, with real-time data streaming in from every continent and both small and large network providers. SenderBase has the most accurate view of the sending patterns of any given mail sender because of the size of the database.

NAC With NAC, network security professionals can authenticate, authorize, evaluate, and remediate wired, wireless, and remote users and their machines prior to network access

NAC

CSA Policy-driven, data-loss prevention with zero-update attack prevention and antivirus detection

CSA

Other vendors McAfee Symantec Juniper SonicWALL Fortinet.

Layer 2 Security Layer 2 attacks typically require internal access, either from an employee or visitor. If the Data Link Layer is hacked, communications are compromised without the other layers being aware of the problem. Security is only as strong as the weakest link. Regarding network security, the Data Link Layer is often the weakest link. When the layer is compromised, other layers are not aware of that fact, Buffer overflows Cisco Security Agent

Layer 2 Security

MAC address spoofing attacks

MAC address overflow attacks MAC address tables are limited in size Macof tool Bombarding the switch with fake source MAC addresses The switch begins to flood all incoming traffic to all ports => a hub

MAC address overflow attacks

MAC address overflow attacks Mitigated by configuring port security on the switch Statically specify the MAC addresses on a particular switch port Allow the switch to dynamically learn a fixed number of MAC addresses for a switch port.

Manipulation attacks

STP 3 2 2 12 2 4 9

Manipulation attacks

Manipulation attacks Mitigation techniques for STP manipulation include Enabling PortFast Root guard and BPDU guard.

LAN Storm attack Errors in the protocol stack implementation Mistakes in network configurations Users issuing a DoS attack can cause a storm. Broadcast storms can also occur on networks. Switches always forward broadcasts out all ports. Some necessary protocols, such as Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP), use broadcasts; therefore, switches must be able to forward broadcast traffic. Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm on one of the physical interfaces.

LAN Storm attack

VLAN hopping attack Spoofing DTP messages from the attacking host to cause the switch to enter trunking mode. From here, the attacker can send traffic tagged with the target VLAN, and the switch then delivers the packets to the destination. Introducing a rogue switch and enabling trunking. The attacker can then access all the VLANs on the victim switch from the rogue switch.

VLAN hopping attack Prevent a basic VLAN hopping attack Turn off trunking on all ports, except the ones that specifically require trunking. On the required trunking ports, disable DTP (auto trunking) negotiations Manually enable trunking.

VLAN hopping attack

Mitigating Layer 2 attacks Enable port security. Statically specify MAC addresses for a port or to permit the switch to dynamically learn a limited number of MAC addresses. Limit the number to one. The port either shuts down until it is administratively enabled (default mode) or drops incoming frames from the insecure host (restrict option). It is recommended that an administrator configure the port security feature to issue a shutdown rather than dropping frames from insecure hosts with the restrict option. The restrict option might fail under the load of an attack.

Configuring port security Step 1. Sets the interface mode as access If an interface is in the default mode (dynamic auto), it cannot be configured as a secure port.

Configuring port security Step 2. Enables port security on the interface

Configuring port security Step 3. Sets the maximum number of secure MAC addresses for the interface (optional) The range is 1 to 132. The default is 1.

Violation rules for the switch-port Step 1. Sets the violation mode (optional) Default condition (shutdown mode).

Violation rules for the switch-port Step 2. Enters a static secure MAC address for the interface (optional)

Violation rules for the switch-port Step 3. Enables sticky learning on the interface (optional)

Port Fast The spanning-tree PortFast feature causes an interface configured as a Layer 2 access port to transition from the blocking to the forwarding state immediately, bypassing the listening and learning states. Switch(config-if)# spanning-tree portfast Switch(config)# spanning-tree portfast default

Port Fast

BPDU Guard BPDU guard is used to protect the switched network from the problems caused by receiving BPDUs on ports that should not be receiving them. If a port that is configured with PortFast receives a BPDU, STP can put the port into the disabled state by using BPDU guard. Use this command to enable BPDU guard on all ports with PortFast enabled. Switch(config)# spanning-tree portfast bpduguard default

Root Guard Root guard is best deployed toward ports that connect to switches that should not be the root bridge. Switch(config-if)# spanning-tree guard root

Storm control Enables broadcast storm protection. Enables multicast storm protection. Specifies the action that should take place when the threshold (level) is reached.

VLAN Trunk Security Be sure to disable DTP (auto trunking) negotiations Manually enable trunking. To prevent a VLAN hopping attack that uses double 802.1Q encapsulation, the switch must look further into the frame to determine whether more than one VLAN tag is attached to it. One of the more important elements is to use a dedicated native VLAN for all trunk ports. Disable all unused switch ports and place them in an unused VLAN.

VLAN Trunk Security

VLAN Trunk Security Step 1. Specifies an interface as a trunk link

VLAN Trunk Security Step 2. Prevents the generation of DTP frames

VLAN Trunk Security Step 3. Set the native VLAN on the trunk to an unused VLAN The default native VLAN is VLAN 1.

SPAN Switched Port Analyzer A SPAN port mirrors traffic to another port where a monitoring device is connected. Without this, it can be difficult to track hackers after they have entered the network. RSPAN

Summary Layer2 Manage switches in secure a manner (SSH, out-of-band management, ACLs, etc.). Much like routers. Set all user ports to non-trunking ports (unless you are using Cisco VoIP). Use port security where possible for access ports. Enable STP attack mitigation (BPDU guard, root guard).

Summary Layer2 Use Cisco Discovery Protocol only where necessary with phones it is useful. Configure PortFast on all non-trunking ports. Configure root guard on STP root ports. Configure BPDU guard on all non-trunking ports. Always use a dedicated, unused native VLAN ID for trunk ports

Summary Layer2 Do not use VLAN 1 for anything. Disable all unused ports and put them in an unused VLAN. Manually configure all trunk ports and disable DTP on trunk ports. Configure all non-trunking ports with switchport mode access.

Wireless security WAR-Driving

Threats to wireless Network Stumbler software finds wireless networks. Kismet software displays wireless networks that do not broadcast their SSIDs. AirSnort software sniffs and cracks WEP keys. CoWPAtty cracks WPA-PSK (WPA1). ASLEAP gathers authentication data. Wireshark can scan wireless Ethernet data and 802.11 SSIDs.

Mitigating threats to wireless Wireless networks using WEP or WPA/TKIP (Wi Fi Protected Acccess) (Temporal Key Integrity Protocol) are not very secure and are vulnerable to hacking attacks. Wireless networks using WPA2/AES (Advanced Encryption Standard) should have a pass phrase of at least 21 characters and this is the state of the art. If an IPsec VPN is available, use it on any public wireless LAN. If wireless access is not needed, disable the wireless radio or wireless NIC.