Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Lan Security Concepts

10.1. Endpoint Security.


10.1.1. Network Attacks Today.
• Distributed Denial of Service (DDoS): • Discard emails with bad links (as shown in the
coordinated attack from many devices, figure).
intention of degrading or halting public access • Block access to newly infected sites.
to an organization website. • Encrypt content in outgoing email to prevent
• Data Breach: Data servers of host are data loss.
compromised to steal confidential information.
10.1.5. Cisco Web Security Appliance.
• Malware: malicious software (WannaCry),
WSA is a mitigation Technology for web-based
encrypts all the data until is paid.
threats.
10.1.2. Network Security Devices
Features and applications:
• Virtual Private Network (VPN)
• Next-Generation Firewall (NGFW): provides • Chat Messaging
Lower bandwidth
stateful inspection, application visibility and • Video
/ limited
control. advanced malware protection (AMP), • Audio
and URL filtering.
• Network Access Control (NAC): Includes Can perform blacklisted URLs, malware scan.
AAA, services may be incorporate, for 10.2. Access Control.
example; The Cisco Identity Services Engine
(ISE). 10.2.1. Authentication with a local password.
Limitations of the data base (SSH):
10.1.3. Endpoint Protection
Traditional host-based security: • Must be configured locally on each device.
• Local database configuration provides no
• Antivirus/Antimalware. fallback authentication method.
• Host-Based Firewalls.
• Host-Based Intrusion Prevention Systems 10.2.2. AAA components.
(HIPSs). • Authentication: who are you?
o Local: Stores usernames and passwords
Endpoints are protected by a combination of locally in a network device
NAC: o Server
▪ Remote Authentication Dial-In User
• Host-Based AMP Software.
Service (RADIUS)
• Email Security Appliance (ESA).
▪ Terminal Access Controller Access
• Web Security Appliance (WSA).
Control System (TACACS+)
10.1.4. Cisco Email Security Appliance. • Authorization: How much can you spend? /
ESA is designed to monitor SMTP what can you do
• Accounting: What did you spend it on?
Functions:
10.2.6. 802.1X
• Block known threats. Port-based access control and authentication
• Remediate against stealth malware that evaded protocol, restricts unauthorized workstations.
initial detection.
Have specific roles:
• Client (Supplicant): device runs 802.1X- IP Source Prevents MAC and IP address spoofing
compliant client software, which is available for Guard attacks.
(IPSG)
wired or wireless devices.
• Switch (Authenticator): switch acts as an This solution will not be effective if protocols are
not secured
intermediary between the client and the
authentication server. It requests identifying Strategies:
information from the client, verifies that
information with the authentication server, and • Always use secure variants of these protocols
relays a response to the client. Another device such as SSH, Secure Copy Protocol (SCP),
that could act as authenticator is a wireless Secure FTP (SFTP), and Secure Socket
access point. Layer/Transport Layer Security (SSL/TLS).
• Authentication server: The server validates the • Consider using out-of-band management
identity of the client and notifies the switch or network to manage devices.
wireless access point that the client is or is not • Use a dedicated management VLAN where
authorized to access the LAN and switch nothing but management traffic resides.
services. • Use ACLs to filter unwanted access.

10.3. Layer 2 Security Threats 10.4. MAC Address Table Attack


10.3.2. Switch Attack Categories. • Tools: Macof.
Layer 2 attacks: • MAC Address Table Flooding: MAC Table is
full.
Category Examples • MAC Address Table Attack Mitigation: To
MAC Includes MAC address flooding attacks. mitigate MAC address table overflow attacks,
Table
Attacks
must implement port security.
VLAN Includes VLAN hopping and VLAN 10.5. LAN Attacks
Attacks double-tagging attacks. It also includes
attacks between devices on a common 10.5.2. Vlan Hopping Attacks
VLAN.
Enables traffic from one Vlan to be seen by
DHCP Includes DHCP starvation and DHCP
Attacks spoofing attacks. another VLAN. The threat actor configures the
ARP Includes ARP spoofing and ARP host to spoof 802.1Q signaling DTP to trunk with
Attacks poisoning attacks. the connecting switch and can access to the vlans
Address Includes MAC address and IP address and can receive the traffic.
Spoofing spoofing attacks.
Attacks 10.5.3. VLAN Double-Tagging Attack
STP Includes Spanning Tree Protocol A VLAN double-tagging is unidirectional and
Attacks manipulation attacks. works only when the attacker is connected to a
10.3.3. Switch Attack Mitigation Techniques. port residing in the same VLAN as the native
Solution Description VLAN of the trunk port.
Port Prevents many types of attacks including
Security MAC address flooding attacks and DHCP Vlan Attack Prevention:
starvation attacks.
DHCP Prevents DHCP starvation and DHCP
• Disable trunking on all access ports.
Snooping spoofing attacks. • Disable auto trunking on trunk links so that
Dynamic Prevents ARP spoofing and ARP trunks must be manually enabled.
ARP poisoning attacks. • Be sure that the native VLAN is only used for
Inspection
(DAI) trunk links.
10.5.5. DHCP Attacks • native VLAN
DHCP Starvation Attack
Disable
Creates a DoS for connecting clients (globbler
app) On a port: no cdp enable

DHCP Spoofing Attack On a device: no cdp run

Occurs when a rogue DHCP server is connected Link Layer Discovery Protocol (LLDP) is also vulnerable to
reconnaissance attacks. Configure no lldp run to disable
to the network and provides false IP
LLDP globally. To disable LLDP on the interface, configure
configuration. Misleading information: no lldp transmit and no lldp receive.

• Wrong default gateway.


• Wrong DNS server.
• Wrong IP address.
10.5.7. ARP Attacks
An attacker can send a gratuitous ARP message
containing a spoofed MAC address to a switch,
and the switch would update its MAC table
accordingly.
10.5.8. Address Spoofing Attacks.
MAC address spoofing attacks occur when the
threat actors alter the MAC address of their host
to match another known MAC address of a target
host.
IP and MAC address spoofing can be mitigated
by implementing IPSG.
10.5.9. STP Attack
the attacking host broadcasts STP bridge protocol
data units (BPDUs) containing configuration and
topology changes that will force spanning-tree
recalculations. This announcing a lower bridge
priority.
This STP attack is mitigated by implementing
BPDU Guard on all access ports. BPDU Guard is
discussed in more detail later in the course.
10.5.10. CDP Reconnaissance
Cisco Discovery Protocol (CDP) is useful for
troubleshooting.
Information:

• IP address of the device,


• IOS software version
• Platform
• Capabilities

You might also like