NET301 Chapter5 NetworkSecurityandMonitoring
NET301 Chapter5 NetworkSecurityandMonitoring
Monitoring
Prepared by: Engr. John Ceazar C. Bello
Chapter 5 - Sections & Objectives
5.1 LAN Security
• Explain how to mitigate common LAN security attacks.
• Describe common LAN security attacks.
• Explain how to use security best practices to mitigate LAN attacks.
5.2 SNMP
• Configure SNMP to monitor network operations in a small to medium-sized business network.
• Explain how SNMP operates.
• Configure SNMP to compile network performance data.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
LAN Security Attacks
Common LAN Attacks
Common security solutions using
routers, firewalls, Intrusion
Prevention System (IPSs), and VPN
devices protect Layer 3 up through
Layer 7.
Layer 2 must also be protected.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
LAN Security Attacks
Telnet Attacks
There are two types of Telnet attacks:
• Brute Force Password Attack - trial-and-
error method used to obtain the administrative
password.
• Telnet DoS Attack - Attacker continuously
requests Telnet connections in an attempt to
render the Telnet service unavailable.
To mitigate these attacks:
• Use SSH
• Use strong passwords that are changed
frequently.
• Limit access to the vty lines using an access
control list (ACL)
• Use AAA with either TACACS+ or RADIUS
protocols.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
LAN Security Attacks
MAC Address Table Flooding Attack
Common LAN switch attack is the MAC
address table flooding attack.
• An attacker sends fake source MAC
addresses until the switch MAC address
table is full and the switch is overwhelmed.
• Switch is then in fail-open mode and
broadcasts all frames, allowing the attacker
to capture those frames.
Configure port security to mitigate these
attacks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
LAN Security Attacks
VLAN Attacks
Switch spoofing attack - an example of a
VLAN attack.
• Attacker can gain VLAN access by
configuring a host to spoof a switch and use
the 802.1Q trunking protocol and DTP to
trunk with the connecting switch.
Methods to mitigate VLAN attacks:
• Explicitly configure access links.
• Disable auto trunking.
• Manually enable trunk links.
• Disable unused ports, make them access
ports, and assign to a black hole VLAN.
• Change the default native VLAN.
• Implement port security.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
LAN Security Attacks
DHCP Attacks
DHCP spoofing attack - An attacker
configures a fake DHCP server on the
network to issue IP addresses to clients.
DHCP starvation attack - An attacker
floods the DHCP server with bogus DHCP
requests and leases all of the available IP
addresses. This results in a denial-of-
service (DoS) attack as new clients cannot
obtain an IP address.
Methods to mitigate DHCP attacks:
• Configure DHCP snooping
• Configure port security
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
LAN Security Best Practices
Secure the LAN
Strategies to help secure Layer 2 of a IP Source Guard (IPSG)
prevents MAC and IP address
network: spoofing.
• Always use secure variants of protocols such
as SSH, SCP, and SSL.
• Use strong passwords and change often. Dynamic ARP Inspection
• Enable CDP on select ports only. (DAI) prevents ARP
spoofing and poisoning.
• Secure Telnet access.
• Use a dedicated management VLAN DHCP snooping
prevents DHCP
• Use ACLs to filter unwanted access. starvation and spoofing.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
LAN Security Best Practices
Mitigate VLAN Attacks
To prevent basic VLAN attacks:
• Disable DTP (auto trunking) negotiations on
non-trunk ports and use switchport mode
access.
• Manually enable trunk links using
switchport mode trunk.
• Disable DTP (auto trunking) negotiations on
trunking and non-trunking ports using
switchport nonegotiate.
• Change the native VLAN from VLAN 1.
• Disable unused ports and assign them to an
unused VLAN.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
LAN Security Best Practices
Mitigate DHCP Attacks
To prevent DHCP attacks use DHCP snooping.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
LAN Security Best Practices
Secure Device Access using 802.1X
IEEE 802.1X standard defines a port-based access control and authentication protocol.
• Restricts unauthorized workstations from connecting to a LAN.
• The authentication server authenticates each workstation connected to a switch port before
making any services available.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
5.2 SNMP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
SNMP Operation
Introduction to SNMP
Simple Network Management Protocol
(SNMP) enables network administrators to
monitor and manage network nodes.
The SNMP system consists of three
elements:
• SNMP manager- collects information from
an SNMP agent using the “get” action.
Changes configurations on an agent using
the “set” action.
• SNMP agents (managed node)
• Management Information Base (MIB)-
stores data and operational statistics about
the managed device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
SNMP Operation
SNMP Operation
SNMP agents that reside on managed
devices collect and store information about
the device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
SNMP Operation
SNMP Versions
All versions use SNMP
managers, agents, and MIBs,
this course focuses on versions
2c and 3.
A network administrator must
configure the SNMP agent to
use the SNMP version
supported by the management
station.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
SNMP Operation
Community Strings
SNMPv1 and SNMPv2c use
community strings that control access
to the MIB.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
SNMP Operation
Management Information Base Object ID
The MIB defines each variable as an object ID (OID).
• OIDs uniquely identify managed objects.
• OIDs are organized based on RFC standards into a
hierarchy or tree.
Most devices implement RFC defined common
public variables.
• Vendors such as Cisco can define private branches
on the tree to accommodate their own variables.
CPU is one of the key resources, it should be
measured continuously.
• An SNMP graphing tool can periodically poll SNMP
agents, and graph the values.
• The data is retrieved via the snmpget utility.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
SNMP Operation
SNMPv3
SNMPv3 authenticates and encrypts
packets over the network to provide secure
access to devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Configuring SNMP
Steps for Configuring SNMP
Basic steps to configuring SNMP:
1. Configure the community string and
access level using snmp-server
community string ro | rw command.
2. (Optional) Document the location of the
device using the snmp-server location
text command.
3. (Optional) Document the system contact
using the snmp-server contact text
command.
4. (Optional)Use an ACL to restrict SNMP
access to NMS hosts (SNMP managers).
Reference the ACL using snmp-server
community string access-list-number-or-
name.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Configuring SNMP
Verifying SNMP Configuration
Kiwi Syslog Server is one of several solutions that
display SNMP output.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Configuring SNMP
SNMP Best Practices
SNMP can create security vulnerabilities.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Configuring SNMP
Steps for Configuring SNMPv3
Steps to configure SNMPv3:
1. Configure a standard ACL that will
permit access for authorized SNMP
managers.
2. Configure an SNMP view to identify
which OIDs the SNMB manager will
be able to read.
3. Configure the SNMP group and
features including name, version,
type of authentication and encryption,
associates view to the group, read or
write, filter with ACL.
4. Configure a user with features
including username, associates with
group, version, authentication type,
encryption type and password.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Configuring SNMP
SNMPv3 Configuration
• The example configures a standard
ACL named PERMIT-ADMIN. It is
configured to permit only the
192.168.1.0/24 network. All hosts
attached to this network will be
allowed to access the SNMP agent
running on R1.
• An SNMP view is named SNMP-RO
and is configured to include the entire
ISO tree from the MIB.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
5.3 Cisco Switch Port
Analyzer
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
SPAN Overview
Port Mirroring
Port mirroring allows a switch to copy and send Ethernet frames from specific ports to the
destination port connected to a packet analyzer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
SPAN Overview
Analyzing Suspicious Traffic
SPAN is a type of port mirroring that
allows administrators or devices to
collect and analyze traffic.
SPAN is commonly implemented to
deliver traffic to specialized devices
including:
• Packet analyzers – Using software such
as Wireshark to capture and analyze
traffic for troubleshooting purposes.
• Intrusion Prevention Systems (IPSs) –
IPSs are focused on the security aspect
of traffic and are implemented to detect
network attacks as they happen.
SPAN can be implemented as either
Local SPAN or Remote SPAN (RSPAN).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
SPAN Overview
Local SPAN
Local SPAN is when traffic on a switch is
mirrored to another port on that switch.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
SPAN Configuration
Configuring Local SPAN
A session number is used to identify a
local SPAN session.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
SPAN Configuration
Verifying Local SPAN
Use the show monitor command to
verify the SPAN session. It displays the
type of the session, the source ports for
each traffic direction, and the
destination port.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
SPAN as a Troubleshooting Tool
Troubleshooting with SPAN Overview
SPAN allows administrators to
troubleshoot network issues.
• To investigate a slow network application,
a network administrator can use SPAN to
duplicate and redirect traffic to a packet
analyzer such as Wireshark.
• Older systems with faulty NICs can also
cause issues. If SPAN is enabled a
network technician can detect and isolate
the end device causing the problem.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
5.4 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Conclusion
Chapter 5: Network Security and Monitoring
Explain how to mitigate common LAN security attacks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38