You are on page 1of 87

Chapter 6:

Securing the Local Area Network

CCNA Security v2.0


6.0 Introduction
6.1 Endpoint Security
6.2 Layer 2 Security Threats
6.3 Summary

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Upon completion of this section, you should be able to:
• Describe endpoint security and the enabling technologies.

• Explain how Cisco AMP is used to ensure endpoint security.

• Explain how Cisco NAC authenticates and enforces the network security policy.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Post malware attack Host-Based Protection:
questions:
• Antivirus/Antimalware
• Where did it come from?
• SPAM Filtering
• What was the threat method
• URL Filtering
and point of entry?
• Blacklisting
• What systems were affected?
• Data Loss Prevention (DLP)
• What did the threat do?

• Can I stop the threat and root


cause?
• How do we recover from it?

• How do we prevent it from


happening again?

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Image is missing

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Image is missing

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Features and benefits of Cisco Email Security solutions:
• Global threat intelligence
• Spam blocking

• Advanced malware protection


• Outbound message control

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Client Initiates Web Request

WSA Forwards
Request

Reply Sent to WSA and Then


To Client

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Three ways to grant sponsor permissions:
• to only those accounts created by the sponsor

• to all accounts

• to no accounts (i.e., they cannot change any permissions)

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Upon completion of the section, you should be able to:
• Describe Layer 2 vulnerabilities.

• Describe CAM table overflow attacks.

• Configure port security to mitigate CAM table overflow attacks.

• Configure VLAN Truck security to mitigate VLAN hopping attacks.

• Implement DHCP Snooping to mitigate DHCP attacks.

• Implement Dynamic Arp Inspection to mitigate ARP attacks.

• Implement IP Source Guard to mitigate address spoofing attacks.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Intruder Runs Attack Tool

Fill CAM Table

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Switch Floods All Traffic

Attacker Captures Traffic

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Enabling Port Security

Verifying Port
Security

Port Security Options

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Setting the Maximum Number of Mac Addresses

Manually Configuring Mac Addresses

Learning Connected Mac Addresses Dynamically

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Security Violation Modes:
• Protect

• Restrict

• Shutdown

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Step 1 – Double Tagging Attack

Step 2 – Double Tagging Attack

Step 3 – Double Tagging Attack

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Attacker Initiates a Starvation Attack

DHCP Server Offers Parameters

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Client Requests all Offers

DHCP Server Acknowledges All Requests

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
The switch will deny packets
containing specific information:
• Unauthorized DHCP server
messages from an untrusted port
• Unauthorized DHCP client
messages not adhering to the
snooping binding table or rate
limits
• DHCP relay-agent packets that
include option-82 information on
an untrusted port

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
DHCP Snooping Reference Topology

Configuring a Maximum Number of MAC Addresses

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Verifying DHCP Snooping

Configuring a Maximum Number of MAC Addresses

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Dynamic ARP
Inspection:

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
ARP Reference Topology

Configuring Dynamic
ARP Inspection

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Checking Source, Destination, and IP

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
For each untrusted port, there are two possible levels of IP traffic security filtering:
• Source IP address filter

• Source IP and MAC address filter

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
IP Source Guard Reference Topology

Configuring IP Source Guard

Checking IP Source Guard

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Spoofing the Root Bridge

Successful STP Manipulation Attack

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Chapter Objectives:
• Explain endpoint security.

• Describe various types of endpoint security applications.

• Describe Layer 2 vulnerabilities.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Thank you.
• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page. 1
(https://www.netacad.com) 2
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 87

You might also like