Module 7: Secure Network Architecture and Management: PDF Created With Pdffactory Trial Version
Module 7: Secure Network Architecture and Management: PDF Created With Pdffactory Trial Version
• Mitigation
Port security may be administratively appropriate in this case because
of the limited size of the design. The Layer 2 switches are a part of the
security perimeter between the zones of trust and should be managed
as securely as possible including the use of SSH for command line
management, Simple Network Management Protocol Version 3
(SNMPv3) for remote management, configuration audits and regular
penetration testing of each VLAN using tools capable of exploiting
Layer 2 vulnerabilities such as Dsniff. An equally effective and less
administratively taxing approach would be to use dynamic port security
through the application of DHCP snooping and Dynamic ARP
Inspection.
• The type of action taken when a port security violation occurs falls into
the following three categories:
– Protect If the number of secure MAC addresses reaches the limit
allowed on the port, packets with unknown source addresses are
dropped until a number of MAC addresses are removed or the
number of allowable addresses is increased. You receive no
notification of the security violation in this type of instance.
– Restrict If the number of secure MAC addresses reaches the limit
allowed on the port, packets with unknown source addresses are
dropped until some number of secure MAC addresses are removed
or the maximum allowable addresses is increased. In this mode, a
security notification is sent to the Simple Network Management
Protocol (SNMP) server (if configured) and a syslog message is
logged. The violation counter is also incremented.
– Shutdown If a port security violation occurs, the interface changes
to error-disabled and the LED is turned off. It sends an SNMP trap,
logs to a syslog message, and increments the violation counter.
10
11
12
• This can be represented by a very large DMZ, or a DMZ with multiple VLANs
all existing within a single security zone of trust. Additionally, this could also be
represented as a Layer 3 switch within the DMZ to provide inter-VLAN routing.
• Vulnerabilities
The primary layer 2 vulnerabilities of this design include the following:
– MAC spoofing
– CAM table overflow
– VLAN hopping
– Spanning tree attacks, in networks with multiple switches.
13
• Mitigation
If the security zone is small enough, use port security to help mitigate
the CAM table overflow vulnerability as well as the MAC spoofing
vulnerability. BPDU guard and root guard can be used to mitigate
attacks against the Spanning Tree Protocol (STP).
• The Layer 2 switches are a part of the security perimeter between
zones of trust and should be managed as securely as possible
including the use of SSH for command line management, SNMPv3 for
remote management, configuration audits and regular penetration
testing of each VLAN using tools capable of exploiting Layer 2
vulnerabilities such as Dsniff.
14
16
• Mitigation
If the security zone is small enough, use port security to
help mitigate the CAM table overflow vulnerability as well
as the MAC spoofing vulnerability. Additionally, mitigation
of VLAN hopping can be accomplished by using the
following VLAN best practices as guidelines:
– Use dedicated VLAN IDs for all trunk ports.
– Disable all unused switch ports and place them in an
unused VLAN.
– Set all user ports to non-trunking mode by explicitly
turning off DTP on those ports.
17
• Mitigation
If the security zone is small enough, use port security to
help mitigate the CAM table overflow vulnerability as well
as the MAC spoofing vulnerability. Additionally, mitigation
of VLAN hopping can be accomplished by following the
VLAN best practices outlined in this module. If necessary,
deploy 802.1x authentication to prevent unauthorized
access to the security zone from an attacker who may
physically connect to a switch in the design. As with the
previous cases, the switches must be managed as
securely as possible and tested on a regular basis.
19
• Vulnerabilities
The primary layer 2 vulnerabilities of this design include the following:
– MAC spoofing, within VLANs
– CAM table overflow, through per VLAN traffic flooding
– VLAN hopping
20
• Mitigation
If the security zones are small enough, use port security to
help mitigate the CAM table overflow vulnerability as well
as the MAC spoofing vulnerability. Additionally, mitigation
of VLAN hopping can be accomplished by following the
VLAN best practices outlined in this module. As with the
previous cases, the switches must be managed as
securely as possible and tested on a regular basis.
21
22
23
• Mitigation
If the security zones are small
enough, use port security to help
mitigate CAM table overflow
vulnerabilities as well as the MAC
spoofing vulnerability. Additionally,
mitigation of VLAN hopping can
be accomplished by following the
VLAN best practices outlined in
this module. If necessary, deploy
802.1x authentication to prevent
unauthorized access to each of
the security zones from an
attacker who may physically
connect to a switch in the design.
Another possible mitigation
method would be to add a firewall
within the design, or add a Layer 3
switch with an integrated firewall.
24
25
• Mitigation
If the security zones are small enough, use port security to help
mitigate CAM table overflow vulnerabilities as well as the MAC
spoofing vulnerability. Additionally, mitigation of VLAN hopping can be
accomplished by following the VLAN best practices outlined within this
module. If necessary, deploy 802.1x authentication to prevent
unauthorized access to each of the security zones from an attacker
who may physically connect to a switch in the design. Another possible
mitigation method would be to add a firewall within the data center
design and integrate it into the central switch similar to that employed
in the previous design. The firewall enforces additional Layer 3 traffic
segregation between the various user groups. As with the previous
cases, the switches must be managed as securely as possible and
tested on a regular basis.
26
27
• Mitigation
If the security zones are small enough, use port security to help
mitigate CAM table overflow vulnerabilities as well as the MAC
spoofing vulnerability. Additionally, mitigation of VLAN hopping can be
accomplished by following the VLAN best practices outlined within this
module. If necessary, deploy 802.1x authentication to prevent
unauthorized access to each of the security zones from an attacker
who may physically connect to a switch in the design. Another
possible mitigation method would be to add a firewall within the data
center design and integrate it into the one or more of the switches,
similar to that employed in the case #6 design. The firewall enforces
additional Layer 3 traffic segregation between the various user groups.
As with the previous cases, the switches must be managed as
securely as possible and tested on a regular basis.
28
29
30
31
32
33
34
35
37
39
40
41
42
43
44
• Before beginning the installation of the Router MC, verify that the
server meets the requirements shown in Figure1 .
• Also, verify that the client machine being used meets the requirements
shown in Figure2 .
45
46
• Log in to the CiscoWorks Web page and complete the following steps to launch the
Router MC:
– Open a browser and point the browser to the IP address of the CiscoWorks server
with a port number of 1741. If the CiscoWorks server is local, type the following
address in the browser: http://127.0.0.1:1741
– If this is the first time that CiscoWorks has been used, enter the username admin
and the password admin.
47
• The Router MC main window is the first window that is encountered in the
Router MC user interface. The Router MC user interface contains four tabs as
shown in Figure
– Devices
– Configuration
– Deployment
– Reports
– Admin
48
• The Devices tab, shown in Figure is used to import and manage the inventory of routers
to be configured using the Router MC.
– Device hierarchy – Use this option to view the device hierarchy and to manage the
routers within the hierarchy by creating device groups, moving or deleting
devices/groups, editing router parameters, and adding unmanaged spokes.
– Device import – Use this option to import the routers to be configured into Router
MC, and to re-import routers when necessary.
– Credentials – Use this option to edit router credentials or synchronize the
credentials of multiple routers from a comma-separated value (CSV) file. Device
credentials include the username, password, and enable password.
50
54
56
57
58
59
• Another technique that the administrator can use to manage and monitor the
network is to employ the Simple Network Management Protocol (SNMP).
SNMP is an application-layer protocol that facilitates the exchange of
management information between network devices. It is part of the TCP/IP
protocol suite. SNMP enables network administrators to manage network
performance, find and solve network problems, and plan for network growth.
SNMP can be used to manage Cisco routers, switches, wireless access points,
firewalls, printers, servers and other SNMP capable devices .
60
65
67
68
69
70
71
72
73
74
• Data integrity
Provided by the MD5 message digest algorithm. A 128-bit digest is
calculated over the designated portion of a SNMPv3 message and
included as part of the message sent to the recipient.
• Data origin authentication
Provided by prefixing each message with a secret value shared by the
originator of that message and its intended recipient before digesting.
• Message delay or replay
Provided by including a timestamp value in each message.
• Data confidentiality
Provided by the symmetric privacy protocol which encrypts an
appropriate portion of the message according to a secret key known
only to the originator and recipient of the message. This protocol is
used in conjunction with the symmetric encryption algorithm, in the
cipher block chaining mode, which is part of the Data Encryption
Standard (DES). The designated portion of an SNMPv3 message is
encrypted and included as part of the message sent to the recipient.
75
78
79
80
81
82
83
84
85
86
87
88
89
90
• SNMP Example
In Figure , the NMS uses a Get operation to request management information
contained in an agent on host 172.18.0.15. Within the Get request, the NMS
includes a complete Object Identifier (OID) so that the agent knows exactly
what is being sought. The response from the agent contains a variable binding
containing the same OID and the data associated with it. The NMS then uses a
Set request to tell the agent to change a piece of information. In an unrelated
communication, host 172.16.0.2 sends a trap to the NMS because some
urgent condition has occurred.
91
• Enable SNMP
The SNMP agent that runs on the PIX Security Appliance performs two
functions:
– Replies to SNMP requests from NMSs.
– Sends traps to NMSs.
• To enable the SNMP agent and identify an NMS that can connect to
the PIX Security Appliance, follow these steps:
• Step 1
Identify the IP address of the NMS that can connect to the PIX Security
Appliance with the snmp-server host interface_name ip_address [trap
| poll] [community text] [version 1 | 2c] [udp-port port] global
configuration command. Specify trap or poll to limit the NMS to
receiving traps only or browsing only. By default, the NMS can use
both functions.
• SNMP traps are sent on UDP port 162 by default. The port number can
be changed by using the udp-port keyword.
92
• Step 2
Specify the community string with the snmp-server community key
global configuration command. The SNMP community string is a
shared secret between the PIX Security Appliance and the NMS. The
key is a case-sensitive value up to 32 characters in length. Spaces are
not permitted.
• Step 3
(Optional) Set the SNMP server location or contact information with the
snmp-server {contact | location} text global configuration command.
• Step 4
Enable the PIX Security Appliance to send traps to the NMS with the
snmp-server enable [traps [all | feature [trap1] [trap2]] [...]] global
configuration command. By default, SNMP core traps are enabled. If a
trap type is not entered in the command, syslog is the default. To
enable or disable all traps, enter the all option. For snmp, each trap
type can be identified separately.
93
• Step 5
Enable system messages to be sent as traps to the
NMSwith the logging history level global configuration
command. Syslog traps must also be enabled using the
preceding snmp-server enable traps command.
• Step 6
Enable logging, so system messages are generated and
can then be sent to an NMS, with the logging enable
global configuration command.
94
95