Module 10 - LAN Security Concepts
Module 10 - LAN Security Concepts
Endpoint
Security Explain how to use endpoint security to mitigate attacks.
Layer 2 Security
Threats Identify Layer 2 vulnerabilities.
MAC Address Explain how a MAC address table attack compromises LAN
Table Attack security.
VPN-Enabled Router
NGFW
NAC
VPN-Enabled Router
A VPN-enabled router provides a secure connection to remote users across a
public network and into the enterprise network. VPN services can be integrated
into the firewall.
10.2.4 Authorization
AAA authorization is automatic and does not require users to perform additional
steps after authentication. Authorization governs what users can and cannot do
on the network after they are authenticated.
Authorization uses a set of attributes that describes the user’s access to the
network. These attributes are used by the AAA server to determine privileges
and restrictions for that user, as shown in the figure.
1. When a user has been authenticated, a session is established between
the router and the AAA server.
2. The router requests authorization from the AAA server for the client’s
requested service.
3. The AAA server returns a PASS/FAIL response for authorization.
10.2.5 Accounting
AAA accounting collects and reports usage data. This data can be used for such
purposes as auditing or billing. The collected data might include the start and
stop connection times, executed commands, number of packets, and number of
bytes.
A primary use of accounting is to combine it with AAA authentication. The AAA
server keeps a detailed log of exactly what the authenticated user does on the
device, as shown in the figure. This includes all EXEC and configuration
commands issued by the user. The log contains numerous data fields, including
the username, the date and time, and the actual command that was entered by
the user. This information is useful when troubleshooting devices. It also provides
evidence for when individuals perform malicious acts.
Layer 2 Attacks
Category Examples
MAC Table
Attacks Includes MAC address flooding attacks.
Address
Spoofing
Attacks Includes MAC address and IP address spoofing attacks.
Dynamic ARP
Inspection (DAI) Prevents ARP spoofing and ARP poisoning attacks.
IP Source Guard
(IPSG) Prevents MAC and IP address spoofing attacks
These Layer 2 solutions will not be effective if the management protocols are not
secured. For example, the management protocols Syslog, Simple Network
Management Protocol (SNMP), Trivial File Transfer Protocol (TFTP), telnet, File
Transfer Protocol (FTP) and most other common protocols are insecure;
therefore, the following strategies are recommended:
Always use secure variants of these protocols such as SSH, Secure
Copy Protocol (SCP), Secure FTP (SFTP), and Secure Socket
Layer/Transport Layer Security (SSL/TLS).
Consider using out-of-band management network to manage devices.
Use a dedicated management VLAN where nothing but management
traffic resides.
Use ACLs to filter unwanted access.
Step 1
Step 2
Step 3
The threat actor sends a double-tagged 802.1Q frame to the switch. The outer
header has the VLAN tag of the threat actor, which is the same as the native
VLAN of the trunk port. For the purposes of this example, assume that this is
VLAN 10. The inner tag is the victim VLAN, in this example, VLAN 20.
A VLAN double-tagging attack is unidirectional and works only when the attacker
is connected to a port residing in the same VLAN as the native VLAN of the trunk
port. The idea is that double tagging allows the attacker to send data to hosts or
servers on a VLAN that otherwise would be blocked by some type of access
control configuration. Presumably the return traffic will also be permitted, thus
giving the attacker the ability to communicate with devices on the normally
blocked VLAN.
VLAN Attack Mitigation
VLAN hopping and VLAN double-tagging attacks can be prevented by
implementing the following trunk security guidelines, as discussed in a previous
module:
Disable trunking on all access ports.
Disable auto trunking on trunk links so that trunks must be manually
enabled.
Be sure that the native VLAN is only used for trunk links.
Step 1
Step 2
Step 3
Step 4
Step 5
Threat Actor Connects Rogue DHCP Server
A threat actor successfully connects a rogue DHCP server to a switch port on the
same subnet and VLANs as the target clients. The goal of the rogue server is to
provide clients with false IP configuration information.
10.5.6 Video – ARP Attacks, STP Attacks, and CDP
Reconnaissance
Click Play in the figure to view a video about VLAN and DHCP attacks.
Step 1
Step 2
Step 3
Normal State with Converged MAC Tables
Each device has an accurate MAC table with the correct IP and MAC addresses
for the other devices on the LAN.
Note: MAC addresses are shown as 24 bits for simplicity.