SlideShare a Scribd company logo
1 of 62
مقدمة لـ الطبقة 2  الأمن  ,[object Object],[object Object]
الطبقة 2  الأمن  IPS MARS VPN ACS Iron Port Firewall Web  Server Email Server DNS Hosts محيط   الإنترنت
OSI نموذج ,[object Object],MAC Addresses Physical Links المادية وصلات  IP Addresses Protocols and Ports البروتوكولات والمنافذ  Application Stream تطبيق دفق  Compromised Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical Initial Compromise
طبقة  2  نقاط الضعف  ,[object Object]
MAC  عنوان الغش هجوم  MAC Address: AABBcc AABBcc 12AbDd التبديل منفذ  1 2 MAC Address: AABBcc مهاجم  Port 1 Port 2 MAC Address: 12AbDd ويرتبط أنا المنافذ  1  و  2  مع  MAC   عناوين الأجهزة المتصلة به .  حركة المرور المتجهة لكل جهاز وسوف ترسل مباشرة  التبديل يحتفظ من النهاية من خلال المحافظة على MAC   معالجة الجدول .  في  MAC   بالتحايل ، ومهاجم آخر يشكل وهوستا شركات €  " في هذه الحالة ،  AABBcc
MAC  عنوان الغش هجوم  MAC Address: AABBcc AABBcc التبديل منفذ  1 2 MAC Address: AABBcc Attacker Port 1 Port 2 لقد تغيرت عنوان  MAC   على الكمبيوتر لمطابقة الملقم .  لقد تغير الجهاز مع  MAC   معالجة  AABBcc   مواقع ل Port2 .  ولا بد لي من ضبط مائدتي عنوان  MAC   وفقا لذلك .  AABBcc 1 2
MAC   العنوان تجاوز الجدول هجوم   ويمكن التبديل بين الإطارات إلى الأمام و PC1 PC2   دون الفيضانات لأن الجدول يحتوي على عنوان  MAC   من المنفذ إلى  MAC   بين معالجة تعيينات في الجدول عنوان  MAC   لهذه الحواسيب .
MAC   العنوان تجاوز الجدول هجوم  A B C D VLAN 10 VLAN 10 الدخيل يدير  macof   لبدء إرسال عناوين وهمية غير معروفة  MAC .  3/25 3/25 MAC X 3/25 MAC Y 3/25 MAC Z XYZ flood يتم إضافة عناوين وهمية الى طاولة كام .  كام الجدول الكامل .  Host C التبديل الفيضانات الإطارات .  يرى مهاجم حركة المرور إلى ملقمات باء ودال .  VLAN 10 1 2 3 4 MAC  Port X  3/25 Y  3/25 C  3/25
STP   التلاعب هجوم  ,[object Object],[object Object],[object Object],F F F F F B Root Bridge Priority = 8192 MAC Address= 0000.00C0.1234
STP   التلاعب هجوم  Root Bridge Priority = 8192 Root Bridge F F F F F B STP BPDU Priority = 0 STP BPDU  Priority = 0 F B F F F F مهاجم البث المضيفة مهاجمة خارج التكوين و STP   BPDUs   تغيير الهيكل . هذا هو محاولة لفرض إعادة الحسابات التي تغطي شجرة .
الشبكة المحلية هجوم العاصفة  وقد غمرت الفيضانات البث والبث المتعدد أو أحادي الإرسال الحزم على جميع المنافذ في شبكة محلية ظاهرية واحدة . ويمكن لهذه العواصف زيادة استخدام وحدة المعالجة المركزية على التحول إلى  100  ٪ ، وخفض أداء الشبكة .  Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast
عاصفة التحكم  Total  number of broadcast packets or bytes
VLAN Attacks VLAN = Broadcast Domain = Logical Network (Subnet)  ,[object Object],[object Object],[object Object]
هجمات شبكة محلية ظاهرية  802.1Q 802.1Q Server يرى مهاجم حركة المرور المتجهة للخوادم  Server Trunk Trunk VLAN 20 VLAN 10 ويمكن إطلاق شبكة محلية ظاهرية التنقل هجوم بطريقتين  :    خداع النشر المكتبي رسائل من المضيف لمهاجمة قضية التحول إلى إدخال وضع الكابلات   إدخال مفتاح المارقة وتشغيل مقسم الهاتف
المزدوج الدالة شبكة محلية ظاهرية هجوم  التبديل الثاني يتلقى الحزمة على شبكة محلية ظاهرية الأصلي  مهاجم على شبكة محلية ظاهرية  10  ، ولكن يضع علامة  20  في الحزمة  Victim (VLAN 20) ملاحظة  :  هذا الهجوم يعمل فقط إذا الجذع لديه شبكة محلية ظاهرية نفس الأم كما المهاجم .  الشرائط التبديل الأول قبالة العلامة الأولى وأنه لا ريتاج  ( ليس  retagged   الحركة الأم ).  إلى الأمام ثم الحزمة للتبديل  2.  20,10 20 Trunk (Native VLAN = 10) 802.1Q, 802.1Q 802.1Q, Frame Frame 1 2 3 4 التبديل الثاني يتلقى الحزمة على شبكة محلية ظاهرية الأصلي
تكوين الأمن التبديل  ,[object Object]
تكوين أمن المنافذ  ,[object Object]
منفذ الأمن لمحة عامة  MAC A MAC A Port 0/1 allows MAC A Port 0/2 allows MAC B Port 0/3 allows MAC C المهاجم  1  المهاجم  2  0/1 0/2 0/3 MAC F السماح لمسؤول لتحديد ثابت  MAC عناوين منفذ أو السماح للتبديل إلى تعلم بشكل حيوي على عدد محدود من  MAC عناوين
المبادرة القطرية أوامر  switchport mode access Switch(config-if)# ,[object Object],switchport port-security Switch(config-if)# ,[object Object],switchport port-security maximum  value Switch(config-if)# ,[object Object]
التبديل منفذ بورت الأمن معلمات  المعلمة  وصف   mac-address   mac-address (Optional) Specify a secure MAC address for the port by entering a 48-bit MAC  aaddress. You can add additional secure MAC addresses up to the maximum value configured. vlan  vlan-id (Optional) On a trunk port only, specify the VLAN ID and the MAC address. If no VLAN ID is specified, the native VLAN is used. vlan access (Optional) On an access port only, specify the VLAN as an access VLAN. vlan voice (Optional) On an access port only, specify the VLAN as a voice VLAN mac-address sticky  [ mac-address ] (Optional) Enable the interface for sticky learning by entering only the  mac-address sticky  keywords. When sticky learning is enabled, the interface adds all secure MAC addresses that are dynamically learned to the running configuration and converts these addresses to sticky secure MAC addresses. Specify a sticky secure MAC address by entering the mac-address sticky mac-address keywords.. maximum   value (Optional) Set the maximum number of secure MAC addresses for the interface. The maximum number of secure MAC addresses that you can configure on a switch is set by the maximum number of available MAC addresses allowed in the system. The active Switch Database Management (SDM) template determines this number. This number represents the total of available MAC addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces. The default setting is 1. vlan  [ vlan-list ] ,[object Object],[object Object],[object Object]
منفذ تكوين الأمان انتهاك  switchport port-security mac-address sticky Switch(config-if)# ,[object Object],switchport port-security violation {protect | restrict | shutdown} Switch(config-if)# ,[object Object],switchport port-security mac-address  mac-address Switch(config-if)# ,[object Object]
التبديل منفذ بورت الأمن انتهاك معلمات  المعلمة  الوصف protect (Optional) Set the security violation protect mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred.  restrict  (Optional) Set the security violation restrict mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. shutdown  (Optional) Set the security violation shutdown mode. In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message, and increments the violation counter. When a secure port is in the error-disabled state, you can bring it out of this state by entering the  errdisable recovery cause   psecure-violation   global configuration command, or you can manually re-enable it by entering the  shutdown  and  no shut down  interface configuration commands. shutdown  vlan Set the security violation mode to per-VLAN shutdown. In this mode, only the VLAN on which the violation occurred is error-disabled.
منفذ الأمن تكوين الشيخوخة  switchport port-security aging {static | time  time  | type {absolute | inactivity}} Switch(config-if)# ,[object Object]
التبديل منفذ بورت الأمن الشيخوخة معلمات  المعلمة   وصف   static Enable aging for statically configured secure addresses on this port. time  time Specify the aging time for this port. The range is 0 to 1440 minutes. If the time is 0, aging is disabled for this port. type absolute Set absolute aging type. All the secure addresses on this port age out exactly after the time (minutes) specified and are removed from the secure address list. type inactivity Set the inactivity aging type. The secure addresses on this port age out only if there is no data traffic from the secure source address for the specified time period.
تكوين نموذجي  switchport mode access  switchport port-security  switchport port-security maximum  2 switchport port-security violation shutdown switchport port-security mac-address sticky  switchport port-security aging time 120 Switch(config-if)# S2 PC B
التحقق من أمن المنافذ  ,[object Object]
المبادرة القطرية أوامر ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sw-class#  show port-security interface f0/12 Port Security  : Enabled Port status  : Secure-down Violation mode  : Shutdown Maximum MAC Addresses  : 2 Total MAC Addresses  : 1 Configured MAC Addresses  : 0 Aging time  : 120 mins Aging type  : Absolute SecureStatic address aging : Disabled Security Violation Count  : 0
عرض تامين عنوان الماك ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
اعلام عنوان الماك ,[object Object],NMS MAC A MAC B F1/1 = MAC A F1/2 = MAC B F2/1 = MAC D (address ages out) Switch CAM Table أرسل إلى فخاخ تجميعيه المتحف عند عناوين جديدة  MAC   ، أو عندما تظهر القديمة مهلة .  MAC D  بعيدا عن الشبكة  . F1/2 F1/1 F2/1
BPDU  الحرس والحرس الجذر  ,[object Object]
تكوين  Portfast   خادم محطة عمل   الامر الوصف Command Description Switch(config-if)#  spanning-tree portfast Enables PortFast on a Layer 2 access port and forces it to enter the forwarding stateimmediately. Switch(config-if)#  no spanning-tree portfast Disables PortFast on a Layer 2 access port. PortFast is disabled by default. Switch(config)#  spanning-tree portfast default Globally enables the PortFast feature on all nontrunking ports.  Switch#  show running-config interface  type   slot/port Indicates whether PortFast has been configured on a port.
Introduction to Layer2 Security ,[object Object],[object Object]
Layer 2 Security IPS MARS VPN ACS Iron Port Firewall Web  Server Email Server DNS Hosts Perimeter Internet
OSI Model ,[object Object],MAC Addresses Physical Links IP Addresses Protocols and Ports Application Stream Compromised Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical Initial Compromise
Layer 2 Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
MAC Address Spoofing Attack MAC Address: AABBcc AABBcc 12AbDd Switch Port 1 2 MAC Address: AABBcc Attacker Port 1 Port 2 MAC Address: 12AbDd I have associated Ports 1 and 2 with the MAC addresses of the devices attached. Traffic destined for each device will be forwarded directly. The switch keeps track of the endpoints by maintaining a MAC address table. In MAC  spoofing, the attacker poses as another host—in this case, AABBcc
MAC Address Spoofing Attack MAC Address: AABBcc AABBcc Switch Port 1 2 MAC Address: AABBcc Attacker Port 1 Port 2 I have changed the MAC address on my computer  to match the server. The device with MAC address AABBcc has changed locations to Port2. I must adjust my MAC address table accordingly. AABBcc 1 2
MAC Address Table Overflow Attack The switch can forward frames between PC1 and PC2 without flooding because the MAC address table contains port-to-MAC-address mappings in the MAC address table for these PCs.
MAC Address Table Overflow Attack A B C D VLAN 10 VLAN 10 Intruder runs  macof  to begin sending unknown bogus MAC addresses. 3/25 3/25 MAC X 3/25 MAC Y 3/25 MAC Z XYZ flood Bogus addresses are added to the CAM table. CAM table is full. Host C The switch floods the frames. Attacker sees traffic to servers B and D. VLAN 10 1 2 3 4 MAC  Port X  3/25 Y  3/25 C  3/25
STP Manipulation Attack ,[object Object],[object Object],[object Object],F F F F F B Root Bridge Priority = 8192 MAC Address= 0000.00C0.1234
STP Manipulation Attack Root Bridge Priority = 8192 Root Bridge F F F F F B STP BPDU Priority = 0 STP BPDU  Priority = 0 F B F F F F Attacker The attacking host broadcasts out STP configuration and topology change BPDUs. This is an attempt to force spanning tree recalculations.
LAN Storm Attack ,[object Object],[object Object],Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast
Storm Control Total  number of broadcast packets or bytes
VLAN Attacks VLAN = Broadcast Domain = Logical Network (Subnet)  ,[object Object],[object Object],[object Object]
VLAN Attacks 802.1Q 802.1Q Server Attacker sees traffic destined for servers Server Trunk Trunk VLAN 20 VLAN 10 ,[object Object],[object Object],[object Object]
Double-Tagging VLAN Attack The second switch receives the packet, on the native VLAN Attacker on VLAN 10, but puts a 20 tag in the packet Victim (VLAN 20) Note: This attack works only if the trunk has the same native VLAN as the attacker.  The first switch strips off the first tag and does not retag it (native traffic is not retagged). It then forwards the packet to switch 2. 20,10 20 Trunk (Native VLAN = 10) 802.1Q, 802.1Q 802.1Q, Frame Frame 1 2 3 4 The second switch examines the packet, sees the VLAN 20 tag and forwards it accordingly.
Configuring Switch Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuring Port Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port Security Overview MAC A MAC A Port 0/1 allows MAC A Port 0/2 allows MAC B Port 0/3 allows MAC C Attacker 1 Attacker 2 0/1 0/2 0/3 MAC F Allows  an administrator to statically specify MAC  Addresses for a port or to permit the switch to dynamically learn a limited number of MAC addresses
CLI Commands switchport mode access Switch(config-if)# ,[object Object],switchport port-security Switch(config-if)# ,[object Object],switchport port-security maximum  value Switch(config-if)# ,[object Object]
Switchport Port-Security Parameters Parameter Description mac-address   mac-address (Optional) Specify a secure MAC address for the port by entering a 48-bit MAC  aaddress. You can add additional secure MAC addresses up to the maximum value configured. vlan  vlan-id (Optional) On a trunk port only, specify the VLAN ID and the MAC address. If no VLAN ID is specified, the native VLAN is used. vlan access (Optional) On an access port only, specify the VLAN as an access VLAN. vlan voice (Optional) On an access port only, specify the VLAN as a voice VLAN mac-address sticky  [ mac-address ] (Optional) Enable the interface for sticky learning by entering only the  mac-address sticky  keywords. When sticky learning is enabled, the interface adds all secure MAC addresses that are dynamically learned to the running configuration and converts these addresses to sticky secure MAC addresses. Specify a sticky secure MAC address by entering the mac-address sticky mac-address keywords.. maximum   value (Optional) Set the maximum number of secure MAC addresses for the interface. The maximum number of secure MAC addresses that you can configure on a switch is set by the maximum number of available MAC addresses allowed in the system. The active Switch Database Management (SDM) template determines this number. This number represents the total of available MAC addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces. The default setting is 1. vlan  [ vlan-list ] ,[object Object],[object Object],[object Object]
Port Security Violation Configuration switchport port-security mac-address sticky Switch(config-if)# ,[object Object],switchport port-security violation {protect | restrict | shutdown} Switch(config-if)# ,[object Object],switchport port-security mac-address  mac-address Switch(config-if)# ,[object Object]
Switchport Port-Security Violation Parameters Parameter Description protect (Optional) Set the security violation protect mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred.  restrict  (Optional) Set the security violation restrict mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. shutdown  (Optional) Set the security violation shutdown mode. In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message, and increments the violation counter. When a secure port is in the error-disabled state, you can bring it out of this state by entering the  errdisable recovery cause   psecure-violation   global configuration command, or you can manually re-enable it by entering the  shutdown  and  no shut down  interface configuration commands. shutdown  vlan Set the security violation mode to per-VLAN shutdown. In this mode, only the VLAN on which the violation occurred is error-disabled.
Port Security Aging Configuration switchport port-security aging {static | time  time  | type {absolute | inactivity}} Switch(config-if)# ,[object Object]
Switchport Port-Security  Aging Parameters Parameter Description static Enable aging for statically configured secure addresses on this port. time  time Specify the aging time for this port. The range is 0 to 1440 minutes. If the time is 0, aging is disabled for this port. type absolute Set absolute aging type. All the secure addresses on this port age out exactly after the time (minutes) specified and are removed from the secure address list. type inactivity Set the inactivity aging type. The secure addresses on this port age out only if there is no data traffic from the secure source address for the specified time period.
Typical Configuration switchport mode access  switchport port-security  switchport port-security maximum  2 switchport port-security violation shutdown switchport port-security mac-address sticky  switchport port-security aging time 120 Switch(config-if)# S2 PC B
Verifying Port Security ,[object Object],[object Object],[object Object]
CLI Commands ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sw-class#  show port-security interface f0/12 Port Security  : Enabled Port status  : Secure-down Violation mode  : Shutdown Maximum MAC Addresses  : 2 Total MAC Addresses  : 1 Configured MAC Addresses  : 0 Aging time  : 120 mins Aging type  : Absolute SecureStatic address aging : Disabled Security Violation Count  : 0
View Secure MAC Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC Address Notification ,[object Object],NMS MAC A MAC B F1/1 = MAC A F1/2 = MAC B F2/1 = MAC D (address ages out) Switch CAM Table SNMP traps sent to NMS when new MAC addresses appear or when old ones time out. MAC D is away from the network. F1/2 F1/1 F2/1
BPDU Guard and Root Guard ,[object Object],[object Object],[object Object],[object Object],[object Object]
Configure Portfast Server Workstation Command Description Switch(config-if)#  spanning-tree portfast Enables PortFast on a Layer 2 access port and forces it to enter the forwarding stateimmediately. Switch(config-if)#  no spanning-tree portfast Disables PortFast on a Layer 2 access port. PortFast is disabled by default. Switch(config)#  spanning-tree portfast default Globally enables the PortFast feature on all nontrunking ports.  Switch#  show running-config interface  type   slot/port Indicates whether PortFast has been configured on a port.

More Related Content

What's hot

How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchIT Tech
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answerNarayana Samy
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)DH Da Lat
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
07 module extending switched netwroks with virtual la ns
07  module extending switched netwroks with virtual la ns07  module extending switched netwroks with virtual la ns
07 module extending switched netwroks with virtual la nsAsif
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1aghacrom
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port SecurityHamed Moghaddam
 
LINUX RS232程式設計
LINUX RS232程式設計LINUX RS232程式設計
LINUX RS232程式設計艾鍗科技
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2samis
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switchADDY50
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet3Anetwork com
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolRafat Khandaker
 
Cisco lab, guide to configure interface stp attributes
Cisco lab, guide to configure interface stp attributesCisco lab, guide to configure interface stp attributes
Cisco lab, guide to configure interface stp attributesIT Tech
 
Ccnp3 lab 3_5_en (hacer)
Ccnp3 lab 3_5_en (hacer)Ccnp3 lab 3_5_en (hacer)
Ccnp3 lab 3_5_en (hacer)Omar Herrera
 

What's hot (19)

How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switch
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
07 module extending switched netwroks with virtual la ns
07  module extending switched netwroks with virtual la ns07  module extending switched netwroks with virtual la ns
07 module extending switched netwroks with virtual la ns
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
 
Ccnp labs
Ccnp labsCcnp labs
Ccnp labs
 
LINUX RS232程式設計
LINUX RS232程式設計LINUX RS232程式設計
LINUX RS232程式設計
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switch
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet
 
Switching
SwitchingSwitching
Switching
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
 
Cisco lab, guide to configure interface stp attributes
Cisco lab, guide to configure interface stp attributesCisco lab, guide to configure interface stp attributes
Cisco lab, guide to configure interface stp attributes
 
Ccna command
Ccna commandCcna command
Ccna command
 
Exam viewer2
Exam viewer2Exam viewer2
Exam viewer2
 
Ccnp3 lab 3_5_en (hacer)
Ccnp3 lab 3_5_en (hacer)Ccnp3 lab 3_5_en (hacer)
Ccnp3 lab 3_5_en (hacer)
 
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
 

Similar to Ch6

Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptxjoko
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkAhmed Habib
 
Chapter 14 - Sw Conf
Chapter 14 - Sw ConfChapter 14 - Sw Conf
Chapter 14 - Sw Confphanleson
 
Configuring dynamic switchport security
Configuring dynamic switchport securityConfiguring dynamic switchport security
Configuring dynamic switchport securityIT Tech
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsMike McLain
 
Switchport port security explained with examples
Switchport port security explained with examplesSwitchport port security explained with examples
Switchport port security explained with examplesteameassefa
 
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 AttacksUnderstanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 AttacksTien Dung
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easysushmil123
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part iiKrunal Shah
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Dân Chơi
 

Similar to Ch6 (20)

Switch security
Switch securitySwitch security
Switch security
 
Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptx
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
 
Chapter 14 - Sw Conf
Chapter 14 - Sw ConfChapter 14 - Sw Conf
Chapter 14 - Sw Conf
 
6.switching vla ns
6.switching vla ns6.switching vla ns
6.switching vla ns
 
SRWE_Module_11.pptx
SRWE_Module_11.pptxSRWE_Module_11.pptx
SRWE_Module_11.pptx
 
Hacking L2 Switches
Hacking L2 SwitchesHacking L2 Switches
Hacking L2 Switches
 
Configuring dynamic switchport security
Configuring dynamic switchport securityConfiguring dynamic switchport security
Configuring dynamic switchport security
 
Switching
SwitchingSwitching
Switching
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
LAYER2_
LAYER2_LAYER2_
LAYER2_
 
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Vlan
VlanVlan
Vlan
 
Switchport port security explained with examples
Switchport port security explained with examplesSwitchport port security explained with examples
Switchport port security explained with examples
 
Switching
SwitchingSwitching
Switching
 
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 AttacksUnderstanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 Attacks
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easy
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part ii
 
Day 13.1..1 catalyst switch
Day 13.1..1 catalyst switchDay 13.1..1 catalyst switch
Day 13.1..1 catalyst switch
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011
 

Recently uploaded

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Ch6

  • 1.
  • 2. الطبقة 2 الأمن IPS MARS VPN ACS Iron Port Firewall Web Server Email Server DNS Hosts محيط الإنترنت
  • 3.
  • 4.
  • 5. MAC عنوان الغش هجوم MAC Address: AABBcc AABBcc 12AbDd التبديل منفذ 1 2 MAC Address: AABBcc مهاجم Port 1 Port 2 MAC Address: 12AbDd ويرتبط أنا المنافذ 1 و 2 مع MAC عناوين الأجهزة المتصلة به . حركة المرور المتجهة لكل جهاز وسوف ترسل مباشرة التبديل يحتفظ من النهاية من خلال المحافظة على MAC معالجة الجدول . في MAC بالتحايل ، ومهاجم آخر يشكل وهوستا شركات € " في هذه الحالة ، AABBcc
  • 6. MAC عنوان الغش هجوم MAC Address: AABBcc AABBcc التبديل منفذ 1 2 MAC Address: AABBcc Attacker Port 1 Port 2 لقد تغيرت عنوان MAC على الكمبيوتر لمطابقة الملقم . لقد تغير الجهاز مع MAC معالجة AABBcc مواقع ل Port2 . ولا بد لي من ضبط مائدتي عنوان MAC وفقا لذلك . AABBcc 1 2
  • 7. MAC العنوان تجاوز الجدول هجوم ويمكن التبديل بين الإطارات إلى الأمام و PC1 PC2 دون الفيضانات لأن الجدول يحتوي على عنوان MAC من المنفذ إلى MAC بين معالجة تعيينات في الجدول عنوان MAC لهذه الحواسيب .
  • 8. MAC العنوان تجاوز الجدول هجوم A B C D VLAN 10 VLAN 10 الدخيل يدير macof لبدء إرسال عناوين وهمية غير معروفة MAC . 3/25 3/25 MAC X 3/25 MAC Y 3/25 MAC Z XYZ flood يتم إضافة عناوين وهمية الى طاولة كام . كام الجدول الكامل . Host C التبديل الفيضانات الإطارات . يرى مهاجم حركة المرور إلى ملقمات باء ودال . VLAN 10 1 2 3 4 MAC Port X 3/25 Y 3/25 C 3/25
  • 9.
  • 10. STP التلاعب هجوم Root Bridge Priority = 8192 Root Bridge F F F F F B STP BPDU Priority = 0 STP BPDU Priority = 0 F B F F F F مهاجم البث المضيفة مهاجمة خارج التكوين و STP BPDUs تغيير الهيكل . هذا هو محاولة لفرض إعادة الحسابات التي تغطي شجرة .
  • 11. الشبكة المحلية هجوم العاصفة وقد غمرت الفيضانات البث والبث المتعدد أو أحادي الإرسال الحزم على جميع المنافذ في شبكة محلية ظاهرية واحدة . ويمكن لهذه العواصف زيادة استخدام وحدة المعالجة المركزية على التحول إلى 100 ٪ ، وخفض أداء الشبكة . Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast Broadcast
  • 12. عاصفة التحكم Total number of broadcast packets or bytes
  • 13.
  • 14. هجمات شبكة محلية ظاهرية 802.1Q 802.1Q Server يرى مهاجم حركة المرور المتجهة للخوادم Server Trunk Trunk VLAN 20 VLAN 10 ويمكن إطلاق شبكة محلية ظاهرية التنقل هجوم بطريقتين :    خداع النشر المكتبي رسائل من المضيف لمهاجمة قضية التحول إلى إدخال وضع الكابلات   إدخال مفتاح المارقة وتشغيل مقسم الهاتف
  • 15. المزدوج الدالة شبكة محلية ظاهرية هجوم التبديل الثاني يتلقى الحزمة على شبكة محلية ظاهرية الأصلي مهاجم على شبكة محلية ظاهرية 10 ، ولكن يضع علامة 20 في الحزمة Victim (VLAN 20) ملاحظة : هذا الهجوم يعمل فقط إذا الجذع لديه شبكة محلية ظاهرية نفس الأم كما المهاجم . الشرائط التبديل الأول قبالة العلامة الأولى وأنه لا ريتاج ( ليس retagged الحركة الأم ). إلى الأمام ثم الحزمة للتبديل 2. 20,10 20 Trunk (Native VLAN = 10) 802.1Q, 802.1Q 802.1Q, Frame Frame 1 2 3 4 التبديل الثاني يتلقى الحزمة على شبكة محلية ظاهرية الأصلي
  • 16.
  • 17.
  • 18. منفذ الأمن لمحة عامة MAC A MAC A Port 0/1 allows MAC A Port 0/2 allows MAC B Port 0/3 allows MAC C المهاجم 1 المهاجم 2 0/1 0/2 0/3 MAC F السماح لمسؤول لتحديد ثابت MAC عناوين منفذ أو السماح للتبديل إلى تعلم بشكل حيوي على عدد محدود من MAC عناوين
  • 19.
  • 20.
  • 21.
  • 22. التبديل منفذ بورت الأمن انتهاك معلمات المعلمة الوصف protect (Optional) Set the security violation protect mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred. restrict (Optional) Set the security violation restrict mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. shutdown (Optional) Set the security violation shutdown mode. In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message, and increments the violation counter. When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually re-enable it by entering the shutdown and no shut down interface configuration commands. shutdown vlan Set the security violation mode to per-VLAN shutdown. In this mode, only the VLAN on which the violation occurred is error-disabled.
  • 23.
  • 24. التبديل منفذ بورت الأمن الشيخوخة معلمات المعلمة وصف static Enable aging for statically configured secure addresses on this port. time time Specify the aging time for this port. The range is 0 to 1440 minutes. If the time is 0, aging is disabled for this port. type absolute Set absolute aging type. All the secure addresses on this port age out exactly after the time (minutes) specified and are removed from the secure address list. type inactivity Set the inactivity aging type. The secure addresses on this port age out only if there is no data traffic from the secure source address for the specified time period.
  • 25. تكوين نموذجي switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security violation shutdown switchport port-security mac-address sticky switchport port-security aging time 120 Switch(config-if)# S2 PC B
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. تكوين Portfast خادم محطة عمل الامر الوصف Command Description Switch(config-if)# spanning-tree portfast Enables PortFast on a Layer 2 access port and forces it to enter the forwarding stateimmediately. Switch(config-if)# no spanning-tree portfast Disables PortFast on a Layer 2 access port. PortFast is disabled by default. Switch(config)# spanning-tree portfast default Globally enables the PortFast feature on all nontrunking ports. Switch# show running-config interface type slot/port Indicates whether PortFast has been configured on a port.
  • 32.
  • 33. Layer 2 Security IPS MARS VPN ACS Iron Port Firewall Web Server Email Server DNS Hosts Perimeter Internet
  • 34.
  • 35.
  • 36. MAC Address Spoofing Attack MAC Address: AABBcc AABBcc 12AbDd Switch Port 1 2 MAC Address: AABBcc Attacker Port 1 Port 2 MAC Address: 12AbDd I have associated Ports 1 and 2 with the MAC addresses of the devices attached. Traffic destined for each device will be forwarded directly. The switch keeps track of the endpoints by maintaining a MAC address table. In MAC spoofing, the attacker poses as another host—in this case, AABBcc
  • 37. MAC Address Spoofing Attack MAC Address: AABBcc AABBcc Switch Port 1 2 MAC Address: AABBcc Attacker Port 1 Port 2 I have changed the MAC address on my computer to match the server. The device with MAC address AABBcc has changed locations to Port2. I must adjust my MAC address table accordingly. AABBcc 1 2
  • 38. MAC Address Table Overflow Attack The switch can forward frames between PC1 and PC2 without flooding because the MAC address table contains port-to-MAC-address mappings in the MAC address table for these PCs.
  • 39. MAC Address Table Overflow Attack A B C D VLAN 10 VLAN 10 Intruder runs macof to begin sending unknown bogus MAC addresses. 3/25 3/25 MAC X 3/25 MAC Y 3/25 MAC Z XYZ flood Bogus addresses are added to the CAM table. CAM table is full. Host C The switch floods the frames. Attacker sees traffic to servers B and D. VLAN 10 1 2 3 4 MAC Port X 3/25 Y 3/25 C 3/25
  • 40.
  • 41. STP Manipulation Attack Root Bridge Priority = 8192 Root Bridge F F F F F B STP BPDU Priority = 0 STP BPDU Priority = 0 F B F F F F Attacker The attacking host broadcasts out STP configuration and topology change BPDUs. This is an attempt to force spanning tree recalculations.
  • 42.
  • 43. Storm Control Total number of broadcast packets or bytes
  • 44.
  • 45.
  • 46. Double-Tagging VLAN Attack The second switch receives the packet, on the native VLAN Attacker on VLAN 10, but puts a 20 tag in the packet Victim (VLAN 20) Note: This attack works only if the trunk has the same native VLAN as the attacker. The first switch strips off the first tag and does not retag it (native traffic is not retagged). It then forwards the packet to switch 2. 20,10 20 Trunk (Native VLAN = 10) 802.1Q, 802.1Q 802.1Q, Frame Frame 1 2 3 4 The second switch examines the packet, sees the VLAN 20 tag and forwards it accordingly.
  • 47.
  • 48.
  • 49. Port Security Overview MAC A MAC A Port 0/1 allows MAC A Port 0/2 allows MAC B Port 0/3 allows MAC C Attacker 1 Attacker 2 0/1 0/2 0/3 MAC F Allows an administrator to statically specify MAC Addresses for a port or to permit the switch to dynamically learn a limited number of MAC addresses
  • 50.
  • 51.
  • 52.
  • 53. Switchport Port-Security Violation Parameters Parameter Description protect (Optional) Set the security violation protect mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred. restrict (Optional) Set the security violation restrict mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. shutdown (Optional) Set the security violation shutdown mode. In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message, and increments the violation counter. When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually re-enable it by entering the shutdown and no shut down interface configuration commands. shutdown vlan Set the security violation mode to per-VLAN shutdown. In this mode, only the VLAN on which the violation occurred is error-disabled.
  • 54.
  • 55. Switchport Port-Security Aging Parameters Parameter Description static Enable aging for statically configured secure addresses on this port. time time Specify the aging time for this port. The range is 0 to 1440 minutes. If the time is 0, aging is disabled for this port. type absolute Set absolute aging type. All the secure addresses on this port age out exactly after the time (minutes) specified and are removed from the secure address list. type inactivity Set the inactivity aging type. The secure addresses on this port age out only if there is no data traffic from the secure source address for the specified time period.
  • 56. Typical Configuration switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security violation shutdown switchport port-security mac-address sticky switchport port-security aging time 120 Switch(config-if)# S2 PC B
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Configure Portfast Server Workstation Command Description Switch(config-if)# spanning-tree portfast Enables PortFast on a Layer 2 access port and forces it to enter the forwarding stateimmediately. Switch(config-if)# no spanning-tree portfast Disables PortFast on a Layer 2 access port. PortFast is disabled by default. Switch(config)# spanning-tree portfast default Globally enables the PortFast feature on all nontrunking ports. Switch# show running-config interface type slot/port Indicates whether PortFast has been configured on a port.