4.3 Given a scenario, apply network hardening techniques. Flashcards
- Secure SNMP
Secure SNMP, often referred to as SNMPv3, is an enhanced version of the Simple Network Management Protocol (SNMP) that incorporates security features not present in its predecessors, SNMPv1 and SNMPv2c. The primary enhancements include the addition of user authentication, data encryption, and access control, making it more suitable for managing network devices in secure environments. SNMPv3 uses various security models, such as the User-based Security Model (USM), which allows for the specification of user credentials and permissions.
For the exam, you should know that secure SNMP is essential for protecting sensitive data transmitted between network management systems and devices. Key features of SNMPv3 include support for authentication using protocols like HMAC, encryption through protocols such as AES, and the ability to define access controls based on user roles. Understanding the importance of securing SNMP communications helps in designing more resilient network management systems and protecting against unauthorized access and data breaches.
- Router Advertisement (RA) Guard
Router Advertisement (RA) Guard is a security feature used in networking to protect against rogue Router Advertisements in an IPv6 network. RA Guard functions by filtering and blocking unauthorized Router Advertisement messages that could be sent by malicious devices or misconfigured hosts. This is critical in preventing attacks such as Man-in-the-Middle (MitM) or Denial of Service (DoS), which can occur if a rogue router claims to be the default gateway, redirecting traffic through itself.
For the exam, it’s important to understand that RA Guard operates at the switch level, ensuring that only legitimate routers can send Router Advertisements on a given VLAN or port. Configuration typically involves specifying which ports or VLANs are trusted to send RA messages, while others are set to block them. Knowing about RA Guard helps in enhancing network security and maintaining the integrity of IPv6 routing information, thereby ensuring that devices receive accurate network configuration details.
- Port security
Port security is a network security feature found on switches that controls access to the switch ports based on MAC addresses. By enabling port security, network administrators can restrict which devices can connect to a switch port, helping to prevent unauthorized access and mitigate security risks such as MAC flooding and spoofing attacks.
For the exam, it’s crucial to know that port security can be configured to allow a specific number of MAC addresses on a port, and if the limit is exceeded, the switch can take actions such as disabling the port, sending alerts, or dropping packets from unknown devices. Understanding the methods of configuring port security, including static MAC address assignments, dynamic learning of MAC addresses, and the violation modes (protect, restrict, or shutdown), is essential for effective network security management.
- Dynamic ARP inspection
Dynamic ARP Inspection (DAI) is a security feature used in switched networks to prevent ARP spoofing attacks. By ensuring that only valid ARP requests and responses are relayed, DAI helps to maintain the integrity of the ARP protocol, which is essential for IP address resolution on a local network.
For the exam, it’s important to know that DAI works by intercepting and validating ARP packets before they reach the destination. It checks incoming ARP packets against a trusted database, which typically includes entries from DHCP snooping or statically configured IP-to-MAC address bindings. If an ARP packet does not match an entry in the trusted database, it can be dropped or logged as a potential security threat. Understanding how to configure DAI, including specifying trusted ports and the importance of maintaining an accurate ARP table, is key to protecting network resources.
- Control plane policing
Control Plane Policing (CoPP) is a network security feature that helps manage and secure the control plane of a network device, such as a router or switch. The control plane is responsible for processing protocols that govern network operations, including routing protocols, management traffic, and other critical functions. CoPP ensures that the control plane remains functional and is not overwhelmed by malicious traffic or excessive legitimate requests.
For the exam, it’s essential to know that CoPP works by applying policies to traffic destined for the control plane. By defining specific rules and thresholds for different types of traffic, network administrators can prioritize important control plane traffic while limiting the impact of unwanted or harmful traffic. This helps maintain network stability and performance, especially during high-traffic situations or attacks. Understanding how to configure CoPP and the types of traffic it can protect is crucial for securing network devices effectively.
- Private VLANs
Private VLANs (PVLANs) are a network segmentation technology that enhances security within a single VLAN by isolating devices from each other while still allowing them to communicate with a shared gateway or router. PVLANs allow multiple virtual networks to exist within a single VLAN, creating sub-VLANs that can restrict communication between devices based on their assigned roles. This is particularly useful in environments such as data centers or service provider networks where multiple customers or tenants share the same physical infrastructure.
For the exam, it’s important to understand the different types of PVLANs: primary VLAN, which is the main VLAN containing all ports; isolated VLAN, where ports cannot communicate with each other but can communicate with the primary VLAN; and community VLAN, where ports within the same community can communicate with each other while remaining isolated from other communities. Knowing how to configure and implement PVLANs can help enhance security and traffic management in a network.
- Disable unneeded network services
Disabling unneeded network services is a security measure aimed at reducing vulnerabilities within a network by turning off services that are not essential for operation. Network services, such as FTP, Telnet, and others, can create potential entry points for attackers. By disabling these services, you limit the opportunities for exploitation, thereby enhancing the overall security posture of the network.
For the exam, it’s important to understand the implications of enabling or disabling network services. Familiarize yourself with common services that may be unnecessary in certain environments and the potential risks they pose if left enabled. Additionally, know how to disable these services through the operating system or network device configurations. Recognizing the importance of this practice in maintaining a secure network environment is essential for your understanding of network security fundamentals.
- Disable unneeded switchports
Disabling unneeded switchports is a security practice that involves turning off unused ports on a network switch to prevent unauthorized access and mitigate potential security risks. By disabling these ports, you reduce the attack surface of your network, making it more difficult for intruders to connect devices that could compromise network integrity. This practice is particularly important in environments where physical access to network equipment is possible, as it helps to ensure that only authorized devices can connect.
For the exam, you should know that disabling unused switchports is a part of network hardening and security best practices. Be familiar with how to identify and disable these ports through switch management interfaces or command-line interfaces (CLI). Understanding the importance of this practice in preventing attacks such as unauthorized access or network device compromise is also crucial.
- Change default passwords
Changing default passwords is a critical security practice that involves replacing factory-set passwords on devices, applications, and accounts with unique, strong passwords. Default passwords are often widely known or easily guessable, making systems vulnerable to unauthorized access. By changing these passwords, you significantly reduce the risk of breaches and unauthorized control over the devices or accounts.
For your exam, it’s important to understand that this practice should be part of the initial configuration of any new device or software. Familiarize yourself with the concept of password complexity, which includes using a mix of upper and lower case letters, numbers, and special characters. Additionally, be aware of the best practices for creating strong passwords and the potential consequences of failing to change default passwords, such as security breaches or data loss. Recognizing the role this practice plays in the broader context of network security will be essential for your exam.
- Password complexity/length
Password complexity refers to the requirements set for creating secure passwords, ensuring they are difficult to guess or crack. A complex password typically includes a combination of upper and lower case letters, numbers, and special characters. Password length is also a critical factor; longer passwords are generally more secure as they increase the number of possible combinations, making them harder to brute-force.
For the exam, you should be aware that many organizations implement password policies that specify minimum length and complexity requirements to enhance security. Familiarize yourself with common standards, such as a minimum of 8-12 characters, and the inclusion of different character types. Understanding the importance of these practices in mitigating the risk of unauthorized access and how they contribute to overall network security will be beneficial for your exam preparation. Additionally, knowing the concepts of password expiration and user education regarding password management can also be relevant.
- Enable DHCP snooping
DHCP snooping is a security feature used on network switches to prevent unauthorized or malicious DHCP servers from assigning IP addresses to clients. By enabling DHCP snooping, the switch maintains a binding table that records valid IP addresses and their associated MAC addresses. It allows only trusted DHCP servers to respond to DHCP requests while blocking responses from untrusted sources.
For the exam, understand that enabling DHCP snooping is crucial for protecting a network from rogue DHCP attacks, where a malicious actor could set up a fake DHCP server to intercept traffic. Be aware of the configuration steps, including defining trusted ports and the importance of monitoring DHCP messages. Knowing how DHCP snooping interacts with other security features like dynamic ARP inspection and port security can also be valuable for your overall understanding of network security measures.
- Change default VLAN
Changing the default VLAN on a switch is an important security practice that helps protect the network from unauthorized access and potential attacks. By default, most switches use VLAN 1 as their management VLAN, which can be a target for attackers. By changing the default VLAN to a non-standard number, network administrators can reduce the risk of VLAN hopping attacks and enhance overall network security.
For the exam, it’s essential to recognize the significance of changing the default VLAN, as it is part of a broader strategy to secure network management interfaces. Understand the steps involved in changing the default VLAN, such as accessing the switch’s configuration interface and assigning a new VLAN ID to the management interface. Be prepared to explain the benefits of this practice, including reducing the attack surface and making it more challenging for malicious users to guess the management VLAN.
- Patch and firmware management
Patch and firmware management refers to the systematic approach of applying updates and fixes to software applications and hardware devices. This process is crucial for maintaining the security, stability, and performance of systems within a network. Patches often address vulnerabilities, bugs, and performance issues, while firmware updates enhance device capabilities and security.
For the exam, it’s important to understand the differences between patch management and firmware management. Patch management focuses on applying updates to software applications and operating systems, ensuring that all known vulnerabilities are addressed. Firmware management deals with the updates that improve the functionality of hardware devices such as routers, switches, and servers. Be prepared to explain the importance of having a regular schedule for updates and the need to test patches in a controlled environment before deployment to avoid potential disruptions in the network.
- Access control list
An access control list (ACL) is a set of rules used to control network traffic and determine which users or systems are granted or denied access to certain resources. ACLs can be applied to various devices, such as routers and firewalls, and help enhance network security by filtering incoming and outgoing traffic based on specified criteria. These criteria can include IP addresses, protocols, port numbers, and more.
For the exam, you should know the different types of ACLs, primarily standard and extended ACLs. Standard ACLs filter traffic based solely on the source IP address, while extended ACLs can filter based on source and destination IP addresses, protocols, and ports. Additionally, understanding how to create and apply ACLs, as well as their impact on network performance and security, is crucial. Be prepared to explain the importance of correctly configuring ACLs to prevent unauthorized access and ensure proper network segmentation.
- Role-based access
Role-based access control (RBAC) is a method of regulating access to network resources based on the roles of individual users within an organization. In this model, permissions are assigned to specific roles rather than to individual users. When a user is assigned a role, they inherit the permissions associated with that role, making it easier to manage access rights for groups of users who require similar access to resources.
For the exam, you should understand the advantages of RBAC, such as improved security, streamlined access management, and reduced administrative overhead. It’s essential to know how RBAC enhances security by ensuring that users only have access to the information and resources necessary for their job functions, thereby minimizing the risk of unauthorized access. Be familiar with common roles in various environments and the principle of least privilege, which is a key concept in RBAC, ensuring that users have the minimum level of access required to perform their duties.