network hardening Flashcards
what are private vlan used for
PVLANs are useful for restricting the flow of broadcast and unknown unicast traffic and for limiting the communication between known hosts. Service providers use PVLANs to keep their customers isolated from one another.
primary / secondary community / secondary isolated vlan
The private VLAN always has one primary VLAN. Within the primary VLAN you will find the promiscuous port (connected to the router) . All other ports are able to communicate with the promiscuous port.
Within the primary VLAN you will encounter one or more secondary VLANs:
Community VLAN: All ports within the community VLAN are able to communicate with each other and the promiscuous port.
Isolated VLAN: All ports within the isolated VLAN are unable to communicate with each other but they can communicate with the promiscuous port.
what is a private vlan
VLANs limit broadcasts to specified users. Private VLANs (PVLANs) take this concept a step further by splitting the broadcast domain into multiple isolated broadcast subdomains and essentially putting secondary VLANs inside a primary VLAN. PVLANs restrict traffic flows through their member switch ports (called “private ports”) so that these ports communicate only with a specified uplink trunk port or with specified ports within the same VLAN. The uplink trunk port is usually connected to a router, firewall, server, or provider network. Each PVLAN typically contains many private ports that communicate only with a single uplink, thereby preventing the ports from communicating with each other.
P (prom/ promiscuous) port
Promiscuous trunk port—A promiscuous port is an trunk port connected to a router, firewall, server, or provider network that can communicate with all interfaces, including the isolated and community ports within a PVLAN.
host ports (private vans)
c-ports (community)
I-port (isolated)
DAI
Dynamic ARP Inspection (DAI) is a security feature in MS switches that protects networks against man-in-the-middle ARP spoofing attacks.
DAI inspects ARP packets on the LAN and uses the information in the DHCP snooping table on the switch to validate ARP packets
What is DHCP snooping?
DHCP snooping is a layer 2 security technology built into a switch that drops DHCP traffic determined to be unacceptable.
The fundamental use case for DHCP snooping is to prevent unauthorized (rogue) DHCP servers offering IP addresses to DHCP clients. Rogue DHCP servers are often used in man in the middle or denial of service attacks for malicious purposes.
where is DHCP data stored?
in the DHCP snooping binding table (Mac add –> ip)
IPv6 autoconfiguration process
An IPv6 clients can auto configure in 2 ways: either by receiving a periodic ICMP Neighbor Discover Router Advertisement packet or by sending out an ICMP Neighbor Discover Router Solicitation packet which will be responded to by the aforementioned ICMP ND RA packet.
This router advertisement packet will contain the Source Address and Prefix Information. A misconfigured device could advertise its own link-local address as the source address to perform a man-in-the-middle attack, or incorrect prefix information to perform a denial-of-service attack.
This attack is effective against networks running SLAAC and DHCPv6 because both rely on the ICMP ND RA packet to advertise the default gateway for a particular LAN segment.
Router advertisement guard
The IPv6 RA L2 guard feature can filter router advertisements and runs on switches. This can be as simple as “don’t allow RAs on this interface” or complex with policies where router advertisements are only permitted when it matches certain criteria.
A Guard is configured on switches to block router advertisements from untrusted ports. This is used similarly to DHCP Snooping in IPv4 deployments. The process of implementing RA Guard it to create a policy and then apply it inbound on an interface.
CoPP Control Plane Policing
QoS feature on routers and switches that limits certain types of traffic in order to protect the CPU (ex. limit IMCP packets to 8000b per second)
–> filtering and rate limiting
packets handled by the main cpu: routing protocols, VRRP, SNMP, SSH, AAA, syslog, isakmp,
ACL best practices
- block incoming requests from unknown private, loopback or multicast ranges
- block incoming requests from protocols that should only be used internally (SMB file sharing)
- block all IPv6 traffic or allow it to only use authorised hosts and ports (!dual stack misconfiguration)
What security feature can help prevent an attacker from sending incorrect SLAAC information to a client?
Router Advertisement (RA) Guard is a Ethernet switch security feature that can prevent an attacker from sending RA messages into the attacker’s switch port. If the attacker were successful, they might convince a client that the attacker’s computer was the victim’s default gateway. Or, when an IPv6 endpoint was generating their IP address via SLAAC, they could receiving incorrect information about their network segment by the malicious RA messages.
You are setting up a policy that allows employees to use their own devices to access internal resources from anywhere in the building, using the wireless network. You are going to use WPA2 encryption with 802.1X to authenticate users. You need to set up a centralized server that stores credentials and allows or denies network access based on username/password combination. Which protocol should the server run?
RADIUS (Remote Authentication Dial-in User Service) is an open standard that many devices can use to authenticate into a network. RADIUS works well with 802.1X and EAP (Extensible Authentication Protocol), which are protocols used for authenticating into wireless networks.
TACACS+ is, for the most part, Cisco proprietary and is commonly used on infrastructure devices.
Kerberos is an authentication protocol that leverages the use of tickets to authenticate network devices over unsecured networks.
Which network authentication protocol supports single sign-on and uses tickets to determine admission to a resource?
Kerberos is an authentication protocol that leverages the use of tickets to authenticate network devices over unsecured networks. Kerberos also supports single sign on (SSO).