Network Hardening Flashcards
securp snmp
simple network management protocol
monitors and controls servers switches routers firewalls and other devices
which snmp versions have encrypted network traffic
snmpV3
- Hardening technique focusing on router advertisements sent with IPv6
Router Advertisement (RA) guard
- Prevent unauthorized users from connecting to a switch interface
- Will alert or disable the port
Port security
Port security operation
Configure the max number of source MAC addresses on an interface
- Can also configure specific MAC addresses
- The switch monitors the number of unique MAC address and maintains a list of every source MAC address
- Once you exceed the maximum, port security activates and will disable the port or send an alert to the administrator
A security feature on a switch that monitors ARP messages in order to detect faked ARP messages
Dynamic ARP Inspection (DAI)
How does DAI work?
DAI tracks trusted IP to MAC bindings (using DHCP Snooping database).
- DAI has “Trusted” and “Untrusted” ports.
- Trusted ports aren’t checked, Untrusted ports are verified that they have an approved MAC.
Control Plane Policing (CoPP)
A policy applied to the control plane of a router to protect the CPU from high rates of traffic that could impact router stability.
- Protects against denial of service or reconnaissance
- Can also block any non-management traffic
What is the management (control) plane?
Used for access and management of network devices
What is the data plane?
A conceptual component of a network device that performs the actual operation over data flows. Eg. Packet forwarding
restrict access between interfaces
even on the same Vlan
port isolation
A security technique to turn off ports on a network device that are not required or currently in use
Disabling unused interfaces
A form of network access control that makes someone authenticate regardless of connection type to a when connecting to a network
802.1X Network Access Control
- Every port is a possible entry port
- Close everything except required ports
- Can be controlled with a firewall - NGFW would be ideal
- Disable or filter any unused services from any network communication
- Use Nmap or similar port scanner to verify which ports are being used by your applications
Disable unnecessary ports and services
- Most devices have default usernames and passwords
- Make sure to change them!
- The right credentials provide full control - Admin access
Changing default credentials