Network Monitoring Flashcards
Network monitoring tools
Syslog. SNMP, Netflow
Common Layer 2 attacks
CDP Reconnaissance Attack Telnet attacks MAC address table flooding attack VLAN attacks DHCP attacks
Collecting and displaying messages as they appear on a Cisco device console display
Syslog
A protocol used for Time Synchronization across devices in network monitoring.
NTP
A protocol that allows network devices to send its system messages across the network to syslog servers
Syslog
Used to manage IP network devices over the network with its rich set of data records and data trees to both retrieve and configure(change) information from networking devices & workstations.
SNMP
Log errors based on severity level 0 to 7 with level 0 as most severe
Syslog
Has 3 components
SNMP
SNMP commands
Get-request, set request, get bulk-requests, trap
Components in SNMP
NetFlow, SPAN, IP SLA
Command to disable CDP globally
no cdp run
Types of telnet attacks
Brute Force password Attack
Telnet DoS attack
Attacker exceeds the MAC address table capacity using fake MAC address causing the switch to be in fail-open mode and broadcasts all frames allowing the attacker to capture those frames
MAC address flooding attack
Attacker can gain VLAN access by configuring a host to spoof a switch and use the 802.1Q trunking protocol and DTP to trunk with the connecting switch
Vlan Attack
Methods to mitigate VLAN Attacks
Explicitly configure access links
Disable auto trunking
Manually enable trunk links
Implement port security
Types of DHCP attacks
DHCP spoofing attack
DHCP starvation attack
Methods to mitigate DHCP attacks
configure DHCP snooping
configure port security