Section 16.151 Port Security Flashcards

Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security

1
Q

Port Security

A

A network switch feature that restricts device access to specific ports based on MAC addresses

■ Enhances network security by preventing unauthorized devices from connecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Switches

A

■ Networking devices that operate at Layer 2 of the OSI model

■ Use MAC addresses for traffic switching decisions through transparent bridging

■ Efficiently prevent collisions, operate in full duplex mode

■ Remember connected devices based on MAC addresses

■ Broadcast traffic only to intended receivers, increasing security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAM Table (Content Addressable Memory)

A

Stores MAC addresses associated with switch ports

■ Vulnerable to MAC flooding attacks, which can cause the switch to fail open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port Security Implementation

A

■ Associate specific MAC addresses with interfaces

■ Prevent unauthorized devices from connecting

■ Can use Sticky MACs for easier setup

■ Susceptible to MAC spoofing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.1x Authentication

A

Provides port-based authentication for wired and wireless networks

Requires three roles:
● Supplicant: Device of the user request access to your network

● Authenticator: this is the device through which the supplicant is attempting to access the network such as a wirless switch or VPN concentrator

● Authentication server: which is going to be our centralised device
that performs the authentication. This is usually going to be configured as a RADIUS or TACACS+ server.

■ Prevents rogue device access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RADIUS vs. TACACS+

A

■ RADIUS is cross-platform, while TACACS+ is Cisco proprietary

■ TACACS+ is slower but offers additional security and independently handles authentication, authorization, and accounting

■ TACACS+ supports all network protocols, whereas RADIUS lacks support for some

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EAP (Extensible Authentication Protocol)

A

■ A framework for various authentication methods
■ Has different variants which have their own features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EAP (Extensible Authentication Protocol)

EAP-MD5

A

○ Uses simple passwords and the challenge handshake authentication process to provide remote access authentication

○ One-way authentication process

○ Doesn’t provide mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAP (Extensible Authentication Protocol)

EAP-TLS

A

○ Uses public key infrastructure with a digital certificate which is installed on both the client and the server

○ Uses mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP (Extensible Authentication Protocol)

EAP-TTLS

A

○ Requires a digital certificate on the server, but not on the client

○ The client uses a password for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAP (Extensible Authentication Protocol)

EAP-FAST

A

Uses protected access credential, instead of a certificate, to establish mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EAP (Extensible Authentication Protocol)

PEAP

A

○ Supports mutual authentication using server certificates and Active Directory databases to authenticate a password from the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EAP (Extensible Authentication Protocol)

EAP-LEAP

A

Cisco proprietary and limited to Cisco devices

Cisco devices only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly