SRWE Module 10
SRWE Module 10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Endpoint Security
Endpoint Protection
• Endpoints are hosts which commonly
consist of laptops, desktops, servers,
and IP phones, as well as employee-
owned devices. Endpoints are
particularly susceptible to malware-
related attacks that originate through
email or web browsing.
• Endpoints have typically used traditional
host-based security features, such as
antivirus/antimalware, host-based
firewalls, and host-based intrusion
prevention systems (HIPSs).
• Endpoints today are best protected by a
combination of NAC, AMP software, an
email security appliance (ESA), and a
web security appliance (WSA).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Endpoint Security
Cisco Email Security Appliance
The Cisco ESA device is designed to monitor Simple Mail Transfer Protocol (SMTP). The
Cisco ESA is constantly updated by real-time feeds from the Cisco Talos, which detects
and correlates threats and solutions by using a worldwide database monitoring system.
This threat intelligence data is pulled by the Cisco ESA every three to five minutes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Endpoint Security
Cisco Web Security Appliance
• The Cisco Web Security Appliance (WSA) is a mitigation technology for web-based
threats. It helps organizations address the challenges of securing and controlling web
traffic.
• The Cisco WSA combines advanced malware protection, application visibility and
control, acceptable use policy controls, and reporting.
• Cisco WSA provides complete control over how users access the internet. Certain
features and applications, such as chat, messaging, video and audio, can be allowed,
restricted with time and bandwidth limits, or blocked, according to the organization’s
requirements.
• The WSA can perform blacklisting of URLs, URL-filtering, malware scanning, URL
categorization, Web application filtering, and encryption and decryption of web traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
10.2 Access Control
Authentication with a Local Password
Many types of authentication can be performed on networking devices, and each method
offers varying levels of security.
The simplest method of remote access authentication is
to configure a login and password combination on
console, vty lines, and aux ports.
AAA is a way to control who is permitted to access a network (authenticate), what they
can do while they are there (authorize), and to audit what actions they performed while
accessing the network (accounting).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Access Control
Authentication
Local and server-based are two common methods of implementing AAA authentication.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Access Control
Authorization
• AAA authorization is automatic and does not require users to perform additional steps
after authentication.
• Authorization governs what users can and cannot do on the network after they are
authenticated.
• Authorization uses a set of attributes that describes the user’s access to the network.
These attributes are used by the AAA server to determine privileges and restrictions
for that user.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Access Control
Accounting
AAA accounting collects and reports usage data. This data can be used for such purposes
as auditing or billing. The collected data might include the start and stop connection times,
executed commands, number of packets, and number of bytes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Access Control
802.1X
The IEEE 802.1X standard is a port-based access control and authentication protocol. This protocol restricts
unauthorized workstations from connecting to a LAN through publicly accessible switch ports. The
authentication server authenticates each workstation that is connected to a switch port before making
available any services offered by the switch or the LAN.
With 802.1X port-based authentication, the devices in the network have specific roles:
• Client (Supplicant) - This is a device running 802.1X-compliant client software, which is available for wired or wireless
devices.
• Switch (Authenticator) –The switch acts as an intermediary between the client and the authentication server. It requests
identifying information from the client, verifies that information with the authentication server, and relays a response to the
client. Another device that could act as authenticator is a wireless access point.
• Authentication server –The server validates the identity of the client and notifies the switch or wireless access point that
the client is or is not authorized to access the LAN and switch services.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
10.3 Layer 2 Security Threats
Layer 2 Vulnerabilities
Category Examples
MAC Table Attacks Includes MAC address flooding attacks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Layer 2 Security Threats
Switch Attack Mitigation Techniques
Solution Description
Prevents many types of attacks including MAC address flooding attacks and
Port Security
DHCP starvation attacks.
Dynamic ARP Inspection (DAI) Prevents ARP spoofing and ARP poisoning attacks.
These Layer 2 solutions will not be effective if the management protocols are not secured. The
following strategies are recommended:
• Always use secure variants of management protocols such as SSH, Secure Copy Protocol
(SCP), Secure FTP (SFTP), and Secure Socket Layer/Transport Layer Security (SSL/TLS).
• Consider using out-of-band management network to manage devices.
• Use a dedicated management VLAN where nothing but management traffic resides.
• Use ACLs to filter unwanted access.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
10.4 MAC Address Table Attack
Switch Operation Review
Recall that to make forwarding decisions, a Layer 2 LAN switch builds a table based on
the source MAC addresses in received frames. This is called a MAC address table. MAC
address tables are stored in memory and are used to more efficiently switch frames.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
MAC Address Table Attack
MAC Address Table Flooding
All MAC tables have a fixed size and consequently, a switch can run out of resources in
which to store MAC addresses. MAC address flooding attacks take advantage of this
limitation by bombarding the switch with fake source MAC addresses until the switch MAC
address table is full.
When this occurs, the switch treats the frame as an unknown unicast and begins to flood
all incoming traffic out all ports on the same VLAN without referencing the MAC table.
This condition now allows a threat actor to capture all of the frames sent from one host to
another on the local LAN or local VLAN.
Note: Traffic is flooded only within the local LAN or VLAN. The threat actor can only capture traffic
within the local LAN or VLAN to which the threat actor is connected.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
MAC Address Table Attack
MAC Address Table Attack Mitigation
What makes tools such as macof so dangerous is that an attacker can create a MAC
table overflow attack very quickly. For instance, a Catalyst 6500 switch can store 132,000
MAC addresses in its MAC address table. A tool such as macof can flood a switch with
up to 8,000 bogus frames per second; creating a MAC address table overflow attack in a
matter of a few seconds.
Another reason why these attack tools are dangerous is because they not only affect the
local switch, they can also affect other connected Layer 2 switches. When the MAC
address table of a switch is full, it starts flooding out all ports including those connected to
other Layer 2 switches.
To mitigate MAC address table overflow attacks, network administrators must implement
port security. Port security will only allow a specified number of source MAC addresses to
be learned on the port. Port security is further discussed in another module.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
10.5 LAN Attacks
VLAN Hopping Attacks
A VLAN hopping attack enables traffic from one
VLAN to be seen by another VLAN without the aid
of a router. In a basic VLAN hopping attack, the
threat actor configures a host to act like a switch to
take advantage of the automatic trunking port
feature enabled by default on most switch ports.
VLAN Attack Mitigation - VLAN hopping and VLAN double-tagging attacks can be
prevented by implementing the following trunk security guidelines, as discussed in a
previous module:
• Disable trunking on all access ports.
• Disable auto trunking on trunk links so that trunks must be manually enabled.
• Be sure that the native VLAN is only used for trunk links.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
LAN Attacks
DHCP Messages
DHCP servers dynamically provide IP configuration information including IP address, subnet
mask, default gateway, DNS servers, and more to clients. A review of the sequence of the
DHCP message exchange between client and server is show in the figure.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
LAN Attacks
DHCP Attacks
Two types of DHCP attacks are DHCP starvation and DHCP spoofing. Both attacks are
mitigated by implementing DHCP snooping.
• DHCP Starvation Attack – The goal of this attack is to create a DoS for connecting
clients. DHCP starvation attacks require an attack tool such as Gobbler. Gobbler has
the ability to look at the entire scope of leasable IP addresses and tries to lease them
all. Specifically, it creates DHCP discovery messages with bogus MAC addresses.
• DHCP Spoofing Attack – This occurs when a rogue DHCP server is connected to the
network and provides false IP configuration parameters to legitimate clients. A rogue
server can provide a variety of misleading information, including the following:
• Wrong default gateway - The rogue server provides an invalid gateway or the IP address of its host to create a
man-in-the-middle attack. This may go entirely undetected as the intruder intercepts the data flow through the
network.
• Wrong DNS server - The rogue server provides an incorrect DNS server address pointing the user to a
nefarious website.
• Wrong IP address - The rogue server provides an invalid IP address effectively creating a DoS attack on the
DHCP client.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
LAN Attacks
ARP Attacks
• Hosts broadcast ARP Requests to determine the MAC address of a host with a destination IP
address. All hosts on the subnet receive and process the ARP Request. The host with the
matching IP address in the ARP Request sends an ARP Reply.
• A client can send an unsolicited ARP Reply called a “gratuitous ARP”. Other hosts on the subnet
store the MAC address and IP address contained in the gratuitous ARP in their ARP tables.
• An attacker can send a gratuitous ARP message containing a spoofed MAC address to a
switch, and the switch would update its MAC table accordingly. In a typical attack, a threat actor
sends unsolicited ARP Replies to other hosts on the subnet with the MAC Address of the threat
actor and the IP address of the default gateway, effectively setting up a man-in-the-middle
attack.
• There are many tools available on the internet to create ARP man-in-the-middle attacks.
• IPv6 uses ICMPv6 Neighbor Discovery Protocol for Layer 2 address resolution. IPv6 includes
strategies to mitigate Neighbor Advertisement spoofing, similar to the way IPv6 prevents a
spoofed ARP Reply.
• ARP spoofing and ARP poisoning are mitigated by implementing Dynamic ARP Inspection
(DAI).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
LAN Attacks
Address Spoofing Attacks
• IP address spoofing is when a threat actor hijacks a valid IP address of another device
on the subnet or uses a random IP address. IP address spoofing is difficult to mitigate,
especially when it is used inside a subnet in which the IP belongs.
• MAC address spoofing attacks occur when the threat actors alter the MAC address of
their host to match another known MAC address of a target host. The switch
overwrites the current MAC table entry and assigns the MAC address to the new port.
It then inadvertently forwards frames destined for the target host to the attacking host.
• When the target host sends traffic, the switch will correct the error, realigning the MAC
address to the original port. To stop the switch from returning the port assignment to its
correct state, the threat actor can create a program or script that will constantly send
frames to the switch so that the switch maintains the incorrect or spoofed information.
• There is no security mechanism at Layer 2 that allows a switch to verify the source of
MAC addresses, which is what makes it so vulnerable to spoofing.
• IP and MAC address spoofing can be mitigated by implementing IP Source Guard
(IPSG).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
LAN Attacks
STP Attack
• Network attackers can manipulate the Spanning Tree Protocol (STP) to conduct an
attack by spoofing the root bridge and changing the topology of a network. Attackers
can then capture all traffic for the immediate switched domain.
• To conduct an STP manipulation attack, the attacking host broadcasts STP bridge
protocol data units (BPDUs) containing configuration and topology changes that will
force spanning-tree recalculations. The BPDUs sent by the attacking host announce a
lower bridge priority in an attempt to be elected as the root bridge.
• This STP attack is mitigated by implementing BPDU Guard on all access ports. BPDU
Guard is discussed in more detail later in the course.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
LAN Attacks
CDP Reconnaissance
The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol. It is enabled
on all Cisco devices by default. Network administrators also use CDP to help configure and
troubleshoot network devices. CDP information is sent out CDP-enabled ports in periodic,
unencrypted, unauthenticated broadcasts. CDP information includes the IP address of the
device, IOS software version, platform, capabilities, and the native VLAN. The device receiving
the CDP message updates its CDP database.
To mitigate the exploitation of CDP, limit the use of CDP on devices or ports. For example,
disable CDP on edge ports that connect to untrusted devices.
• To disable CDP globally on a device, use the no cdp run global configuration mode
command. To enable CDP globally, use the cdp run global configuration command.
• To disable CDP on a port, use the no cdp enable interface configuration command. To
enable CDP on a port, use the cdp enable interface configuration command.
Note: Link Layer Discovery Protocol (LLDP) is also vulnerable to reconnaissance attacks. Configure no lldp run to disable LLDP
globally. To disable LLDP on the interface, configure no lldp transmit and no lldp receive.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26