C4-CNv6 instructorPPT Chapter5
C4-CNv6 instructorPPT Chapter5
Chapter 5: Network
Security and Monitoring
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 5: Best Practices
Prior to teaching Chapter 5, the instructor should:
Complete Chapter 5 Assessment.
Ensure all activities are completed. This is a very important
concept and hands-on time is vital.
Provide the students many network security and network
monitoring activities.
Encourage students to login with their cisco.com login and
download
http://docwiki.cisco.com/wiki/Internetworking_Technology_H
andbook
• Review the Security Technologies and the Network Management
chapters.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Chapter 5: Network Security
and Monitoring
Connecting Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Chapter 5 - Sections & Objectives
5.1 LAN Security
• Explain how to mitigate common LAN security.
5.2 SNMP
• Configure SNMP to monitor network operations in a small to medium-
sized business network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
5.1 LAN Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
LAN Security
LAN Security Attacks
Common attacks against the Layer 2 LAN infrastructure
include:
• CDP Reconnaissance Attacks
• Telnet Attacks
• MAC Address Table Flooding Attacks
• VLAN Attacks
• DHCP Attacks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
LAN Security
LAN Security Best Practices
This topic covers several Layer 2 security solutions:
• Mitigating MAC address table flooding attacks using port security
• Mitigating VLAN attacks
• Mitigating DHCP attacks using DHCP snooping
• Securing administrative access using AAA
• Securing device access using 802.1X port authentication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
LAN Security
LAN Security Best Practices
There are several strategies to help secure Layer 2 of a
network:
• Always use secure variants of these protocols such as SSH, SCP, SSL,
SNMPv3, and SFTP.
• Always use strong passwords and change them often.
• Enable CDP on select ports only.
• Secure Telnet access.
• Use a dedicated management VLAN where nothing but management
traffic resides.
• Use ACLs to filter unwanted access.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
5.2 SNMP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
SNMP
SNMP Operation
SNMP allows administrators
to manage and monitor
devices on an IP network.
SNMP Elements
• SNMP Manager
• SNMP Agent
• MIB
SNMP Operation
• Trap
• Get
• Set
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
SNMP
SNMP Operation
SNMP Security Model and Levels
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
SNMP
Configuring SNMP
Configuration steps
• Configure community string
• Document location of device
• Document system contact
• Restrict SNMP Access
• Specify recipient of SNMP
Traps
• Enable traps on SNMP agent
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
SNMP
Configuring SNMP
Securing SNMPv3
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
5.3 Cisco Switch Port Analyzer
(SPAN)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Cisco Switch Port Analyzer
SPAN Overview
Port mirroring
• The port mirroring feature allows a switch to copy and send Ethernet
frames from specific ports to the destination port connected to a
packet analyzer. The original frame is still forwarded in the usual
manner.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Cisco Switch Port Analyzer
SPAN Overview
SPAN terminology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Cisco Switch Port Analyzer
SPAN Overview
RSPAN terminology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Cisco Switch Port Analyzer
SPAN Configuration
Use monitor session global configuration command
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Cisco Switch Port Analyzer
SPAN as a Troubleshooting Tool
SPAN allows administrators to
troubleshoot network issues
Administrator can use SPAN to
duplicate and redirect traffic to a
packet analyzer
Administrator can analyze traffic
from all devices to troubleshoot
sub-optimal operation of
network applications
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
5.4 Chapter Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Chapter Summary
Summary
At Layer 2, a number of vulnerabilities exist that require
specialized mitigation techniques:
• MAC address table flooding attacks are addressed with port security.
• VLAN attacks are controlled by disabling DTP and following basic
guidelines for configuring trunk ports.
• DHCP attacks are addressed with DHCP snooping.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Summary Continued
SNMPv3 is the recommended version because it provides security.
SNMP is a comprehensive and powerful remote management tool. Nearly every
item available in a show command is available through SNMP.
Switched Port Analyzer (SPAN) is used to mirror the traffic going to and/or
coming from the host. It is commonly implemented to support traffic analyzers or
IPS devices.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30