Top Banner
CCNA Security v2.0 Chapter 6: Securing the Local Area Network
87

CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Jan 18, 2016

Download

Documents

Jodie Robinson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

CCNA Security v2.0

Chapter 6:

Securing the Local Area Network

Page 2: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2

Chapter Outline

6.0 Introduction

6.1 Endpoint Security

6.2 Layer 2 Security Threats

6.3 Summary

Page 3: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3

Section 6.1:Endpoint Security

Upon completion of this section, you should be able to:

• Describe endpoint security and the enabling technologies.

• Explain how Cisco AMP is used to ensure endpoint security.

• Explain how Cisco NAC authenticates and enforces the network security policy.

Page 4: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4

Topic 6.1.1:Introducing Endpoint Security

Page 5: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5

Securing LAN Elements

Page 6: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6

Traditional Endpoint Security

Page 7: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

The Borderless Network

Page 8: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

Securing Endpoints in the Borderless Network

Post malware attack questions:

• Where did it come from?

• What was the threat method and point of entry?

• What systems were affected?

• What did the threat do?

• Can I stop the threat and root cause?

• How do we recover from it?

• How do we prevent it from happening again?

Host-Based Protection:

• Antivirus/Antimalware

• SPAM Filtering

• URL Filtering

• Blacklisting

• Data Loss Prevention (DLP)

Page 9: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9

Modern Endpoint Security Solutions

Page 10: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10

Hardware and Software Encryption of Local Data

Page 11: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 11

Topic 6.1.2:Antimalware Protection

Page 12: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12

Advanced Malware Protection

Page 13: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13

AMP and Managed Threat Defense

Image is missing

Page 14: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14

AMP for Endpoints

Image is missing

Page 15: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 15

Topic 6.1.3:Email and Web Security

Page 16: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

Securing Email and Web

Page 17: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17

Cisco Email Security Appliance

Features and benefits of Cisco Email Security solutions:

• Global threat intelligence

• Spam blocking

• Advanced malware protection

• Outbound message control

Page 18: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18

Cisco Web Security Appliance

Client Initiates Web Request

WSA Forwards Request

Reply Sent to WSA and Then To Client

Page 19: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 19

Topic 6.1.4:Controlling Network Access

Page 20: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20

Cisco Network Admission Control

Page 21: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21

Cisco NAC Functions

Page 22: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22

Cisco NAC Components

Page 23: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23

Network Access for Guests

Three ways to grant sponsor permissions:

• to only those accounts created by the sponsor

• to all accounts

• to no accounts (i.e., they cannot change any permissions)

Page 24: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24

Cisco NAC Profiler

Page 25: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25

Section 6.2:Layer 2 Security Considerations

Upon completion of the section, you should be able to:

• Describe Layer 2 vulnerabilities.

• Describe CAM table overflow attacks.

• Configure port security to mitigate CAM table overflow attacks.

• Configure VLAN Truck security to mitigate VLAN hopping attacks.

• Implement DHCP Snooping to mitigate DHCP attacks.

• Implement Dynamic Arp Inspection to mitigate ARP attacks.

• Implement IP Source Guard to mitigate address spoofing attacks.

Page 26: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 26

Topic 6.2.1:Layer 2 Security Threats

Page 27: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27

Describe Layer 2 Vulnerabilities

Page 28: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28

Switch Attack Categories

Page 29: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 29

Topic 6.2.2:CAM Table Attacks

Page 30: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30

Basic Switch Operation

Page 31: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31

CAM Table Operation Example

Page 32: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32

CAM Table Attack

Fill CAM Table

Intruder Runs Attack Tool

Page 33: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33

CAM Table Attack

Attacker Captures Traffic

Switch Floods All Traffic

Page 34: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34

CAM Table Attack Tools

Page 35: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35

Topic 6.2.3:Mitigating CAM Table Attacks

Page 36: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36

Countermeasure for CAM Table Attacks

Page 37: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37

Port Security

Enabling Port Security

Verifying Port Security

Port Security Options

Page 38: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38

Enabling Port Security Options

Setting the Maximum Number of Mac Addresses

Manually Configuring Mac Addresses

Learning Connected Mac Addresses Dynamically

Page 39: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39

Port Security Violations

Security Violation Modes:

• Protect

• Restrict

• Shutdown

Page 40: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40

Port Security Aging

Page 41: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41

Port Security with IP Phones

Page 42: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42

SNMP MAC Address Notification

Page 43: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 43

Topic 6.2.4:Mitigating VLAN Attacks

Page 44: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44

VLAN Hopping Attacks

Page 45: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45

VLAN Double-Tagging Attack

Step 1 – Double Tagging Attack

Step 2 – Double Tagging Attack

Step 3 – Double Tagging Attack

Page 46: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46

Mitigating VLAN Hopping Attacks

Page 47: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47

PVLAN Edge Feature

Page 48: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48

Verifying Protected Ports

Page 49: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49

Private VLANs

Page 50: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 50

Topic 6.2.5:Mitigating DHCP Attacks

Page 51: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51

DHCP Spoofing Attack

Page 52: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52

DHCP Starvation AttackAttacker Initiates a Starvation Attack

DHCP Server Offers Parameters

Page 53: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53

DHCP Starvation AttackClient Requests all Offers

DHCP Server Acknowledges All Requests

Page 54: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54

Mitigating VLAN Attacks

The switch will deny packets containing specific information:

• Unauthorized DHCP server messages from an untrusted port

• Unauthorized DHCP client messages not adhering to the snooping binding table or rate limits

• DHCP relay-agent packets that include option-82 information on an untrusted port

Page 55: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55

Configuring DHCP Snooping

Page 56: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56

Configuring DHCP Snooping ExampleDHCP Snooping Reference Topology

Configuring a Maximum Number of MAC Addresses

Page 57: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57

Configuring DHCP Snooping ExampleVerifying DHCP Snooping

Configuring a Maximum Number of MAC Addresses

Page 58: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 58

Topic 6.2.6:Mitigating ARP Attacks

Page 59: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59

ARP Spoofing and ARP Poisoning Attack

Page 60: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60

Mitigating ARP Attacks

Dynamic ARP Inspection:

Page 61: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61

Configuring Dynamic ARP Inspection

Page 62: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62

Configuring DHCP Snooping Example

ARP Reference Topology

Configuring Dynamic ARP Inspection

Page 63: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63

Configuring DHCP Snooping Example

Checking Source, Destination, and IP

Page 64: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 64

Topic 6.2.7:Mitigating Address Spoofing Attacks

Page 65: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65

Address Spoofing Attack

Page 66: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66

Mitigating Address Spoofing Attacks

For each untrusted port, there are two possible levels of IP traffic security filtering:

• Source IP address filter

• Source IP and MAC address filter

Page 67: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67

Configuring IP Source Guard

IP Source Guard Reference Topology

Configuring IP Source Guard

Checking IP Source Guard

Page 68: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 68

Topic 6.2.8:Spanning Tree Protocol

Page 69: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69

Introduction to the Spanning Tree Protocol

Page 70: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70

Various Implementations of STP

Page 71: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71

STP Port Roles

Page 72: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72

STP Root Bridge

Page 73: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73

STP Path Cost

Page 74: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 74

802.1D BPDU Frame Format

Page 75: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75

BPDU Propagation and Process

Page 76: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76

Extended System ID

Page 77: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77

Select the Root Bridge

Page 78: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 78

Topic 6.2.9:Mitigating STP Attacks

Page 79: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79

STP Manipulation Attacks

Spoofing the Root Bridge

Successful STP Manipulation Attack

Page 80: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80

Mitigating STP Attacks

Page 81: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 81

Configuring PortFast

Page 82: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 82

Configuring BDPU Guard

Page 83: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 83

Configuring Root Guard

Page 84: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 84

Configuring Loop Guard

Page 85: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 85

Section 6.3:Summary

Chapter Objectives:

• Explain endpoint security.

• Describe various types of endpoint security applications.

• Describe Layer 2 vulnerabilities.

Page 86: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

Thank you.

Page 87: CCNA Security v2.0 Chapter 6: Securing the Local Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 87

Instructor Resources

• Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com)

• These resources cover a variety of topics including navigation, assessments, and assignments.

• A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes.

1

2