CCNP Switch Questions/Answers Securing Campus Infrastructure

Size: px
Start display at page:

Download "CCNP Switch Questions/Answers Securing Campus Infrastructure"

Transcription

1 What statement is true about a local SPAN configuration? A. A port can act as the destination port for all SPAN sessions configured on the switch. B. A port can be configured to act as a source and destination port for a single SPAN session. C. Both Layer 2 and Layer 3 switched ports can be configured as source or destination ports for a single SPAN session. D. Port channel interfaces (EtherChannel) can be configured as source and destination ports for a single SPAN session. Answer: C The following additional guidelines or restrictions apply to local SPAN: - Both Layer 2 switched ports (LAN ports configured with the switchport command) and Layer 3 ports (LAN ports configured with the no switchport command) can be configured as source or destination ports in Cisco IOS based switches. - A port can act as the destination port for only one SPAN session. - A port cannot be configured as a destination port if it is a source port of a span session. - Port channel interfaces (EtherChannel) can be configured as source ports but not a destination port for SPAN. - SPAN supports configuration of source ports belonging to different VLANs. - Traffic direction is both by default for SPAN sources. - Destination ports never participate in a spanning-tree instance. Local SPAN includes BPDUs in the monitored traffic, so any BPDUs seen on the destination port are from the source port. As a result, SPAN destination ports should not be connected to another switch because this might cause a network loop. - Destination ports get a copy of all packets switched through the switch regardless of whether the packets actually leave the switch due to STP blocking state on an egress port

2 Refer to the exhibit. Which statement is true about the local SPAN configuration on switch SW1? A. The SPAN session transmits to a device on port fa3/21 a copy of all traffic that is monitored on port fa3/1. B. The SPAN session transmits to a device on port fa3/21 a copy of all traffic that is monitored on port fa3/1, but configured in VLAN 10. C. The SPAN session transmits to a device on port fa3/21 a copy of all traffic that is monitored on port fa3/1, but configured as trunk. D. The SPAN session transmits to a device on port fa3/21 only a copy of unicast traffic that is monitored on port fa3/1 and BPDU frames will be excluded from the monitoring process. Answer: A Above is displayed configuration example for Local SPAN. Local SPAN copies traffic from one or more source ports in any VLAN or from one or more VLANs to a destination port for analysis

3 Refer to the exhibit. Which statement is true about the VSPAN configuration on switch SW1? A. The VSPAN session that is configured on port fa3/4 can monitor only the ingress traffic for any of the VLANs. B. The VSPAN session that is configured on port fa3/4 can monitor only the egress traffic for any of the VLANs. C. Port fa3/4 must be associated with VLAN 10 or VLAN 20 in order to monitor the traffic for any of the VLANs. D. The VSPAN session transmits a copy of the ingress traffic for VLAN 10 and the egress traffic for VLAN 20 out interface fa3/4. Answer: D The following additional guidelines or restrictions apply to VSPAN: - VSPAN sessions, with both ingress and egress options configured, forward duplicate packets from the source port only if the packets get switched in the same VLAN. One copy of the packet is from the ingress traffic on the ingress port, and the other copy of the packet is from the egress traffic on the egress port. VSPAN monitors only traffic that leaves or enters Layer 2 ports in the VLAN: Routed traffic that enters a monitored VLAN is not captured if the SPAN session is configured with that VLAN as an ingress source because traffic never appears as ingress traffic entering a Layer 2 port in the VLAN. Traffic that is routed out of a monitored VLAN, which is configured as an egress source in a SPAN session, is not captured because the traffic never appears as egress traffic leaving a Layer 2 port in that VLAN

4 Which configuration guideline applies to using the capture option in VACL? A. Capture ports transmit traffic that belongs to all VLANs. B. The capture port captures all packets that are received on the port. C. The switch has a restriction on the number of captured ports. D. The capture port needs to be in the spanning-tree forwarding state for the VLAN. Answer: D The Catalyst 6500 family of switches offers an additional feature to monitor traffic flows through the switch. SPAN, VSPAN, and RSPAN configuration applies to all traffic on the source port or source VLAN in one or both directions. Using VACLs with the capture option, the network analyzer receives only a copy of traffic matching the configured ACL. Because the ACL might match Layers 2, 3, or 4 information, the VACL with the capture option offers a useful and powerful complementary value to the SPAN and RSPAN features. The following configuration guidelines apply to using the capture option in VACL: - The capture port needs to be in the spanning-tree forwarding state for the VLAN. - The switch has no restriction on the number of capture ports. - The capture port captures only packets permitted by the configured ACL. - Capture ports transmit only traffic belonging to the capture port VLAN. To capture traffic going to many VLANs, configure the capture port as a trunk carrying the required VLANs

5 All access ports on a switch are configured with the administrative mode of dynamic auto. An attacker, connected to one of these ports, sends a malicious DTP frame. What is the intent of the attacker? A. VLAN hopping B. DHCP spoofing attack C. MAC flooding attack D. ARP poisoning attack Answer: A VLAN hopping is attack where attacker device sends or collects packets from VLAN that shouldn t be accessible to that attacker device. VLAN hopping can be done by switch spoofing or double tagging. First form of attack is when by default Cisco switch ports are set in auto mode. If interface receive DTP frame, then link becomes trunk. So attacker can access VLANs in these cases: - Attacker sends DTP frame, attacker port became trunk port and attacker can attack any VLAN on the trunk. - In switch spoofing attack, attacker configures system to act (spoof) as a switch. Then authorized switch sends DTP frames and configure trunk. So attacker got access to VLANs

6 Refer to the exhibit. A network engineer is securing a network against DHCP spoofing attacks. On all switches, the engineer applied the ip dhcp snooping command and enabled DHCP snooping on all VLANs with the ip dhcp snooping vlan command. What additional step should be taken to configure the security required on the network? A. Issue the ip dhcp snooping trust command on all uplink interfaces on SW1, SW2 and SW3. B. Issue the ip dhcp snooping trust command on all interfaces on SW2 and SW3. C. Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2 and SW3. D. Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2 and SW3 except interface fa0/1 on SW1. Answer: A DHCP Snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted. Trusted ports can source all DHCP messages, whereas untrusted ports can source requests only. If a rogue device on an untrusted port attempts to send a DHCP response packet into the network, the port is shut down. Switch end-user ports are configured as untrusted ports and ports that connect to other device are configured as trusted. DHCP Snooping can be applied on VLAN on switch. In our example end-user ports on SW2 and SW3 should be untrusted. Fa0/1, fa0/2 and fa0/3 ports on SW1 should be trusted. Port of SW2 that is connected to fa0/2 of SW1 should be trusted port. Port of SW3 that is connected to fa0/3 of SW1 should be trusted port

7 Which countermeasures can be implemented to determine the validity of an ARP packet, based on the valid MAC-address-to-IP address bindings stored in a DHCP snooping database? A. DHCP spoofing B. Dynamic ARP inspection C. CAM table inspection D. MAC snooping Answer: B In a normal ARP operation, a host sends a broadcast to determine the MAC address of a host with a particular IP address. The device at that IP address replies with its MAC address. The originating host caches the ARP response, using it to populate the destination Layer 2 header of packets sent to that IP address. By spoofing an ARP reply from a legitimate device with a gratuitous ARP, an attacking device appears to be the destination host sought by the senders. The ARP reply from the attacker causes the sender to store the MAC address of the attacking system in its ARP cache. All packets destined for those IP addresses are forwarded through the attacker system. ARP does not have any authentication. It is quite simple for a malicious user to spoof addresses by using tools such as ettercap, dsniff, and arpspoof to poison the ARP tables of other hosts on the same VLAN. In a typical attack, a malicious user can send unsolicited ARP replies (gratuitous ARP packets) to other hosts on the subnet with the attacker s MAC address and the default gateway s IP address. Frames intended for default gateways sent from hosts with poisoned ARP tables are sent to the hacker s machine (enabling the packets to be sniffed) or an unreachable host as a DoS attack. ARP poisoning leads to various man-in-themiddle attacks, posing a security threat in the network. Dynamic ARP inspection helps prevent the man-in-the-middle attacks by not relaying invalid or gratuitous ARP replies out to other ports in the same VLAN. Dynamic ARP inspection intercepts all ARP requests and all replies on the untrusted ports. Each intercepted packet is verified for valid IP-to-MAC bindings that are gathered via DHCP snooping. Denied ARP packets are either dropped or logged by the switch for auditing, so ARP poisoning attacks are stopped. Incoming ARP packets on the trusted ports are not inspected. Dynamic ARP inspection also can rate-limit ARP requests from client ports to minimize port scanning mechanisms

8 How should unused ports on a switch be configured in order to prevent VLAN hopping attacks? A. Configure them with the UDLD feature. B. Configure then with the PAgP protocol. C. Configure them as trunk ports for the native VLAN 1. D. Configure them as access ports and associate them with an unused VLAN. Answer: D Best practice to prevent VLAN hopping attacks are: - Configure all unused ports as access ports, so that trunking can t be done trough these ports. - Place all unused ports in shutdown states and associate them with VLAN that carries just unused ports. On this VLAN it is not permitted to be user data traffic. - When you set trunk link, native VLAN must be different from all other user data VLANs. - Trunking is set to on or nonegotiate (not negotiated). - Native VLAN is not carried on the trunk

9 Refer to the exhibit. Network policy dictates that security functions should be administered using AAA. Which configuration would create a default login authentication list that uses RADIUS as the first authentication method, the enable password as the second method and the local database as the final method? A. SW1(config)#aaa new-model; SW1(config)#radius-server host key secret; SW1(config)#aaa authentication default group-radius local B. SW1(config)#aaa new-model; SW1(config)#radius-server host key secret; SW1(config)#aaa authentication default group-radius enable local C. SW1(config)#aaa new-model; SW1(config)#radius-server host key secret; SW1(config)#aaa authentication login default group radius enable local D. SW1(config)#aaa new-model; SW1(config)#radius-server host key secret; SW1(config)#aaa authentication login default group radius enable local none Answer: C

10 AAA is architectural framework for configuring three independent security functions in a consistent manner. AAA provides a modular way of performing the following services: - Authentication provides the method of identifying users, including login and password dialog, challenge and response, messaging support and depending on the security protocol you select, encryption. Authentication is the way a user is identified prior to being allowed access to the network and network services. You configure AAA authentication by defining a named list of authentication methods and then applying that list to various interfaces. The method list defines the types of authentication to be performed and the sequence in which they will be performed; it must be applied to a specific interface before any of the defined authentication methods will be performed. The only exception is the default method list (which is named default). The default method list is automatically applied to all interfaces if no other method list is defined. A defined method list overrides the default method list. All authentication methods, except for local, line passwords and enable authentication must be defined through AAA. R1(config)#aaa new-model R1(config)#aaa authentication login {default list-name}method1[method2 ] R1(config)#line[aux console tty vty]line-number[ending-line-number] R1(config-line)#login authentication [default list-name] R1(config-if)#aaa authentication ppp[default list-name]method1[method2 ] R1(config)#interface interface-type interface-number R1(config-if)#ppp authentication {protocol1[protocol2 ]}[if-needed][default list-name]

11 - Authorization provides the method for remote access control, including one-time authorization or authorization for each service, per-user account list and profile, user group support and support of IP, IPX, ARA and Telnet. AAA authorization works by assembling a set of attributes that describe what the user is authorized to perform. These attributes are compared to the information contained in a database for a given user and the result is returned to AAA to determine the user s actual capabilities and restrictions. The database can be located locally on the access server or router or it can be hosted remotely on a RADIUS or TACACS+ security server. Remote security servers, such as RADIUS and TACACS+, authorize users for specific rights by associating attribute-value (AV) pairs, which define those rights with the appropriate user. All authorization must be defined through AAA. As with authentication, you configure AAA authorization by defining a named list of authorization methods and then applying that list to various interfaces. - Accounting provides the method for collecting and sending security server information used for billing, auditing and reporting, such as user identities, start and stop times, executed commands (such as PPP), number of packets and number of bytes. Accounting enables you to track the services users are accessing as well as the amount of network resources they are consuming. When AAA accounting is activated, the network access server reports user activity to the RASIUS or TACACS+ security server (depending on which security method you have implemented) in the form of accounting records. Each accounting record is comprised of accounting AV pairs and is stored on the access control server. This data can then be analyzed for network management, client billing, and/or auditing. All accounting methods must be defined through AAA. As with authentication and authorization, you configure AAA accounting by defining a named list of accounting methods and then applying that list to various interfaces

12 You control the port authorization state by using the dot1x port-control interface configuration command and these keywords: force-authorized disables 802.1x authentication and cause the port to transition to the authorized state without any authentication exchange required. The port sends and receives normal traffic without 802.1x based authentication of the client. This is the default setting. force-unauthorized causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface. auto enables 802.1x authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port transitions from down to up or when an EAPOL-start frame is received. The switch requests the identity of the client and begins relying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the switch by using the client s MAC address

13 Refer to the exhibit. A switch is being configured to support AAA authentication on the console connection. Given the information in the exhibit, which three statements are correct? (Choose three) A. The authentication login admin line console command is required. B. The login authentication admin line console command is required. C. The configuration creates authentication list that uses a named access list called group as the first authentication method, a TACACS+ server as the second method, the local username database as the third method, the enable password as the fourth method and none as the last method. D. The configuration creates an authentication list that uses a TACACS+ server as the first authentication method, the local username database as the second method, the enable password as the third method and none as the last method. E. The none keyword enables any user logging in to successfully authenticate if all other methods return an error. F. The none keyword specifies that a user cannot log in if all other methods have failed. Answer: B, D, E Switch(config)#aaa new-model /enables AAA globally on the switch Switch(config)#aaa authentication login admin group tacacs+ local enable none / These are lists of authentication methods. "admin" is name of the list, and the / methods listed on the same lines are the methods in the order to be tried. In the table are shown AAA authentication login methods

14 We can apply admin group on console (in our example, or can be Telnet) Switch(config)#line con 0 Switch(config-line)#password whatever Switch(config-line)#exec-timeout 0 0 Switch(config-line)#login authentication admin More on: Link

Cisco Networking Academy CCNP

Cisco Networking Academy CCNP Semester 3 v5 -Chapter 8 Cisco Networking Academy CCNP Minimizing Service Loss and Data Theft in a Campus Network Switch security concerns Network security coverage often focuses on edge-routing devices

More information

Internetwork Expert s CCNA Security Bootcamp. Mitigating Layer 2 Attacks. Layer 2 Mitigation Overview

Internetwork Expert s CCNA Security Bootcamp. Mitigating Layer 2 Attacks. Layer 2 Mitigation Overview Internetwork Expert s CCNA Security Bootcamp Mitigating Layer 2 Attacks http:// Layer 2 Mitigation Overview The network is only as secure as its weakest link If layer 2 is compromised, all layers above

More information

Understanding Switch Security

Understanding Switch Security Overview of Switch Security Understanding Switch Security Most attention surrounds security attacks from outside the walls of an organization. Inside the network is left largely unconsidered in most security

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection Finding Feature Information, page 1 Restrictions for Dynamic ARP Inspection, page 1 Understanding Dynamic ARP Inspection, page 3 Default Dynamic ARP Inspection Configuration, page 6 Relative Priority of

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection 21 CHAPTER This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 3560 switch. This feature helps prevent malicious attacks on the

More information

Configuring 802.1X Port-Based Authentication

Configuring 802.1X Port-Based Authentication CHAPTER 10 This chapter describes how to configure IEEE 802.1X port-based authentication on the Catalyst 3750 switch. As LANs extend to hotels, airports, and corporate lobbies, creating insecure environments,

More information

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018 Network Security The Art of War in The LAN Land Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018 Part I MAC Attacks MAC Address/CAM Table Review 48 Bit Hexadecimal Number Creates Unique

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 41 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

Configuring Private VLANs

Configuring Private VLANs CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 34 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window 9. Security DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Port Security 802.1X AAA RADIUS TACACS IMPB DHCP Server Screening ARP Spoofing Prevention MAC Authentication Web-based

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 42 This chapter describes how to configure web-based authentication. It consists of these sections: About Web-Based Authentication, page 42-1, page 42-5 Displaying Web-Based Authentication Status,

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 8 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the switch. IEEE 802.1x authentication prevents unauthorized

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN Finding Feature Information, page 1 Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 2 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring

More information

Configuring DHCP Features and IP Source Guard

Configuring DHCP Features and IP Source Guard CHAPTER 21 This chapter describes how to configure DHCP snooping and option-82 data insertion, and the DHCP server port-based address allocation features on the switch. It also describes how to configure

More information

Understanding and Configuring Dynamic ARP Inspection

Understanding and Configuring Dynamic ARP Inspection 29 CHAPTER Understanding and Configuring Dynamic ARP Inspection This chapter describes how to configure Dynamic ARP Inspection (DAI) on the Catalyst 4500 series switch. This chapter includes the following

More information

ActualTest v by-VA

ActualTest v by-VA ActualTest-642-813-v2012-10-29-by-VA Number: 154 Passing Score: 790 Time Limit: 140 min File Version: 2.7 http://www.gratisexam.com/ Implementing Cisco IP Switched Networks (SWITCH) I rearranged the last

More information

Configuring DHCP Features and IP Source Guard

Configuring DHCP Features and IP Source Guard CHAPTER 23 This chapter describes how to configure DHCP snooping and option-82 data insertion, and the DHCP server port-based address allocation features on the IE 3000 switch. It also describes how to

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 9 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the Catalyst 2960 switch. IEEE 802.1x authentication prevents

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN CHAPTER 32 This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 3750-X or 3560-X switch. Unless otherwise noted, the term switch refers to a Catalyst

More information

Port ACLs (PACLs) Prerequisites for PACls CHAPTER

Port ACLs (PACLs) Prerequisites for PACls CHAPTER 71 CHAPTER Prerequisites for PACls, page 71-1 Restrictions for PACLs, page 71-2 Information About PACLs, page 71-2 How to Configure PACLs, page 71-7 Note For complete syntax and usage information for the

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 61 This chapter describes how to configure web-based authentication. Cisco IOS Release 12.2(33)SXH and later releases support web-based authentication. Note For complete syntax and usage information

More information

Configuring Private VLANs

Configuring Private VLANs Finding Feature Information, on page 1 Prerequisites for Private VLANs, on page 1 Restrictions for Private VLANs, on page 1 Information About Private VLANs, on page 2 How to Configure Private VLANs, on

More information

Configuring Private VLANs

Configuring Private VLANs 36 CHAPTER This chapter describes private VLANs (PVLANs) on Catalyst 4500 series switches. It also provides restrictions, procedures, and configuration examples. This chapter includes the following major

More information

Configuring Private VLANs

Configuring Private VLANs 36 CHAPTER This chapter describes private VLANs (PVLANs) on Catalyst 4500 series switches. It also provides restrictions, procedures, and configuration examples. This chapter includes the following major

More information

Configuring SPAN. Understanding SPAN CHAPTER. This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch.

Configuring SPAN. Understanding SPAN CHAPTER. This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch. CHAPTER 23 This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 1 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring SPAN and RSPAN Operations,

More information

Understanding and Configuring Private VLANs

Understanding and Configuring Private VLANs CHAPTER 8 This chapter describes private VLANs on the Catalyst 4000 family switches. It also provides guidelines, procedures, and configuration examples. This chapter includes the following major sections:

More information

Q&As Implementing Cisco IP Switched Networks (SWITCH v2.0)

Q&As Implementing Cisco IP Switched Networks (SWITCH v2.0) CertBus.com 300-115 Q&As Implementing Cisco IP Switched Networks (SWITCH v2.0) Pass Cisco 300-115 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

CCNA Security 1.0 Student Packet Tracer Manual

CCNA Security 1.0 Student Packet Tracer Manual 1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Configuring Network Admission Control

Configuring Network Admission Control 45 CHAPTER This chapter describes how to configure Network Admission Control (NAC) on Catalyst 6500 series switches. With a PFC3, Release 12.2(18)SXF2 and later releases support NAC. Note For complete

More information

Cisco Exam Bundle

Cisco Exam Bundle Cisco 642-813 Exam Bundle Number: 642-813 Passing Score: 790 Time Limit: 120 min File Version: 22.3 http://www.gratisexam.com/ Cisco 642-813 Exam Bundle Exam Name: Cisco implementing cisco switched networks

More information

Configuring DHCP Features and IP Source Guard

Configuring DHCP Features and IP Source Guard CHAPTER 21 This chapter describes how to configure DHCP snooping and the option-82 data insertion features on the switch. It also describes how to configure the IP source guard feature.unless otherwise

More information

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks In an ARP spoofing attack, the attacker associates its own MAC address with the IP address of a network device

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

: Building Cisco Multilayer Switched Networks

: Building Cisco Multilayer Switched Networks Exam : Cisco 642-812 Title : Building Cisco Multilayer Switched Networks Version : Demo Cheat-Test,help you pass any IT exam! Q: 1 Which three statements about the Multiple Spanning Tree (MST) protocol

More information

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 13, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

actualtests.cisco.ccnp switch by.passforu

actualtests.cisco.ccnp switch by.passforu actualtests.cisco.ccnp.642-813.switch.2012.07.02.by.passforu Number: 642-813 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ www.passforu.com obtain your it certifications

More information

Cisco Nexus 3000 Series NX-OS Security Configuration Guide, Release 6.x

Cisco Nexus 3000 Series NX-OS Security Configuration Guide, Release 6.x Cisco Nexus 3000 Series NX-OS Security Configuration Guide, Release 6.x First Published: 2013-05-21 Last Modified: 2017-03-13 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA

More information

Configuring Access and Trunk Interfaces

Configuring Access and Trunk Interfaces Configuring Access and Trunk Interfaces Ethernet interfaces can be configured either as access ports or trunk ports. Trunks carry the traffic of multiple VLANs over a single link and allow you to extend

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Configuring IEEE 802.1X Port-Based Authentication

Configuring IEEE 802.1X Port-Based Authentication CHAPTER 44 This chapter describes how to configure IEEE 802.1X port-based authentication to prevent unauthorized devices (clients) from gaining access to the network. Note For complete syntax and usage

More information

Catalyst Switches for Microsoft Network Load Balancing Configuration Example

Catalyst Switches for Microsoft Network Load Balancing Configuration Example Catalyst Switches for Microsoft Network Load Balancing Configuration Example Document ID: 107995 Contributed by Shashank Singh, Cisco TAC Engineer. Dec 19, 2013 Contents Introduction Prerequisites Requirements

More information

FiberstoreOS. Security Configuration Guide

FiberstoreOS. Security Configuration Guide FiberstoreOS Security Configuration Guide Contents 1 Configuring Port Security...1 1.1 Overview...1 1.2 Topology... 2 1.3 Configurations...2 1.4 Validation... 3 2 Configuring Vlan Security... 4 2.1 Overview...4

More information

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

BraindumpsIT.  BraindumpsIT - IT Certification Company provides Braindumps pdf! BraindumpsIT http://www.braindumpsit.com BraindumpsIT - IT Certification Company provides Braindumps pdf! Exam : 300-115 Title : Implementing Cisco IP Switched Networks Vendor : Cisco Version : DEMO Get

More information

Configuring Network Admission Control

Configuring Network Admission Control CHAPTER 59 This chapter describes how to configure Network Admission Control (NAC) in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication The Web-Based Authentication feature, also known as web authentication proxy, authenticates end users on host systems that do not run the IEEE 802.1x supplicant. Finding Feature Information, on page 1

More information

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL Contents: UniNets CCNA Security LAB MANUAL Section 1 Securing Layer 2 Lab 1-1 Configuring Native VLAN on a Trunk Links Lab 1-2 Disabling

More information

Question No: 1 What is the maximum number of switches that can be stacked using Cisco StackWise?

Question No: 1 What is the maximum number of switches that can be stacked using Cisco StackWise? Volume: 283 Questions Question No: 1 What is the maximum number of switches that can be stacked using Cisco StackWise? A. 4 B. 5 C. 8 D. 9 E. 10 F. 13 Answer: D Question No: 2 A network engineer wants

More information

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

itexamdump 최고이자최신인 IT 인증시험덤프   일년무료업데이트서비스제공 itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : 642-813 Title : Implementing Cisco IP Switched Networks Vendor : Cisco Version : DEMO Get Latest & Valid 642-813 Exam's Question

More information

Cisco Exam Bundle

Cisco Exam Bundle Cisco 642-813 Exam Bundle Number: 642-813 Passing Score: 790 Time Limit: 120 min File Version: 22.3 http://www.gratisexam.com/ Cisco 642-813 Exam Bundle Exam Name: Cisco implementing cisco switched networks

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 10 Configuring IEEE 802.1x Port-Based Authentication IEEE 802.1x port-based authentication prevents unauthorized devices (clients) from gaining access to the network. Unless otherwise noted, the

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Switched Networks. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Switched Networks. Version: Demo Vendor: Cisco Exam Code: 642-813 Exam Name: Implementing Cisco IP Switched Networks Version: Demo QUESTION 1 Which two RSTP port roles include the port as part of the active topology? (Choose two) A. Root

More information

Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch

Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch Requirements You can configure DHCP snooping, dynamic ARP inspection

More information

Introduction to Switched Networks Routing And Switching

Introduction to Switched Networks Routing And Switching Introduction to Switched Networks Routing And Switching 1 Converged Networks Growing Complexity of Networks Our digital world is changing Information must be accessed from anywhere in the world Networks

More information

FSOS Security Configuration Guide

FSOS Security Configuration Guide FSOS Security Configuration Guide Contents 1 Configuring Port Security...8 1.1 Overview...8 1.2 Topology... 9 1.3 Configurations...9 1.4 Validation... 10 2 Configuring Vlan Security... 11 2.1 Overview...

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

Configuring ARP attack protection 1

Configuring ARP attack protection 1 Contents Configuring ARP attack protection 1 ARP attack protection configuration task list 1 Configuring unresolvable IP attack protection 1 Configuring ARP source suppression 2 Configuring ARP blackhole

More information

Configuring ARP attack protection 1

Configuring ARP attack protection 1 Contents Configuring ARP attack protection 1 ARP attack protection configuration task list 1 Configuring unresolvable IP attack protection 1 Configuring ARP source suppression 2 Configuring ARP blackhole

More information

Configuring DHCP Features

Configuring DHCP Features This chapter describes how to configure DHCP snooping and option-82 data insertion on the Cisco ASR 920 Series Router. Finding Feature Information, page 1 Limitations and Restrictions, page 1 DHCP Features,

More information

Configuring Voice VLAN

Configuring Voice VLAN CHAPTER 15 This chapter describes how to configure the voice VLAN feature on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and a switch stack. Voice VLAN

More information

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Port-Based and Client-Based Access Control (802.1X) 9 Configuring Port-Based and Client-Based Access Control (802.1X) Contents Overview..................................................... 9-3 Why Use Port-Based or Client-Based Access Control?............

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

Number: Passing Score: 800 Time Limit: 120 min File Version: 9.0. Cisco Questions & Answers

Number: Passing Score: 800 Time Limit: 120 min File Version: 9.0. Cisco Questions & Answers 300-115 Number: 300-115 Passing Score: 800 Time Limit: 120 min File Version: 9.0 Cisco 300-115 Questions & Answers Implementing Cisco IP Switched Networks Version: 9.0 Cisco 300-115 Exam Topic 1, Layer

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 24 CHAPTER This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on your Catalyst 2950 or Catalyst 2955 switch. Note For complete syntax and usage information for

More information

Authorized CCNP. Student. LabManual SWITCH.

Authorized CCNP. Student. LabManual SWITCH. Authorized CCNP SWITCH Student LabManual Web:www.networkershome.com Email:info@networkershome.com www.networkershome.com Authorized CCNPSWITCHWORKBOOK Module:01to20 CopyrightsNetworkersHome2007-2015 Website:htp:/www.networkershome.com;info@networkershome.com

More information

Security Commands. Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3850 Switches) OL

Security Commands. Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3850 Switches) OL Security Commands aaa accounting dot1x, page 4 aaa accounting identity, page 6 aaa authentication dot1x, page 8 aaa authorization, page 9 aaa new-model, page 14 access-session mac-move deny, page 16 action,

More information

Configuring DHCP Features

Configuring DHCP Features CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and the option-82 data insertion features on the Catalyst 3750 switch. Unless otherwise noted, the

More information

Configuring Private Hosts

Configuring Private Hosts CHAPTER 25 This chapter describes how to configure the private hosts feature in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 300-115 Title : Implementing Cisco IP Switched Networks Vendor : Cisco Version : DEMO Get Latest & Valid

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

1. Which two statements are true about VLAN implementation? (Choose two.)

1. Which two statements are true about VLAN implementation? (Choose two.) CCNA 2 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. Which two statements are true about VLAN implementation? (Choose two.) The size of the collision domain is reduced. The number of required switches in

More information

Catalyst 4500 Series IOS Commands

Catalyst 4500 Series IOS Commands CHAPTER Catalyst 4500 Series IOS Commands New Commands dot1x guest-vlan supplicant ip dhcp snooping information option allow-untrusted port-security mac-address port-security mac-address sticky port-security

More information

Cisco IOS Commands for the Catalyst 4500 Series Switches

Cisco IOS Commands for the Catalyst 4500 Series Switches CHAPTER 2 Cisco IOS Commands for the Catalyst 4500 Series Switches This chapter contains an alphabetical listing of Cisco IOS commands for the Catalyst 4500 series switches. For information about Cisco

More information

Chapter 3: VLANs. Routing & Switching

Chapter 3: VLANs. Routing & Switching Chapter 3: VLANs Routing & Switching VLAN Definitions A VLAN is a logical partition of a Layer 2 network. VLANs logically group hosts, regardless of physical location. Multiple partitions can be created,

More information

Selected Network Security Technologies

Selected Network Security Technologies Selected Network Security Technologies Petr Grygárek rek Agenda: Security in switched networks Control Plane Policing 1 Security in Switched Networks 2 Switch Port Security Static MAC addresses assigned

More information

Lab 3.3 Configuring Wireshark and SPAN

Lab 3.3 Configuring Wireshark and SPAN Lab 3.3 Configuring Wireshark and SPAN Learning Objectives Install Wireshark on a host PC Configure a switch to use the SPAN monitoring tool. Topology Diagram Scenario In this lab, you will configure a

More information

With 802.1X port-based authentication, the devices in the network have specific roles.

With 802.1X port-based authentication, the devices in the network have specific roles. This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 8 Prerequisites for 802.1X, page 8 802.1X Guidelines and Limitations, page 9 Default

More information

Configuring DHCP. About DHCP Snooping, page 2 About the DHCPv6 Relay Agent, page 8

Configuring DHCP. About DHCP Snooping, page 2 About the DHCPv6 Relay Agent, page 8 This chapter describes how to configure the Dynamic Host Configuration Protocol (DHCP) on a Cisco NX-OS device. This chapter includes the following sections: About DHCP Snooping, page 2 About the DHCP

More information

Configuring IPv6 First-Hop Security

Configuring IPv6 First-Hop Security This chapter describes the IPv6 First-Hop Security features. This chapter includes the following sections: Finding Feature Information, on page 1 Introduction to First-Hop Security, on page 1 RA Guard,

More information

ARP Inspection and the MAC Address Table

ARP Inspection and the MAC Address Table This chapter describes how to customize the MAC address table and configure ARP Inspection for bridge groups. About, page 1 Default Settings, page 2 Guidelines for, page 2 Configure ARP Inspection and

More information

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

ARP Inspection and the MAC Address Table for Transparent Firewall Mode ARP Inspection and the MAC Address Table for Transparent Firewall Mode This chapter describes how to customize the MAC address table and configure ARP Inspection for bridge groups. About ARP Inspection

More information

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards First Published: May 17, 2005 Last Updated: July 28, 2010 This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port

More information

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more

More information

Cisco CCNP Exam

Cisco CCNP Exam Cisco CCNP 642-813 Exam Number: 160 Passing Score: 800 Time Limit: 120 min File Version: 1301 http://www.gratisexam.com/ Cisco CCNP 642-813 Exam EnsurePass.com Vendor:Cisco Exam Code:642-813 Contact us:

More information

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure

More information

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

CCNA 1 Chapter 5 v5.0 Exam Answers 2013 CCNA 1 Chapter 5 v5.0 Exam Answers 2013 1 2 A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination

More information

Configuring DHCP Snooping

Configuring DHCP Snooping 15 CHAPTER This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on an NX-OS device. This chapter includes the following sections: Information About DHCP Snooping,

More information

Cisco IOS Commands for the Catalyst 4500 Series Switches

Cisco IOS Commands for the Catalyst 4500 Series Switches CHAPTER 2 Cisco IOS Commands for the Catalyst 4500 Series Switches This chapter contains an alphabetical listing of Cisco IOS commands for the Catalyst 4500 series switches. For information about Cisco

More information

2. What is a characteristic of a contention-based access method?

2. What is a characteristic of a contention-based access method? CCNA 1 Chapter 5 v5.0 Exam Answers 2015 (100%) 1. Which statement is true about MAC addresses? MAC addresses are implemented by software. A NIC only needs a MAC address if connected to a WAN. The first

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan June 18, 2015 1 / 19 ARP (Address resolution protocol) poisoning ARP is used to resolve 32-bit

More information

Catalyst 4500 Series IOS Commands

Catalyst 4500 Series IOS Commands CHAPTER Catalyst 4500 Series IOS Commands New Commands call-home (global configuration) call-home request call-home send call-home send alert-group call-home test clear energywise neighbors clear errdisable

More information

Configuring DHCP. Finding Feature Information. Information About DHCP. DHCP Server. DHCP Relay Agent

Configuring DHCP. Finding Feature Information. Information About DHCP. DHCP Server. DHCP Relay Agent Finding Feature Information, page 1 Information About DHCP, page 1 How to Configure DHCP Features, page 8 Server Port-Based Address Allocation, page 17 Finding Feature Information Your software release

More information

Building Cisco Multilayer Switched Networks (BCMSN)

Building Cisco Multilayer Switched Networks (BCMSN) Building Cisco Multilayer Switched Networks (BCMSN) Table of Contents Module 1 Defining VLANs Implementing Best Practices for VLAN Topologies Describing Issues in a Poorly Designed Network Grouping Business

More information

Finding Feature Information, page 2 Information About DHCP Snooping, page 2 Information About the DHCPv6 Relay Agent, page 8

Finding Feature Information, page 2 Information About DHCP Snooping, page 2 Information About the DHCPv6 Relay Agent, page 8 This chapter describes how to configure the Dynamic Host Configuration Protocol (DHCP) on a Cisco NX-OS device. This chapter includes the following sections: Finding Feature Information, page 2 Information

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

With 802.1X port-based authentication, the devices in the network have specific roles.

With 802.1X port-based authentication, the devices in the network have specific roles. This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 9 Prerequisites for 802.1X, page 9 802.1X Guidelines and Limitations, page 9 Default

More information

PT Activity: Configure AAA Authentication on Cisco Routers

PT Activity: Configure AAA Authentication on Cisco Routers PT Activity: Configure AAA Authentication on Cisco Routers Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask R1 Fa0/0 192.168.1.1 255.255.255.0 S0/0/0 10.1.1.2

More information