CCNP Security Secure

Similar documents
CCNP Security Firewall

Maintenance Checklists for Microsoft Exchange on a Cisco Unity System

CCNP Voice TVoice

Maintenance Checklists for Active Directory on a Cisco Unity System with Exchange as the Message Store

The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer

Connecting Cisco DSU/CSU High-Speed WAN Interface Cards

Release Notes for Cisco ONS MA Release 9.01

Cisco Video Surveillance Virtual Matrix Client Configuration Guide

Connecting Cisco 4-Port FXS/DID Voice Interface Cards

Cisco WAAS Mobile User Guide

Cisco Aironet Very Short 5-GHz Omnidirectional Antenna (AIR-ANT5135SDW-R)

Cisco Intrusion Detection and Prevention Signatures

7825-I4, 7828-I4 Hard Disk Firmware Update

Release Notes for Cisco ONS SDH Release 9.01

Cisco Software Licensing Information for Cisco Unified Communications 500 Series for Small Business

Using Microsoft Outlook to Schedule and Join Cisco Unified MeetingPlace Express Meetings

Release Notes for Cisco Small Business Pro ESW 500 Series Switches

Configuring an Intermediate IP Multicast Helper Between Broadcast-Only Networks

Cisco Virtual Office End User Instructions for Cisco 1811 Router Set Up at Home or Small Office

Exclusive Configuration Change Access and Access Session Locking

Release Notes for Catalyst 6500 Series and Cisco 7600 Series Internet Router CEF720 Module ROMMON Software

Cisco Service Control Service Security: Outgoing Spam Mitigation

Cisco Unified Web and Interaction Manager Browser Settings Guide

Contextual Configuration Diff Utility

Online Bank Secures Future Leadership

CCNP Security FIREWALL Quick Reference

Modified LNS Dead-Cache Handling

Cisco Unified Web and Interaction Manager Browser Settings Guide

Configuring the WIP310 Wireless-G IP Phone with the SPA9000 Voice System

Cisco BTS Softswitch Turkish ISUP Feature Module

Protected URL Database

Release Notes for SPA942 and SPA962 IP Phones Firmware Version 6.1.3

Behavioral Change for Buffer Recarving

RAID Controller Firmware Upgrade Instructions for the Cisco WAE-7341, 7371, and 674

Connecting Cisco WLAN Controller Enhanced Network Modules to the Network

Cisco Unified Attendant Console Backup and Restore Guide

RAID Battery Backup Unit Replacement and RAID Firmware Upgrade for Cisco Security MARS

Wireless-G IP Phone QUICK INSTALLATION GUIDE. Package Contents

Cisco Unified MeetingPlace for Microsoft Office Communicator

Release Notes for SPA9000 Voice System

Cisco BTS Softswitch Site Preparation and Network Communications Requirements, Release 6.0. Safety and Compliance

Release Notes for Cisco Video Surveillance Manager 4.1/6.1

Installing IEC Rack Mounting Brackets on the ONS SDH Shelf Assembly

Cisco PGW 2200 Softswitch Generic Call Tagging Feature Module

Cisco Data Center Business Continuity Planning Service

Cisco Payment Card Industry Compliance Services

VPDN LNS Address Checking

IP SLAs Proactive Threshold Monitoring

Installing the RJ-45 Bracket and Cable on the Cisco ONS Rack

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

Cisco Registered Envelope Recipient Guide

User Guide for Microsoft Outlook Plug-in for Cisco Unified Videoconferencing Manager Release 7.1

Cisco Smart Business Communications System Teleworker Set Up

Cisco Unity Express Voic System User s Guide

LAN Emulation Overview

Release Notes for Cisco Unified Attendant Console Standard Release

Cisco Unified Web and Interaction Manager Supervision Console User s Guide

Cisco Unified Mobile Communicator 3.0 User Portal Guide

Configuration Replace and Configuration Rollback

Release Notes for Click to Call Release 7.x

ATM VP Average Traffic Rate

Improving Government Certification Testing

Cisco SAN Health Check Service

BGP Enforce the First Autonomous System Path

Generic Routing Encapsulation Tunnel IP Source and Destination VRF Membership

QUICK START Remote Control Quick Start Guide for Cisco Digital Media Players

Release Notes for Cisco Service Control Management Suite Collection Manager (SCMS CM) 3.1.6

Cisco Aironet Directional Antenna (AIR-ANT-SE-WiFi-D)

Release Notes for Cisco Unified Attendant Console Compact Edition Version

IS-IS Incremental SPF

Suppress BGP Advertisement for Inactive Routes

Cisco Redundant Power System 2300 Compatibility Matrix

Configuring ISG VRF Transfer (Cisco IOS Release 12.2(28)SB)

Release Notes for Cisco Broadband Access Center 3.5

1 Obtaining Cisco ANA NSA 1.0 Patch 1

DHCP Lease Limit per ATM/RBE Unnumbered Interface

Wireless LAN Error Messages

ADMINISTRATION GUIDE Cisco Small Business

Logging to Local Nonvolatile Storage (ATA Disk)

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

Installing and Configuring the Microsoft Outlook Client Plug-in for Cisco Unified Videoconferencing Manager Release 7.1

Cisco Report Server Readme

Cisco 806, Cisco 820 Series, Cisco 830 Series, SOHO 70 Series and SOHO 90 Series Routers ROM Monitor Download Procedures

OSPF Incremental SPF

Installing the Cisco ONS Deep Door Kit

Configuring Multiple Basic Service Set Identifiers and Microsoft WPS IE SSIDL

Release Notes for Cisco Aironet a/b/g Client Adapters (CB21AG and PI21AG) for Windows Vista 1.0

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, and AP1522 Wireless LAN Access Points

Cisco Open Platform for Safety and Security: Incident Collaboration Architecture Building Block

PPPoE Session Recovery After Reload

Per IP Subscriber DHCP Triggered RADIUS Accounting

Adding a Cisco Small Business 300 Series Switch to SBCS 2.0

Building Croatia s Information Society

Wireless LAN Overview

Connecting Cisco Digital Modem Network Modules to the Network

DHCP Relay MPLS VPN Support

VPDN Group Session Limiting

Release Notes for Cisco MDS 9000 Family Fabric Manager Release 4.1(3b)

Cisco Aironet 1500 Series Access Point Large Pole Mounting Kit Instructions

Using TAPS with +E.164 Directory Numbers

Transcription:

Table of Contents...3 CCNP Security Secure 642-637 Quick Reference Andrew Mason Chapter 2 Network Address Translation... 15 Chapter 3 Cisco IOS Firewall... 27 Chapter 4 Cisco IOS IPS... 48 Chapter 5 Secure Connectivity with Cisco VPNs... 63 Chapter 6 Cisco Network Foundation Protection...117 ciscopress.com

[ 3 ] A lot of attention is paid to securing the higher layers of the OSI reference model with network-level devices such as firewalls, intrusion protection systems (IPS), and applications such as antivirus and host-based intrusion protection (HIPS). Layer 2 attacks occur, as you would expect, at Layer 2 of the OSI model. We know that switching operates at Layer 2; therefore, most of these attacks need to be mitigated in the switches you deploy in your network. Layer 2 attacks are often overlooked when designing a network security solution; it is quite normal to find Layer 2 networks with no protection whatsoever. The availability of dedicated Layer 2 attack tools makes it necessary to defend against possible attack by implementing the features that Cisco offers within IOS Software. One of the best tools used for testing Layer 2 security is Yersinia that is freely available from http://www.yersinia.net/ and is part of the BackTrack 4 security distribution. Types of Layer 2 Attacks This section covers several types of Layer 2 attacks. This section also explains how to mitigate these attacks by implementing the correct control in Cisco IOS. Following are the main types of Layer 2 attacks: CAM overflow VLAN hopping MAC spoofing Private VLAN attacks DHCP attacks

[ 4 ] CAM Overflow Switches operate by building a reference table of MAC addresses and corresponding switch ports. Based on the destination MAC address, the switch knows which port to forward the frames to. This table is called the context-addressable memory (CAM) table. The switch can hold only a specific number of MAC addresses in this table, depending on the resources available to the switch. A CAM overflow attack occurs when an attacker connects to a single or multiple switch ports and then runs a tool that mimics the existence of thousands of random MAC addresses on those switch ports. The switch enters these into the CAM table, and eventually the CAM table fills to capacity. When a switch is in this state, no more new MAC addresses can be learned; therefore, the switch starts to flood any traffic from new hosts out of all ports on the switch. A CAM overflow attack turns a switch into a hub, which enables the attacker to eavesdrop on a conversation and perform manin-the-middle attacks. Note Dsniff can be downloaded from the authors website at http://monkey. org/~dugsong/dsniff/. A common tool that performs CAM overflows is macof and is part of the Dsniff set of tools. This tool generates hundreds of thousands of random MAC addresses and floods these out onto the network. This is a useful tool for testing to see if your switch infrastructure is susceptible to CAM overflow attacks. Cisco implemented a technology into IOS called Port Security that mitigates the risk of a Layer 2 CAM overflow attack. Port Security Port Security on a Cisco switch enables you to control how the switch port handles the learning and storing of MAC addresses on a per-interface basis. The main use of this command is to set a limit to the maximum number of concurrent MAC addresses that can be learned and allocated to the individual switch port. If a machine starts broadcasting multiple MAC addresses in what appears to be a CAM overflow attack, the default action of Port Security is to shut down the switch interface; although, you can configure the switch just to discard any future Layer 2 frames received from the bogus MAC addresses.

[ 5 ] Note Using a setting of 1 for the maximum allowed MAC addresses sounds good from a security point of view but might produce unwanted support overhead in all but the most locked-down environments. Configuring Port Security You must configure Port Security at the interface configuration level on a Cisco IOS switch. You need to allow Port Security on static access ports rather than dynamic access or trunk ports. For illustrative purposes, this section shows a common Port Security configuration. You can configure Port Security to dynamically enable three MAC addresses on the configured port and make these connections sticky. Start by ensuring that the switch port is a static access port: Switch(config-if)# switchport mode access The next step is to allow Port Security on the switch interface and to configure a maximum of three MAC addresses for the interface: Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 3 The switch learns the MAC addresses connected on the switch port and enables the first three it finds. In most cases, it is only a single end-user workstation connected to the switch and should see only a single MAC address. The switch needs to go through this process whenever you reboot the switch. You can allow the sticky mode for Port Security so that the MAC addresses that the switch learns about are stored when the configuration is saved so that they do not need to be relearned when the switch reboots. To allow sticky learning, enter the following command: Switch(config-if)# switchport port-security mac-address sticky You just reviewed a common configuration scenario in which the switch dynamically learns and remembers the MAC address of the devices connected to it. The other, and more secure, mechanism is to configure static Port Security by manually specifying the MAC address of the host connected to it. If you have a switch port with the host MAC address 00:16:cb:96:95:94 connected to it, you can enter the following command to ensure that only this host can connect to the switch port:

[ 6 ] Switch(config-if)# switchport port-security mac-address 0016.cb96.9594 The default mode of port-security operation is to shutdown the port. There are three configurable modes of operation for port security - Shutdown, Restrict and Protect. In the event that the switch port receives more MAC addresses than the configured maximum the port-security mode of operation dictates the action taken by the switch. Shutdown. In the event that the switch port receives more MAC addresses than the configured maximum, the switch will shutdown the switch port. This is the default action mode. Restrict. Restrict drops packets from unknown source MAC addresses received on the switch port and sends an SNMP Trap or a Syslog message to an administrator. The violation counter is also incremented. Protect. Protect drops packets from unknown source MAC addresses. No SNMP Trap or Syslog message is generated and the violation counter is not incremented. The following command is used to change the port-security mode of operation: switchport port-security violation {shutdown restrict protect} Note When statically assigning MAC addresses, be careful of the possible support overhead that will be required for any moves or changes to the end-user infrastructure. VLAN Hopping Switches implement virtual LANs (VLAN). Users connect to access ports that are members of a VLAN as specified in the switch configuration. VLAN hopping is where a user can gain access to a VLAN not assigned to the switch port to which the user connects. A user can achieve this in two ways against the default configuration of a Cisco switch port. The first and most commonly used VLAN hopping method is where the attacker makes his workstation act as a trunk port. Most switches, in the default

[ 7 ] configuration, need only one side of a connection to announce themselves as a trunk; then the switch automatically trunks all available VLANs over the switch port. This results in the attacker seeing all traffic across all VLANs. The second way an attacker can hop VLANs is by using double tagging. With double tagging, the attacker inserts a second 802.1q tag in front of the existing 802.1q tag. This relies on the switch stripping off only the first 802.1q tag and leaving itself vulnerable to the second tag. This is not as common a method of VLAN hopping as using trunking. To ensure you do not fall foul of a VLAN hopping attack, you must ensure that all your user ports are assigned as access mode ports. Any unused ports should be disabled and set as access mode ports by default. To set a switch port to access mode, use the following configuration command from interface configuration mode: Switch(config-if)# switchport mode access By entering this command at the interface level, you switch the port into access mode; this port can never become a trunk port. It is a good practice to get into to ensure that all ports are configured in the correct mode. This should form part of your deployment strategy for all access layer switches in use within your organization. When configuring a trunk port, the native VLAN need to be set to a unique VLAN, which is not routable or used elsewhere. To set a native VLAN on a trunk port, use the following configuration command from interface configuration mode: Switch(config-if)# switchport trunk native vlan {number} MAC Spoofing MAC spoofing attacks are attacks launched by clients on a Layer 2 network. Attackers spoof their MAC address to perform a man-in-the-middle (MiTM) attack. In one common attack, the attacker pretends to be the default gateway and sends out a gratuitous Address Resolution Protocol (ARP) to the network so that users send their traffic through the attacker rather than the default gateway. The attacker then forwards user traffic to the real default gateway. An attacker on a fast enough host can capture and forward packets so that victims do not notice any change in their network access. Many tools available for download from the Internet, such as Ettercap, can accomplish such a task, and preventing such attacks is quite problematic.

[ 128 ] CCNP Security Secure 642-637 Quick Reference CCNP Security Secure 642-637 Quick Reference Andrew Mason Technical Editor: Max Leitch Copyright 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. First Printing December 2011 ISBN-10: 0-13-256645-1 ISBN-13: 978-0-13-256645-2 Warning and Disclaimer This book is designed to provide information about the CCNP Security Secure exam. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an as is basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc Trademark Acknowledgments All terms mentioned in this ebook that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of this information. Use of a term in this ebook should not be regarded as affecting the validity of any trademark or service mark. Feedback Information At Cisco Press, our goal is to create in-depth technical ebooks of the highest quality and value. Each ebook is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members of the professional technical community. Reader feedback is a natural continuation of this process. If you have any comments on how we could improve the quality of this ebook, or otherwise alter it to better suit your needs, you can contact us through email at feedback@ciscopress.com. Please be sure to include the ebook title and ISBN in your message. We greatly appreciate your assistance. Corporate and Government Sales The publisher offers excellent discounts on this ebook when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales 1-800-382-3419 corpsales@pearsontechgroup.com. For sales outside the United States please contact: International Sales international@pearsoned.com Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iphone, iquick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R) 2011 Cisco Systems Inc. All rights reserved. This publication is protected by copyright.