CCNP Switch Questions/Answers Securing Campus Infrastructure

Similar documents
Cisco Networking Academy CCNP

Internetwork Expert s CCNA Security Bootcamp. Mitigating Layer 2 Attacks. Layer 2 Mitigation Overview

Understanding Switch Security

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection

Configuring 802.1X Port-Based Authentication

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018

Configuring SPAN and RSPAN

Configuring Private VLANs

Configuring SPAN and RSPAN

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

Configuring Web-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication

Configuring SPAN and RSPAN

Configuring DHCP Features and IP Source Guard

Understanding and Configuring Dynamic ARP Inspection

ActualTest v by-VA

Configuring DHCP Features and IP Source Guard

Configuring IEEE 802.1x Port-Based Authentication

Configuring SPAN and RSPAN

Port ACLs (PACLs) Prerequisites for PACls CHAPTER

Configuring Web-Based Authentication

Configuring Private VLANs

Configuring Private VLANs

Configuring Private VLANs

Configuring SPAN. Understanding SPAN CHAPTER. This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch.

Configuring SPAN and RSPAN

Understanding and Configuring Private VLANs

Q&As Implementing Cisco IP Switched Networks (SWITCH v2.0)

CCNA Security 1.0 Student Packet Tracer Manual

Configuring Network Admission Control

Cisco Exam Bundle

Configuring DHCP Features and IP Source Guard

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

Configuring Web-Based Authentication

: Building Cisco Multilayer Switched Networks

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x

Configuring Web-Based Authentication

actualtests.cisco.ccnp switch by.passforu

Cisco Nexus 3000 Series NX-OS Security Configuration Guide, Release 6.x

Configuring Access and Trunk Interfaces

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring IEEE 802.1X Port-Based Authentication

Catalyst Switches for Microsoft Network Load Balancing Configuration Example

FiberstoreOS. Security Configuration Guide

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

Configuring Network Admission Control

Configuring Web-Based Authentication

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

Question No: 1 What is the maximum number of switches that can be stacked using Cisco StackWise?

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Cisco Exam Bundle

Configuring IEEE 802.1x Port-Based Authentication

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Switched Networks. Version: Demo

Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch

Introduction to Switched Networks Routing And Switching

FSOS Security Configuration Guide

CIT 380: Securing Computer Systems. Network Security Concepts

Configuring ARP attack protection 1

Configuring ARP attack protection 1

Configuring DHCP Features

Configuring Voice VLAN

Configuring Port-Based and Client-Based Access Control (802.1X)

Chapter 2. Switch Concepts and Configuration. Part II

Number: Passing Score: 800 Time Limit: 120 min File Version: 9.0. Cisco Questions & Answers

Configuring SPAN and RSPAN

Authorized CCNP. Student. LabManual SWITCH.

Security Commands. Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3850 Switches) OL

Configuring DHCP Features

Configuring Private Hosts

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Configuring Switch-Based Authentication

1. Which two statements are true about VLAN implementation? (Choose two.)

Catalyst 4500 Series IOS Commands

Cisco IOS Commands for the Catalyst 4500 Series Switches

Chapter 3: VLANs. Routing & Switching

Selected Network Security Technologies

Lab 3.3 Configuring Wireshark and SPAN

With 802.1X port-based authentication, the devices in the network have specific roles.

Configuring DHCP. About DHCP Snooping, page 2 About the DHCPv6 Relay Agent, page 8

Configuring IPv6 First-Hop Security

ARP Inspection and the MAC Address Table

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Cisco CCNP Exam

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

Configuring DHCP Snooping

Cisco IOS Commands for the Catalyst 4500 Series Switches

2. What is a characteristic of a contention-based access method?

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

Catalyst 4500 Series IOS Commands

Configuring DHCP. Finding Feature Information. Information About DHCP. DHCP Server. DHCP Relay Agent

Building Cisco Multilayer Switched Networks (BCMSN)

Finding Feature Information, page 2 Information About DHCP Snooping, page 2 Information About the DHCPv6 Relay Agent, page 8

Sections Describing Standard Software Features

With 802.1X port-based authentication, the devices in the network have specific roles.

PT Activity: Configure AAA Authentication on Cisco Routers

Transcription:

What statement is true about a local SPAN configuration? A. A port can act as the destination port for all SPAN sessions configured on the switch. B. A port can be configured to act as a source and destination port for a single SPAN session. C. Both Layer 2 and Layer 3 switched ports can be configured as source or destination ports for a single SPAN session. D. Port channel interfaces (EtherChannel) can be configured as source and destination ports for a single SPAN session. Answer: C The following additional guidelines or restrictions apply to local SPAN: - Both Layer 2 switched ports (LAN ports configured with the switchport command) and Layer 3 ports (LAN ports configured with the no switchport command) can be configured as source or destination ports in Cisco IOS based switches. - A port can act as the destination port for only one SPAN session. - A port cannot be configured as a destination port if it is a source port of a span session. - Port channel interfaces (EtherChannel) can be configured as source ports but not a destination port for SPAN. - SPAN supports configuration of source ports belonging to different VLANs. - Traffic direction is both by default for SPAN sources. - Destination ports never participate in a spanning-tree instance. Local SPAN includes BPDUs in the monitored traffic, so any BPDUs seen on the destination port are from the source port. As a result, SPAN destination ports should not be connected to another switch because this might cause a network loop. - Destination ports get a copy of all packets switched through the switch regardless of whether the packets actually leave the switch due to STP blocking state on an egress port. 2013 1

Refer to the exhibit. Which statement is true about the local SPAN configuration on switch SW1? A. The SPAN session transmits to a device on port fa3/21 a copy of all traffic that is monitored on port fa3/1. B. The SPAN session transmits to a device on port fa3/21 a copy of all traffic that is monitored on port fa3/1, but configured in VLAN 10. C. The SPAN session transmits to a device on port fa3/21 a copy of all traffic that is monitored on port fa3/1, but configured as trunk. D. The SPAN session transmits to a device on port fa3/21 only a copy of unicast traffic that is monitored on port fa3/1 and BPDU frames will be excluded from the monitoring process. Answer: A Above is displayed configuration example for Local SPAN. Local SPAN copies traffic from one or more source ports in any VLAN or from one or more VLANs to a destination port for analysis. 2013 2

Refer to the exhibit. Which statement is true about the VSPAN configuration on switch SW1? A. The VSPAN session that is configured on port fa3/4 can monitor only the ingress traffic for any of the VLANs. B. The VSPAN session that is configured on port fa3/4 can monitor only the egress traffic for any of the VLANs. C. Port fa3/4 must be associated with VLAN 10 or VLAN 20 in order to monitor the traffic for any of the VLANs. D. The VSPAN session transmits a copy of the ingress traffic for VLAN 10 and the egress traffic for VLAN 20 out interface fa3/4. Answer: D The following additional guidelines or restrictions apply to VSPAN: - VSPAN sessions, with both ingress and egress options configured, forward duplicate packets from the source port only if the packets get switched in the same VLAN. One copy of the packet is from the ingress traffic on the ingress port, and the other copy of the packet is from the egress traffic on the egress port. VSPAN monitors only traffic that leaves or enters Layer 2 ports in the VLAN: Routed traffic that enters a monitored VLAN is not captured if the SPAN session is configured with that VLAN as an ingress source because traffic never appears as ingress traffic entering a Layer 2 port in the VLAN. Traffic that is routed out of a monitored VLAN, which is configured as an egress source in a SPAN session, is not captured because the traffic never appears as egress traffic leaving a Layer 2 port in that VLAN. 2013 3

Which configuration guideline applies to using the capture option in VACL? A. Capture ports transmit traffic that belongs to all VLANs. B. The capture port captures all packets that are received on the port. C. The switch has a restriction on the number of captured ports. D. The capture port needs to be in the spanning-tree forwarding state for the VLAN. Answer: D The Catalyst 6500 family of switches offers an additional feature to monitor traffic flows through the switch. SPAN, VSPAN, and RSPAN configuration applies to all traffic on the source port or source VLAN in one or both directions. Using VACLs with the capture option, the network analyzer receives only a copy of traffic matching the configured ACL. Because the ACL might match Layers 2, 3, or 4 information, the VACL with the capture option offers a useful and powerful complementary value to the SPAN and RSPAN features. The following configuration guidelines apply to using the capture option in VACL: - The capture port needs to be in the spanning-tree forwarding state for the VLAN. - The switch has no restriction on the number of capture ports. - The capture port captures only packets permitted by the configured ACL. - Capture ports transmit only traffic belonging to the capture port VLAN. To capture traffic going to many VLANs, configure the capture port as a trunk carrying the required VLANs. 2013 4

All access ports on a switch are configured with the administrative mode of dynamic auto. An attacker, connected to one of these ports, sends a malicious DTP frame. What is the intent of the attacker? A. VLAN hopping B. DHCP spoofing attack C. MAC flooding attack D. ARP poisoning attack Answer: A VLAN hopping is attack where attacker device sends or collects packets from VLAN that shouldn t be accessible to that attacker device. VLAN hopping can be done by switch spoofing or double tagging. First form of attack is when by default Cisco switch ports are set in auto mode. If interface receive DTP frame, then link becomes trunk. So attacker can access VLANs in these cases: - Attacker sends DTP frame, attacker port became trunk port and attacker can attack any VLAN on the trunk. - In switch spoofing attack, attacker configures system to act (spoof) as a switch. Then authorized switch sends DTP frames and configure trunk. So attacker got access to VLANs. 2013 5

Refer to the exhibit. A network engineer is securing a network against DHCP spoofing attacks. On all switches, the engineer applied the ip dhcp snooping command and enabled DHCP snooping on all VLANs with the ip dhcp snooping vlan command. What additional step should be taken to configure the security required on the network? A. Issue the ip dhcp snooping trust command on all uplink interfaces on SW1, SW2 and SW3. B. Issue the ip dhcp snooping trust command on all interfaces on SW2 and SW3. C. Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2 and SW3. D. Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2 and SW3 except interface fa0/1 on SW1. Answer: A DHCP Snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted. Trusted ports can source all DHCP messages, whereas untrusted ports can source requests only. If a rogue device on an untrusted port attempts to send a DHCP response packet into the network, the port is shut down. Switch end-user ports are configured as untrusted ports and ports that connect to other device are configured as trusted. DHCP Snooping can be applied on VLAN on switch. In our example end-user ports on SW2 and SW3 should be untrusted. Fa0/1, fa0/2 and fa0/3 ports on SW1 should be trusted. Port of SW2 that is connected to fa0/2 of SW1 should be trusted port. Port of SW3 that is connected to fa0/3 of SW1 should be trusted port. 2013 6

Which countermeasures can be implemented to determine the validity of an ARP packet, based on the valid MAC-address-to-IP address bindings stored in a DHCP snooping database? A. DHCP spoofing B. Dynamic ARP inspection C. CAM table inspection D. MAC snooping Answer: B In a normal ARP operation, a host sends a broadcast to determine the MAC address of a host with a particular IP address. The device at that IP address replies with its MAC address. The originating host caches the ARP response, using it to populate the destination Layer 2 header of packets sent to that IP address. By spoofing an ARP reply from a legitimate device with a gratuitous ARP, an attacking device appears to be the destination host sought by the senders. The ARP reply from the attacker causes the sender to store the MAC address of the attacking system in its ARP cache. All packets destined for those IP addresses are forwarded through the attacker system. ARP does not have any authentication. It is quite simple for a malicious user to spoof addresses by using tools such as ettercap, dsniff, and arpspoof to poison the ARP tables of other hosts on the same VLAN. In a typical attack, a malicious user can send unsolicited ARP replies (gratuitous ARP packets) to other hosts on the subnet with the attacker s MAC address and the default gateway s IP address. Frames intended for default gateways sent from hosts with poisoned ARP tables are sent to the hacker s machine (enabling the packets to be sniffed) or an unreachable host as a DoS attack. ARP poisoning leads to various man-in-themiddle attacks, posing a security threat in the network. Dynamic ARP inspection helps prevent the man-in-the-middle attacks by not relaying invalid or gratuitous ARP replies out to other ports in the same VLAN. Dynamic ARP inspection intercepts all ARP requests and all replies on the untrusted ports. Each intercepted packet is verified for valid IP-to-MAC bindings that are gathered via DHCP snooping. Denied ARP packets are either dropped or logged by the switch for auditing, so ARP poisoning attacks are stopped. Incoming ARP packets on the trusted ports are not inspected. Dynamic ARP inspection also can rate-limit ARP requests from client ports to minimize port scanning mechanisms. 2013 7

How should unused ports on a switch be configured in order to prevent VLAN hopping attacks? A. Configure them with the UDLD feature. B. Configure then with the PAgP protocol. C. Configure them as trunk ports for the native VLAN 1. D. Configure them as access ports and associate them with an unused VLAN. Answer: D Best practice to prevent VLAN hopping attacks are: - Configure all unused ports as access ports, so that trunking can t be done trough these ports. - Place all unused ports in shutdown states and associate them with VLAN that carries just unused ports. On this VLAN it is not permitted to be user data traffic. - When you set trunk link, native VLAN must be different from all other user data VLANs. - Trunking is set to on or nonegotiate (not negotiated). - Native VLAN is not carried on the trunk. 2013 8

Refer to the exhibit. Network policy dictates that security functions should be administered using AAA. Which configuration would create a default login authentication list that uses RADIUS as the first authentication method, the enable password as the second method and the local database as the final method? A. SW1(config)#aaa new-model; SW1(config)#radius-server host 10.10.10.12 key secret; SW1(config)#aaa authentication default group-radius local B. SW1(config)#aaa new-model; SW1(config)#radius-server host 10.10.10.12 key secret; SW1(config)#aaa authentication default group-radius enable local C. SW1(config)#aaa new-model; SW1(config)#radius-server host 10.10.10.12 key secret; SW1(config)#aaa authentication login default group radius enable local D. SW1(config)#aaa new-model; SW1(config)#radius-server host 10.10.10.12 key secret; SW1(config)#aaa authentication login default group radius enable local none Answer: C 2013 9

AAA is architectural framework for configuring three independent security functions in a consistent manner. AAA provides a modular way of performing the following services: - Authentication provides the method of identifying users, including login and password dialog, challenge and response, messaging support and depending on the security protocol you select, encryption. Authentication is the way a user is identified prior to being allowed access to the network and network services. You configure AAA authentication by defining a named list of authentication methods and then applying that list to various interfaces. The method list defines the types of authentication to be performed and the sequence in which they will be performed; it must be applied to a specific interface before any of the defined authentication methods will be performed. The only exception is the default method list (which is named default). The default method list is automatically applied to all interfaces if no other method list is defined. A defined method list overrides the default method list. All authentication methods, except for local, line passwords and enable authentication must be defined through AAA. R1(config)#aaa new-model R1(config)#aaa authentication login {default list-name}method1[method2 ] R1(config)#line[aux console tty vty]line-number[ending-line-number] R1(config-line)#login authentication [default list-name] R1(config-if)#aaa authentication ppp[default list-name]method1[method2 ] R1(config)#interface interface-type interface-number R1(config-if)#ppp authentication {protocol1[protocol2 ]}[if-needed][default list-name] 2013 10

- Authorization provides the method for remote access control, including one-time authorization or authorization for each service, per-user account list and profile, user group support and support of IP, IPX, ARA and Telnet. AAA authorization works by assembling a set of attributes that describe what the user is authorized to perform. These attributes are compared to the information contained in a database for a given user and the result is returned to AAA to determine the user s actual capabilities and restrictions. The database can be located locally on the access server or router or it can be hosted remotely on a RADIUS or TACACS+ security server. Remote security servers, such as RADIUS and TACACS+, authorize users for specific rights by associating attribute-value (AV) pairs, which define those rights with the appropriate user. All authorization must be defined through AAA. As with authentication, you configure AAA authorization by defining a named list of authorization methods and then applying that list to various interfaces. - Accounting provides the method for collecting and sending security server information used for billing, auditing and reporting, such as user identities, start and stop times, executed commands (such as PPP), number of packets and number of bytes. Accounting enables you to track the services users are accessing as well as the amount of network resources they are consuming. When AAA accounting is activated, the network access server reports user activity to the RASIUS or TACACS+ security server (depending on which security method you have implemented) in the form of accounting records. Each accounting record is comprised of accounting AV pairs and is stored on the access control server. This data can then be analyzed for network management, client billing, and/or auditing. All accounting methods must be defined through AAA. As with authentication and authorization, you configure AAA accounting by defining a named list of accounting methods and then applying that list to various interfaces. 2013 11

You control the port authorization state by using the dot1x port-control interface configuration command and these keywords: force-authorized disables 802.1x authentication and cause the port to transition to the authorized state without any authentication exchange required. The port sends and receives normal traffic without 802.1x based authentication of the client. This is the default setting. force-unauthorized causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface. auto enables 802.1x authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port transitions from down to up or when an EAPOL-start frame is received. The switch requests the identity of the client and begins relying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the switch by using the client s MAC address. 2013 12

Refer to the exhibit. A switch is being configured to support AAA authentication on the console connection. Given the information in the exhibit, which three statements are correct? (Choose three) A. The authentication login admin line console command is required. B. The login authentication admin line console command is required. C. The configuration creates authentication list that uses a named access list called group as the first authentication method, a TACACS+ server as the second method, the local username database as the third method, the enable password as the fourth method and none as the last method. D. The configuration creates an authentication list that uses a TACACS+ server as the first authentication method, the local username database as the second method, the enable password as the third method and none as the last method. E. The none keyword enables any user logging in to successfully authenticate if all other methods return an error. F. The none keyword specifies that a user cannot log in if all other methods have failed. Answer: B, D, E Switch(config)#aaa new-model /enables AAA globally on the switch Switch(config)#aaa authentication login admin group tacacs+ local enable none / These are lists of authentication methods. "admin" is name of the list, and the / methods listed on the same lines are the methods in the order to be tried. In the table are shown AAA authentication login methods. 2013 13

We can apply admin group on console (in our example, or can be Telnet) Switch(config)#line con 0 Switch(config-line)#password whatever Switch(config-line)#exec-timeout 0 0 Switch(config-line)#login authentication admin More on: Link1 2013 14