Skip to main content

Network Access Layer Security


The campus access layer switching infrastructure must be resilient to attacks including direct, indirect, intentional, and unintentional types of attacks. In addition, they must offer protection to users and devices within the Layer 2 domain. The below terminology is Cisco specific, however similar features are available in products of other brands. 
The key measures for providing switching security on the access switches include the following:

Restrict broadcast domains
Spanning Tree Protocol (STP) Security
-       Rapid Per-VLAN Spanning Tree (Rapid PVST+)  (fast convergence)
-       BPDU Guard (shuts port down if a BPDU is received, prevents STP manipulation) 
-       Root Guard to protect against inadvertent loops (prevents other switches from becoming root bridge)
-       BPDU filter (stops BPDUs from being broadcast to access ports)
DHCP Protection
-       Implement DHCP snooping on access VLANs to protect against DHCP starvation and rogue DHCP server attacks
IP Spoofing Protection
-       Implement IP Source Guard on access ports to prevent IP spoofing
ARP Spoofing Protection
-       Implement dynamic ARP inspection (DAI) on access VLANs
MAC Flooding Protection
-       Enable Port Security on access ports (to limit number of MAC addresses allowed on a port)
Broadcast and Multicast Storm Protection
-       Enable storm control on access ports 
VLAN Best Common Practices
-       Restrict VLANs to a single switch (current design best practice, prevents STP issues)
-       Configure separate VLANs for voice and data
-       Configure all user-facing ports as non-trunking (DTP off)
-       Disable VLAN dynamic trunk negotiation on access ports (prevents VLAN hopping attacks)
-       Explicitly configure trunking on infrastructure ports rather than autonegotiation
-       Use VTP transparent mode
-       Disable unused ports and place in unused VLAN
-       Do not use VLAN 1 for anything
-       Configure native VLAN on trunk links to an unused VLAN (prevents VLAN hopping using double-tagged frames)


Source: Cisco SAFE Design Reference Guide

Comments

Popular posts from this blog

x.509 Certificates - Critical vs non-critical extensions

Extensions are used to associate additional information with the user or the key.  Each certificate extension has three attributes - extnID, critical, extnValue extnID - Extension ID - an OID that specifies the format and definitions of the extension critical - Critical flag - Boolean value extnValue - Extension value  Criticality flag specifies whether the information in an extension is important. If an application doesn't recognize the extension marked as critical, the certificate cannot be accepted. If an extension is not marked as critical (critical value False) it can be ignored by an application. In Windows, critical extensions are marked with a yellow exclamation mark,  View certificate extensions using OpenSSL: # openssl x509 -inform pem -in cert.pem -text -noout (output abbreviated)         X509v3 extensions:             X509v3 Key Usage: critical                 Digital Signature, Key Encipherment             X509v3 Subject Key Identifier

Count number of lines - 'findstr'

How do I count number of lines in a command output? findstr /r/n "^" | find /c ":" Above commands will display number of lines output by whatever command (well, nearly whatever) you specify in the front.  For example:  C:\>ping localhost | findstr /r/n "^" | find /c ":" FINDSTR: // ignored 12 This comes handy if you want to find out how many OUs you have in Active Directory: dsquery ou  -limit 0 | findstr /r/n "^" | find /c ":" How many user accounts there are: dsquery user -limit 0 | findstr /r/n "^" | find /c ":" Computers: dsquery computer -limit | findstr /r/n "^" | find /c ":"

Cisco ASA Certificate Revocation Checking

ASA supports status verification using CRLs and OCSP. CRL can be retrieved using HTTP, LDAP or SCEP. Revocation checking using CRL: Over HTTP: ciscoasa(config)# crypto ca trustpoint ASDM_TrustPoint2 ciscoasa(config-ca-trustpoint)# revocation-check crl ciscoasa(config-ca-crl)# protocol http By default ASA will use address listed in CDP extension of the certificate that is being validated.  To override default behaviour we need to add the following in the CRL configuration context. ciscoasa(config-ca-crl)# policy static ciscoasa(config-ca-crl)# url 1 http://cdpurl.kp.local/crl.crl Over LDAP: Certificate I'm using for this lab, doesn't have LDAP address in its CDP extension. Therefore I'm using "policy static"  to specify LDAP URL where CRL can be retrieved.  ciscoasa(config)# crypto ca trustpoint ASDM_TrustPoint2 ciscoasa(config-ca-trustpoint)# revocation-check crl ciscoasa(config-ca-trustpoint)# crl configure ciscoasa