• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
Some best Practices in VLAN security
VLAN configuration: Consider the following recommendations when configuring switch VLANs:
— Configure ports that do not need to form a trunk to a trunk setting of “off,” as opposed to “auto.”
— Do not send user data over an IEEE 802.1Q trunk’s native VLAN.
— Use private VLANs to prevent an attacker from compromising one host
in a VLAN and then using that host as a jumping-off point to attack other hosts within the VLAN.
VLAN Hopping
A VLAN hopping attack allows traffic from one VLAN to pass into another VLAN, without
first being routed
Switch Spoofing
By default, Ethernet trunks on Cisco Catalyst switches carry traffic for all VLANs.
Therefore, if an attacker can persuade a switch to go into trunking mode, the attacker could then see traffic for all VLANs
Disabling Trunking
At the interface:

switchport mode access
Preventing the use of DTP (Dynamic Trunking Protocol)
At the interface:

switchport trunk encapsulation dot1q
switchport mode trunk
switchport nonegotiate
How to avoid Double Tagging
Create a VLAN that does not have any port and it is assigned like Native VLAN
Setting the Native VLAN
at the interface:

switchport trunk native vlan 400
Two approcaches for portecting a network from STP attacks:
Protecting with Root Guard
Protecting with BPDU Guard
Root Guard
If a port configured for Root Guard receives a superior BPDU, instead of believing the BPDU, the port goes into a root-inconsistent state. While a port is in the root-inconsistent state, no user data is sent across

at the interface:

spanning-tree guard root
BPDU Guard
It reduces the amount of time required for the port to go into forwarding state after being connected.

Because these PortFast ports are connected to end-user devices, they should never receive a BPDU. Therefore, if a port enabled for BPDU Guard receives a BPDU, the port is disabled

At the interface:

spanning-tree portfast bpduguard
Enable proteccion agains dhcp snooping
At global config:

ip dhcp snooping

At the interface:

ip dhcp snooping limit trust

Limit the dhcp messages:

ip dhcp snooping limit rate 3
Dynamic ARP Inspection
Bulid the MAC address associate with ip address obtaining from dhcp

at the interface:

ip arp inspection trust
Configuring a SPAN Port
At global config:

monitor session 1 source interface (name-interface)

monitor session 1 destination interface (name-interface)
Cisco Catalyst switches support two categories of secondary VLANs
Isolated VLANs
Community VLANs
When a switch port security violation occurs, you can configure the switch port to respond in one of three ways:
Protect
Restrict
Shutdown
Ports support one of three types of secure MAC addresses:
Static secure MAC address
Sticky secure MAC address
Dynamic secure MAC address:
Static secure MAC address
switchport port-security mac-address
Sticky secure MAC address
store MAC address-to-port
associations in their switch’s running configuration and CAM table.
Dynamic secure MAC address
dynamic secure MAC addresses are stored only in a switch’s CAM table, not in a switch’s running configuration.
Enable port security
switchport port-security
Cisco Network Admission
Control (NAC)
To ensure that every endpoint complies with network security policies before being granted access to the network,

Noncompliant is set in qurantine or given restricted access to resources