KEMBAR78
Port Security | PDF | Computer Architecture | Computer Networking
0% found this document useful (0 votes)
22 views36 pages

Port Security

Uploaded by

lynnunderwater
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views36 pages

Port Security

Uploaded by

lynnunderwater
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Port Security

TECH ACADEMY – DAY SEVEN – JOSE QUIROS


BPDU protection
SPANNING
TREE PORT
SECURITY
Loop Protection
FEATURES
Root Protection
Non-Juniper
BPDU Protection

Prevents rogue switches from


connecting to the network and causing
undesired layer 2 topology changes
and possible outages.

If a BPDU is received on a
protected interface, the
interface is disabled and
transitions to the blocking state.

Non-Juniper
Loop Protection

Provides additional protection against Layer 2 loops by


preventing non-designated ports from becoming
designated ports.

Enable loop protection on all non-designated ports.

Non-Juniper
 Enable Root Protection to avoid
unwanted STP topology changes and
root bridge placement.
 If a superior BPDU is received on a
Root Protection protected interface, the interface is
disabled and transitions to the blocking
state.

 Prevent designated ports on root bridge


from becoming root ports.

Non-Juniper
PORT SECURITY
FEATURES

Non-Juniper
Port Security features

Once a physical connection is


passed to an end-user, that
Default settings include all user can, if proactive measures
interfaces on a Juniper switch are not taken, connect a rogue
to be enabled for layer 2 switch or wireless device to
operations. the network allowing access
for unauthorized devices to
the network and its resources.

Non-Juniper
MAC Limiting

Persistent MAC learning


Juniper Port
Security DHCP Snooping
features Dynamic ARP Inspection (DAI)

IP Source Guard

Non-Juniper
Limits the number of MAC
addresses learned on a port.

Prevents MAC address spoofing by


MAC Limiting explicitly configure the allowed
MAC addresses on a port.

Monitor MAC address movement


between ports in a same VLAN.

Non-Juniper
 To achieve goals, MAC Limiting is divided in tree
possible configurations based on needs:
 MAC address limit
MAC Limiting
 Allowed MAC address
 MAC Move limit

Non-Juniper
 Combats flooding by limiting the
MAC address number of MAC address learned
through a specific port.
limit

Non-Juniper
Allowed MAC  Combats spoofing by statically binding
specific MAC addresses to a particular
addresses port.

Non-Juniper
MAC Move Limit

Use this option to


limit the number of Helps prevent MAC
times a MAC spoofing and layer
address can move 2 loops.
to new interface.

Non-Juniper
MAC Limiting actions

Non-Juniper
 Limit traffic loss for trusted hosts by retaining
Persistent MAC their MAC addresses during reboots.

learning  Protects against security attacks when used in


conjunction with MAC limiting.

Non-Juniper
Interface must be an access
port.

Persistent Persistent MAC learning does not


MAC learning work on interfaces using 802.1X
authentication.
considerations
Interface must be allowed to
learn MAC addresses.

Non-Juniper
DYNAMIC HOST
CONFIGURATION
PROTOCOL

Non-Juniper
DHCP

Non-Juniper
Allocate temporary or
DHCP permanent IP addresses to
clients.
provides two
primary Store, manage, and provide
functions: client configuration
parameters.

Non-Juniper
DHCP Client, DHCP Local Server, and
Address-Assignment Pool Interaction

Non-Juniper
DHCP Local
Server and  Client address and configuration information reside in
centralized address-assignment pools, that are managed
Address- independently from the DHCP local server

Assignment
Pools

Non-Juniper
DHCP Client

Non-Juniper
DHCP Relay

Non-Juniper
Discover
DORA
process Offer
packet
exchange Request
overview
Acknowledge

Non-Juniper
DHCPDISCOVER

Non-Juniper
DHCPOFFER

Non-Juniper
DHCPREQUEST

Non-Juniper
DHCPACK

Non-Juniper
DHCP
VULNERABILITIES

Non-Juniper
 DHCP requests are flooded throughout the network,
DHCP therefore requests can be seen by all devices on the
same broadcast domain.
Vulnerabilities  Any listening device can respond to the DHCP requests.
Attackers can start a DoS attack.

Non-Juniper
Combats DHCP vulnerabilities
by:
• Building and maintaining a database of
valid DHCP bindings.
• Inspecting DHCP packets received on
DHCP untrusted ports.
• By default access ports are untrusted
Snooping and trunk ports are trusted.

DHCP snooping includes


support for DHCP option 82.
• Used to identify the switch and port to
which the client is attached.

Non-Juniper
ARP is used to learn a device’s MAC address
on a LAN via the IP address.

Networking devices on a LAN build and


maintain an ARP table, which includes MAC-
to-IP address mapping.
ARP Review
The arp table is consulted when forwarding
packets on the LAN.

When an ARP entry for a specific MAC


address does not exist in the ARP table, a
broadcast packet is forwarded.

Non-Juniper
ARP Spoofing

 This is a main-in-the-middle
attack that impersonates the
MAC address of another network
device such as a gateway or
server.
 Traffic is diverted from the
proper destination and received
by the impersonating device.

Non-Juniper
 Prevents ARP spoofing attacks by intercepting arp
packets on untrusted ports and validating them
against the DHCP snooping database. Dynamic Arp
 Checks if the source MAC address of the ARP packet
matches a valid entry in the DHCP snooping database.
Inspection
 If no MAC-IP entry matches, packet is dropped. (DAI)
 If IP address in the packet is invalid, packet is dropped.

Non-Juniper
IP address spoofing

 Attackers can change their IP


and MAC addresses to hide their
device’s identity when launching
attacks.
 Spoofed attacks can be on the
local network or remote
networks.

Non-Juniper
IP Source Guard

 Use IP Source Guard to prevent IP spoofing attacks


 Inspects IP packets on untrusted ports and validating them against the DHCP
snooping database
 Checks if the source MAC address of the IP packet matches a valid entry in the
DHCP snooping database.
 If no valid entry exists, packet is dropped.

Non-Juniper

You might also like