SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 5: Network Security
and Monitoring
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 - Sections & Objectives
 5.1 LAN Security
• Explain how to mitigate common LAN security.
 5.2 SNMP
• Configure SNMP to monitor network operations in a small to medium-
sized business network.
 5.3 Cisco Switch Port Analyzer (SPAN)
• Troubleshoot a network problem using SPAN.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3
5.1 LAN Security
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Security
LAN Security Attacks
 Common attacks against the Layer 2 LAN infrastructure
include:
• CDP Reconnaissance Attacks
• Telnet Attacks
• MAC Address Table Flooding Attacks
• VLAN Attacks
• DHCP Attacks
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 This topic covers several Layer 2 security solutions:
• Mitigating MAC address table flooding attacks using port security
• Mitigating VLAN attacks
• Mitigating DHCP attacks using DHCP snooping
• Securing administrative access using AAA
• Securing device access using 802.1X port authentication
LAN Security
LAN Security Best Practices
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 There are several strategies to help secure Layer 2 of a
network:
• Always use secure variants of these protocols such as SSH, SCP, SSL,
SNMPv3, and SFTP.
• Always use strong passwords and change them often.
• Enable CDP on select ports only.
• Secure Telnet access.
• Use a dedicated management VLAN where nothing but management
traffic resides.
• Use ACLs to filter unwanted access.
LAN Security
LAN Security Best Practices
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7
5.2 SNMP
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
SNMP Operation
 SNMP allows administrators
to manage and monitor
devices on an IP network.
 SNMP Elements
• SNMP Manager
• SNMP Agent
• MIB
 SNMP Operation
• Trap
• Get
• Set
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
SNMP Operation
 SNMP Security Model and Levels
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
Configuring SNMP
 Configuration steps
• Configure community string
• Document location of device
• Document system contact
• Restrict SNMP Access
• Specify recipient of SNMP
Traps
• Enable traps on SNMP agent
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
Configuring SNMP
 Securing SNMPv3
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
5.3 Cisco Switch Port Analyzer
(SPAN)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Overview
 Port mirroring
• The port mirroring feature allows a switch to copy and send Ethernet
frames from specific ports to the destination port connected to a
packet analyzer. The original frame is still forwarded in the usual
manner.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Overview
 SPAN terminology
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Overview
 RSPAN terminology
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Configuration
 Use monitor session global configuration command
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN as a Troubleshooting Tool
 SPAN allows administrators to
troubleshoot network issues
 Administrator can use SPAN to
duplicate and redirect traffic to a
packet analyzer
 Administrator can analyze traffic
from all devices to troubleshoot
sub-optimal operation of
network applications
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18
5.4 Chapter Summary
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter Summary
Summary
 At Layer 2, a number of vulnerabilities exist that require
specialized mitigation techniques:
• MAC address table flooding attacks are addressed with port security.
• VLAN attacks are controlled by disabling DTP and following basic
guidelines for configuring trunk ports.
• DHCP attacks are addressed with DHCP snooping.
 The SNMP protocol has three elements: the Manager, the
Agent, and the MIB. The SNMP manager resides on the
NMS, while the Agent and the MIB are on the client devices.
• The SNMP Manager can poll the client devices for information, or it can
use a TRAP message that tells a client to report immediately if the client
reaches a particular threshold. SNMP can also be used to change the
configuration of a device.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Summary Continued
 SNMPv3 is the recommended version because it provides security.
 SNMP is a comprehensive and powerful remote management tool. Nearly every
item available in a show command is available through SNMP.
 Switched Port Analyzer (SPAN) is used to mirror the traffic going to and/or
coming from the host. It is commonly implemented to support traffic analyzers or
IPS devices.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PPTX
CCNA Course Training Presentation
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 4
PPTX
WPA-3: SEA and Dragonfly
PPT
Spanning Tree Protocol
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
PPTX
Subnetting
PPTX
CCNA v6.0 ITN - Chapter 08
PPT
IP Addressing
CCNA Course Training Presentation
CCNA 1 Routing and Switching v5.0 Chapter 4
WPA-3: SEA and Dragonfly
Spanning Tree Protocol
CCNA 2 Routing and Switching v5.0 Chapter 4
Subnetting
CCNA v6.0 ITN - Chapter 08
IP Addressing

What's hot (20)

PPTX
Network Devices
PPT
Cisco Packet Tracer Overview
PPTX
Ip addressing
PPTX
Wired equivalent privacy (wep)
PPTX
Network protocol
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 9
PPTX
Wifi Security
PPTX
Basic of IPv6
PDF
BGP on RouterOS7 - Part 2
PPSX
Subnetting
PPT
IP Addressing and subnetting
PPTX
wireless communication security PPT, presentation
PDF
Troubleshooting Firewalls (2012 San Diego)
PPTX
Basics of IP Addressing
PPT
Ip Addressing
PPTX
Tipos de socket
PPTX
Ip and icmp
PPSX
بحث علمي عن الهاكرز . Hackers
PPTX
Virtual Routing and Forwarding, (VRF-lite)
PDF
10 palo alto nat policy concepts
Network Devices
Cisco Packet Tracer Overview
Ip addressing
Wired equivalent privacy (wep)
Network protocol
CCNA 2 Routing and Switching v5.0 Chapter 9
Wifi Security
Basic of IPv6
BGP on RouterOS7 - Part 2
Subnetting
IP Addressing and subnetting
wireless communication security PPT, presentation
Troubleshooting Firewalls (2012 San Diego)
Basics of IP Addressing
Ip Addressing
Tipos de socket
Ip and icmp
بحث علمي عن الهاكرز . Hackers
Virtual Routing and Forwarding, (VRF-lite)
10 palo alto nat policy concepts
Ad

Similar to CCNA (R & S) Module 02 - Connecting Networks - Chapter 5 (20)

PPTX
CCNA4 Verson6 Chapter5
PDF
CCNAv5 - S4: Chapter8 monitoring the network
PDF
L2 Attacks.pdf
PDF
Implementing Cisco Network Security Exam (210-260)
PPT
Cisco L3 security and CCIE training .ppt
PDF
ITN6_Instructor_Materials_Chapter11.pdf
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
PDF
The Network as a Sensor, Cisco and Lancope
PPTX
Network Security v1.0 Current State of Affairs - Module 1.pptx
PPTX
Cisco Network Security Training slides.pptx
PPTX
Network Security v1.0 Network Security v
PDF
CCNP Security-Secure
PDF
CCNA4v5 Chapter 8 - Monitoring the Netwok
PPTX
Encor chapter 1_packet forwarding
PPTX
Layer Two ( 2 ) Security of Cisco switch
PPTX
Network Security.pptx
PPTX
ENCOR_Capitulo 1.pptx
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PPTX
Ccna v5-S1-Chapter 11
PPT
Cisco Security Training on ASA and FMC.ppt.ppt
CCNA4 Verson6 Chapter5
CCNAv5 - S4: Chapter8 monitoring the network
L2 Attacks.pdf
Implementing Cisco Network Security Exam (210-260)
Cisco L3 security and CCIE training .ppt
ITN6_Instructor_Materials_Chapter11.pdf
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
The Network as a Sensor, Cisco and Lancope
Network Security v1.0 Current State of Affairs - Module 1.pptx
Cisco Network Security Training slides.pptx
Network Security v1.0 Network Security v
CCNP Security-Secure
CCNA4v5 Chapter 8 - Monitoring the Netwok
Encor chapter 1_packet forwarding
Layer Two ( 2 ) Security of Cisco switch
Network Security.pptx
ENCOR_Capitulo 1.pptx
CCNA 2 Routing and Switching v5.0 Chapter 2
Ccna v5-S1-Chapter 11
Cisco Security Training on ASA and FMC.ppt.ppt
Ad

More from Waqas Ahmed Nawaz (20)

PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

CCNA (R & S) Module 02 - Connecting Networks - Chapter 5

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 5: Network Security and Monitoring Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 - Sections & Objectives  5.1 LAN Security • Explain how to mitigate common LAN security.  5.2 SNMP • Configure SNMP to monitor network operations in a small to medium- sized business network.  5.3 Cisco Switch Port Analyzer (SPAN) • Troubleshoot a network problem using SPAN.
  • 3. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3 5.1 LAN Security
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Security LAN Security Attacks  Common attacks against the Layer 2 LAN infrastructure include: • CDP Reconnaissance Attacks • Telnet Attacks • MAC Address Table Flooding Attacks • VLAN Attacks • DHCP Attacks
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  This topic covers several Layer 2 security solutions: • Mitigating MAC address table flooding attacks using port security • Mitigating VLAN attacks • Mitigating DHCP attacks using DHCP snooping • Securing administrative access using AAA • Securing device access using 802.1X port authentication LAN Security LAN Security Best Practices
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  There are several strategies to help secure Layer 2 of a network: • Always use secure variants of these protocols such as SSH, SCP, SSL, SNMPv3, and SFTP. • Always use strong passwords and change them often. • Enable CDP on select ports only. • Secure Telnet access. • Use a dedicated management VLAN where nothing but management traffic resides. • Use ACLs to filter unwanted access. LAN Security LAN Security Best Practices
  • 7. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7 5.2 SNMP
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP SNMP Operation  SNMP allows administrators to manage and monitor devices on an IP network.  SNMP Elements • SNMP Manager • SNMP Agent • MIB  SNMP Operation • Trap • Get • Set
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP SNMP Operation  SNMP Security Model and Levels
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Configuring SNMP  Configuration steps • Configure community string • Document location of device • Document system contact • Restrict SNMP Access • Specify recipient of SNMP Traps • Enable traps on SNMP agent
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Configuring SNMP  Securing SNMPv3
  • 12. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12 5.3 Cisco Switch Port Analyzer (SPAN)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview  Port mirroring • The port mirroring feature allows a switch to copy and send Ethernet frames from specific ports to the destination port connected to a packet analyzer. The original frame is still forwarded in the usual manner.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview  SPAN terminology
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview  RSPAN terminology
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Configuration  Use monitor session global configuration command
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN as a Troubleshooting Tool  SPAN allows administrators to troubleshoot network issues  Administrator can use SPAN to duplicate and redirect traffic to a packet analyzer  Administrator can analyze traffic from all devices to troubleshoot sub-optimal operation of network applications
  • 18. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18 5.4 Chapter Summary
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter Summary Summary  At Layer 2, a number of vulnerabilities exist that require specialized mitigation techniques: • MAC address table flooding attacks are addressed with port security. • VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports. • DHCP attacks are addressed with DHCP snooping.  The SNMP protocol has three elements: the Manager, the Agent, and the MIB. The SNMP manager resides on the NMS, while the Agent and the MIB are on the client devices. • The SNMP Manager can poll the client devices for information, or it can use a TRAP message that tells a client to report immediately if the client reaches a particular threshold. SNMP can also be used to change the configuration of a device.
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Summary Continued  SNMPv3 is the recommended version because it provides security.  SNMP is a comprehensive and powerful remote management tool. Nearly every item available in a show command is available through SNMP.  Switched Port Analyzer (SPAN) is used to mirror the traffic going to and/or coming from the host. It is commonly implemented to support traffic analyzers or IPS devices.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential