SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Instructor Materials
Chapter 5: Network
Security and Monitoring
CCNA Routing and Switching
Connecting Networks
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Best Practices
Prior to teaching Chapter 5, the instructor should:
 Complete Chapter 5 Assessment.
 Ensure all activities are completed. This is a very important
concept and hands-on time is vital.
 Provide the students many network security and network
monitoring activities.
 Encourage students to login with their cisco.com login and
download
http://docwiki.cisco.com/wiki/Internetworking_Technology_H
andbook
• Review the Security Technologies and the Network Management
chapters.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9
Chapter 5: Network Security
and Monitoring
Connecting Networks
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 - Sections & Objectives
 5.1 LAN Security
• Explain how to mitigate common LAN security.
 5.2 SNMP
• Configure SNMP to monitor network operations in a small to medium-
sized business network.
 5.3 Cisco Switch Port Analyzer (SPAN)
• Troubleshoot a network problem using SPAN.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11
5.1 LAN Security
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Security
LAN Security Attacks
 Common attacks against the Layer 2 LAN infrastructure
include:
• CDP Reconnaissance Attacks
• Telnet Attacks
• MAC Address Table Flooding Attacks
• VLAN Attacks
• DHCP Attacks
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 This topic covers several Layer 2 security solutions:
• Mitigating MAC address table flooding attacks using port security
• Mitigating VLAN attacks
• Mitigating DHCP attacks using DHCP snooping
• Securing administrative access using AAA
• Securing device access using 802.1X port authentication
LAN Security
LAN Security Best Practices
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 There are several strategies to help secure Layer 2 of a
network:
• Always use secure variants of these protocols such as SSH, SCP, SSL,
SNMPv3, and SFTP.
• Always use strong passwords and change them often.
• Enable CDP on select ports only.
• Secure Telnet access.
• Use a dedicated management VLAN where nothing but management
traffic resides.
• Use ACLs to filter unwanted access.
LAN Security
LAN Security Best Practices
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
5.2 SNMP
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
SNMP Operation
 SNMP allows administrators
to manage and monitor
devices on an IP network.
 SNMP Elements
• SNMP Manager
• SNMP Agent
• MIB
 SNMP Operation
• Trap
• Get
• Set
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
SNMP Operation
 SNMP Security Model and Levels
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
Configuring SNMP
 Configuration steps
• Configure community string
• Document location of device
• Document system contact
• Restrict SNMP Access
• Specify recipient of SNMP
Traps
• Enable traps on SNMP agent
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP
Configuring SNMP
 Securing SNMPv3
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
5.3 Cisco Switch Port Analyzer
(SPAN)
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Overview
 Port mirroring
• The port mirroring feature allows a switch to copy and send Ethernet
frames from specific ports to the destination port connected to a
packet analyzer. The original frame is still forwarded in the usual
manner.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Overview
 SPAN terminology
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Overview
 RSPAN terminology
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN Configuration
 Use monitor session global configuration command
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Switch Port Analyzer
SPAN as a Troubleshooting Tool
 SPAN allows administrators to
troubleshoot network issues
 Administrator can use SPAN to
duplicate and redirect traffic to a
packet analyzer
 Administrator can analyze traffic
from all devices to troubleshoot
sub-optimal operation of
network applications
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26
5.4 Chapter Summary
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter Summary
Summary
 At Layer 2, a number of vulnerabilities exist that require
specialized mitigation techniques:
• MAC address table flooding attacks are addressed with port security.
• VLAN attacks are controlled by disabling DTP and following basic
guidelines for configuring trunk ports.
• DHCP attacks are addressed with DHCP snooping.
 The SNMP protocol has three elements: the Manager, the
Agent, and the MIB. The SNMP manager resides on the
NMS, while the Agent and the MIB are on the client devices.
• The SNMP Manager can poll the client devices for information, or it can
use a TRAP message that tells a client to report immediately if the client
reaches a particular threshold. SNMP can also be used to change the
configuration of a device.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Summary Continued
 SNMPv3 is the recommended version because it provides security.
 SNMP is a comprehensive and powerful remote management tool. Nearly every
item available in a show command is available through SNMP.
 Switched Port Analyzer (SPAN) is used to mirror the traffic going to and/or
coming from the host. It is commonly implemented to support traffic analyzers or
IPS devices.
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PPT
PDF
CAPsMANv2 | Wireless APs Controller by MikroTik
PDF
Scripting para Mikrotik - Presentación Nunsys en MUM
PPT
Quality of service
PDF
Layer-3 VPN
PDF
CCNA Syllabus pdf
PDF
Multipath Load Balancing for SDN Data Plane
PDF
6.5.1.3 packet tracer layer 2 vlan security instructor
CAPsMANv2 | Wireless APs Controller by MikroTik
Scripting para Mikrotik - Presentación Nunsys en MUM
Quality of service
Layer-3 VPN
CCNA Syllabus pdf
Multipath Load Balancing for SDN Data Plane
6.5.1.3 packet tracer layer 2 vlan security instructor

What's hot (20)

PPT
Cisco ACL
PDF
Policy Based Routing (PBR)
PPTX
PPTX
Routing Protocols and Concepts: Ch9 - EIGRP
PDF
Security and Virtualization in the Data Center
PDF
Wireshark tcp
PDF
Building on TAP sync resiliency for the cloud
PPT
CCNA presentation.
PPTX
CCNA v6.0 ITN - Chapter 03
PDF
10 step-to-configure-cisco-call-manager-express
PDF
1.4.2-basic-configuration-with-mikrotik-cli.pdf
PPT
C C N A Day2
PPTX
Cisco router basic
PDF
6.5.1.2 packet tracer layer 2 security instructor
PDF
Ccna new lab_manual_by_esp_team
PPTX
Chapter 5 : Ethernet
PPTX
PDF
redes2_parteI configuración de switch.pdf
PPT
Chapter 2 point-to-point protocol (ppp)
PDF
Pic18f4550 microcontroller based projects _ PIC Microcontroller.pdf
Cisco ACL
Policy Based Routing (PBR)
Routing Protocols and Concepts: Ch9 - EIGRP
Security and Virtualization in the Data Center
Wireshark tcp
Building on TAP sync resiliency for the cloud
CCNA presentation.
CCNA v6.0 ITN - Chapter 03
10 step-to-configure-cisco-call-manager-express
1.4.2-basic-configuration-with-mikrotik-cli.pdf
C C N A Day2
Cisco router basic
6.5.1.2 packet tracer layer 2 security instructor
Ccna new lab_manual_by_esp_team
Chapter 5 : Ethernet
redes2_parteI configuración de switch.pdf
Chapter 2 point-to-point protocol (ppp)
Pic18f4550 microcontroller based projects _ PIC Microcontroller.pdf
Ad

Similar to CCNA4 Verson6 Chapter5 (20)

PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
PPTX
CCNP Switching Chapter 10
PDF
CCNAv5 - S4: Chapter8 monitoring the network
PDF
Chapter 6-Securing the Local Area Network.pdf
PPT
Chapter 6 overview
PDF
L2 Attacks.pdf
PPTX
CCNA4 Verson6 Chapter2
PPTX
4. VPN4. VPN4. VPN4. VPN4. VPN4. VPN.pptx
PDF
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
PPTX
KPUCC-Rs instructor ppt_chapter2_final
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
PDF
CCNAv5 - S4: Chapter3 Point to-point Connections
PPTX
Chapter 13 : Introduction to switched networks
PPSX
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PPTX
RS_instructorPPT_Chapter5RS_instructorPPT_Chapter5.pptx
PPTX
Chapter 14 : vlan
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
PPTX
KPUCC-Rs instructor ppt_chapter3_final
PDF
CCNAv5 - S2: Chapter3 Vlans
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNP Switching Chapter 10
CCNAv5 - S4: Chapter8 monitoring the network
Chapter 6-Securing the Local Area Network.pdf
Chapter 6 overview
L2 Attacks.pdf
CCNA4 Verson6 Chapter2
4. VPN4. VPN4. VPN4. VPN4. VPN4. VPN.pptx
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
KPUCC-Rs instructor ppt_chapter2_final
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S4: Chapter3 Point to-point Connections
Chapter 13 : Introduction to switched networks
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
CCNA 2 Routing and Switching v5.0 Chapter 2
RS_instructorPPT_Chapter5RS_instructorPPT_Chapter5.pptx
Chapter 14 : vlan
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
KPUCC-Rs instructor ppt_chapter3_final
CCNAv5 - S2: Chapter3 Vlans
Ad

More from Chaing Ravuth (20)

PPTX
CCNP ROUTE V7 CH8
PPTX
CCNP ROUTE V7 CH7
PPTX
CCNP ROUTE V7 CH6
PPTX
CCNP ROUTE V7 CH5
PPTX
CCNP ROUTE V7 CH4
PPTX
CCNP ROUTE V7 CH3
PPTX
CCNP ROUTE V7 CH2
PPTX
CCNP ROUTE V7 CH1
PPTX
CCNP Switching Chapter 3
PPTX
CCNP Switching Chapter 2
PPTX
CCNP Switching Chapter 1
PPTX
CCNP Switching Chapter 9
PPTX
CCNP Switching Chapter 8
PPTX
CCNP Switching Chapter 7
PPTX
CCNP Switching Chapter 6
PPTX
CCNP Switching Chapter 5
PPTX
CCNP Switching Chapter 4
PPTX
CCNA4 Verson6 Chapter1
PPTX
CCNA4 Verson6 Chapter8
PPTX
CCNA4 Verson6 Chapter7
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH1
CCNP Switching Chapter 3
CCNP Switching Chapter 2
CCNP Switching Chapter 1
CCNP Switching Chapter 9
CCNP Switching Chapter 8
CCNP Switching Chapter 7
CCNP Switching Chapter 6
CCNP Switching Chapter 5
CCNP Switching Chapter 4
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter7

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Computing-Curriculum for Schools in Ghana
TR - Agricultural Crops Production NC III.pdf
Cell Structure & Organelles in detailed.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
RMMM.pdf make it easy to upload and study
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
01-Introduction-to-Information-Management.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPH.pptx obstetrics and gynecology in nursing
2.FourierTransform-ShortQuestionswithAnswers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Microbial diseases, their pathogenesis and prophylaxis
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Institutional Correction lecture only . . .
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

CCNA4 Verson6 Chapter5

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 5: Network Security and Monitoring CCNA Routing and Switching Connecting Networks
  • 2. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Best Practices Prior to teaching Chapter 5, the instructor should:  Complete Chapter 5 Assessment.  Ensure all activities are completed. This is a very important concept and hands-on time is vital.  Provide the students many network security and network monitoring activities.  Encourage students to login with their cisco.com login and download http://docwiki.cisco.com/wiki/Internetworking_Technology_H andbook • Review the Security Technologies and the Network Management chapters.
  • 3. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9 Chapter 5: Network Security and Monitoring Connecting Networks
  • 4. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 - Sections & Objectives  5.1 LAN Security • Explain how to mitigate common LAN security.  5.2 SNMP • Configure SNMP to monitor network operations in a small to medium- sized business network.  5.3 Cisco Switch Port Analyzer (SPAN) • Troubleshoot a network problem using SPAN.
  • 5. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11 5.1 LAN Security
  • 6. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Security LAN Security Attacks  Common attacks against the Layer 2 LAN infrastructure include: • CDP Reconnaissance Attacks • Telnet Attacks • MAC Address Table Flooding Attacks • VLAN Attacks • DHCP Attacks
  • 7. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  This topic covers several Layer 2 security solutions: • Mitigating MAC address table flooding attacks using port security • Mitigating VLAN attacks • Mitigating DHCP attacks using DHCP snooping • Securing administrative access using AAA • Securing device access using 802.1X port authentication LAN Security LAN Security Best Practices
  • 8. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  There are several strategies to help secure Layer 2 of a network: • Always use secure variants of these protocols such as SSH, SCP, SSL, SNMPv3, and SFTP. • Always use strong passwords and change them often. • Enable CDP on select ports only. • Secure Telnet access. • Use a dedicated management VLAN where nothing but management traffic resides. • Use ACLs to filter unwanted access. LAN Security LAN Security Best Practices
  • 9. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 5.2 SNMP
  • 10. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP SNMP Operation  SNMP allows administrators to manage and monitor devices on an IP network.  SNMP Elements • SNMP Manager • SNMP Agent • MIB  SNMP Operation • Trap • Get • Set
  • 11. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP SNMP Operation  SNMP Security Model and Levels
  • 12. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Configuring SNMP  Configuration steps • Configure community string • Document location of device • Document system contact • Restrict SNMP Access • Specify recipient of SNMP Traps • Enable traps on SNMP agent
  • 13. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Configuring SNMP  Securing SNMPv3
  • 14. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20 5.3 Cisco Switch Port Analyzer (SPAN)
  • 15. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview  Port mirroring • The port mirroring feature allows a switch to copy and send Ethernet frames from specific ports to the destination port connected to a packet analyzer. The original frame is still forwarded in the usual manner.
  • 16. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview  SPAN terminology
  • 17. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview  RSPAN terminology
  • 18. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Configuration  Use monitor session global configuration command
  • 19. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN as a Troubleshooting Tool  SPAN allows administrators to troubleshoot network issues  Administrator can use SPAN to duplicate and redirect traffic to a packet analyzer  Administrator can analyze traffic from all devices to troubleshoot sub-optimal operation of network applications
  • 20. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26 5.4 Chapter Summary
  • 21. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter Summary Summary  At Layer 2, a number of vulnerabilities exist that require specialized mitigation techniques: • MAC address table flooding attacks are addressed with port security. • VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports. • DHCP attacks are addressed with DHCP snooping.  The SNMP protocol has three elements: the Manager, the Agent, and the MIB. The SNMP manager resides on the NMS, while the Agent and the MIB are on the client devices. • The SNMP Manager can poll the client devices for information, or it can use a TRAP message that tells a client to report immediately if the client reaches a particular threshold. SNMP can also be used to change the configuration of a device.
  • 22. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Summary Continued  SNMPv3 is the recommended version because it provides security.  SNMP is a comprehensive and powerful remote management tool. Nearly every item available in a show command is available through SNMP.  Switched Port Analyzer (SPAN) is used to mirror the traffic going to and/or coming from the host. It is commonly implemented to support traffic analyzers or IPS devices.
  • 23. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 24. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential