CCNA2 Module 11

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

Layer 2

Considered as the weakest link in the OSI model

2
New cards

shutdown

Command to use to disable unused ports

3
New cards

port security

The simplest and most effective method to prevent MAC address table overflow attacks is to enable _____ ________.

_____ ________. limits the number of valid MAC addresses allowed on a port

By limiting the number of permitted MAC addresses on a port to one, _____ ________ can be used to control unauthorized access to the network.

4
New cards

S1(config)# interface f0/1

S1(config-if)# switchport port-security

Command rejected: FastEthernet0/1 is a dynamic port.

S1(config-if)# switchport mode access

S1(config-if)# switchport port-security

command to enable port security

5
New cards

port-security interface

Use the show ____________ _______ command to display the current port security settings

6
New cards

switchport port-security

If an active port is configured with the _________ _______________ command and more than one device is connected to that port, the port will transition to the error-disabled state

7
New cards

switchport port-security maximum value

To set the maximum number of MAC addresses allowed on a port, use the following command:

8
New cards

1. Manually Configured

2. Dynamically Learned

3. Dynamically Learned – Sticky

The switch can be configured to learn about MAC addresses on a secure port in one of three ways:

9
New cards

Manually Configured

The administrator manually configures a static MAC address(es) by using the following command for each secure MAC address on the port

10
New cards

Dynamically Learned

When the switchport port-security command is entered, the current source MAC for the device connected to the port is automatically secured but is not added to the startup configuration. If the switch is rebooted, the port will have to re-learn the device’s MAC address.

11
New cards

Dynamically Learned – Sticky

The administrator can enable the switch to dynamically learn the MAC address and “stick” them to the running configuration by using the following command:

12
New cards

show port-security interface

show port-security address

Commands used to verify the port-security interface

13
New cards

Port Security Aging

______ __________ _______ can be used to set the aging time for static and dynamic secure addresses on a port.

14
New cards

Absolute - The secure addresses on the port are deleted after the specified aging time

Inactivity - The secure addresses on the port are deleted only if they are inactive for the specified aging time.

Port security aging can be used to set the aging time for static and dynamic secure addresses on a port. Two types of aging are supported per port:

15
New cards

aging

Use ______ to remove secure MAC addresses on a secure port without manually deleting the existing secure MAC addresses.

16
New cards

switchport port-security aging

Use the ________________________ command to enable or disable static aging for the secure port, or to set the aging time or type.

17
New cards

static

time

type absolute

type inactivity

switchport port-security aging parameters:

18
New cards

port violation

If the MAC address of a device attached to the port differs from the list of secure addresses, then a ____ ________ occurs. By default, the port enters the error-disabled state.

19
New cards

switchport port-security violation { protect | restrict | shutdown }

To set the port security violation mode, use the following command:

20
New cards

shutdown

restrict

protect

Security Violation Modes (3)

21
New cards

Protect

What is the violation mode used?

Discards Offending Traffic? Yes

Sends Syslog Message? No

Increase Violation Counter? No

Shuts Down Port? No

22
New cards

Restrict

What is the violation mode used?

Discards Offending Traffic? Yes

Sends Syslog Message? Yes

Increase Violation Counter? Yes

Shuts Down Port? No

23
New cards

Shutdown

What is the violation mode used?

Discards Offending Traffic? Yes

Sends Syslog Message? Yes

Increase Violation Counter? Yes

Shuts Down Port? Yes

24
New cards

turned off

when port protocol and link status are changed to down and the port LED is ________ ___.

25
New cards

show run

To verify that MAC addresses are “sticking” to the configuration, use the _____ ___ command

26
New cards

VLAN Hopping Attacks

These steps are used to mitigate what?

Step 1: Disable DTP (auto trunking) negotiations on non-trunking ports by using the switchport mode access interface configuration command.

Step 2: Disable unused ports and put them in an unused VLAN.

Step 3: Manually enable the trunk link on a trunking port by using the switchport mode trunk command.

Step 4: Disable DTP (auto trunking) negotiations on trunking ports by using the switchport nonegotiate command.

Step 5: Set the native VLAN to a VLAN other than VLAN 1 by using the switchport trunk native vlan vlan_number command.

27
New cards

Spoofing DTP messages

This is a way VLAN hopping attacks are initiated:

___________ ___ ____________ from the attacking host to cause the switch to enter trunking mode. From here, the attacker can send traffic tagged with the target VLAN, and the switch then delivers the packets to the destination.

28
New cards

rogue switch

This is a way VLAN hopping attacks are initiated:

Introducing a _______ _______ and enabling trunking. The attacker can then access all the VLANs on the victim switch using this method.

29
New cards

Double tagging (or double-encapsulated)

This is a way VLAN hopping attacks are initiated:

_________ _________ attack. This attack takes advantage of the way hardware on most switches operate.

30
New cards

Denial of Service (DoS)

The goal of a DHCP starvation attack is to create a __________ ___ ___________ for connecting clients.

31
New cards

Gobbler

DHCP starvation attacks require an attack tool such as?

32
New cards

port security

DHCP starvation attacks can be effectively mitigated by using ____ __________ because Gobbler uses a unique source MAC address for each DHCP request sent.

33
New cards

Ethernet address

Mitigating DHCP spoofing attacks requires more protection. Gobbler could be configured to use the actual interface MAC address as the source ________ _______, but specify a different Ethernet address in the DHCP payload.

34
New cards

DHCP snooping

DHCP spoofing attacks can be mitigated by using ______ ___________ on trusted ports.

35
New cards

Source MAC Addresses

DHCP snooping does not rely on ______ ___ ________. Instead, DHCP snooping determines whether DHCP messages are from an administratively configured trusted or untrusted source. It then filters DHCP messages and rate-limits DHCP traffic from untrusted sources.

36
New cards

trusted sources, untrusted source

Devices under your administrative control, such as switches, routers, and servers, are _______ _____. Any device beyond the firewall or outside your network is an _______ _____.

37
New cards

untrusted port

Rogue DHCP server would be on an _______ ____ after enabling DHCP snooping. All interfaces are treated as untrusted by default. Trusted interfaces are typically trunk links and ports directly connected to a legitimate DHCP server. These interfaces must be explicitly configured as trusted.

38
New cards

DHCP snooping binding table

A DHCP table is built that includes the source MAC address of a device on an untrusted port and the IP address assigned by the DHCP server to that device. The MAC address and IP address are bound together. Therefore, this table is called the _____ _________ __________ ______.

39
New cards

DHCP Attacks

These steps are used to mitigate what?

Step 1. Enable DHCP snooping by using the ip dhcp snooping global configuration command.

Step 2. On trusted ports, use the ip dhcp snooping trust interface configuration command.

Step 3. Limit the number of DHCP discovery messages that can be received per second on untrusted ports by using the ip dhcp snooping limit rate interface configuration command.

Step 4. Enable DHCP snooping by VLAN, or by a range of VLANs, by using the ip dhcp snooping vlan global configuration command.

40
New cards

show ip dhcp snooping, show ip dhcp snooping binding

Use the _____ __ ____ _______ privileged EXEC command to verify DHCP snooping and ______ __ _____ ________ ________ to view the clients that have received DHCP information

41
New cards

Dynamic ARP Inspection (DAI)

DHCP snooping is also required by _______ ____ ________

42
New cards

unsolicited ARP requests

In a typical ARP attack, a threat actor can send _________ ___ _________ to other hosts on the subnet with the MAC Address of the threat actor and the IP address of the default gateway

43
New cards

ARP Requests, Replies

To prevent ARP spoofing and the resulting ARP poisoning, a switch must ensure that only valid ____ ________ and _______ are relayed.

44
New cards

DHCP snooping

Dynamic ARP inspection (DAI) requires ____ ________ and helps prevent ARP attacks by:

  • Not relaying invalid or gratuitous ARP Requests out to other ports in the same VLAN.

  • Intercepting all ARP Requests and Replies on untrusted ports.

  • Verifying each intercepted packet for a valid IP-to-MAC binding.

  • Dropping and logging ARP Requests coming from invalid sources to prevent ARP poisoning.

  • Error-disabling the interface if the configured DAI number of ARP packets is exceeded.

45
New cards

ARP Attacks

These guidelines are used by DAI to mitigate what?

Enable DHCP snooping globally.

Enable DHCP snooping on selected VLANs.

Enable DAI on selected VLANs.

Configure trusted interfaces for DHCP snooping and ARP inspection.

46
New cards

access

It is generally advisable to configure all _______ switch ports as untrusted and to configure all uplink ports that are connected to other switches as trusted.

47
New cards

Destination MAC


This can be used by DAI to check the destination MAC address in the Ethernet header against the target MAC address in ARP body.

48
New cards

Source MAC

This can be used by DAI to check the source MAC address in the Ethernet header against the sender MAC address in the ARP body.

49
New cards

IP address

This can be used by DAI to check the ARP body for invalid and unexpected IP addresses including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.

50
New cards

ip arp inspection validate {[src-mac] [dst-mac] [ip]}

It is a global configuration command is used to configure DAI to drop ARP packets when the IP addresses are invalid. It can be used when the MAC addresses in the body of the ARP packets do not match the addresses that are specified in the Ethernet header.

51
New cards

Spanning Tree Protocol (STP)

Network attackers can manipulate the ________ ___ _______ to conduct an attack by spoofing the root bridge and changing the topology of a network

52
New cards

STP Attacks

Portfast and BPDU guard is used to mitigate what?

53
New cards

PortFast

this immediately brings an interface configured as an access port to the forwarding state from a blocking state, bypassing the listening and learning states. Apply to all end-user ports. It should only be configured on ports attached to end devices.

54
New cards

BPDU guard

this immediately error disables a port that receives a BPDU. It should only be configured on interfaces attached to end devices.

55
New cards

Portfast

_______ bypasses the STP listening and learning states to minimize the time that access ports must wait for STP to converge

56
New cards

spanning-tree loop

If PortFast is enabled on a port connecting to another switch, there is a risk of creating a _____________ _____.

57
New cards

spanning-tree portfast

this is an interface configuration command used to enable portfast

58
New cards

spanning-tree portfast default

Portfast can be configured globally on all access ports by using this global configuration command.

59
New cards

show running-config | begin span, show spanning-tree summary command

To verify whether PortFast is enabled globally you can use either the ______________________________ command or the ______________________________

60
New cards

show running-config interface type/number

To verify if PortFast is enabled on an interface, use this command _____________________________

61
New cards

BPDUs

Even though PortFast is enabled, the interface will still listen for ________

62
New cards

BPDU Guard

If any BPDUs are received on a ______ _______ enabled port, that port is put into error-disabled state

63
New cards

errdisable recovery cause bpduguard

When a port is in the shutdown state caused by the BPDU guard, we must manually re-enable or automatically recover it through the _______________________________ global command.

64
New cards

spanning-tree bpduguard enable

spanning-tree portfast bpduguard default

BPDU Guard can be enabled on a port by using the _______________________________ interface configuration command, otherwise use the ______________________________ global configuration command to globally enable BPDU guard on all PortFast-enabled ports.

65
New cards

show spanning-tree summary

To display information about the state of spanning tree, use the __________________________ command