CHAPTER 11 - Switch Security Configuration

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

68 Terms

1
New cards

Secured

All switch ports (interfaces) should be _______ before the switch is deployed for production use. How it is done depends on its function.

2
New cards

disable

A simple method that many administrators use to help secure the network from unauthorized access is to _______ all unused ports on a switch. Navigate to each unused port and issue the Cisco IOS shutdown command.

3
New cards

No shutdown

If a port must be reactivated at a later time, it can be enabled with the __ ________ command.

4
New cards

Interface range

To configure a range of ports, use the _________ _____ command.

5
New cards

port security

The simplest and most effective method to prevent MAC address table overflow attacks is to enable ____ ________.

6
New cards

port security

limits the number of valid MAC addresses allowed on a port. It allows an administrator to manually configure MAC addresses for a port or to permit the switch to dynamically learn a limited number of MAC addresses. When a port configured with ____ ________ receives a frame, the source MAC address of the frame is compared to the list of secure source MAC addresses that were manually configured or dynamically learned on the port.

7
New cards

switchport port-security

Port security is enabled with the __________ ____-________ interface configuration command.

8
New cards

dynamic auto

port security can only be configured on manually configured access ports or manually configured trunk ports. By default, Layer 2 switch ports are set to _______ ____ (trunking on). Therefore, in the example, the port is configured with the switchport mode access interface configuration command.

9
New cards

show port-security interface

Use the ____ ____-________ _________ command to display the current port security settings for FastEthernet 0/1.

10
New cards

error disabled

If an active port is configured with the switchport port-security command and more than one device is connected to that port, the port will transition to the _____-________ state

11
New cards

switchport port-security maximum value

To set the maximum number of MAC addresses allowed on a port, use the following command

12
New cards

1

The default port security value is _

13
New cards

Manually Configured

a way for a switch to learn about mac addresses. The administrator manually configures a static MAC address(es) by using the following command for each secure MAC address on the port:

Switch(config-if)# switchport port-security mac-address mac-address

14
New cards

Dynamically Learned

a way for a switch to learn about mac addresses. When the switchport port-security command is entered, the current source MAC for the device connected to the port is automatically secured but is not added to the running configuration. If the switch is rebooted, the port will have to re-learn the device's MAC address.

15
New cards

Dynamically Learned - Sticky

a way for a switch to learn about mac addresses. The administrator can enable the switch to dynamically learn the MAC address and "stick" them to the running configuration by using the following command:

Switch(config-if)# switchport port-security mac-address sticky

16
New cards

NVRAM

Saving the running configuration will commit the dynamically learned MAC address to _____

17
New cards

Port security aging

can be used to set the aging time for static and dynamic secure addresses on a port

18
New cards

Absolute, inactivity

two types of aging supported per port

19
New cards

Absolute

type of aging. The secure addresses on the port are deleted after the specified aging time.

20
New cards

Inactivity

type of aging. The secure addresses on the port are deleted if they are inactive for a specified time.

21
New cards

aging

Use _____ to remove secure MAC addresses on a secure port without manually deleting the existing secure MAC addresses.

22
New cards

switchport port-security aging

Use the __________ ____-________ _____ command to enable or disable static aging for the secure port, or to set the aging time or type.

Switch(config-if)# __________ ____-________ _____ {static | time _time_ | type {absolute | inactivity}

23
New cards

port violation, error-disabled state

If the MAC address of a device attached to a port differs from the list of secure addresses, then a ____ _________ occurs and the port enters the _____-________ _____.

24
New cards

switchport port-security violation

To set the port security violation mode, use the following command:

Switch(config-if)# __________ ____-________ _________ {shutdown | restrict | protect}

25
New cards

shutdown

violation mode. (default) The port transitions to the error-disabled state immediately, turns off the port LED, and sends a syslog message. It increments the violation counter. When a secure port is in the error-disabled state, an administrator must re-enable it by entering theshutdownandno shutdowncommands

26
New cards

restrict

violation mode. The port drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the maximum value. This mode causes the Security Violation counter to increment and generates a syslog message.

27
New cards

protect

violation mode. This is the least secure of the security violation modes. The port drops packets with unknown MAC source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the maximum value. No syslog message is sent.

28
New cards

Shutdown, restrict, protect

3 violation modes

29
New cards

Shutdown, no shutdown

To re-enable the port, first use the ________ command, then, use the __ ________ command.

30
New cards

1, shutdown

The example indicates that all 24 interfaces are configured with the switchport port-security command because the maximum allowed is _ and the violation mode is _______.

31
New cards

Show run

To verify that MAC addresses are "sticking" to the configuration, use the ____ ___ command as shown in the example for FastEthernet 0/19

32
New cards

show port-security address

To display all secure MAC addresses that are manually configured or dynamically learned on all switch interfaces, use the ____ ____-________ _______ command as shown in the example.

33
New cards

Spoofing DTP

messages from the attacking host to cause the switch to enter trunking mode. From here, the attacker can send traffic tagged with the target VLAN, and the switch then delivers the packets to the destination.

34
New cards

rogue

Introducing a _____ switch and enabling trunking. The attacker can then access all the VLANs on the victim switch from that switch.

35
New cards

Double-tagging

Another type of VLAN hopping attack is a ______-_______(or double-encapsulated) attack. This attack takes advantage of the way hardware on most switches operate.

36
New cards

DTP

Step 1 Mitigate VLAN Hopping: Disable ___ (auto trunking) negotiations on non-trunking ports by using the switchport mode access interface configuration command.

37
New cards

Unused vlan

Step 2 Mitigate VLAN Hopping: Disable unused ports and put them in an ______ ____.

38
New cards

Switchport mode trunk

Step 3 Mitigate VLAN Hopping: Manually enable the trunk link on a trunking port by using the __________ ____ _____ command.

39
New cards

switchport nonegotiate

Step 4 Mitigate VLAN Hopping: Disable DTP (auto trunking) negotiations on trunking ports by using the __________ ___________ command.

40
New cards

Vlan 1

Step 5 Mitigate VLAN Hopping: Set the native VLAN to a VLAN other than ____ _ by using the switchport trunk native vlan vlan_number command

41
New cards

DOS

The goal of a DHCP starvation attack is to an attack tool such as Gobbler to create a ___ for connecting clients.

42
New cards

DHCP Snooping

DHCP spoofing attacks can be mitigated by using ____ ________ on trusted ports

43
New cards

DHCP snooping

filters DHCP messages and rate-limits DHCP traffic on untrusted ports.

• Devices under administrative control (e.g., switches, routers, and servers) are trusted sources.

• Trusted interfaces (e.g., trunk links, server ports) must be explicitly configured as trusted.

• Devices outside the network and all access ports are generally treated as untrusted sources

44
New cards

DHCP snooping binding

A DHCP table is built that includes the source MAC address of a device on an untrusted port and the IP address assigned by the DHCP server to that device. • The MAC address and IP address are bound together. • Therefore, this table is called the ____ ________ _______ table.

45
New cards

ip dhcp snooping

Step 1 dhcp snooping. Enable DHCP snooping by using the __ ____ ________ global configuration command.

46
New cards

ip dhcp snooping trust

Step 2 dhcp snooping. On trusted ports, use the __ ____ ________ _____ interface configuration command.

47
New cards

ip dhcp snooping limit rate

Step 3 dhcp snooping: On untrusted interfaces, limit the number of DHCP discovery messages that can be received using the __ ____ ________ _____ ____ _packets-per-second interface configuration command.

48
New cards

ip dhcp snooping vlan

Step 4 dhcp snooping. Enable DHCP snooping by VLAN, or by a range of VLANs, by using the __ ____ ________ ____ global configuration command

49
New cards

show ip dhcp snooping

Use the ____ __ ____ ________ privileged EXEC command to verify DHCP snooping settings.

50
New cards

show ip dhcp snooping binding

Use the ____ __ ____ ________ _______ command to view the clients that have received DHCP information.

51
New cards

Unsolicited, valid

In a typical ARP attack, a threat actor can send ___________ ARP replies to other hosts on the subnet with the MAC Address of the threat actor and the IP address of the default gateway. To prevent ARP spoofing and the resulting ARP poisoning, a switch must ensure that only _____ ARP Requests and Replies are relayed.

52
New cards

Dynamic ARP inspection

(DAI)

53
New cards

DAI

___ requires DHCP snooping and helps prevent ARP attacks by:

• Not relaying invalid or gratuitous ARP Replies out to other ports in the same VLAN.

• Intercepting all ARP Requests and Replies on untrusted ports.

• Verifying each intercepted packet for a valid IP-to-MAC binding.

• Dropping and logging ARP Replies coming from invalid to prevent ARP poisoning.

• Error-disabling the interface if the configured DAI number of ARP packets is exceeded.

54
New cards

Globally, selected, selected, trusted

To mitigate the chances of ARP spoofing and ARP poisoning, follow these DAI implementation guidelines:

• Enable DHCP snooping ________.

• Enable DHCP snooping on ________ VLANs.

• Enable DAI on ________ VLANs.

• Configure _______ interfaces for DHCP snooping and ARP inspection.

55
New cards

Untrusted, trusted

It is generally advisable to configure all access switch ports as _________ and to configure all uplink ports that are connected to other switches as _______

56
New cards

ip arp inspection validate

The __ ___ __________ ________ {[src-mac] [dst-mac] [ip]} global configuration command is used to configure DAI to drop ARP packets when the IP addresses are invalid. It can be used when the MAC addresses in the body of the ARP packets do not match the addresses that are specified in the Ethernet header.

57
New cards

Bridge Protocol Data Unit

(BPDU)

58
New cards

Portfast, bpdu

Recall that network attackers can manipulate the Spanning Tree Protocol (STP) to conduct an attack by spoofing the root bridge and changing the topology of a network. To mitigate STP attacks, use ________ and ____

59
New cards

PortFast

immediately brings a port to the forwarding state from a blocking state, bypassing the listening and learning states. Apply to all end-user access ports.

60
New cards

BPDU Guard

immediately error disables a port that receives a BPDU

61
New cards

End

Like PortFast, BPDU guard should only be configured on interfaces attached to ___ devices.

62
New cards

portfast interface

On an interface - Use the spanning-tree ________ _________ configuration command.

63
New cards

portfast default

Globally - Use the spanning tree ________ _______ global configuration command to enable PortFast on all access ports.

64
New cards

show spanning-tree summary

To verify whether PortFast is enabled globally you can use the ____ ________-____ _______ command

65
New cards

error disabled

If a BPDU is received on a BPDU Guard enabled access port, the port is put into _____ ________ state.

66
New cards

errdisable recovery cause psecure_violation

If a BPDU is received on a BPDU Guard enabled access port, This means the port is shut down and must be manually re-enabled or automatically recovered through the __________ ________ _____ _________________ global command.

67
New cards

spanning-tree bpduguard enable

BPDU Guard can be enabled: • On an interface - Use the ________-____ _________ ______ interface configuration command.

68
New cards

spanning-tree portfast bpduguard default

BPDU Guard can be enabled: • Globally - Use the ________-____ ________ _________ _______ global configuration command to enable BPDU Guard on all access ports