<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Voice VLAN hopping : Hown to mitigate ? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110296#M142265</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can use smartports without the need of an external device/solution. You can reference the document in the link below to see the different scenarios and guidelines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/auto_smartports/12.2_55_se/configuration/guide/configure.html#wp1064388"&gt;http://www.cisco.com/en/US/docs/switches/lan/auto_smartports/12.2_55_se/configuration/guide/configure.html#wp1064388&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Nov 2012 19:06:31 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2012-11-20T19:06:31Z</dc:date>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110291#M142256</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I want your help to advise how to mitigate to voice vlan hopping attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;First Scenario : &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC behind IP Phone : the PC will send 802.1q tag including VID of Voice VLAN. Then, the PC will get IP Address automatically from voice vlan subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Solution : this attack can be mitigated by dropping 802.1q trafic from PC port. It's done at CUCM level.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Second Scenario :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The attacker connects directly to port instead of IP Phone. When he send 802.1q tag including VVID, he will retrieve IP Address from voice vlan subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Solution : ????&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Driss&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110291#M142256</guid>
      <dc:creator>Driss BENATTOU</dc:creator>
      <dc:date>2019-03-11T02:48:35Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110292#M142258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure 802.1x on your access ports and with the help with a AAA solution such as Cisco ISE you can deny/authorize different devices on different VLANs, apply dynamic ACLs, blackhole devices, etc. For example, you can have an authorization policy where it will only authorize devices on the voice vlan if they pass EAP-TLS certificate authentication and/or dynamic profiling while sending everything else to different vlans (Data, guest, etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can potentially also use macros/smart ports where a port will automatically be assigned to a "Blackhole" vlan as soon as the IP phone gets disconnected. This will prevent users/attackers from bypassing your phone/phone security &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 15:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110292#M142258</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-11-20T15:05:10Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110293#M142260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your answer. &lt;/P&gt;&lt;P&gt;should I use the smart port option in combination with 802.1X or can I use it without ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Driss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 16:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110293#M142260</guid>
      <dc:creator>Driss BENATTOU</dc:creator>
      <dc:date>2012-11-20T16:18:29Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110294#M142261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Driss-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would be up to you. You can use either one or the combination of the two. Using both of them will add more security to your network but it could also require more admin overheard if phones get moved around often. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 17:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110294#M142261</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-11-20T17:53:40Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110295#M142263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neno,&lt;/P&gt;&lt;P&gt;I want to mean if smart port option will be enough for my situation, without depending on other hardware &amp;amp; software prerequisities ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Driss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 17:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110295#M142263</guid>
      <dc:creator>Driss BENATTOU</dc:creator>
      <dc:date>2012-11-20T17:59:01Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110296#M142265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can use smartports without the need of an external device/solution. You can reference the document in the link below to see the different scenarios and guidelines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/auto_smartports/12.2_55_se/configuration/guide/configure.html#wp1064388"&gt;http://www.cisco.com/en/US/docs/switches/lan/auto_smartports/12.2_55_se/configuration/guide/configure.html#wp1064388&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 19:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110296#M142265</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-11-20T19:06:31Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110297#M142267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I tried the configuration but with no positive result.&lt;/P&gt;&lt;P&gt;I have not control to block 802.1q tag issued from PC (Vlan hopping)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Driss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2012 01:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110297#M142267</guid>
      <dc:creator>Driss BENATTOU</dc:creator>
      <dc:date>2012-11-22T01:02:35Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110298#M142270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you elaborate on which solution you tried and exactly what results you got? Also, perhaps post some configs too for evaluation...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2012 01:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110298#M142270</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-11-22T01:10:48Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110299#M142273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I use auto smartport option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the configuration applied is below : &lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;STRONG&gt;
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt; &lt;A name="wp1220636"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;PRE&gt;Switch(config)# macro auto global processing&lt;/PRE&gt;
Switch(config)# &lt;STRONG&gt;macro auto execute CISCO_PHONE_EVENT builtin CISCO_PHONE_AUTO_SMARTPORT&amp;nbsp; ACCESS_VLAN=32 VOICE_VLAN=132&lt;BR /&gt;&lt;/STRONG&gt;&lt;BR /&gt;
&lt;PRE&gt;Switch(config-if)#&lt;STRONG&gt; macro auto global processing&lt;/STRONG&gt;&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;Switch(config-if)# &lt;STRONG&gt;macro auto control device phone &lt;/STRONG&gt;&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;Switch(config-if)# macro auto control detection cdp&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;Switch(config-if)# macro auto control trigger&lt;/PRE&gt;
&lt;/PRE&gt;
When i plug PC behind IP&amp;nbsp; phone and I tag NIC Card with VLAN ID corresponding to VVLAN, then I receive ip address from voice subnet range.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Driss &lt;BR /&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;BR /&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;/PRE&gt;
&lt;/PRE&gt;
&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;/PRE&gt;
&lt;BR /&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Nov 2012 16:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110299#M142273</guid>
      <dc:creator>Driss BENATTOU</dc:creator>
      <dc:date>2012-11-24T16:00:29Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110300#M142275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Driss-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that you can mitigate that issue by controlling the voice vlan tagging at CUCM level? The goal of the auto smart port is to shutdown/place the port into a dead VLAN once a phone is disconnected. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Nov 2012 17:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110300#M142275</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-11-25T17:21:39Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110301#M142276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;At CUCM Level, i can block incoming tagged trafic. But, for PC connecting directly to network by bypassing the ip phone, I can't do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Driss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2012 15:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110301#M142276</guid>
      <dc:creator>Driss BENATTOU</dc:creator>
      <dc:date>2012-11-26T15:50:25Z</dc:date>
    </item>
    <item>
      <title>Voice VLAN hopping : Hown to mitigate ?</title>
      <link>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110302#M142277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry Driss I fell on some of the discussions here as I got really busy. I have a quick question for you: Were you able to get the autosmart ports to work properly? If so then once the phone is disconnected from the switch, the switch should remove all relevant "VOICE" configuration. You can potentially write a script to force shutdown the port once the phone is disconnected from the port. All of this should along with the CUCM changes should provide you with enough security to block a malicious user from VLAN hopping. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 02:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/voice-vlan-hopping-hown-to-mitigate/m-p/2110302#M142277</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-12-17T02:40:24Z</dc:date>
    </item>
  </channel>
</rss>

