cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3618
Views
0
Helpful
11
Replies

Voice VLAN hopping : Hown to mitigate ?

Driss BENATTOU
Level 4
Level 4

Hi,

I want your help to advise how to mitigate to voice vlan hopping attack.

First Scenario :

PC behind IP Phone : the PC will send 802.1q tag including VID of Voice VLAN. Then, the PC will get IP Address automatically from voice vlan subnet.

Solution : this attack can be mitigated by dropping 802.1q trafic from PC port. It's done at CUCM level.

Second Scenario :

The attacker connects directly to port instead of IP Phone. When he send 802.1q tag including VVID, he will retrieve IP Address from voice vlan subnet.

Solution : ????

Regards

Driss

11 Replies 11

nspasov
Cisco Employee
Cisco Employee

You can configure 802.1x on your access ports and with the help with a AAA solution such as Cisco ISE you can deny/authorize different devices on different VLANs, apply dynamic ACLs, blackhole devices, etc. For example, you can have an authorization policy where it will only authorize devices on the voice vlan if they pass EAP-TLS certificate authentication and/or dynamic profiling while sending everything else to different vlans (Data, guest, etc)

You can potentially also use macros/smart ports where a port will automatically be assigned to a "Blackhole" vlan as soon as the IP phone gets disconnected. This will prevent users/attackers from bypassing your phone/phone security

Thank you for rating!

Thank you for your answer.

should I use the smart port option in combination with 802.1X or can I use it without ?

Regards

Driss

Hello Driss-

That would be up to you. You can use either one or the combination of the two. Using both of them will add more security to your network but it could also require more admin overheard if phones get moved around often.

Thank you for rating helpful posts!

Hello Neno,

I want to mean if smart port option will be enough for my situation, without depending on other hardware & software prerequisities ?

Regards

Driss

Yes, you can use smartports without the need of an external device/solution. You can reference the document in the link below to see the different scenarios and guidelines:

http://www.cisco.com/en/US/docs/switches/lan/auto_smartports/12.2_55_se/configuration/guide/configure.html#wp1064388

Thank you for rating helpful posts!

Hi,

I tried the configuration but with no positive result.

I have not control to block 802.1q tag issued from PC (Vlan hopping)

Any idea ?

Thanks

Driss

Can you elaborate on which solution you tried and exactly what results you got? Also, perhaps post some configs too for evaluation...

Hi,

I use auto smartport option.

the configuration applied is below :


Switch(config)# macro auto global processing
Switch(config)# macro auto execute CISCO_PHONE_EVENT builtin CISCO_PHONE_AUTO_SMARTPORT  ACCESS_VLAN=32 VOICE_VLAN=132

Switch(config-if)# macro auto global processing
Switch(config-if)# macro auto control device phone 
Switch(config-if)# macro auto control detection cdp
Switch(config-if)# macro auto control trigger
When i plug PC behind IP  phone and I tag NIC Card with VLAN ID corresponding to VVLAN, then I receive ip address from voice subnet range.

Regards
Driss








Hi Driss-

I thought that you can mitigate that issue by controlling the voice vlan tagging at CUCM level? The goal of the auto smart port is to shutdown/place the port into a dead VLAN once a phone is disconnected.

Hi,

At CUCM Level, i can block incoming tagged trafic. But, for PC connecting directly to network by bypassing the ip phone, I can't do it.

Driss

Sorry Driss I fell on some of the discussions here as I got really busy. I have a quick question for you: Were you able to get the autosmart ports to work properly? If so then once the phone is disconnected from the switch, the switch should remove all relevant "VOICE" configuration. You can potentially write a script to force shutdown the port once the phone is disconnected from the port. All of this should along with the CUCM changes should provide you with enough security to block a malicious user from VLAN hopping.

Thank you for rating!