at this Article we want to talk about very commonly project in network security section, and today's Network security is bolder than old, and we see some article about Security but they have only some theoretical info, in this Article we want to have a very common security feature in CISCO or any other switches( Management switches ), its about Port Security. How you can manage your Security of your network ? maybe you have a wireless network, in this situation you must select another solution or maybe you have different scenario with different hardware or virtualization and you have another option with different name for implement basic Access security .
In this Article we visualize we have an Ethernet Network with simple equipment and as refer to Ethernet standard each device have a MAC Address.
so how we can secure our network ? we have so many security solution but some of there is:
-DHCP Snooping :
Attacker can run a DHCP Server on here PC or device then get Address to your Network devices, maybe you think its good, cause your DHCP Server use less CPU and Attacker computer help it, but Attacker do that for here destiny, for example set Default Gateway or DNS of here system and then can very easily redirect your network traffic to capture or any other use.
or another attack is send so many IP Address request to DHCP and used capacity of your DHCP pool.
-Dynamic ARP Protection: Protects your network from ARP cache poisoning.
refer to Ethernet standard and how ARP working, as you know, ARP table filled via frames come to your nodes, Ethernet device extract source of that device and if it wasn't in here CAM Table then add it (of course for unicast Address ) so today's i can very easily create or build an script with Ruby, Python , .... that send crafted frame to Network, for example i can create empty frame with source address of my Router MAC and destination MAC address of another node then send it to Network, what happened if you haven't enough security implementation on your central devices like switches ? when destination node receive this frame extract it Source MAC address then Extract source IP Address and see the MAC address of her gateway or router was changed so it change here CAM Table, after that if this node want to send any data to her gateway, create an frame with this information: Destination IP Address: Router Address | Destination MAC Address: Attacker MAC Address
and what can be happened ? all of traffic send to the Attacker device. OK for prevent this type of Attack we can use ARP Protection Method.
Port Security Configuration:
select Interface or interface range
set maximum MAC Address can be assigned to this port:
switchport port-security maximum XXX
set Violation mode to what happen when maximum number of MAC Address rich :
switchport port-security violation XXXX
Add manually MAC Address to MAC Table that allow forward Frames:
switchport port-security mac-address mac_address
Enable sticky Learning MAC Address of each node connected to this port(unless maximum number rich)
switchport port-security mac-address sticky
show port security status of all ports you enable it:
Show Address learned of all Interfaces :
show port-security address
show Address of specify port that allow forward traffic:
So I set the following: debug crypto condition peer 10.10.10.1 debug crypto ikev2 protocol 127debug crypto ikev2 platform 127 However no debugs are displayed on the CLI for IPSEC tunnel negotiations. All configs for tunnel look good a...
I am running v2.2 patch 14.I currently am using the following profiling probes: HTTP, Radius, NMAP, SNMPQuery, AD. I have a total endpoint database of ~41,000 endpoints, with only about 18,000 active. As I go through my contect visibility trying to clean ...
On the Create Account Page the only option I want is to create Random accounts. So need the page to have only Random button, Number of accounts field and create button.From the discussion board, I have been able to remove most except the Username prefix b...
Hi,Hi, Wht cmd used in switch to check the communication with Radius server if the key & IP are correct? Also how to check in ISE? radius server Radius-1-address ipv4 172.30.5.6 auth-port 1812 acct-port 1813-automate-tester username dummy pr...