Securing Network Switches: Minimizing Service Loss and Data Theft in A Campus Network

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 10

Minimizing Service Loss and Data Theft in a Campus Network

Securing Network Switches

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Describing Vulnerabilities in CDP

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Describing Vulnerabilities in the Telnet
Protocol

The Telnet connection sends


text unencrypted and potentially
readable.

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Describing the Secure Shell Protocol

SSH replaces the Telnet session


with an encrypted connection.

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Describing vty ACLs

• Set up standard IP ACL.


• Use line configuration
mode to filter access with
the access-class command.
• Set identical restrictions on
every vty line.

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Describing Commands to Apply ACLs

Switch(config)#access-list access-list-number
{permit | deny | remark} source [mask]

• Configures a standard IP access list

Switch(config)#line vty {vty# | vty-range}

• Enters configuration mode for a vty or vty range

Switch(config-line)#access-class access-list-number in|out

• Restricts incoming or outgoing vty connections to addresses


in the ACL

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Best Practices: Switch Security

Secure switch access:


• Set system passwords.
• Secure physical access to the console.
• Secure access via Telnet.
• Use SSH when possible.
• Configure system warning banners.
• Use Syslog if available.

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Best Practices: Switch Security (Cont.)

Secure switch protocols:


• Trim CDP and use only as needed.
• Secure spanning tree.

Mitigate compromises through a switch:


• Take precautions for trunk links.
• Minimize physical port access.
• Establish standard access port configuration for both
unused and used ports.

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
Summary

• CDP packets can expose some network information.


• Authentication information and data carried in Telnet
sessions are vulnerable.
• SSH provides a more secure option for Telnet.
• vty ACLs should be used to limit Telnet access to
switch devices.
• vty ACL configuration commands use standard IP ACL lists.
• Sound security measures and trimming of unused
applications are the basis of best practices.

北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688
北京训唐 E-TRAIN 思科专业培训中心 www.ciscotrain.com league.ciscotrain.com 咨询热线: 010 - 82536886 010 - 8253688

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy