Why should we care about switch security???
This diagram mainly shows that firewalls, routers, and switches are generally placed at the border or DMZ, core and distribution layer, and access layer respectively; Among these devices, why are switches the least secure?
Possible attack forms and defense measures at the switch level: For so many forms of attack, we can roughly divide them into four categories:
1. VLAN Hopping Attack Use Trunk or Double Tag (native) to sniff or attack information from other VLANs Countermeasures:
2. STP spoofing attack Influencing the spanning tree topology by forging incorrect BPDU messages Countermeasures: (1) Configure BPDU guard on the interface (access) connected to the host or router. This type of interface should not receive BPDUs. If it does, the interface will be set to error disable state. spanning-tree bpduguard enable on the interface (2) Or configure Root Guard on the above interfaces. This type of interface can receive BPDUs, but if it is a better BPDU, the interface is set to error disable state to avoid the change of the root bridge. spanning-tree guard root under interface MAC spoofing attack Stealing other people's MAC addresses to forge attacks, or illegally accessing the network to steal information Countermeasures:
IV. CAM/MAC Flood Attack By continuously forging MAC addresses and sending messages, the switch CAM table is flooded with junk MAC addresses in a short period of time, the real MAC is squeezed out, the known unicast becomes unknown unicast, and is forced to flood, causing the data to be sniffed. Countermeasures: Port security, limiting the maximum number of MAC addresses that a port can learn 5. DHCP Server Spoofing Attack The illegal DHCP server preemptively allocates addresses to customers, issues fake gateway addresses, and directs customer traffic to the "middleman" to achieve information sniffing. Countermeasures: Configure DHCP Snooping on the Layer 3 switch to monitor DHCP messages and intercept address allocation messages from illegal DHCP servers. 6. DHCP starvation (address pool exhaustion) Constantly changing MAC addresses and forging DHCP request messages will consume all the addresses in the DHCP server address pool in a short period of time, making it impossible for legitimate users to obtain IP addresses. Countermeasures:
7. ARP Spoofing Publish fake ARP reply messages to direct customer messages to the "middleman", thereby achieving data sniffing. Countermeasures:
8. IP address spoofing Stealing IP addresses, illegally accessing the network, or impersonating others to send attack traffic Countermeasures:
9. Attacks on the switch itself Intercept CDP (plain text) messages, obtain the switch management address, and then perform brute force password cracking; intercept Telnet messages (plain text) and sniff passwords. After obtaining switch management permissions, they can do whatever they want. Countermeasures:
|
<<: Are the operators wronged when being questioned about “4G speed reduction and 5G hibernation”?
Today I will introduce the DNS access principle t...
1. What is NB-IoT NB-IoT (Narrow Band Internet of...
Figure 1: Growing Asia Pacific fiber optic market...
Anhui Sino-Australian Vocational College of Scien...
Residents are excited about and choosing to live ...
Overview The performance issue of TCP is essentia...
In recent years, with the accelerated advancement...
spinservers is a site under Majestic Hosting Solu...
Today, digital transformation led by emerging tec...
Hello everyone, I am Xiaolin. I saw an old man as...
HostYun has launched a Christmas and 2024 New Yea...
We are not unfamiliar with number portability. As...
As 2020 winds down and the new year dawns, it pro...
[51CTO.com original article] From July 11 to 13, ...
BriskServers was founded in 2021 by a group of ga...