Why should we care about switch security???
This diagram mainly shows that firewalls, routers, and switches are generally placed at the border or DMZ, core and distribution layer, and access layer respectively; Among these devices, why are switches the least secure?
Possible attack forms and defense measures at the switch level: For so many forms of attack, we can roughly divide them into four categories:
1. VLAN Hopping Attack Use Trunk or Double Tag (native) to sniff or attack information from other VLANs Countermeasures:
2. STP spoofing attack Influencing the spanning tree topology by forging incorrect BPDU messages Countermeasures: (1) Configure BPDU guard on the interface (access) connected to the host or router. This type of interface should not receive BPDUs. If it does, the interface will be set to error disable state. spanning-tree bpduguard enable on the interface (2) Or configure Root Guard on the above interfaces. This type of interface can receive BPDUs, but if it is a better BPDU, the interface is set to error disable state to avoid the change of the root bridge. spanning-tree guard root under interface MAC spoofing attack Stealing other people's MAC addresses to forge attacks, or illegally accessing the network to steal information Countermeasures:
IV. CAM/MAC Flood Attack By continuously forging MAC addresses and sending messages, the switch CAM table is flooded with junk MAC addresses in a short period of time, the real MAC is squeezed out, the known unicast becomes unknown unicast, and is forced to flood, causing the data to be sniffed. Countermeasures: Port security, limiting the maximum number of MAC addresses that a port can learn 5. DHCP Server Spoofing Attack The illegal DHCP server preemptively allocates addresses to customers, issues fake gateway addresses, and directs customer traffic to the "middleman" to achieve information sniffing. Countermeasures: Configure DHCP Snooping on the Layer 3 switch to monitor DHCP messages and intercept address allocation messages from illegal DHCP servers. 6. DHCP starvation (address pool exhaustion) Constantly changing MAC addresses and forging DHCP request messages will consume all the addresses in the DHCP server address pool in a short period of time, making it impossible for legitimate users to obtain IP addresses. Countermeasures:
7. ARP Spoofing Publish fake ARP reply messages to direct customer messages to the "middleman", thereby achieving data sniffing. Countermeasures:
8. IP address spoofing Stealing IP addresses, illegally accessing the network, or impersonating others to send attack traffic Countermeasures:
9. Attacks on the switch itself Intercept CDP (plain text) messages, obtain the switch management address, and then perform brute force password cracking; intercept Telnet messages (plain text) and sniff passwords. After obtaining switch management permissions, they can do whatever they want. Countermeasures:
|
<<: Are the operators wronged when being questioned about “4G speed reduction and 5G hibernation”?
This month, CMIVPS is offering a limited special ...
With the empowerment of 5G+AI in the security ind...
HTTP security headers are a fundamental part of w...
Virtualization technology is being used more and ...
1. SPI driver source file directory Linux common ...
315 is coming soon, and various consumer rights p...
As the deadline for the cancellation of roaming c...
[[386226]] 1. Introduction With the vigorous prom...
From networking and integration to failover, asse...
2021 is a year of rapid change in the field of sc...
The recently revised "Radio Management Regul...
The global economy is entering the digital econom...
At the beginning of the month, I shared RAKsmart&...
V5.NET has released a special promotional model, ...
[[346837]] After 2019, the first year of 5G, and ...