| 0 comments ]

Mitigating Layer 2 Attacks

Add a note here Like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements. Access to switches is a convenient entry point for attackers who are intent on illegally gaining access to a corporate network. With access to a switch, an attacker can set up rogue access points and protocol analyzers, and launch all types of attacks from within the network. Attackers can even spoof the MAC and IP addresses of critical servers to do a great deal of damage.

Add a note here Basic Switch Operation

Add a note hereUnlike hubs, switches can regulate the flow of data between their ports by creating “instant” networks that contain only the two end devices communicating with each other at that moment in time. When end systems send data frames, their source and destination addresses are not changed throughout the switched domain. Switches maintain content-addressable memory (CAM) lookup tables to track the source MAC addresses located on the switch ports. These lookup tables are populated by an address-learning process on the switch. If the destination MAC address of a frame is not known, or if the frame received by the switch is destined for a broadcast or multicast MAC address, the switch forwards the frame to all ports. Because of their capability to isolate traffic and create instant networks, you can use switches to divide a physical network into multiple logical segments, or VLANs, using Layer 2 traffic segmenting.

Add a note hereLayer 2 is the data link layer in the OSI model and is one of seven layers designed to work together but with autonomy. Layer 2 operates above the physical layer, but below the network and transport layers, as shown in Figure 7-20.

Click to collapse
Add a note hereFigure 7-20: Domino Effect If Layer 2 Is Compromised

Add a note hereLayer 2 independence enables interoperability and interconnectivity. However, from a security perspective, Layer 2 independence creates a challenge because a compromise at one layer is not always known by the other layers. If the initial attack comes in at Layer 2, the rest of the network can be compromised in an instant. Network security is only as strong as the weakest link—and that link might be the data link layer.

Add a note here Mitigating VLAN Attacks

Add a note hereA VLAN is a logical broadcast domain that can span multiple physical LAN segments, as shown in Figure 7-21. Within the switched internetwork, VLANs provide segmentation and organizational flexibility. You can design a VLAN structure that lets you group together stations that are segmented logically by functions, project teams, and applications without regard to the physical location of the users. You can assign each switch port to only one VLAN, thereby adding a layer of security. Ports in a VLAN share broadcasts; ports in different VLANs do not share broadcasts. Containing broadcasts within a VLAN improves the overall performance of the network.

Image from book
Add a note hereFigure 7-21: VLAN Overview

Add a note hereWithin the switched internetwork, VLANs provide segmentation and organizational flexibility. Using VLAN technology, you can group switch ports and their connected users into logically defined communities, such as coworkers in the same department, a cross-functional product team, or diverse user groups sharing the same network application.

Add a note hereA VLAN can exist on a single switch or span multiple switches. VLANs can include stations in a single building or multiple-building infrastructures. VLANs can also connect across WANs.

VLAN Hopping

Add a note here The VLAN architecture simplifies network maintenance and improves performance. However, VLAN operation opens the door to abuse. VLAN hopping allows traffic from one VLAN to be seen by another VLAN without first crossing a router. Under certain circumstances, attackers can sniff data and extract passwords and other sensitive information at will. The attack works by taking advantage of an incorrectly configured trunk port. By default, trunk ports have access to all VLANs and pass traffic for multiple VLANs across the same physical link, generally between switches. The data moving across these links may be encapsulated with IEEE 802.1Q or ISL.

VLAN Hopping by Rogue Trunk

Add a note hereIn a basic VLAN hopping attack, the attacker takes advantage of the default automatic trunking configuration on most switches. The network attacker configures a system to spoof itself as a switch. This spoofing requires that the network attacker be capable of emulating either ISL or 802.1Q signaling along with Dynamic Trunking Protocol (DTP) signaling, as shown in Figure 7-22. By tricking a switch into thinking it is another switch that needs to trunk, an attacker can gain access to all the VLANs allowed on the trunk port. To succeed, this attack requires a configuration on the port that supports trunking, such as auto. As a result, the attacker is a member of all the VLANS that are trunked on the switch and can “hop” (that is, send and receive traffic) on all of those VLANs.

Image from book
Add a note hereFigure 7-22: VLAN Hopping by Rogue Trunk

Add a note hereA VLAN hopping attack can be launched in one of two ways:

  • Add a note here Spoofing DTP messages from the attacking host to cause the switch to enter trunking mode: From here, the attacker can send traffic tagged with the target VLAN, and the switch then delivers the packets to the destination.

  • Add a note here Introducing a rogue switch and turning trunking on: The attacker can then access all the VLANs on the victim switch from the rogue switch.

Add a note hereThe best way to prevent a basic VLAN hopping attack is to turn off trunking on all ports except the ones that specifically require trunking. On the required trunking ports, disable DTP (auto trunking) negotiations and manually enable trunking.

VLAN Hopping by Double Tagging

Add a note here The double-tagging (or double-encapsulated) VLAN hopping attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q decapsulation and allow an attacker, in specific situations, to embed a hidden 802.1Q tag inside the frame. This tag allows the frame to go to a VLAN that the outer 802.1Q tag did not specify. An important characteristic of the double-encapsulated VLAN hopping attack is that it works even if trunk ports are set to off.

Add a note hereA double-tagging VLAN hopping attack follows four steps, as shown in Figure 7-23:

Add a note here Step 1

Add a note hereThe attacker sends a double-tagged 802.1Q frame to the switch. The outer header has the VLAN tag of the attacker, which is the same as the native VLAN of the trunk port. For the purposes of this example, assume that this is VLAN 10. The inner tag is the victim VLAN, VLAN 20.

Add a note here Step 2

Add a note hereThe frame arrives on the switch, which looks at the first 4-byte 802.1Q tag. The switch sees that the frame is destined for VLAN 10 and sends it out all VLAN 10 ports (including the trunk), because there is no CAM table entry. The switch does not add a VLAN 10 tag to the frames because VLAN 10 is the native VLAN, and as specified by the 802.1Q specification, native VLAN traffic is not tagged. At this point, the second VLAN tag is still intact and has not been inspected by the first switch.

Add a note here Step 3

Add a note hereThe frame arrives at the second switch but has no knowledge that it was supposed to be for VLAN 10.

Add a note here Step 4

Add a note hereThe second switch looks only at the 802.1Q tag (the former inner tag that the attacker sent) and sees that the frame is destined for VLAN 20 (the victim VLAN). The second switch sends the packet on to the victim port, or floods it, depending on whether there is an existing CAM table entry for the victim host.

Click to collapse

Add a note hereNote: This attack works only if the trunk has the same native VLAN as the attacker.


Add a note hereFigure 7-23: VLAN Hopping by Double Tagging

Add a note here It is important to note that this attack, as shown in Figure 7-23, is unidirectional and works only when the attacker and trunk port have the same native VLAN. Thwarting this type of attack is not as easy as stopping basic VLAN hopping attacks. The best approach is to ensure that the native VLAN of the trunk ports is different from the native VLAN of the user ports.

Add a note hereTo prevent a VLAN hopping attack that uses double 802.1Q encapsulation, the switch must look further into the packet to determine whether more than one VLAN tag is attached to a given frame. Unfortunately, the ASICs that most switches use are only hardware optimized to look for one tag and then switch the frame. The issue of performance versus security requires administrators to balance their requirements carefully.

Add a note hereMitigating VLAN hopping attacks that use double 802.1Q encapsulation requires several modifications to the VLAN configuration. One of the more important elements is to use a dedicated native VLAN for all trunk ports. This attack is easy to stop if you follow the best practice that native VLANs for trunk ports should never be used anywhere else on the switch. Also, disable all unused switch ports and place them in an unused VLAN.

Add a note hereYou have the following options to control trunking for ports:

  • Add a note hereFor links that you do not intend to trunk across, use the switchport mode access interface configuration command to disable trunking.

  • Add a note hereFor links that you do intend to trunk across, take the following actions:

    Add a note hereUse the switchport mode trunk interface configuration command to cause the interface to become a trunk link and use the switchport nonegotiate interface configuration command to prevent the generation of DTP frames.

    Add a note hereUse the switchport trunk native vlan vlan_number interface configuration command to set the native VLAN on the trunk to an unused VLAN. The default native VLAN is VLAN 1.

Add a note here Preventing Spanning Tree Protocol Manipulation

Add a note hereEven though redundant designs, shown in Figure 7-24, can eliminate the possibility of a single point of failure causing a loss of function for the entire switched or bridged network, you must consider problems that redundant designs can cause.

Image from book
Add a note hereFigure 7-24: Redundant Topology

Add a note here Some of the problems that can occur with redundant links and devices in switched or bridged networks are as follows:

  • Add a note here Broadcast storms: Without some loop-avoidance process in operation, each switch or bridge floods broadcasts endlessly. This situation is commonly called a broadcast storm.

  • Add a note here Multiple frame transmission: Multiple copies of unicast frames may be delivered to destination stations. Many protocols expect to receive only a single copy of each transmission. Multiple copies of the same frame can cause unrecoverable errors.

  • Add a note here MAC database instability: Instability in the content of the MAC address table results from copies of the same frame being received on different ports of the switch. Data forwarding can be impaired when the switch consumes the resources that are coping with instability in the MAC address table.

Add a note hereLayer 2 LAN protocols, such as Ethernet, lack a mechanism to recognize and eliminate endlessly looping frames. Some Layer 3 protocols implement a Time to Live (TTL) mechanism that limits the number of times a Layer 3 networking device can retransmit a packet. Lacking such a mechanism, Layer 2 devices continue to retransmit looping traffic indefinitely.

Add a note hereA loop-avoidance mechanism is required to solve each of these problems.

Add a note hereSpanning Tree Protocol (STP) provides loop resolution by managing the physical paths to given network segments. STP allows physical path redundancy while preventing the undesirable effects of active loops in the network. STP is an IEEE committee standard defined as 802.1D.

Add a note hereSTP behaves as follows:

  • Add a note hereSTP forces certain ports into a standby state so that they do not listen to, forward, or flood data frames, as seen in Figure 7-25, where one switch has a port in blocking mode. The overall effect is that only one active path exists to the other network segment at any time.

    Add a note here Image from book
    Add a note hereFigure 7-25: Loop Resolution with STP

  • Add a note hereIf there is a problem with connectivity to any of the segments within the network, STP reestablishes connectivity by automatically activating a previously inactive path, if one exists.

Add a note here STP performs three steps to provide a loop-free logical network topology:

Add a note here Step 1

Add a note here Elects one root bridge:

Add a note hereSTP has a process to elect a root bridge. Only one bridge can act as the root bridge in a given network. On the root bridge, all ports are designated ports. Designated ports are normally in the forwarding state. When in the forwarding state, a port can send and receive traffic. In Figure 7-26, switch X is the root bridge.

Image from book
Add a note hereFigure 7-26: STP Operation and Resulting Topology

Add a note here Step 2

Add a note here Selects the root port on the nonroot bridge:

Add a note hereSTP establishes one root port on each nonroot bridge. The root port is the lowest-cost path from the nonroot bridge to the root bridge. Root ports are normally in the forwarding state. Spanning-tree path cost is an accumulated cost that is calculated on the bandwidth. In Figure 7-26, the lowest-cost path to the root bridge from switch Y is through the 100BASE-T Fast Ethernet link.

Add a note here Step 3

Add a note here Selects the designated port on each segment:

Add a note hereOn each segment, STP establishes one designated port. The designated port is selected on the bridge that has the lowest-cost path to the root bridge. Designated ports are normally in the forwarding state, forwarding traffic for the segment. In Figure 7-26, the designated port for both segments is on the root bridge because the root bridge is directly connected to both segments. The 10BASE-T Ethernet port on switch Y is a nondesignated port because there is only one designated port per segment. Nondesignated ports are normally in the blocking state to logically break the loop topology. When a port is in the blocking state, it is not forwarding traffic but can still receive traffic.

Add a note here Figure 7-26 shows STP operations and the resulting topology.

Add a note hereSwitches and bridges running the spanning-tree algorithm exchange configuration messages with other switches and bridges at regular intervals (every two seconds by default). Switches and bridges exchange these messages using a multicast frame called the bridge protocol data unit (BPDU). One of the pieces of information included in the BPDU is the bridge ID (BID).

Add a note here STP calls for each switch or bridge to be assigned a unique BID. Typically, the BID is composed of a priority value (2 bytes) and the bridge MAC address (6 bytes). The default priority, in accordance with IEEE 802.1D, is 32,768 (1000 0000 0000 0000 in binary, or 0x8000 in hex format), which is the midrange value. The root bridge is the bridge with the lowest BID.


Note

Add a note hereA Cisco Catalyst switch uses one of its MAC addresses from a pool of MAC addresses that are assigned either to the backplane or to the supervisor module, depending on the switch model.

Add a note hereIn Figure 7-27, both switches are using the same default priority. The switch with the lowest MAC address is the root bridge. In Figure 7-26, switch X is the root bridge with the default priority of 0x8000 (hex,) or 32,768 in decimal, and a MAC address of 0c00.1111.1111.

Click to collapse
Add a note hereFigure 7-27: STP: Root Bridge Selection

Add a note here Figure 7-28 shows how a network attacker can use STP to change the topology of a network so that it appears that the network attacker host is a root bridge with a higher priority. The attacker sends out BPDUs with a better bridge ID, and as a result, becomes the root bridge. Now all the traffic for this switch domain passes through the new root bridge, which is actually the attacker system.

Image from book
Add a note hereFigure 7-28: STP Manipulation

Add a note hereBy manipulating the STP root bridge parameters, network attackers hope to spoof their system, or a rogue switch that they add to the network, as the root bridge in the topology. To do this, the network attacker broadcasts out STP configuration and topology change BPDUs in an attempt to force spanning-tree recalculations. The BPDUs sent out by the system or switch of the network attacker announce that the attacking system has a lower bridge priority. If successful, the network attacker becomes the root bridge and sees a variety of frames that otherwise would not be seen.


Note

Add a note hereThis attack can be used against all three security objectives of confidentiality, integrity, and availability.

PortFast

Add a note here The spanning-tree PortFast feature causes an interface configured as a Layer 2 access port to transition from the blocking to the forwarding state immediately, bypassing the listening and learning states. You can use PortFast on Layer 2 access ports that connect to a single workstation or server, as shown on Figure 7-29, to allow those devices to connect to the network immediately, instead of waiting for spanning tree to converge.

Image from book
Add a note hereFigure 7-29: Using PortFast

Add a note hereIf a port that is configured with PortFast receives a BPDU, spanning tree can put the port into the blocking state by using a feature called BPDU guard.


Caution

Add a note hereBecause the purpose of PortFast is to minimize the time that access ports must wait for spanning tree to converge, it should be used only on access ports. If you enable PortFast on a port connecting to another switch, you risk creating a spanning-tree loop.

Add a note here Table 7-6 lists the commands that you use to implement and verify PortFast on an interface.

Add a note here Table 7-6: PortFast Commands
Open table as spreadsheet

Add a note hereCommand

Add a note hereDescription

Add a note hereSwitch(config-if)# spanning-tree portfast

Add a note hereEnables PortFast on a Layer 2 access port and forces it to enter the forwarding state immediately.

Add a note hereSwitch(config-if)# no spanning-tree portfast

Add a note hereDisables PortFast on a Layer 2 access port. PortFast is disabled by default.

Add a note hereSwitch(config)# spanning-tree portfast default

Add a note hereGlobally enables the PortFast feature on all nontrunking ports.

Add a note hereSwitch# show running-config interface type slot/port

Add a note hereIndicates whether PortFast has been configured on a port.

Mitigating STP Vulnerabilities

Add a note hereTo mitigate STP manipulation, use the BPDU guard and root guard enhancement commands available on Cisco switches to enforce the placement of the root bridge in the network and enforce the STP domain borders.

BPDU Guard

Add a note hereThe STP BPDU guard feature is designed to enable network designers to keep the active network topology predictable. BPDU guard is used to protect the switched network from the problems that may be caused by the receipt of BPDUs on ports that should not be receiving them. The receipt of unexpected BPDUs might be accidental or might be part of an unauthorized attempt to add a switch to the network.

Add a note hereBPDU guard is best deployed toward user-facing ports to prevent rogue switch network extensions by an attacker.

Add a note hereThe global command to activate BPDU guard on all ports with PortFast enabled is as follows:

Add a note hereSwitch(config)# spanning-tree portfast bpduguard default

Add a note hereIn Figure 7-30, the attacker starts sending out spoofed BPDUs in an effort to become the root bridge. Upon receipt of a BPDU, the BPDU guard feature disables the port.

Image from book
Add a note hereFigure 7-30: BPDU Guard

Note

Add a note hereAnother command used to prevent BPDU filtering, which prevents a port from sending and receiving BPDUs is following the interface command:

Add a note hereSwitch(config-if)# spanning-tree bpdufilter enable

Add a note hereBe careful when you enter the spanning-tree bpdufilter enable command; it overrides the PortFast configuration, explained previously.

Add a note hereThis command has three states:

  • Add a note here Switch(config-if)# spanning-tree bpdufilter enable

    Add a note hereThis command state unconditionally enables BPDU filtering on the interface.

  • Add a note here Switch(config-if)# spanning-tree bpdufilter disable

    Add a note hereThis command state unconditionally disables BPDU filtering on the interface.

  • Add a note here Switch(config-if)# no spanning-tree bpdufilter

    Add a note hereThis command state enables BPDU filtering on the interface if the interface is in operational PortFast state and if you configure the spanning-tree portfast bpdufilter default command.

Root Guard

Add a note hereThe root guard feature of Cisco switches is designed to provide a way to enforce the placement of root bridges in the network. Root guard limits the switch ports out of which the root bridge can be negotiated. If a root guard–enabled port receives BPDUs that are superior to those that the current root bridge is sending, that port is moved to a root-inconsistent state, which is effectively equal to an STP listening state, and no data traffic is forwarded across that port.

Add a note hereBecause an administrator can manually set the bridge priority of a switch to zero, root guard might seem unnecessary. However, setting the priority of a switch to zero does not guarantee that switch will be elected as the root bridge, because another switch could have a priority of zero and a lower MAC address, and therefore a lower BID.

Add a note hereRoot guard is best deployed toward ports that connect to switches that should not be the root bridge.

Add a note hereThe command to enable root guard on a per-interface basis is as follows:

Add a note hereSwitch(config-if)# spanning-tree guard root

Add a note hereIn Figure 7-31, the attacker starts sending out spoofed BPDUs in an effort to become the root bridge. Upon receipt of a BPDU, the switch with the root guard feature configured on that port ignores the BPDU and puts the port in a root-inconsistent state. The port will recover as soon as the offending BPDUs cease.

Click to collapse
Add a note hereFigure 7-31: Root Guard
Confirming Spanning-Tree State

Add a note hereTo display information about the state of spanning tree, use the show spanning-tree summary command.

Add a note here Example 7-1 shows that BPDU guard is enabled.

Add a note here Example 7-1: show spanning-tree summary Command Output

Add a note hereSwitch# show spanning-tree summary
Root bridge for: Bridge group 1, VLAN0001, VLAN0004-VLAN1005
VLAN1013-VLAN1499, VLAN2001-VLAN4094
EtherChannel misconfiguration guard is enabled
Extended system ID is enabled
Portfast is enabled by default
PortFast BPDU Guard is enabled
Portfast BPDU Filter is disabled by default
Loopguard is disabled by default
UplinkFast is disabled
BackboneFast is disabled
Pathcost method used is long

Switch#

Add a note here CAM Table Overflow Attacks

Add a note hereThe CAM table in a switch contains the MAC addresses that can be reached off a given physical port of a switch and the associated VLAN parameters for each. When a Layer 2 switch receives a frame, the switch looks in the CAM table for the destination MAC address. If an entry exists for the MAC address in the CAM table, the switch forwards the frame to the MAC address port designated in the CAM table. If the MAC address does not exist in the CAM table, the switch acts like a hub and forwards the frame out every port on the switch.

Add a note hereThe key to understanding how CAM-overflow attacks work is to know that CAM tables are limited in size. MAC flooding takes advantage of this limitation by bombarding the switch with fake source MAC addresses until the switch CAM table is full. If enough entries are entered into the CAM table before other entries are expired, the CAM table fills up to the point that no new entries can be accepted.

Add a note hereIn a CAM table overflow attack, a network intruder floods the switch with a large number of invalid source MAC addresses until the CAM table fills up. When that occurs, the switch begins to flood all incoming traffic to all ports because there is no room in the CAM table to learn any legitimate MAC addresses. The switch, in essence, acts like a hub. As a result, the attacker can see all the frames sent from a victim host to another host without a CAM table entry. CAM table overflow floods traffic only within the local VLAN so that the intruder will see only traffic within the local VLAN to which the intruder is connected. If the intruder does not maintain the flood of invalid source MAC addresses, the switch eventually ages out older MAC address entries from the CAM table and begins to act like a switch again.

Add a note hereIn Figure 7-32, the macof program is running on Host C. This tool floods a switch with packets that contain randomly generated source and destination MAC and IP addresses. Over a short period, the CAM table in the switch fills up until it cannot accept new entries. When the CAM table fills up, the switch begins to flood all frames that it receives.

Click to collapse
Add a note hereFigure 7-32: CAM Table Overflow Attack

Add a note hereAs long as macof is left running, the CAM table on the switch remains full. When this happens, the switch begins to flood all received frames out every port so that frames sent from any host are also flooded out of port 3/25 on the switch.

Add a note here The CAM table overflow attack can be mitigated by configuring port security on the switch. With port security, you can either statically specify the MAC addresses on a particular switch port or you can allow the switch to dynamically learn a fixed number of MAC addresses for a switch port. To statically specify the MAC addresses on switch ports is far too unmanageable a solution for a production environment; however, allowing the switch to dynamically learn a fixed number of MAC addresses for a port is a more administratively scalable solution.

Add a note here MAC Address Spoofing Attacks

Add a note hereMAC spoofing attacks involve the use of a known MAC address of another host to attempt to make the target switch forward frames destined for the remote host to the network attacker. By sending a single frame with the source Ethernet address of the other host, the network attacker overwrites the CAM table entry so that the switch forwards packets destined for the host to the network attacker instead. Until the host sends traffic, it does not receive any traffic. When the host sends out traffic, the CAM table entry is rewritten once more so that it moves back to the original port.

Add a note here Figure 7-33 shows how MAC spoofing works. In the beginning, the switch has learned that Host A is on port 1, Host B is on port 2, and Host C is on port 3. Host B (attacker) sends out a packet identifying itself with the source MAC address of Host A. This traffic causes the switch to move the location of Host A in its CAM table from port 1 to port 2. Traffic from Host C destined to Host A is now visible to Host B and not to Host A.

Click to collapse
Add a note hereFigure 7-33: MAC Address Spoofing Attack

Add a note hereThis attack can also be mitigated using port security.

Add a note here Using Port Security

Add a note here You can use the port security feature to restrict input to an interface by limiting and identifying the MAC addresses of the stations that are allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses.

Add a note herePort security allows you to statically specify MAC addresses for a port or permit the switch to dynamically learn a limited number of MAC addresses. By limiting the number of permitted MAC addresses on a port to one, you can use port security to control unauthorized expansion of the network.

Add a note hereWhen a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, either the port shuts down until it is administratively enabled (default mode) or the port drops incoming packets from the unsecure host. The behavior of the port depends on how you configure it to respond to a security violation. In Figure 7-34, traffic from Attacker 1 and Attacker 2 will be dropped at the switch because the source MAC addresses of these frames do not match MAC addresses in the list of secured (allowed) addresses.

Image from book
Add a note hereFigure 7-34: Port Security

Add a note here It is recommended that you configure the port security feature to shut down a port instead of just dropping packets from insecure hosts. If port security does not shut down a port, it is possible that there will be too much load from an attack, and the port will be disabled anyway.


Note

Add a note hereFor specific guidelines and limitations on port security configuration, refer to the Cisco Catalyst Switch Configuration Guide.


Tip

Add a note herePort security protects against too many MAC address per ports and can dictate which MAC address is allowed to connect against which port. However, if the hacker spoofs the MAC address permitted on that port, he will gain access to the network. If you are concerned by spoofed MAC addresses, then consider implementing an 802.1X authentication solution.

Add a note hereTo configure port security on an access port, follow these steps (see Table 7-7 for command details):

Add a note here Table 7-7: switchport port-security Command Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here mac-address mac-address

Add a note here(Optional) Specify a secure MAC address for the port by entering a 48-bit MAC address. You can add additional secure MAC addresses up to the maximum value configured.

Add a note here vlan vlan-id

Add a note here(Optional) On a trunk port only, specify the VLAN ID and the MAC address. If no VLAN ID is specified, the native VLAN is used.

Add a note here vlan access

Add a note here(Optional) On an access port only, specify the VLAN as an access VLAN.

Add a note here vlan voice

Add a note here(Optional) On an access port only, specify the VLAN as a voice VLAN.

Add a note here Note: The voice keyword is available only if voice VLAN is configured on a port and if that port is not the access VLAN.

Add a note here mac-address sticky [mac-address]

Add a note here(Optional) Enable the interface for sticky learning by entering only the mac-address sticky keywords. When sticky learning is enabled, the interface adds all secure MAC addresses that are dynamically learned to the running configuration and converts these addresses to sticky secure MAC addresses.

Add a note hereSpecify a sticky secure MAC address by entering the mac-address sticky mac-address keywords.

Add a note here Note: Although you can specify a sticky secure MAC address by entering the mac-address sticky mac-address keywords, it is recommended that you use the mac-address mac-address interface configuration command to enter static secure MAC addresses.

Add a note here maximum value

Add a note here(Optional) Set the maximum number of secure MAC addresses for the interface. The maximum number of secure MAC addresses that you can configure on a switch is set by the maximum number of available MAC addresses allowed in the system. The active Switch Database Management (SDM) template determines this number. This number represents the total available MAC addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces.

Add a note hereThe default setting is 1.

Add a note here vlan [vlan-list]

Add a note here(Optional) For trunk ports, you can set the maximum number of secure MAC addresses on a specific VLAN. If the vlan keyword is not entered, the default value is used.

Add a note here vlan: set a per-VLAN maximum value.

Add a note here vlan vlan-list: set a per-VLAN maximum value on a range of VLANs separated by a hyphen or a series of VLANs separated by commas. For nonspecified VLANs, the per-VLAN maximum value is used.

Add a note here Step 1

Add a note here Enter interface configuration mode:

Add a note hereSwitch(config)# interface FastEthernet 0/8

Add a note here Step 2

Add a note hereConfigure the interface as an access interface:

Add a note hereSwitch(config-if)# switchport mode access

Note

Add a note hereWith an interface in the default mode (dynamic desirable), it cannot be configured as a secure port.

Add a note here Step 3

Add a note hereEnable port security on the interface:

Add a note hereSwitch(config-if)# switchport port-security [mac-address mac-address
[vlan {vlan-id | {access | voice}}] ] | [mac-address sticky [mac-address|
vlan {vlan-id | {access | voice}}]] [maximum value [vlan
{vlan-list | {access | voice}}]]

Add a note here Step 4

Add a note here(Optional) Set the maximum number of secure MAC addresses for the interface:

Add a note hereSwitch(config-if)# switchport port-security maximum value

Note

Add a note hereThe range is 1 to 132; the default is 1.

Add a note here Step 5

Add a note here(Optional) Set the violation mode. This is the action to be taken when a security violation is detected:

Add a note hereSwitch(config-if)# switchport port-security violation {protect |
restrict | shutdown | shutdown vlan}

Add a note here Table 7-8 provides the details of the switchport port-security violation command parameters.

Add a note here Table 7-8: switchport port-security violation Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here protect

Add a note here(Optional) Set the security violation protect mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred.

Add a note here restrict

Add a note here(Optional) Set the security violation restrict mode. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. Specifically, a Simple Network Management Protocol (SNMP) trap is sent, a syslog message is logged, and the violation counter increments.

Add a note here shutdown

Add a note here(Optional) Set the security violation shutdown mode. In this mode, a port security violation causes the interface to immediately become error disabled and turns off the port LED. It also sends an SNMP trap, logs a syslog message, and increments the violation counter. When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually reenable it by entering the shutdown and no shut down interface configuration commands.

Add a note here shutdown vlan

Add a note hereSet the security violation mode to per-VLAN shutdown. In this mode, only the VLAN on which the violation occurred is error-disabled.


Tip

Add a note hereWhen a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually reenable it by entering the shutdown and no shutdown interface configuration commands.

Add a note here Step 6

Add a note here(Optional) Enter a static secure MAC address for the interface with this command:

Add a note hereSwitch(config-if)# switchport port-security mac-address mac-address

Note

Add a note hereRepeat this command as many times as necessary for each secure MAC address.

Add a note here Step 7

Add a note here (Optional) Enable sticky learning on the interface with this command:

Add a note hereSwitch(config-if)# switchport port-security mac-address sticky

Add a note hereUse the no switchport port-security interface configuration command to return the interface to the default condition of not being a secure port. The sticky secure addresses remain part of the running configuration. To remove the sticky secure addresses from the running configuration, use the no mac-address mac-address command.

Add a note hereUse the no switchport port-security maximum value interface configuration command to return the interface to the default number of secure MAC addresses.

Add a note hereUse the no switchport port-security violation {protect | restrict} interface configuration command to return the violation mode to the default condition (shutdown mode).

Add a note hereYou can use port security aging to set the aging time for static and dynamic secure addresses on a port. Each port supports two types of aging:

  • Add a note here Absolute: The secure addresses on the port are deleted after the specified aging time.

  • Add a note here Inactivity: The secure addresses on the port are deleted only if the secure addresses are inactive for the specified aging time.

Add a note hereYou can use this feature to remove and add secure MAC addresses on a secure port without manually deleting the existing secure MAC addresses and still limit the number of secure addresses on a port. Also, you can enable or disable the aging of statically configured secure addresses on a per-port basis.

Add a note hereUse the switchport port-security aging {static | time time | type {absolute | inactivity}} command to enable or disable static aging for the secure port, or set the aging time or type. Table 7-9 provides the details of the switchport port-security again parameters.

Add a note here Table 7-9: switchport port-security aging Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here static

Add a note hereThis command option enables aging for statically configured secure addresses on this port.

Add a note here time time

Add a note hereThis command option specifies the aging time for this port. The range is 0 to 1440 minutes. If the time is 0, aging is disabled for this port.

Add a note here type absolute

Add a note hereThis command option sets the aging type to absolute. All the secure addresses on this port age out exactly after the time (minutes) specified and are removed from the secure address list.

Add a note here type inactivity

Add a note hereThis command option sets the aging type to inactivity. The secure addresses on this port age out only if there is no data traffic from the secure source address for the specified time period.

Add a note here Example 7-2 shows a typical port security configuration for a voice port. Two MAC addresses are allowed, and they are to be learned dynamically. One MAC address is for the IP phone, and the other IP address is for the PC connected to the IP phone. Violations of this policy result in the port being shut down, and the aging timeout for the learned MAC addresses is set to two hours.

Add a note here Example 7-2: Port Security Configuration

Add a note hereSwitch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 2
Switch(config-if)# switchport port-security violation shutdown
Switch(config-if)# switchport port-security mac-address sticky
Switch(config-if)# switchport port-security aging time 120

Add a note hereUse the show port-security command to view port security settings for the switch, including violation count, configured interfaces, and security violation actions.

Add a note hereUse the show port-security [interface interface-id] command to view port security settings for the specified interface, including the maximum allowed number of secure MAC addresses for each interface, the number of secure MAC addresses on the interface, the number of security violations that have occurred, and the violation mode.

Add a note here Example 7-3 shows that port security is enabled on port fa0/12 with a maximum MAC address count of 2. Currently, there are no MAC addresses learned on that port, and the violation action has been set to shut down the port.

Add a note here Example 7-3: show port-security Command Output

Add a note heresw-class# show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––-
Fa0/12 2 0 0 Shutdown
––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––-
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024

Add a note here Example 7-4 demonstrates output from the show port-security interface fa0/12 command, revealing that a violation has occurred, which means that more than one MAC address has been seen on the port. The port has been shutdown because of this policy violation, as confirmed by the secure-down port status.

Add a note here Example 7-4: show port-security interface fa0/12 Command Output

Add a note heresw-class# show port-security interface fa0/12
Port Security : Enabled
Port status : Secure-down
Violation mode : Shutdown
Maximum MAC Addresses : 1
Total MAC Addresses : 2
Configured MAC Addresses : 0
Aging time : 120 mins
Aging type : Absolute
SecureStatic address aging : Disabled
Security Violation Count : 1

Add a note here Use the show port-security [interface interface-id] address command to view all the secure MAC addresses that are configured on all switch interfaces, or on a specified interface, with aging information for each address.

Add a note here Example 7-5 shows that port fa0/12 is in VLAN 1 and has a secured MAC address of 0000.ffff.aaaa, which means that the host with the 0000.ffff.aaaa MAC address can connect to port fa0/12.

Add a note here Example 7-5: show port-security address Command Output

Add a note heresw-class# show port-security address
Secure Mac Address Table
––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––-
Vlan Mac Address Type Ports Remaining Age
(mins)
–––– ––––––––––- –––– ––––- ––––––––––––-
1 0000.ffff.aaaa SecureConfigured Fa0/12 -
––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––-
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024

Add a note hereNetwork managers need a way to monitor who is using the network and where they are. In Figure 7-35, if port Fa2/1 is secure, an SNMP trap will be generated when MAC D disappears from the CAM table of the switch.

Image from book
Add a note hereFigure 7-35: Notification of Intrusions

Add a note here The MAC address notification feature sends SNMP traps to the network management station (NMS) whenever a new MAC address is added to, or an old address is deleted from, the forwarding tables. MAC notifications are generated only for dynamic and secure MAC addresses.

Add a note hereMAC address notification allows the network administrator to monitor MAC addresses that are learned and MAC addresses that age out and are removed from the switch.

Add a note hereUse the mac address-table notification change global configuration command to enable the MAC address notification feature on the switch.

Add a note here Additional Switch Security Features

Add a note hereThe sections that follow describe the additional security features that are available with Cisco switches.

Switched Port Analyzer

Add a note hereYou can analyze the network traffic that passes through ports or VLANs by using Switched Port Analyzer (SPAN) or Remote Switched Port Analyzer (RSPAN) to send a copy of the traffic to another port on the switch, or to a port on another switch, that has been connected to a network analyzer or other monitoring or security device. SPAN copies (or mirrors) traffic received or sent (or both) on source ports or source VLANs to a destination port for analysis. SPAN does not affect the switching of network traffic on the source ports or VLANs. You must dedicate the destination port for SPAN use. Except for traffic that is required for the SPAN or RSPAN session, destination ports do not receive or forward traffic.

Add a note hereAn intrusion detection system (IDS) has the capability to detect misuse, abuse, and unauthorized access to networked resources. You can use SPAN to mirror traffic to another port where a probe or an IDS sensor is connected, as shown in Figure 7-36. When an IDS sensor detects an intruder, the sensor can send out a TCP reset that tears down the intruder connection within the network, immediately removing the intruder from the network.

Click to collapse
Add a note hereFigure 7-36: Switched Port Analyzer

Add a note here Example 7-6 shows how to set up SPAN session 1 for monitoring source port traffic to a destination port. First, any existing SPAN configuration for session 1 is deleted, and then bidirectional traffic is mirrored from source port Gigabit Ethernet 0/1 to destination port Gigabit Ethernet 0/2, retaining the encapsulation method.

Add a note here Example 7-6: Setting Up SPAN

Add a note hereSwitch(config)# no monitor session 1
Switch(config)# monitor session 1 source interface gigabitethernet0/1
Switch(config)# monitor session 1 destination interface gigabitethernet0/2 encapsulation replicate
Switch(config)# end


Note

Add a note hereShould you need ingress traffic to be passed on that SPAN port, use the following command:

Add a note hereSwitch(config)# monitor session 1 destination interface gigabitethernet0/2 encapsulation replicate ingress untagged vlan 5

Add a note hereAn IPS sensor configured with an EventAction of TCP reset is an example of a typology where the SPAN port needs to accommodate ingress traffic.

Remote SPAN

Add a note here Figure 7-37 shows that an RSPAN VLAN has been created for the forwarding of traffic from switch to switch to reach the IDS, which analyzes the traffic for malicious behavior. Source ports for the spanned traffic are found on all three switches resulting in the IDS examining traffic that is forwarded by all of these devices. As the attacker traffic leaves the router, a copy of it will be forwarded to the IDS for examination.

Click to collapse
Add a note hereFigure 7-37: Remote SPAN

Add a note hereTo configure RSPAN, you start by configuring the RSPAN VLAN. Example 7-7 shows the command to create VLAN 901 and configure it as an RSPAN VLAN.

Add a note here Example 7-7: Setting Up Remote SPAN

Add a note hereSwitch(config)# vlan 901
Switch(config-vlan)# remote-span

Add a note hereNext, it is necessary to configure the RSPAN source ports and VLANs. Example 7-8 shows a variety of sources.

Add a note here Example 7-8: Configuring RSPAN Source Ports

Add a note hereSwitch2(config)# monitor session 2 source interface fastethernet1/1 - 3 rx
Switch3(config)# monitor session 2 source interface fastethernet 5/15 , 7/3 rx
Switch4(config)# monitor session 2 source interface gigabitethernet 1/2 tx
Switch5(config)# monitor session 2 source interface port-channel 102
Switch6(config)# monitor session 2 source filter vlan 2 - 3
Switch7(config)# monitor session 2 destination remote vlan 901

Add a note here Finally, you configure the RSPAN traffic to be forwarded out an interface toward where the IDS resides. Example 7-9 configures traffic that is destined for VLAN 901 to be forwarded out interface FastEthernet 1/2.

Add a note here Example 7-9: Configuring Remote SPAN Traffic Toward a Specific Interface

Add a note hereSwitch(config)# monitor session 2 source remote vlan 901
Switch(config)# monitor session 2 destination interface fastethernet 1/2

Add a note hereTo display an RSPAN configuration, use the show monitor session command. Example 7-10 shows that the FastEthernet interfaces 1/1, 1/2, and 1/3 are configured as source ports to only receive traffic, and VLAN 901 is configured as the RSPAN VLAN.

Add a note here Example 7-10: show monitor session Command Output

Add a note hereSwitch2# show monitor session 2 detail
Session 2
————————————
Type : Remote Source Session
Source Ports:
RX Only: Fa1/1-3
TX Only: None
Both: None
Source VLANs:
RX Only: None
TX Only: None
Both: None
Source RSPAN VLAN: None
Destination Ports: None
Filter VLANs: None
Dest RSPAN VLAN: 901

LAN Storm Suppression

Add a note here A LAN storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance, as shown in Figure 7-38. Errors in the protocol-stack implementation, mistakes in network configurations, or users issuing a DoS attack can cause a storm. Broadcast storms can also occur on networks that have protocols that rely heavily on broadcasts (for example, some of the protocols in AppleTalk and Novell networking).

Image from book
Add a note hereFigure 7-38: LAN Storm

Add a note hereBy limiting the number of incoming broadcast, multicast, and unicast frames on each port, the processing and forwarding of frames is limited. Storm control (or traffic suppression) limits the number of incoming frames by monitoring packets that pass from an interface to the switching bus and determines whether the packet is unicast, multicast, or broadcast. The switch counts the number of packets of a specified type received within the one-second time interval and compares the measurement with a predefined suppression-level threshold. Storm control blocks traffic on a port when the rising threshold is reached.

Add a note hereFor example, on a Catalyst 3550 switch when a multicast storm occurs, the networking device blocks all traffic (broadcast, multicast, and unicast traffic) except for control traffic, such as BPDU frames. By default, when a broadcast or unicast storm occurs, the networking device blocks only the broadcast or unicast traffic. This blocking includes traffic that might be necessary in the network, such as routing protocol traffic. Therefore, you must assess the required thresholds on each port against their potential for attack and assess the required traffic for normal network operation. Also, the network should be designed and configured to remove or limit the normal broadcast and multicast traffic.

Add a note hereUse the storm-control interface configuration command to enable storm control on an interface and set the threshold value for each type of traffic. You can enter the storm-control suppression level as a percentage of total bandwidth of the port, as a rate in packets per second at which traffic is received, or as a rate in bits per second at which traffic is received.

Add a note hereWhen you specify the traffic suppression level as a percentage (up to two decimal places) of the total bandwidth, the level can be from 0.00 to 100.00. A threshold value of 100 percent means that no limit is placed on that type of traffic. A value of 0.0 means that all traffic of that type on that port is blocked.

Add a note hereThreshold percentages are approximations because of hardware limitations and the way in which packets of different sizes are counted. Depending on the packet sizes that make up the incoming traffic, the actual enforced threshold might differ from the configured level by several percentage points.


Note

Add a note hereStorm control is supported on physical interfaces. Since Cisco IOS Software Release 12.2(25), you can also configure storm control on EtherChannel port channels. When you configure storm control on an EtherChannel, the storm control settings propagate to the EtherChannel physical interfaces.

Add a note hereThe full command syntax for the storm-control command is as follows:

Add a note here
storm-control {{broadcast | multicast | unicast} level {level [level-low] | bps
bps [bps-low] | pps pps [pps-low]}} | {action {shutdown | trap}}

Add a note here Table 7-10 shows the details of the storm-control command.

Add a note here Table 7-10: storm-control Command Parameters
Open table as spreadsheet

Add a note hereParameter

Add a note hereDescription

Add a note here broadcast

Add a note hereThis parameter enables broadcast storm control on the interface.

Add a note here multicast

Add a note hereThis parameter enables multicast storm control on the interface.

Add a note here unicast

Add a note hereThis parameter enables unicast storm control on the interface.

Add a note here level level [level-low]

Add a note hereSpecify the rising and falling suppression levels as a percentage of total bandwidth of the port:

Add a note here level: Rising suppression level, up to two decimal places. The range is 0.00 to 100.00. Block the flooding of storm packets when the value specified for level is reached.

Add a note here level-low: (Optional) Falling suppression level, up to two decimal places. The range is 0.00 to 100.00. This value must be less than or equal to the rising suppression value. If you do not configure a falling suppression level, it is set to the rising suppression level.

Add a note here level bps bps [bps-low]

Add a note hereSpecify the rising and falling suppression levels as a rate in bits per second at which traffic is received on the port:

Add a note here bps: Rising suppression level, up to 1 decimal place. The range is 0.0 to 10000000000.0. Block the flooding of storm packets when the value specified for bps is reached.

Add a note here bps-low: (Optional) Falling suppression level, up to 1 decimal place. The range is 0.0 to 10000000000.0. This value must be equal to or less than the rising suppression value.

Add a note hereYou can use metric suffixes such as k, m, and g for large-number thresholds.

Add a note here level pps pps [pps-low]

Add a note hereSpecify the rising and falling suppression levels as a rate in packets per second at which traffic is received on the port:

Add a note here pps: Rising suppression level, up to 1 decimal place. The range is 0.0 to 10000000000.0. Block the flooding of storm packets when the value specified for pps is reached.

Add a note here pps-low: (Optional) Falling suppression level, up to one decimal place. The range is 0.0 to 10000000000.0. This value must be equal to or less than the rising suppression value.

Add a note hereYou can use metric suffixes such as k, m, and g for large-number thresholds.

Add a note here action {shutdown | trap}

Add a note hereThe action taken when a storm occurs on a port. The default action is to filter traffic and to not send an SNMP trap.

Add a note hereThe keywords have these meanings:

Add a note here shutdown: Disables the port during a storm

Add a note here trap: Sends an SNMP trap when a storm occurs

Add a note hereThe trap and shutdown options are independent of each other.

Add a note here If you configure the action to be taken as shutdown, the port is error disabled during a storm, and you must use the no shutdown interface configuration command to bring the interface out of this state.

Add a note hereWhen a storm occurs and the action is to filter traffic, if the falling suppression level is not specified, the switch blocks all traffic until the traffic rate drops below the rising suppression level. If the falling suppression level is specified, the switch blocks traffic until the traffic rate drops below this level.

Add a note hereUse the following command to verify the storm control settings:

Add a note here
show storm-control [interface][{broadcast | multicast | unicast | history}]

Add a note here Layer 2 Best Practices

Add a note hereThe following list suggests Layer 2 security best practices. All of these suggestions are dependent on your security policy:

  • Add a note hereManage switches in as secure a manner as possible (SSH, OOB, permit lists, and so on).

  • Add a note hereAlways use a dedicated VLAN ID for trunk ports.

  • Add a note hereDo not use VLAN 1 for anything.

  • Add a note hereSet all user ports to nontrunking (unless you are using Cisco VoIP).

  • Add a note hereUse port security where possible for access ports.

  • Add a note hereSelectively use SNMP and treat community strings like root passwords.

  • Add a note hereEnable STP attack mitigation (BPDU guard, root guard).

  • Add a note hereUse Cisco Discovery Protocol only where necessary (with phones it is useful).

  • Add a note hereDisable all unused ports and put them in an unused VLAN.

Add a note hereIt is important to manage switches like routers, using secure protocols or out-of-band methods if policy permits it. Because VLAN 1 is a known management VLAN, it is recommended that you avoid using it. Turn off services that are not necessary and ports that are not being used. Implement the various security services that have been covered in this chapter as necessary and as supported by your hardware. Turn Cisco Discovery Protocol (CDP) off on ports that do not connect to network devices, with the exception of ports that connect to Cisco IP phones.


Summary

Add a note here Layer 2 security is often an overlooked aspect of network security. It is important for security practitioners to remember that all software is vulnerable to poor programming. Buffer overflows can be the worst of these problems. The goals of endpoint security include protection from viruses, worms, and Trojan horses. SAN and voice security are also increasingly important because these technologies are growing in popularity in the modern enterprise.

Add a note hereThe major points covered in this chapter are as follows:

  • Add a note hereAn endpoint is an individual computer system or device that acts as a network client.

  • Add a note hereCisco offers different security appliances such as IronPort Systems, Cisco NAC Appliance, Cisco ASA, and Cisco MARS.

  • Add a note hereA SAN is a specialized network that enables fast, reliable access among servers and external storage resources.

  • Add a note hereVoIP is the transmission of voice traffic over IP-based networks. Hackers can tamper with voice systems, user identities, and telephone configurations and intercept voice-mail messages.

  • Add a note hereAssigning voice traffic to specific VLANs to logically segment voice and data traffic is an industrywide accepted best practice.

  • Add a note hereAlways use a dedicated VLAN ID for trunk ports and do not use VLAN 1 for anything. Also, set all user ports to nontrunking (unless you are using Cisco VoIP).

  • Add a note hereUse port security where possible for access ports and enable STP attack mitigation (BPDU guard, root guard).

  • Add a note hereVLAN hopping and MAC spoofing attacks are possible on switched networks and measures should be put in place to protect against those attacks.

Add a note here References

Add a note hereFor additional information, refer to these resources:

  • Add a note hereCisco Systems, Inc. Cisco Catalyst 6500 Series Switches: Private VLAN Catalyst Switch Support Matrix, http://tinyurl.com/2w22d6

  • Add a note hereCisco Systems, Inc. Securing Networks with Private VLANs and VLAN Access Control Lists, http://www.cisco.com/warp/public/473/90.shtml

  • Add a note hereCisco Systems, Inc. LAN Security: Introduction, http://tinyurl.com/594lpb

  • Add a note hereCisco Systems, Inc. Identity Based Networking Services Solution, http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns75/networking_solutions_sub_sub_solution_home.html

  • Add a note here Cisco Systems, Inc. Catalyst 6500 Release 12.2SXH Software Configuration Guide: Configuring Private VLANs (PVLANs), http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/pvlans.html

  • Add a note hereCisco Systems, Inc. Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.1(13)EW: Configuring Private VLANs, http://tinyurl.com/5mhtdl.

  • Add a note hereIronPort Systems. http://www.ironport.com

  • Add a note hereCisco Systems, Inc. Cisco Security Agent Introduction, http://www.cisco.com/go/csa

  • Add a note hereCisco Systems, Inc. Network Admission Control Introduction, http://www.cisco.com/go/nac

  • Add a note hereCisco Systems, Inc. Storage Networking Introduction, http://www.cisco.com/go/storagenetworking

  • Add a note hereCisco Systems, Inc. Data Center Networking, http://www.cisco.com/go/datacenter

  • Add a note hereStorage Network Industry Association. http://www.snia.org

  • Add a note hereANSI T11 FC Projects. http://www.t11.org/index.htm

  • Add a note hereVacca, J. R. The Essential Guide to Storage Area Networks (Prentice Hall, 2001)

  • Add a note hereWallace, K. Cisco Voice over IP (CVOICE) Self-Study (Cisco Press, 2007)

0 comments

Post a Comment