Why should we care about switch security???
This diagram mainly shows that firewalls, routers, and switches are generally placed at the border or DMZ, core and distribution layer, and access layer respectively; Among these devices, why are switches the least secure?
Possible attack forms and defense measures at the switch level: For so many forms of attack, we can roughly divide them into four categories:
1. VLAN Hopping Attack Use Trunk or Double Tag (native) to sniff or attack information from other VLANs Countermeasures:
2. STP spoofing attack Influencing the spanning tree topology by forging incorrect BPDU messages Countermeasures: (1) Configure BPDU guard on the interface (access) connected to the host or router. This type of interface should not receive BPDUs. If it does, the interface will be set to error disable state. spanning-tree bpduguard enable on the interface (2) Or configure Root Guard on the above interfaces. This type of interface can receive BPDUs, but if it is a better BPDU, the interface is set to error disable state to avoid the change of the root bridge. spanning-tree guard root under interface MAC spoofing attack Stealing other people's MAC addresses to forge attacks, or illegally accessing the network to steal information Countermeasures:
IV. CAM/MAC Flood Attack By continuously forging MAC addresses and sending messages, the switch CAM table is flooded with junk MAC addresses in a short period of time, the real MAC is squeezed out, the known unicast becomes unknown unicast, and is forced to flood, causing the data to be sniffed. Countermeasures: Port security, limiting the maximum number of MAC addresses that a port can learn 5. DHCP Server Spoofing Attack The illegal DHCP server preemptively allocates addresses to customers, issues fake gateway addresses, and directs customer traffic to the "middleman" to achieve information sniffing. Countermeasures: Configure DHCP Snooping on the Layer 3 switch to monitor DHCP messages and intercept address allocation messages from illegal DHCP servers. 6. DHCP starvation (address pool exhaustion) Constantly changing MAC addresses and forging DHCP request messages will consume all the addresses in the DHCP server address pool in a short period of time, making it impossible for legitimate users to obtain IP addresses. Countermeasures:
7. ARP Spoofing Publish fake ARP reply messages to direct customer messages to the "middleman", thereby achieving data sniffing. Countermeasures:
8. IP address spoofing Stealing IP addresses, illegally accessing the network, or impersonating others to send attack traffic Countermeasures:
9. Attacks on the switch itself Intercept CDP (plain text) messages, obtain the switch management address, and then perform brute force password cracking; intercept Telnet messages (plain text) and sniff passwords. After obtaining switch management permissions, they can do whatever they want. Countermeasures:
|
<<: Are the operators wronged when being questioned about “4G speed reduction and 5G hibernation”?
"Industrial Internet" has been written ...
[51CTO.com original article] On April 25, Huawei ...
CUBECLOUD has launched a promotion during the Mid...
The introduction of the new infrastructure strate...
If the previous exploration and practice of diffe...
The network equipment such as routers has now bee...
[[386510]] Today, China Telecom announced its ful...
Today, the global food challenge has become a rea...
This afternoon, Huawei's new product launch c...
Digital-vm released the promotion information for...
[[245408]] OSI computer network 7-layer model TCP...
RepriseHosting is a low-cost US server provider f...
Recently, the "Conference on Deepening the I...
HostYun has added a new VPS product in Hong Kong&...
Will the "joker" break your cognitive b...