SlideShare ist ein Scribd-Unternehmen logo
1 von 18
SECURING MANAGEMENT, CONTROL
& DATA PLANE
Security | www.netprotocolxpert.in
Management Plane
• The management plane performs management functions for a network and coordinates functions
among all the planes (management, control, data). The management plane also is used to
manage a device through its connection to the network.
• Examples of protocols processed in the management plane are Simple Network Management
Protocol (SNMP), Telnet, HTTP, Secure HTTP (HTTPS), and SSH. These management protocols are
used for monitoring and for CLI access. Restricting access to devices to internal sources (trusted
networks) is critical.
• There are many methods you can manage a device “VTY, AUX, and Console” lines and ports and
you should do your best to keep access through it more secure as you can among some procedures
such as :-
• Strong passwords
• Make passwords very difficult to break, An attacker can break a password in several ways,
including a dictionary and/or a brute force attack. In addition to this, you should use the
encrypted password “enable secret” instead of plain text password “enable password”; Enable
secrets are hashed using the MD5 algorithm. Also, work on enforcing password policy,
including features such as maximum number of login attempts and minimum password
length.
• Encrypted management protocols
• Undoubtedly, accessing devices through “Telnet or HTTP” is not secure anymore as the
password sent in plain text, so encrypted communications should be used, such as Secure
Shell (SSH) or HypertextTransfer Protocol Secure (HTTPS).
• User authentication and AAA
• AAA stands for Authentication, Authorization and Accounting.
In large networks it isn’t logic to depend on the local user database for authenticating users.
The goal of AAA is to identify who users are before giving them any kind of access to the network, and
once they are identified, only give them access to the part they are authorized to use, see, or manage.
Cisco provides many ways to implement AAA services for Cisco devices, such as ACS server, TACACS
server, or RADIUS server and we will cover this point in more details at our next sessions.
• Role-based access control (RBAC)
• With RBAC, we can create a role (like a group) and assign that role to the users who will be
acting in that role. With the role comes the permissions and access. Ways to implement RBACs
include using Access Control Server (ACS) and CLI parser views.
• Logging
• Logging is a way to create an audit trail, Logging may be done in many different
ways, logging includes not only what administrators have changed or done, but also system
events that are generated by the router or switch because of some problem that has occurred
or some threshold that has been reached. This logging information may be sent to a syslog
server. SNMP one of the most important protocols can be used here.
• Network Time Protocol (NTP)
• NTP is a protocol which is used widely in networking industry to synchronize the clocks of
network infrastructure devices (Servers, Routers, Switches, Computers) over a network, This
becomes very important to correlate logs between devices in case there is ever a breach and
you need to reconstruct (or prove in a court of law) what occurred.
1. How to enable SSH to access a router or switch
• To enable SSH on a router or switch, the following items need to be in place:
• Hostname other than the default name of router.
• Domain name.
• Generating a public/private key pair, used behind the scenes by SSH.
• Requiring user login via the vty lines, instead of just a password. Local authentication or
authentication using anACS server are both options.
• Having at least one user account to log in with, either locally on the router, or on anACS server.
2. User Authentication with AAA
• There are two models to implement AAA server:-
1. Self-ContainedAAA
• AAA services in this model is a self-contained in the router. It is also known as local authentication.
1. The client establishes a connection with the router.
2. The AAA router prompts the user for a username and password.
3. The router authenticates the username and password using the local database and the user is
authorized to access the network based on information in the local database.
2. Server-Based AAA
• Uses an external database server to authenticate the username/Password.
1. The client establishes a connection with the router.
2. The AAA router prompts the user for a username and password.
3. The router authenticates the username and password using a remote AAA server.
4. The user is authorized to access the network based on information on the remote AAA Server.
• There are many names and access methods associated with the central server, including calling it an
authentication server, AAA server, ACS server,TACACS server, or RADIUS server.
• The following list describes a few of these centralized server types:
1. Cisco Secure ACS Solution Engine: It’s a server appliance with the Access Control Server (ACS) software
preinstalled, Cisco ACS uses the two distinct protocols for AAA services RADIUS &TACACS+.
2. Cisco Secure ACS for Windows Server: This software package may be used for user and administrator
authentication, AAA services on the router contact an external Cisco Secure ACS (running on a Microsoft
Windows system).
Securing Control Plane
• Control plane packets are network device–generated or received packets that are used for
the creation and operation of the network itself.
• From the perspective of the network device, control plane packets always have a receive
destination IP address and are handled by the CPU in the network device route processor.
Some examples of control plane functions include routing protocols (for example, BGP,
OSPF, EIGRP), as well as protocols like Internet Control Message Protocol (ICMP) and the
Resource Reservation Protocol (RSVP).
• So, The fateful issue to protect the control plane is minimizing the amount of CPU load as
much as we can.
Some of the packets and traffic which handled by the CPU:
• Receive adjacency traffic: This indication is for any IP address that requires direct handling
by the Cisco device CPU which is refereed by the term receive in the show ip cef command-
line interface (CLI) output.
• Access control list (ACL) logging: The log and log-input options apply to an ACL entries and
cause packets that match the ACL entry to be logged.
• Unicast Reverse Path Forwarding (uRPF): Security feature works by enabling a router to verify
the reachability of the source address in packets being forwarded.
• IP options: Any IP packets with options included must be processed by the CPU.
• Fragmentation: Any IP packet that requires fragmentation must be passed to the CPU for
processing.
• Time-To-Live (TTL) expiry: Packets that have aTTL value less than or equal to 1.
• Traffic requiring an ARP request: Destinations for which an ARP entry does not exist require
processing by the CPU.
• Non-IP traffic: All non-IP traffic is processed by the CPU.
• Through the use of control plane policing (CoPP) and control plane protection (CPPr) we can
secure the control plane.
Control Plane Policing(CoPP):
• It’s a feature designed to allow users to manage the flow of traffic handled by the router
processor of their network devices.
• Control plane policing can be performed through the use of granular classification ACLs and
the use of the show policymap control-plane command to display it.
Benefits of Control Plane Policing
• Configuring the Control Plane Policing feature on your Cisco router or switch provides the
following benefits:
• Protection against DoS attacks at infrastructure routers and switches.
• QoS control for packets that are destined to the control plane of Cisco routers or switches.
• Ease of configuration for control plane policies.
• Better platform reliability and availability
• In below example we are about permit only the BGP and OSPF and discard any ip packet has a
ttl less than 2 to reach the Cisco device CPU.
Control Plane Protection(CPPr):
• The Control Plane Protection feature is an extension of the policing functionality provided by
the existing Control-plane Policing feature.The Control-plane Policing feature allows Quality
of Service (QoS) policing of aggregate control-plane traffic destined to the route processor.
• Additionally , the CPPr feature provides the following:
• Port-filtering feature: Enables the policing and dropping of packets that are sent to closed or non-
listeningTCP or UDP ports.
• Queue-thresholding feature: Limits the number of packets for a specified protocol that are allowed in
the control-plane IP input queue.
• For more details about this technique, you can refer to below link.
http://www.cisco.com/c/en/us/about/security-center/understanding-cppr.html
Securing Data Plane
• Data plane is the name of the router/switch part which responsible to handle traffic that is
being forwarded through the network (sometimes called transit traffic), so it sometimes data
plane called as a forwarding plane.
• Data Plane is taking charge of Forward traffic to the next hop along the path to the selected
destination network according to control plane logic.
• Actually, the routers/switches use what the control plane built to dispose of incoming and
outgoing frames and packets.
• A failure of some component in the data plane results in the customer’s traffic not being able
to be forwarded. Other times, based on policy, you might want to deny specific types of traffic
that is traversing the data plane.
Securing the Data plane
• NowWe are about cover the methods available for implementing policy related to traffic
allowed through (transit traffic) network devices . As mentioned, For the data plane, this
discussion concerns traffic that is going through your network device.
• There are some ways to control and protect data plane-
• Access Control list (ACL) used for filtering
ACLs are used to secure the data plane in a variety of ways such as Block unwanted traffic or
users, reduce the chance of DoS attacks, mitigate spoofing attacks and Provide bandwidth control.
• Antispoofing
IP spoofing is a technique of generating IP packets with a source address that belongs to someone
else, Features such as Unicast Reverse Path Forwarding (uRPF) can be used to complement the
antispoofing strategy.
• Port security
To prevent MAC address spoofing and MAC address flooding attacks which occur when a
switch has no more room in its tables for dynamically learned MAC addresses, there is the
possibility of the switch not knowing the destination Layer 2 address (for the user’s frames)
and forwarding a frame to all devices in the sameVLAN.This might give the attacker the
opportunity to eavesdrop.
• DHCP Snooping
Which enable switch to listen in on DHCP traffic and stop any malicious DHCP packets.
DHCP servers are often used in man in the middle or denial of service attacks for malicious
purposes.
• Dynamic ARP inspection (DAI)
It can protect against Address Resolution Protocol (ARP ) spoofing, ARP poisoning (which
is advertising incorrect IP-to-MAC address mapping information), and resulting Layer 2
man-in-the-middle attacks.
DAI is a security feature that validates ARP packets in a network. DAI intercepts, logs, and
discards ARP packets with invalid IP-t o-MAC address bindings.
DAI determines the validity of an ARP packet based on valid IP-to-MAC address bindings
stored in a trusted database “DHCP snooping binding database”.
• IP source Guard
This feature helps to prevent IP spoofing, which is when an attacker claims the IP address
of a server or device on your network. By pretending to be that device, the attacker could
potentially direct sensitive data towards a port he’s connected to.
Also, source guard relies on a switch’s knowledge of DHCP-assigned host
addresses “DHCP snooping binding database” in order to validate and restrict spoofed
source addresses.

Weitere ähnliche Inhalte

Was ist angesagt?

Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
Kashif Latif
 

Was ist angesagt? (20)

Wpa3
Wpa3Wpa3
Wpa3
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Overview 5G NR Radio Protocols by Intel
Overview 5G NR Radio Protocols by Intel Overview 5G NR Radio Protocols by Intel
Overview 5G NR Radio Protocols by Intel
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
Amqp Basic
Amqp BasicAmqp Basic
Amqp Basic
 

Andere mochten auch

Cisco Intelligent WAN (IWAN) Solution
Cisco Intelligent WAN (IWAN) SolutionCisco Intelligent WAN (IWAN) Solution
Cisco Intelligent WAN (IWAN) Solution
Cisco Russia
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
Irsandi Hasan
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 

Andere mochten auch (20)

Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
 
Dmvpn with configuration example
Dmvpn with configuration exampleDmvpn with configuration example
Dmvpn with configuration example
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Cisco Intelligent WAN (IWAN) Solution
Cisco Intelligent WAN (IWAN) SolutionCisco Intelligent WAN (IWAN) Solution
Cisco Intelligent WAN (IWAN) Solution
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
NETCONF & YANG Enablement of Network Devices
NETCONF & YANG Enablement of Network DevicesNETCONF & YANG Enablement of Network Devices
NETCONF & YANG Enablement of Network Devices
 
How to Build Advanced Voice Assistants and Chatbots
How to Build Advanced Voice Assistants and ChatbotsHow to Build Advanced Voice Assistants and Chatbots
How to Build Advanced Voice Assistants and Chatbots
 
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)
 

Ähnlich wie Securing management, control & data plane

M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01
slavenvvv
 

Ähnlich wie Securing management, control & data plane (20)

Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
 
Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1Security defined routing_cybergamut_v1_1
Security defined routing_cybergamut_v1_1
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
BRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdfBRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdf
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01
 
Managing Microservices With The Istio Service Mesh on Kubernetes
Managing Microservices With The Istio Service Mesh on KubernetesManaging Microservices With The Istio Service Mesh on Kubernetes
Managing Microservices With The Istio Service Mesh on Kubernetes
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
UNIT 2.pdf
UNIT 2.pdfUNIT 2.pdf
UNIT 2.pdf
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 

Mehr von NetProtocol Xpert

Mehr von NetProtocol Xpert (20)

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
Regular expression examples
Regular expression examplesRegular expression examples
Regular expression examples
 
Eigrp is restricted to stub connections
Eigrp is restricted to stub connections Eigrp is restricted to stub connections
Eigrp is restricted to stub connections
 
Converting ipv4 to ipv6 and vice versa
Converting ipv4 to ipv6 and vice versaConverting ipv4 to ipv6 and vice versa
Converting ipv4 to ipv6 and vice versa
 
Password recovery cisco catalyst 3850
Password recovery cisco catalyst 3850Password recovery cisco catalyst 3850
Password recovery cisco catalyst 3850
 
Cisco 2960x switch password recovery
Cisco 2960x switch password recoveryCisco 2960x switch password recovery
Cisco 2960x switch password recovery
 
VMware ESXi 6.0 Installation Process
VMware ESXi 6.0 Installation ProcessVMware ESXi 6.0 Installation Process
VMware ESXi 6.0 Installation Process
 
EtherChannel Configuration
EtherChannel ConfigurationEtherChannel Configuration
EtherChannel Configuration
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
OSPF External Route Summarization
OSPF External Route Summarization OSPF External Route Summarization
OSPF External Route Summarization
 
OSPF Internal Route Summarization
OSPF Internal Route SummarizationOSPF Internal Route Summarization
OSPF Internal Route Summarization
 
Redistribution into OSPF
Redistribution into OSPFRedistribution into OSPF
Redistribution into OSPF
 

Kürzlich hochgeladen

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Securing management, control & data plane

  • 1. SECURING MANAGEMENT, CONTROL & DATA PLANE Security | www.netprotocolxpert.in
  • 2. Management Plane • The management plane performs management functions for a network and coordinates functions among all the planes (management, control, data). The management plane also is used to manage a device through its connection to the network. • Examples of protocols processed in the management plane are Simple Network Management Protocol (SNMP), Telnet, HTTP, Secure HTTP (HTTPS), and SSH. These management protocols are used for monitoring and for CLI access. Restricting access to devices to internal sources (trusted networks) is critical. • There are many methods you can manage a device “VTY, AUX, and Console” lines and ports and you should do your best to keep access through it more secure as you can among some procedures such as :-
  • 3. • Strong passwords • Make passwords very difficult to break, An attacker can break a password in several ways, including a dictionary and/or a brute force attack. In addition to this, you should use the encrypted password “enable secret” instead of plain text password “enable password”; Enable secrets are hashed using the MD5 algorithm. Also, work on enforcing password policy, including features such as maximum number of login attempts and minimum password length. • Encrypted management protocols • Undoubtedly, accessing devices through “Telnet or HTTP” is not secure anymore as the password sent in plain text, so encrypted communications should be used, such as Secure Shell (SSH) or HypertextTransfer Protocol Secure (HTTPS). • User authentication and AAA • AAA stands for Authentication, Authorization and Accounting. In large networks it isn’t logic to depend on the local user database for authenticating users. The goal of AAA is to identify who users are before giving them any kind of access to the network, and once they are identified, only give them access to the part they are authorized to use, see, or manage. Cisco provides many ways to implement AAA services for Cisco devices, such as ACS server, TACACS server, or RADIUS server and we will cover this point in more details at our next sessions.
  • 4. • Role-based access control (RBAC) • With RBAC, we can create a role (like a group) and assign that role to the users who will be acting in that role. With the role comes the permissions and access. Ways to implement RBACs include using Access Control Server (ACS) and CLI parser views. • Logging • Logging is a way to create an audit trail, Logging may be done in many different ways, logging includes not only what administrators have changed or done, but also system events that are generated by the router or switch because of some problem that has occurred or some threshold that has been reached. This logging information may be sent to a syslog server. SNMP one of the most important protocols can be used here. • Network Time Protocol (NTP) • NTP is a protocol which is used widely in networking industry to synchronize the clocks of network infrastructure devices (Servers, Routers, Switches, Computers) over a network, This becomes very important to correlate logs between devices in case there is ever a breach and you need to reconstruct (or prove in a court of law) what occurred.
  • 5. 1. How to enable SSH to access a router or switch • To enable SSH on a router or switch, the following items need to be in place: • Hostname other than the default name of router. • Domain name. • Generating a public/private key pair, used behind the scenes by SSH. • Requiring user login via the vty lines, instead of just a password. Local authentication or authentication using anACS server are both options. • Having at least one user account to log in with, either locally on the router, or on anACS server.
  • 6. 2. User Authentication with AAA • There are two models to implement AAA server:- 1. Self-ContainedAAA • AAA services in this model is a self-contained in the router. It is also known as local authentication. 1. The client establishes a connection with the router. 2. The AAA router prompts the user for a username and password. 3. The router authenticates the username and password using the local database and the user is authorized to access the network based on information in the local database.
  • 7. 2. Server-Based AAA • Uses an external database server to authenticate the username/Password. 1. The client establishes a connection with the router. 2. The AAA router prompts the user for a username and password. 3. The router authenticates the username and password using a remote AAA server. 4. The user is authorized to access the network based on information on the remote AAA Server. • There are many names and access methods associated with the central server, including calling it an authentication server, AAA server, ACS server,TACACS server, or RADIUS server. • The following list describes a few of these centralized server types: 1. Cisco Secure ACS Solution Engine: It’s a server appliance with the Access Control Server (ACS) software preinstalled, Cisco ACS uses the two distinct protocols for AAA services RADIUS &TACACS+. 2. Cisco Secure ACS for Windows Server: This software package may be used for user and administrator authentication, AAA services on the router contact an external Cisco Secure ACS (running on a Microsoft Windows system).
  • 8. Securing Control Plane • Control plane packets are network device–generated or received packets that are used for the creation and operation of the network itself. • From the perspective of the network device, control plane packets always have a receive destination IP address and are handled by the CPU in the network device route processor. Some examples of control plane functions include routing protocols (for example, BGP, OSPF, EIGRP), as well as protocols like Internet Control Message Protocol (ICMP) and the Resource Reservation Protocol (RSVP). • So, The fateful issue to protect the control plane is minimizing the amount of CPU load as much as we can.
  • 9. Some of the packets and traffic which handled by the CPU: • Receive adjacency traffic: This indication is for any IP address that requires direct handling by the Cisco device CPU which is refereed by the term receive in the show ip cef command- line interface (CLI) output. • Access control list (ACL) logging: The log and log-input options apply to an ACL entries and cause packets that match the ACL entry to be logged. • Unicast Reverse Path Forwarding (uRPF): Security feature works by enabling a router to verify the reachability of the source address in packets being forwarded. • IP options: Any IP packets with options included must be processed by the CPU. • Fragmentation: Any IP packet that requires fragmentation must be passed to the CPU for processing.
  • 10. • Time-To-Live (TTL) expiry: Packets that have aTTL value less than or equal to 1. • Traffic requiring an ARP request: Destinations for which an ARP entry does not exist require processing by the CPU. • Non-IP traffic: All non-IP traffic is processed by the CPU. • Through the use of control plane policing (CoPP) and control plane protection (CPPr) we can secure the control plane.
  • 11. Control Plane Policing(CoPP): • It’s a feature designed to allow users to manage the flow of traffic handled by the router processor of their network devices. • Control plane policing can be performed through the use of granular classification ACLs and the use of the show policymap control-plane command to display it. Benefits of Control Plane Policing • Configuring the Control Plane Policing feature on your Cisco router or switch provides the following benefits: • Protection against DoS attacks at infrastructure routers and switches. • QoS control for packets that are destined to the control plane of Cisco routers or switches. • Ease of configuration for control plane policies. • Better platform reliability and availability
  • 12. • In below example we are about permit only the BGP and OSPF and discard any ip packet has a ttl less than 2 to reach the Cisco device CPU.
  • 13. Control Plane Protection(CPPr): • The Control Plane Protection feature is an extension of the policing functionality provided by the existing Control-plane Policing feature.The Control-plane Policing feature allows Quality of Service (QoS) policing of aggregate control-plane traffic destined to the route processor. • Additionally , the CPPr feature provides the following: • Port-filtering feature: Enables the policing and dropping of packets that are sent to closed or non- listeningTCP or UDP ports. • Queue-thresholding feature: Limits the number of packets for a specified protocol that are allowed in the control-plane IP input queue. • For more details about this technique, you can refer to below link. http://www.cisco.com/c/en/us/about/security-center/understanding-cppr.html
  • 14. Securing Data Plane • Data plane is the name of the router/switch part which responsible to handle traffic that is being forwarded through the network (sometimes called transit traffic), so it sometimes data plane called as a forwarding plane. • Data Plane is taking charge of Forward traffic to the next hop along the path to the selected destination network according to control plane logic. • Actually, the routers/switches use what the control plane built to dispose of incoming and outgoing frames and packets. • A failure of some component in the data plane results in the customer’s traffic not being able to be forwarded. Other times, based on policy, you might want to deny specific types of traffic that is traversing the data plane.
  • 15.
  • 16. Securing the Data plane • NowWe are about cover the methods available for implementing policy related to traffic allowed through (transit traffic) network devices . As mentioned, For the data plane, this discussion concerns traffic that is going through your network device. • There are some ways to control and protect data plane- • Access Control list (ACL) used for filtering ACLs are used to secure the data plane in a variety of ways such as Block unwanted traffic or users, reduce the chance of DoS attacks, mitigate spoofing attacks and Provide bandwidth control. • Antispoofing IP spoofing is a technique of generating IP packets with a source address that belongs to someone else, Features such as Unicast Reverse Path Forwarding (uRPF) can be used to complement the antispoofing strategy.
  • 17. • Port security To prevent MAC address spoofing and MAC address flooding attacks which occur when a switch has no more room in its tables for dynamically learned MAC addresses, there is the possibility of the switch not knowing the destination Layer 2 address (for the user’s frames) and forwarding a frame to all devices in the sameVLAN.This might give the attacker the opportunity to eavesdrop. • DHCP Snooping Which enable switch to listen in on DHCP traffic and stop any malicious DHCP packets. DHCP servers are often used in man in the middle or denial of service attacks for malicious purposes.
  • 18. • Dynamic ARP inspection (DAI) It can protect against Address Resolution Protocol (ARP ) spoofing, ARP poisoning (which is advertising incorrect IP-to-MAC address mapping information), and resulting Layer 2 man-in-the-middle attacks. DAI is a security feature that validates ARP packets in a network. DAI intercepts, logs, and discards ARP packets with invalid IP-t o-MAC address bindings. DAI determines the validity of an ARP packet based on valid IP-to-MAC address bindings stored in a trusted database “DHCP snooping binding database”. • IP source Guard This feature helps to prevent IP spoofing, which is when an attacker claims the IP address of a server or device on your network. By pretending to be that device, the attacker could potentially direct sensitive data towards a port he’s connected to. Also, source guard relies on a switch’s knowledge of DHCP-assigned host addresses “DHCP snooping binding database” in order to validate and restrict spoofed source addresses.