MAC Table Attackes Flashcards

1
Q

MAC table Attacks modus operandi

A

MAC address flooding attacks take advantage of this limitation by bombarding the
switch with fake source MAC addresses until the switch MAC address table is full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC table Attacks Expected results

A

The switch treats the frame as an unknown unicast and begins to flood all incoming
traffic out all ports on the same VLAN without referencing the MAC table

On some bogus switches, DOS has also been observed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAC table Attacks Amplification

A

When the MAC address table of a switch is full, it starts flooding out all ports including those connected to other Layer 2 switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC table attacks Mitigation

A

Port security features :

  • Disable unused ports
  • Limit the number of learnt MAC address on a port
  • Adapt port Aging
  • Defini an appropriate violation policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC table Attacks mitigation Limit the number of learnt MAC address on a port :

Manual configuration

A

The administrator configures a STATIC MAC address :
Command :
Switch(config-if) # switchport port-security mac-address “mac-address”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAC table Attacks mitigation Limit the number of learnt MAC address on a port :
Dynamically learned

A

Enter the command “switchport port-security”, the current source MAC for the device connected to the port is automatically secured (the port of the switch keep just the initial MAC address) but is not added to the startup configuration. If the switch is rebooted, the port will have to re-learn the device’s MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC table Attacks mitigation limit the number of learnt MAC address on a port :
Dynamically learned - Sticky

A

command :
Switch(config-if)# switchport port-security mac-address sticky
Learn the MAC address and “stick” them to the running configuration, the port will work only if the MAC address at the extremity is the good one, saving the running configuration will commit the dynamically learned MAC address to NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC table attacks Mitigation : Port security aging

A

Switch(config-if)#switchport port-security aging { static | time time | type {absolute | inactivity }}

static : Enable aging for statically configured secure addresses on this port.

time: time Specify the aging time for this port. The range is 0 to 1440 minutes. If the time is 0, aging is
disabled for this port.

type absolute : Set the absolute aging time. All the secure addresses on this port age out exactly after the
time (in minutes) specified and are removed from the secure address list.

type inactivity : Set the inactivity aging type. The secure addresses on this port age out only if there is no
data traffic from the secure source address for the specified time period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC table attacks Mitigation : Violation policy

A

Switch(config-if)# switchport port-security violation { protect | restrict | shutdown }

shutdown
(default) :
The port transitions to the error-disabled state immediately, turns off the port LED,
and sends a syslog message. It increments the violation counter. When a secure
port is in the error-disabled state, an administrator must re-enable it by entering
the shutdown and no shutdown commands.

restrict :
The port drops packets with unknown source addresses until you remove a
sufficient number of secure MAC addresses to drop below the maximum value or
increase the maximum value. This mode causes the Security Violation counter to
increment and generates a syslog message.

protect :
This is the least secure of the security violation modes. The port drops packets with
unknown MAC source addresses until you remove a sufficient number of secure
MAC addresses to drop below the maximum value or increase the maximum value.
No syslog message is sent.

Discrds
Offending
Traffic: 1er
Sends Syslog
Message: 2ème
Increase
Violation
Counter : 3ème
Shuts Down
Port : 4ème
Protect Yes No No No
Restrict Yes Yes Yes No
Shutdown Yes Yes Yes Yes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly