5.7 Layer 2 Security Features Flashcards
Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security). (26 cards)
Define:
Layer 2 security features
Security mechanisms that protect against threats at the Data Link layer.
Layer 2 security features include DHCP snooping, Dynamic ARP Inspection (DAI), and Port Security, all designed to protect the network from unauthorized access, ARP spoofing, and rogue DHCP servers.
Define:
DHCP snooping
A security feature that prevents rogue DHCP servers from assigning IP addresses.
DHCP snooping monitors DHCP messages and ensures that only trusted servers can assign IP addresses, blocking unauthorized DHCP servers from providing incorrect or malicious IP configurations.
How does DHCP snooping enhance network security?
It limits DHCP traffic to trusted servers only.
By filtering DHCP messages and allowing only trusted servers to respond, DHCP snooping prevents rogue servers from assigning malicious IP addresses to clients, thus securing the network.
How do trusted and untrusted ports differ in DHCP snooping?
- Trusted ports: Permit DHCP server messages.
- Untrusted ports: Used for client devices.
Trusted ports are typically connected to authorized DHCP servers, while untrusted ports are used for client devices that receive DHCP assignments but should not send DHCP offers.
What command enables DHCP snooping on a Cisco switch?
ip dhcp snooping
This command is required to enable DHCP snooping globally, and additional configurations are needed to define trusted ports and specify VLANs to monitor.
What are the steps to configure DHCP snooping?
- Enable DHCP snooping globally with ip dhcp snooping.
- Define trusted and untrusted ports.
- Enable DHCP snooping on specific VLANs with ip dhcp snooping vlan [vlan_id].
- Optionally configure rate limiting for DHCP requests.
DHCP snooping helps secure the network by ensuring that only authorized DHCP servers can assign IP addresses.
True or False
DHCP snooping only works with IP addresses.
False
While DHCP snooping is focused on IP-to-MAC bindings, it also provides valuable data for Dynamic ARP Inspection (DAI), which helps protect against ARP spoofing.
What does DHCP snooping prevent in a network?
Unauthorized DHCP servers from assigning IP addresses.
By monitoring and controlling DHCP messages, DHCP snooping ensures only legitimate DHCP servers can assign IP addresses to clients, preventing network disruption.
True or False:
DHCP snooping only works with IP addresses.
False
While DHCP snooping is focused on IP-to-MAC bindings, it also provides valuable data for Dynamic ARP Inspection (DAI), which helps protect against ARP spoofing.
Fill in the blank:
Dynamic ARP Inspection (DAI) helps protect against ______ ______.
ARP spoofing
DAI validates ARP messages to ensure that they are not malicious, preventing attackers from sending false ARP replies to hijack network traffic.
What does the show ip dhcp snooping binding command display?
The IP-to-MAC address bindings learned via DHCP snooping.
This database is used by Dynamic ARP Inspection (DAI) to validate ARP messages and prevent ARP spoofing attacks.
What is the primary function of Dynamic ARP Inspection (DAI)?
It prevents ARP spoofing
DAI checks ARP requests and responses against the DHCP snooping database, ensuring the IP-MAC bindings are correct to prevent attackers from sending falsified ARP responses.
How does Dynamic ARP Inspection (DAI) protect against ARP spoofing?
It validates ARP packets against the DHCP snooping binding database.
DAI ensures that ARP messages contain valid IP-to-MAC mappings, preventing attackers from sending false ARP responses to hijack traffic.
What command enables Dynamic ARP Inspection (DAI) on a Cisco switch for a VLAN?
ip arp inspection vlan [vlan_id]
This command enables DAI for specific VLANs, allowing the switch to inspect ARP packets and validate them using the bindings provided by DHCP snooping.
True or False:
Dynamic ARP Inspection (DAI) works without DHCP snooping.
False
DAI depends on the IP-to-MAC bindings learned via DHCP snooping to validate ARP messages.
Without DHCP snooping, DAI cannot verify ARP packet authenticity, making both features dependent on each other.
Define:
Port Security
A feature that limits access to a switch port based on the MAC address.
Port Security ensures that only authorized devices, identified by their MAC addresses, can communicate on the port, preventing unauthorized devices from accessing the network.
Describe how Port Security works with the “restrict” mode.
It drops packets from unauthorized devices but logs violations.
In restrict mode, the port allows traffic from trusted devices, drops traffic from unauthorized devices, and logs the violation, providing visibility into potential security threats.
What happens if a Port Security violation occurs in shutdown mode?
The port is disabled and must be manually re-enabled.
In shutdown mode, if a violation occurs, the switch disables the port to prevent unauthorized access, requiring manual intervention to bring the port back online.
Define:
sticky MAC addresses
MAC addresses automatically learned and bound to a port.
Sticky MAC addresses are dynamically learned and stored by the switch, even after reboots, simplifying the management of trusted devices.
What are the three Port Security violation modes?
- Protect
- Restrict
- Shutdown
Protect – Drops packets from unauthorized devices.
Restrict – Drops packets and logs violations.
Shutdown – Disables the port and requires manual intervention.
Why would you configure Port Security with a limit on MAC addresses?
To prevent unauthorized devices from accessing the network.
Limiting the number of MAC addresses per port ensures that only the expected number of devices can connect, reducing the risk of unauthorized network access.
What is the default behavior of Port Security when a violation occurs?
The default mode is shutdown, which disables the port.
In the default configuration, Port Security automatically disables the port when a violation is detected to prevent unauthorized access, requiring manual intervention to restore access.
How does Port Security handle dynamically learned MAC addresses?
By learning and binding the MAC addresses to the port.
Dynamic MAC addresses can be either sticky or non-sticky, allowing flexibility in managing devices that temporarily connect to the network.
What command enables Port Security on a switch?
switchport port-security
This command enables Port Security on a port, and further configurations, such as setting the maximum number of MAC addresses, can be applied.