International Journal of Application or Innovation in Engineering & Management...

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
ISSN 2319 - 4847
Special Issue for National Conference On Recent Advances in Technology and Management for
Integrated Growth 2013 (RATMIG 2013)
Effective Remote Management for Inter-VLAN
Routing Networks
Rajiv O. Verma
Asst. Professor, Guru Nanak Institute of Engineering & Technology, Nagpur.
rajiv_verma44@hotmail.com
ABSTRACT
VLANs are extensively used in enterprise network to ease management of hosts to improve scalability and flexibility. Despite their
wide usage in enterprise network, VLAN security is a greater concern for the network administrator due to very little attention has
been paid on error prone, unsystematic, high risk of misconfiguration in the design and management of enterprise VLAN network
[20] . This paper extends the consideration of how to handle remote access to VLAN switches. We have shown the management of
VLAN switches from remote location by using protocols such as telnet, SSH, etc. We proposed effective ways to restrict access to
management functions from remote sources. We have used access-control-lists to filter the traffic of inter-VLAN routing as well as
to restrict remote access to VLAN switches designed in VTP model. Unless otherwise stated this paper is based upon configuration
& hardware implementation in a Cisco environment. We demonstrate the security optimization techniques in designing VLAN both
for Inter-VLAN communication and addressing VTP issues.
Keywords-- VLAN; VTP; DTP; SSH; ACL
1. INTRODUCTION
Today’s enterprise network is undergoing a stringent complexity due to frequent change in design of their networks for
new organizational needs. Configuration changes are required due to movement of departments and user, addition of new
hosts, revision of security policies, company mergers and malicious intruders. The frequency and complexity of
configuration changes results in error-prone enterprise networks [5]. However, yet these challenges in enterprise network
have received little attention from the research community. One prominent example is VLAN design which is
extensively used in enterprise networks[2].VLAN’s were initially intended to connect a group of hosts in the same
broadcast domain, independent of their physical location. The expectation for today’s VLAN has increases due to better
security, flexibility and scalability requirements [1]. CISCO’s VLAN trunking protocol reduces administration in a
switched network [4]. VTP has some issues but not much research has been done for complexities arise in VTP based
configuration. In this paper, we focus strongly on various security aspects of VLAN design using with VTP to reduce the
much administrative work apart from optimal Inter-VLAN routing design. We proposed various security aspects like
access-lists based layer 3 securities in Inter-VLAN routing, deactivating native VLAN1 to secure Layer 2 traffic in VTP
model, application of authentication on VTP server and nonnegotiating Dynamic Trunking Protocol mode to counter the
effect of inserting a rogue switch/trunk with higher config revision number [20]. Cisco Catalyst switches can provide a
remote administration and management interface into the switch which can be configured with an IP address. These
management interfaces are referred to as in-band management interfaces because they are attached to and can be
accessed from the data network.
Organized By: GNI Nagpur, India
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
ISSN 2319 - 4847
Special Issue for National Conference On Recent Advances in Technology and Management for
Integrated Growth 2013 (RATMIG 2013)
2. INTER-VLAN ROUTING
In this section a simulated VLAN design is used using VLAN Trunking protocol (VTP) to fulfill our objective to reduce
the much administrative work with less costing. In the first part we have configure the VTP model by interconnecting
four switches such that one acts as VTP Server and the other three are clients. VTP server will automatically update the
summary/subset advertisement to all the connected clients. In the second part we have connected a router with single
interface with the VTP Server switch to simulate inter-VLAN Routing.
Table I. Interface ports for Network in Figure 1.
ROUTER0
A
B
C
D
E
A
F0/F1
*
F1/F2
F1/F3
F1/F4
*
PC1
*
*
F2/E0
*
*
*
PC2
*
*
*
F2/E0
*
*
PC3
*
*
*
*
F2/E0
*
PC0
*
*
*
*
*
F2/E0
ROUTER1
S0/S0
*
*
*
*
F1/F0
Table II. IP Address Allocation in Figure 1.
Organized By: GNI Nagpur, India
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
ISSN 2319 - 4847
Special Issue for National Conference On Recent Advances in Technology and Management for
Integrated Growth 2013 (RATMIG 2013)
Router0
F0/0.1- 192.168.1.254
Router0
F0/0.2- 192.168.2.254
Router0
F0/0.3- 192.168.3.254
Router1
F0/0-192.168.4.254
PC1- 192.168.1.1
DG- 192.168.1.254
PC2- 192.168.2.1
DG- 192.168.2.254
PC3- 192.168.3.1
DG- 192.168.3.254
PC0- 192.168.4.1
DG- 192.168.4.254
VLAN’s allow you to isolate users from each other by placing them in different VLAN’s but how do you pass traffic
from one VLAN to another VLAN? Doing so involves the use of Layer 3 device to route the traffic from one VLAN to
another [10]. The best way is to use a router for inter-VLAN communication. In traditional method, each of the router
interfaces is connected to an access links that in turn is connected to hosts. Such design requires 3 physical interfaces for
three VLAN’s (as per our example). In our proposed method, router interface is not connected to an access links; instead
the router fast Ethernet interface is connected to the VTP server switch interface and configured with ISL or 802.1q
trunking. The benefit of using a trunk link is to reduce the number of router and switch interfaces used. A single trunk
link saves the cost and minimizes configuration complexity. One fast Ethernet interface f0/0 is divided into three subinterfaces and VLAN encapsulation is defined for each sub-interface. The configuration of sub-interfaces is shown
below:
Router#show run
interface FastEthernet0/0
no ip address
duplex full
speed 100
!
interface FastEthernet0/0.1
encapsulation dot1Q 10
ip address 192.168.1.254 255.255.255.0
!
interface FastEthernet0/0.2
encapsulation dot1Q 11
ip address 192.168.2.254 255.255.255.0
!
interface FastEthernet0/0.3
encapsulation dot1Q 12
ip address 192.168.3.254 255.255.255.0
!
2.1 Remote Management of VLAN
The remote connectivity can be done by using any routing protocols from static or dynamic. In our paper we use static
routing protocol. We have configured telnet port vty along with other required authentication. Your management VLAN
does not have to be the same as your Native VLAN. Matter of fact, it is good practice to make sure that they are
different. Your management VLAN should only carry in-band management traffic and should not be the default
VLAN. We have specified an ip address to vlan 10 & make sure that they are not shutdown. Also specify ip default
gateway to router0 in the server switch. The configuration of server switch A for telnet support is given below:
Organized By: GNI Nagpur, India
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
ISSN 2319 - 4847
Special Issue for National Conference On Recent Advances in Technology and Management for
Integrated Growth 2013 (RATMIG 2013)
interface Vlan10
ip address 192.168.1.10 255.255.255.0
!
ip default-gateway 192.168.1.254
!
line con 0
password 7 08224340
login
!
line vty 0 4
password 7 08375857
login
line vty 5 15
password 7 08375857
login
!
end
2.2 Access-List Based Inter-VLAN Communication
ACL’s are used to secure and control traffic into or out of networks. In modern implementations, central file servers and
services are usually placed in their own isolated VLAN, securing them from possible network attacks while controlling
access to them. An administrator can smartly disable ICMP echoes and other protocols used to detect a live host,
avoiding possible detection by an attacker host located over a different VLAN [10]. After configuring ACL, router works
as a firewall and checks each statement sequentially before forwarding the traffic to its destination. By using standard or
extended access-lists, a router processes each ACL from top to bottom, one statement at a time. We propose extended
ACL’s to filter the traffic between VLAN’s or between hosts of a VLAN. Also we can use standard ACL to restrict telnet
access from the remote network. The configuration of ACL as per figure 1on router0 is shown below:
access-list 101 deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 101 permit ip any any
To configure a more restrictive ACL, create permit entries and omit the permit any entry at the end of the standard ACL.
access-list 15 permit host 192.168.4.1 209.157.22.32
access-list 15 permit 192.168.4.0 0 0.0.0.255
telnet access-group 15
3. SECURITY FOR VLAN HOPPING ATTACK
VLAN hopping attack allows a user on a VLAN to unauthorized access to another VLAN. This can be done by using a
native VLAN1 (default). Normally 802.1q trunking does not tag frames for native VLAN. An attacker can connect a
rogue switch/trunk to an unused port & spoofs DTP messages to automatically negotiate and thus turn on trunking
between the rogue switch and the target switch. An attacker can also send a double-tagging 802.1q frame to access the
victim switch. The outer header has the VLAN tag of the attacker, which is the same as the native VLAN of the trunk
port. To mitigate this type of attack the best approach is to ensure that the native VLAN of the trunk ports is different
from the native VLAN of the other ports. In our proposed model we have changed the native VLAN to VLAN 90; we
have disallowed VLAN 1 from the trunk ports and keep the desired VLANs allowed. Also we proposed that either
disable the remaining ports or change them to access ports in non-negotiate mode. Set nonnegotiate mode on both side of
the trunk. From figure 2, PC5 is an attacker which is connected to VTP client 1 switch, and trunk port F0/1 is connected
to VTP server switch.
Organized By: GNI Nagpur, India
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
ISSN 2319 - 4847
Special Issue for National Conference On Recent Advances in Technology and Management for
Integrated Growth 2013 (RATMIG 2013)
Figure 2. Layer-2 attack Model
4. CONCLUSION
The security of VLAN technology is reliable and robust. The problem arises only due to user misconfiguration or
improper use of features. In this paper our primary contribution is to show the security measures arises due to InterVLAN communication both locally and remotely, and issues in using VTP in an enterprise network. Solutions proposed
to secure Inter-VLAN communication and to address VTP issues are brought into practice using simulated network
configuration. We proposed access-list based security on layer 3 to prevent unauthorized access to different VLANs. We
proposed security solutions emerges due to VLAN hopping attacks by deactivating the native VLAN1 which is the root
cause of such type of attacks. For secured remote administration the management VLAN should not have to be same as
your Native VLAN or default VLAN 1.
REFERENCES
[1] Milan Yu and Jennifer Rexford, Princeton University,Xin Sun and Sanjay Rao, Purdue University, Nick Feamster,
Georgia institute of Technology. “A survey of Virtual LAN Usage in Campus Networks” IEEE Paper in IEEE
Communications Magazine July, Volume: 49, Issue: 7 pp. 98-103.
[2] Yu-Wei Eric Sung, Sanjay G. Rao, Geoffrey G. Xie,David A. Maltz, Purdue University.“Towards systematic Design
of Enterprise network” Networking, IEEE/ACM Transactions, 2011,Volume: 19 , Issue: 3 pp. 695-708.
[3] Kolbuchi M, Otsuka T, kudoh T, amano H. “A switch-tagged routing methodology for PC clusters withVLAN
Ethernet” Parallel and Distributed Systems, IEEE Transactions, 2011, Volume: 22 , Issue: 2 pp. 217-230.
[4] Johal, Hatinder Singh. “Access list based VLAN Map architecture & modified 802.1q frame scheme for addressing
VTP issues.” Eighth ACIS International Conference, 2010, pp.11-18.
[5] Xin Sun, Yu-Wei E Sung, Sunil D. Krothpalli, and Sanjay G. Rao, Purdue University. “A systematic Approach for
evolving
VLAN Designs” INFOCOM, 2010 Proceedings IEEE, pp. 1-9.
Organized By: GNI Nagpur, India
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
ISSN 2319 - 4847
Special Issue for National Conference On Recent Advances in Technology and Management for
Integrated Growth 2013 (RATMIG 2013)
[6] Rajiv O. Verma, S.S. Shriramwar “Effective VTP Model for Enterprise VLAN Security” 2013 International
Conference on Communication Systems and Network Technologies.
[7] Cisco. (2006, Aug 6). Configuration examples related to VLAN Features. [Online]. Available: http://cisco.com/
univered/cc/td/doc/product/lan/28201900/1928v8x/eescg8x/aleakyv.htm.
[8] “Secure use of VLANs": An@stake security Assessment.
http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/tech/stake_wp.pdf.
[9] “UnderstandingVTP”: http://www.cisco.com/en/US/docs
/switches/lan/catalyst2960/software/release/12.2_25_see/configuration/guide/swvtp.pdf.
[10] “InterVLAN Routing – Routing between VLAN Networks” Available:http://www.firewall.cx/networkingtopics/vlan-networks/222-intervlan-routing.html.
[11] “VLAN Hopping Attack And Mitigation/Prevention”: Available:http://lonetsec.blogspot.in/2011/02/vlan-hoppingattacks-and.html.
[12] Gobjuka, H. “Topology discovery for virtual local area” INFOCOM, 2010 Proceedings IEEE, pp. 1-5.
[13] Yamasak, Y, Miyamoto, Y, Yamoto, J, Goto, H, Sone, H. “Flexible access management system for campus VLAN
based on open-flow” Applications and the Internet (SAINT), 2011 IEEE/IPSJ 11th International Symposium
on pp. 347-351.
[14] Hirotsu T, Fukuda K, Abe H, Kurihara S, Akashi O, Sugawara T. “Dynamic & distributed routing control for
virtualized local area network” Local Computer Networks (LCN), 2010 IEEE 35th Conference pp.212-215.
[15] M casado, T. Garfinkel, A. Akella, M. Freedman, D. Boneh, N. Mckeron, and S. Shenker. SANE: A protection
architecture for enterprise networks. In Proc USENIX security, 2006.
[16] Maltz, G. Xie, J. Zhan, H. Zhang, G. Hjalmtysson,and A. Greenbug. Routing design in operational networks: A look
from inside. In Proc. ACM SIGCOMM, 2004.
[17] IEEE standard 802.1Q-2003. “Virtual Bridged Local AreaNetworks”. Technical report ISBN 0-7381-3662-X.
[18] Cisco, “Catalyst Family of LAN Switching” CLVco system Inc. product information, 1998.
[19] Garrett Leischner and codyTews, Security through VLAN segmentation: Isolating and Securing Critical Assets
without Loss of Usability. Schweitzer engineering Laboratories, Inc. SEL 2007 TP6277-01.
[20]Rajiv O. Verma, S.S. Shriramwar “Security Optimization of VTP Model in an Enterprise VLAN” International
Journal
of Electronics Communication and Computer Engineering Volume 4, Issue 3, ISSN (Online): 2249–071X, ISSN
(Print):
2278–4209.
AUTHOR’S PROFILE
A. Rajiv O. Verma
The author Rajiv O. Verma is born in Gorakhpur (UP), India on 11th of November,1967. He has done Bachelor of Engineering in
Electronics Engineering from Yeshwantrao Chavan College of Engineering at Nagpur, Maharashtra, India, in the year 1990. Currently
he is a student of Mtech in Communication & working as an Asst. Professor in Guru Nanak Institute og Engineering & Technology,
Nagpur, India.. Computer Communication Network is the author’s major field of study.
Organized By: GNI Nagpur, India
Download