SECURING WIRED LOCAL AREA NETWORK FINAL PROJECT REPORT Mr Sentuya Francis Derrick, ID 08051602 Module: CT3P50N fds0008@londonmet.ac.uk Supervisor: Dr. Shamhram Salekzamankhani s.salekzamankhani@londonmet.ac.uk A Final Project Report as a requirement of London Metropolitan University for a BSc Computer Networking with Honours December-16-2011 Faculty of Computing Page 1-- 1 - of 105 Abstract This report shows how to secure the vulnerabilities of a wired LAN. It examines the technology used to secure the LAN against various dynamic network security threats. A brief history of Network security and its operation is initially outlined. The discussion then is focused on the potential LAN security vulnerabilities using the OSI model. A virtual topology is used to showing the secured LAN achieved by having a good LAN design, incorporating appropriate secured network security devices. A detailed explanation of the security configurations and their verification/results are included. Suggestions and recommendations are given, plus a mentioning of further work to be done. The report concludes that, the set out aims and objective are achieved, and also makes a note that network security is a process that is on-going. New technological mitigation measures should be learned and applied on the LANs. It’s suggested that network professions should be sought, share information, and keep installing software patches on the Local Area Networks systems. Page 1-- 2 - of 105 Contents at Glance 1 – 13 - 105 Chapter 1 Introduction Chapter 2 Literature Review Chapter 3 Approach and Scope 2 – 18 - 105 3 – 24 - 105 Chapter 4 Practical Simulation and Results 4 – 29 - 105 Chapter 5 Critical appraisal, Recommendations and Suggestions for further work 5 – 34 - 105 Chapter 6 Conclusion 6 - 42 - 105 Appendix A: Network Device documentation - show run command. 6 - 46 - 105 Appendix B: Glossary 6 - 65 - 105 Appendix C: Project Proposal 6 - 67 - 105 Page 1-- 3 - of 105 Contents Contents ........................................................................................................................................... 1-- 4 Chapter 1 : Introduction ................................................................................................................. 1-- 13 1.1 Aims and Objectives ............................................................................................................. 1-- 14 Personal and Academic objectives ............................................................................................... 1-- 15 1.2 Methodology ........................................................................................................................ 1-- 15 1.3 Chapter Summary................................................................................................................. 1-- 17 Chapter 2 : Literature Review ........................................................................................................ 2-- 18 2.1 What is a LAN? ............................................................................................................... 2-- 18 - 2.2 What is LAN Security? .................................................................................................... 2-- 19 - 2.2.1 The Evolution of LAN Security ....................................................................................... 2-- 20 2.2.2 LAN’s most vulnerable layer.......................................................................................... 2-- 20 2.3 Common network threats .............................................................................................. 2-- 21 - 2.3.1 Reconnaissance attacks................................................................................................. 2-- 21 2.3.2 Denial-of-service ........................................................................................................... 2-- 21 2.3.3 Access attacks................................................................................................................ 2-- 22 2.4 Chapter Summary........................................................................................................... 2-- 23 - Chapter 3 : Approach and Scope .................................................................................................... 3-- 24 3.1 Approach ........................................................................................................................ 3-- 24 - 3.2 Project Scope.................................................................................................................. 3-- 25 - 3.3 Contingency Plans .......................................................................................................... 3-- 27 - 3.4 Scenario ................................................................................................................................ 3-- 27 3.5 Chapter Summary........................................................................................................... 3-- 28 - Chapter 4 : Practical simulation and results................................................................................... 4-- 29 4.1 Security Configuration on Cisco catalyst Switches ............................................................... 4-- 32 4.1.2 Message of the day / login Banner ............................................................................... 4-- 32 4.1.3 Port level Port Security .................................................................................................. 4-- 32 4.1.4 BPDU Guard................................................................................................................... 4-- 33 4.1.5 Storm Control ................................................................................................................ 4-- 35 4.1.6 Root Guard .................................................................................................................... 4-- 35 4.1.7 Spanning Tree Protocol feature - PortFast .................................................................... 4-- 36 4.1.8 Root Bridge .................................................................................................................... 4-- 36 4.1.9 VLAN Trunk Security ...................................................................................................... 4-- 37 4.110 VLANs ........................................................................................................................... 4-- 38 4.1.11 High Availability with Hot Standby Routing Protocol (HSRP) ...................................... 4-- 39 Page 1-- 4 - of 105 4.2 Security Configuration to manage router security on Cisco Routers............................... 4-- 2 - 4.2.1 Message of the day / login Banner ................................................................................. 4-- 2 4.2.2 Password requirement .................................................................................................... 4-- 2 4.2.3 Secure remote administrative access to routers ............................................................ 4-- 3 4.2.4 Secure router network services ...................................................................................... 4-- 8 4.2.5 Configure Authentication, Accounting, Authorization protocol .................................... 4-- 9 4.2.6 Log router activity ......................................................................................................... 4-- 10 4.2.7 Syslog server.................................................................................................................. 4-- 11 4.2.8 IPS software firewall...................................................................................................... 4-- 13 4.2.9 Secure EIGRP routing protocol authentication ............................................................. 4-- 15 4.2.10 Securing the router IOS image on perimeter, and firewall routers ............................ 4-- 17 4.2.11 Access Lists .................................................................................................................. 4-- 17 4.3 Simulation and verification of user access to different Subnets of the LAN/ Internet .... 4-- 21 4.4 Context-based access control (CBAC) inspection rule ................................................... 4-- 26 - 4.4.1 Inspection rule/Audit-trail enabled screen shot ........................................................... 4-- 27 4.4.2 Simulation of inspection /audit-trail process ................................................................ 4-- 28 4.5 Port Address Translation PAT / NAT Overload ..................................................................... 4-- 28 4.6 DHCP implementation .......................................................................................................... 4-- 31 4.6.1 DHCP Snooping.............................................................................................................. 4-- 32 4.6.2 Dynamic ARP inspection................................................................................................ 4-- 32 4.6.3 IP source guard .............................................................................................................. 4-- 33 4.7 Chapter Summary........................................................................................................... 4-- 33 - Chapter 5 : Critical appraisal, recommendations and suggestions for further work .................... 5-- 34 5.1 Critical appraisal ............................................................................................................. 5-- 34 - 5.2 Suggestions for Further work ......................................................................................... 5-- 37 - 5.2.1 Backup IOS software images ......................................................................................... 5-- 37 5.2.2 Continuous network monitoring ................................................................................... 5-- 38 5.3 Recommendations ......................................................................................................... 5-- 38 - 5.3.1 Virtual private network technology (VPN) .................................................................... 5-- 38 5.3.2 Cisco Adaptive Security Appliance (ASA) firewall ......................................................... 5-- 38 5.4 ASA Intrusion detection and Prevention system ................................................................. 5-- 40 5.5 DNS Implementation on the Cisco ASA ................................................................................ 5-- 40 5.6 Host- Based Intrusion Detection Systems ............................................................................ 5-- 40 5.7 Chapter Summary........................................................................................................... 5-- 41 - Chapter 6 : Conclusion ................................................................................................................... 6-- 42 Page 1-- 5 - of 105 References:..................................................................................................................................... 6-- 44 Appendix A: .................................................................................................................................... 6-- 46 A.1 Device documentation with a show run command ............................................................. 6-- 46 A.1.1 Secured Perimeter Router documentation .................................................................. 6-- 46 A.1.2 Secured Firewall Router documentation ...................................................................... 6-- 48 A.1.3 Secured Layer 3Switch1 documentation ...................................................................... 6-- 52 A.1.4 Secured Layer 3Switch2 documentation ...................................................................... 6-- 55 A.1.5 Secured Layer 2Switch1 documentation ...................................................................... 6-- 58 A.1.6 Secured Layer 2Switch2 documentation ...................................................................... 6-- 60 Appendix B: ................................................................................................................................ 6-- 63 B.1 Glossary ................................................................................................................................ 6-- 63 Appendix C: ................................................................................................................................ 6-- 67 C.1 Project proposal ................................................................................................................... 6-- 67 - Page 1-- 6 - of 105 List of Figures, titles, and their pages I. II. Figure 1: DOS Attack Page 2 -- 22 - 105 Figure 2: Secured LAN Topology Page 4 -- 29 - 105 Page 1-- 7 - of 105 List of Tables, titles, and their pages I. Table 1 Types of Network devices used Page 4 - 30 - of 105 Table 2 Network Configuration Table: Routers Page 4 -- 30- of 105 III. Table 3 End-system configuration table: Switches Page 4 -- 31- of 105 IV. Table 4 End-system configuration table: End devices Page 4 -- 31- of 105 II. Page 1-- 8 - of 105 The following is a reference list of Abbreviations used in this report. AAA: Authentication Authorisation Accounting ASA: Adaptive Security Appliance BPDU: Bridge Protocol Data Unit DHCP: Dynamic Host Configuration Protocol DMZ: Demilitarizes Zone DOS: Denial of Service DTP: Dynamic Trunking Protocol FTP: File Transfer Protocol FDDI: Fibre Distributed Data Interface HTTP: Hypertext Transfer Protocol IPS: Intrusion Prevention System IP: Internet Protocol IEEE: Institute of Electrical and Electronic Engineers LAN: Local Area Network NAT: Network Address Translation MAC: Media Access Control OSI: Open Standard Interconnect POP3: Post office Protocol PAT: Port Address Translation Page 1-- 9 - of 105 SSH: Secure shell VLAN: Virtual Local Area Network VPN: Virtual Private Network Page 1-- 10 - of 105 Acknowledgement I would like to thank Dr. Shamhram Salekzamankhani my project supervisor for his guidance, and continually working with me from the start of my proposal writing up to the implementation phase of this project. Your help has been indispensable when it comes to doing my project and I can’t say enough how much your help and support kept me sane during my project work. Also, thanks to my lecturer Mr Talik Molalingn who taught me a very important module (Fundamentals of Network Security) that has been crucial in doing my project. Also Dr Nicholas Ioannides, who taught me and guided me on how to write a very good structured project report and presentational skills. Big thanks goes to Ebrima Bah for your continued support, discussions till late evenings, advice, and encouragement you have offered me all through my second phase of my project implementation. Lastly but not the least, I thank God for the ability, knowledge, and the gift of life for me to be able to do this project. Page 1-- 11 - of 105 Dedication To my boys who have been so patient with me when I am busy studying and pursuing my academics. You have always given me space and a reading environment that enables me to have the luxury of my intellectual pursuits. You bring a smile to my face every day. I know that as you see me working hard and studying harder till late in the night will inspire you to also work hard in your studies so that your dreams come true. You have encouraged and made me happy seeing you so much interested in your studies and sometimes joining me in my reading study room to read together. Sentuya Francis Derrick Page 1-- 12 - of 105 Chapter 1 : Introduction This is a final project report on a secured wired local area network. As it is required, the report deals with an in depth view backed by my research from different sources such as network security books, the internet, Cisco network related lectures at London metropolitan University on the LAN security threats, and the technological measures that are available and used to secure wired LANs. Equipped with this knowledge, the report shows the implemented measures to achieve a secured wired LAN. The report defines what is meant by Local Area Networks, gives an insight of the background of LANs, and defines network security. It also gives an overview of the evolution of the LAN security, network security threats and the mitigations techniques available. A LAN as a group of computers and devices interconnected together in a limited geographical area such as computer laboratory, home, office buildings, or schools, to enable the sharing of resources like printers, files, applications amongst users on the network. By this definition it’s imperative therefore, to make Local area networks secure to provide network users with confidentiality, data Integrity, and availability. Network security is such an important part of Local area networks which involves securing protocols, technologies, devices, and mitigating any network security threats by use of network security tools and techniques. Network security policies are put in place to provide a framework and guideline for network users/employees to follow when doing their work on LANs. A Virtual topology is used to show how to have a secured LAN solution. Page 1-- 13 - of 105 1.1 Aims and Objectives Aim 1: To investigate which layer of the OSI model is most vulnerable to attacks on the Local Area Network. Objectives (i) To secure the physical devices that operate at the physical layer such as; Routers, Switches, PCs, servers, cables, Network interface cards, Transceivers, Repeaters, Hubs, Multi-station access units. (ii) To secure layer 2 protocols of the OSI model such as the Ethernet/IEEE 802.3, token ring / IEEE 802.5 and devices operating at this layer. (iii)To secure the addressing structure and the routing protocols at the network layer on the LAN. (iv) To have an identifiable secure and reliable transport mechanism between two communicating devices on the Local Area Network. (v) To provide a secure way for applications to translate data formats, encryption, decryption of the data traversing the network by using authentication methods, SSH, passwords, encryption just to mention but a few. (vi) To provide a secure platform where end users interact with application software by securing the application layer protocols such as HTTP, HTTPS, FTP, TELNET, POP3, FTP-DATA and more. Aim 2: To investigate and analyse the available tools and methods to secure a wired Local Area Network. Objectives (i) To prevent un-trusted traffic to access the network resources and secure gateways at the session layers to control the setup and teardown of sessions on the OSI model. Page 1-- 14 - of 105 (ii) To provide a cost effective but efficient and reliable Local Area Network. Personal and Academic objectives (i) To study, learn how to secure Local Area Networks, and the security threats faced by these Networks in a dynamic network technological environment. (ii) To learn how to organise my time meaningfully in order to achieve my intended goals in a given limited time. (iii)To learn the techniques, and approach on how to carry out a meaningful research on specific subject areas. (iv) To achieve skills on how to write a successful, well-structured report. (v) To improve my presentation skills, and my confidence in this area. (vi) To prepare myself for a future career in Computer Network Security, and further studies. 1.2 Methodology 1. By implementing the project in a secure physical environment of London Metropolitan University Cisco laboratory. It is well ventilated, with backup power supply, equipped with all the network devices I will use, and with controlled access to only authorised personnel. 2. The use of the designed logical topology shown in this report using GNS3 and packet tracer software to simulate the security configurations which are later on implemented in the laboratory. 3. To configure layer 2 switch port level security on the Cisco catalyst switches series 2960, and layer 3 switches series 3560. I will also configure storm controls, root and BPDU guard; protect switch ports by setting the maximum MAC address per port, shut down unused ports, and other more security configurations required. Page 1-- 15 - of 105 4. To configure VLANs on the Local Area Network, change the native VLAN , implement inter-VLAN routing on the layer 3 Cisco switches series 3560 provided in the laboratory, and enable routing too. 5. To configure access control lists on the Cisco Router firewall as a measure to filter traffic that is traversing the network fabric both from the external/public network such the internet to the DMZ, and from the private network (LAN) accessing the internet and the demilitarized zone (DMZ). 6. Provide a dynamic IP assignment mechanism by configuring a DHCP server on the LAN VLANs subnet. Configure DHCP snooping and enabling IP source guard on untrusted ports to prevent rogue DHCP on the network. 7. Use/ configure Authentication, Authorization, and Accounting (AAA) protocol on the Cisco routers and implement a locally-based user database to be authenticated in order to access network resources. 8. Use the Cisco Router Firewall with advanced security version IOS image to configure security for the LAN such as IPS, disabling unused router services, ensure minimum password lengthy, encryption of password, limit console and configure SSH on line VTY access. 9. Access control lists will be configured in order to control the in and out of traffic to different subnets of the LAN, and also filter out malicious packets trying to enter the private subnets. 10. Create a demilitarized zone (DMZ) with limited security compared to the private network subnet so as to enable external / internet host based users and company customers to access company web server, at the same time providing security for the systems residing within that zone. Page 1-- 16 - of 105 11. Use Network address translation with port overload (NAT/PAT) on the perimeter router. Host-based intrusion prevention software on end devices like PCs, and servers to provide in-depth checks of packets on layer 4 through to layer 7. 12. Structure the LAN in a hierarchal network design model i.e. core, distribution and access in order to provide redundancy, efficient, security, and reliability on the LAN. 13. Use 2 layer 2, and 2 layer 3 switches and a Cisco Router firewall ,perimeter firewall router, available in the our laboratory that support extra security configurations. 14. To configure context based access control, an inspection rule and an audit trail on the router to inspect the required protocols that pass in and out of the router firewall. This server as an added software firewall to the LAN. 15. Lastly but not the least, configure a syslog server on the network to truck and record the activities on the network for network administrative purposes. 1.3 Chapter Summary In this chapter the report introduces what the project is all about which is to secure a wired LAN. It also outlines the Aims and objectives of the project, outlines the methods that are employed to achieve the aims and objectives. For instance, to secure all the seven layers of the OSI model by using a variety of security configurations, devices, a good network design model and implementing the project to achieve the required results in the end. Page 1-- 17 - of 105 Chapter 2 : Literature Review 2.1 What is a LAN? Local area network comprises of computer devices that have got disks, processors and operating systems as a platform for software and other applications to run on, and they are interconnected in order to communicate with one another within a small geographical area usually a single building or group of buildings. Local Area Networks may also connect to other the network of server computers or mainframes with higher processing power and memory storage that can send information from the Local Area Network over telephone lines to public network. LANs include higher data-transfer rates, no need for a leased telecommunication lines. In the past ARCNET, Token Ring and other technology standards have been used but Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies currently in use. LANs allow users to have isolated or separate offices but still be able to operate off the same system, as if they were all sitting around a single computer. This network can be easily installed simply, upgraded or expanded with little difficulty, even moved or rearranged without disruption. LANs have helped in the increased work place productivity, decreased the amount of paper used and the speeding up of the information flow. It’s important to mention that on the other hand LANs have also created additional work in terms of organization, maintenance, security and trouble-shooting. [5] Brief history In 1970s and 1980s after the development of both desk operating systems bases personal computers and Control Program for Microcomputers based personal computers meant that Page 2-- 18 - of 105 one site could have a big number of computers. A need developed to share disk space and laser printers due to the higher cost of these devices, and as a result the idea of LAN started to be developed. The introduction of the OSI model has enabled multi-vendors’ products that can be compatible and work together on one single machine. As a result, users were able to share resources regardless what operating system, network cards, cabling or protocols being used by different software running on the different machines but interconnected together within a LAN.[1] 2.2 What is LAN Security? LAN security involves the protecting of information, systems and the hardware that used to store, and transmit that information. It involves the steps taken to make sure that confidentiality, integrity, and availability of data / resources is achieved and maintained on the private or local area network from both form the internal and external networks threats. Network security solutions started coming up as the early 1960 but didn’t have a big impact due to the complexity of network security and the dynamic/ever changing nature of networks and most importantly companies, governments and other organisations had not realised the importance of network security on the company networks not until the 2000s. Since then network security become an integral part of the business networks and dedicated network security devices have emerged and there is a surge in the demand for network security professions. [5] Page 2-- 19 - of 105 2.2.1 The Evolution of LAN Security LAN security threats mostly target protocols and other technologies used on the local area network infrastructure. They fall into two types: Denial of service and spoofing attacks. The following shows the measures or Security technologies that have been developed over the last 13 year to mitigate LAN types of threats. In 1998 measures to Mitigate MAC Address Spoofing, MAC Address Table Overflow Attacks, and LAN Storm were released. In 2000 measures to Mitigate Root Bridge Spoofing and VLAN Attacks were released. In 2003 measures to Mitigate ARP Spoofing Attacks were released. Network Security is also achieved by the use of encryption and hashing mechanisms on the data as it traverses the network fabric. The following gives an outline of the cryptography security technology and their timeline: In 1993 Cisco GRE Tunnels was released. In 1996 Site-to-Site IPsec VPNs was released In 1999 Secure Socket Layer (SSH) was released In 2000 Multi-Protocol Label Switching (MPLS VPNs) was released In 2001 Remote-Access IPsec VPN was released In 2002 Dynamic Multipoint VPN was released In 2005 Secure Socket Layer (SSL) VPN was released. 2.2.2 LAN’s most vulnerable layer Basing on the OSI model research approach to find out which layer of the seven (7) layers is most vulnerable; I concluded that Layer 2 of the OSI model – (Data link layer) poses the most network security vulnerabilities on the LAN. The data link layer is divided into two sub-layer; Page 2-- 20 - of 105 logical link control and Media Access Control layer. Examples of the protocols that run on this layer are; FDDI, Ethernet, Token ring, MAC addresses, and the devices used on this layer are layer 2 and 3 LAN switch that perform switching and filtering of frames and packets basing on the MAC address and IP address if IP routing is enabled on the layer 3 switches. This makes layer 2 switches completely transparent to the network protocols and user applications. Unauthorised access to the layer 2 devices puts the whole network resources and performance at high security risk. In implementing this project I have seriously considered layer 3 switches. In addition, all protocols on other layers of the OSI model are secured to provide a holistic secure LAN environment for security threats. [3] 2.3 Common network threats 2.3.1 Reconnaissance attacks These types of attacks gather information on the network or targeted device’s security vulnerabilities that maybe exploited later by using tools like: [3] Packet sniffers, Ping sweeps, Port Scans, Internet information queries, 2.3.2 Denial-of-service This type of attack sends large numbers of requests over the network in order to cause the target devices to be overwhelmed causing them to run suboptimal and eventually becoming unavailable to serve its legitimate access and use. Examples of DOS attacks are:[3] Page 2-- 21 - of 105 Ping of Death, Smurf Attack, TCP SYN Flood attack Worm, DOS Attack Figure 3: DOS Attack 2.3.3 Access attacks These attacks are geared towards gaining access to the computer network and retrieve data, and escalate rights to resources. The following are the types of this form of attack: [3] Man-in-the-middle, Buffer overflow, Port Redirection, Password attacks, Trust exploitation Virus, Trojan horse, Page 2-- 22 - of 105 The following shows other categories of network security threats that can exploit network vulnerabilities on the LAN especially the LAN switches. MAC address spoofing, Spanning Tree Protocol manipulation attack, MAC address table overflows, LAN storms, VLAN attacks, 2.4 Chapter Summary This chapter is about what a LAN is, the meaning of LAN security, the evolution of LAN technology, the computer network threats, and the technology used to mitigate these threats in order to have a secured LAN. The chapter also out lines and defines the most common LAN security threats, points out and explains why layer 2 of the OSI model is the most Vulnerable layer. This means that on the LAN its imperatives to have this layer more adequately. Page 2-- 23 - of 105 Chapter 3 : Approach and Scope 3.1 Approach In the implementation of this project the network hierarchical design model is used to point out, identify, and subdivide the areas required on the LAN to be secured, how to secure them, and against what. The network hierarchical design model includes the Access, Distribution, and Core layers. On the Access Layer The strategy is to starts by securing the LAN’s Access layer devices which are interconnected with straight through, and cross over cables to endpoints such as: hosts, servers, and other devices that act as network clients, including non-endpoint devices like layer 2 switches. The following security configurations are made on these devices to mitigating attacks: [3] Switch port security, LAN storm controls, Limit one MAC address per port, Root guard, VLANs, BPDU’s Shutdown unused port and services, Enforce password encryption and minimum length, Mitigate STP manipulation, On the Distribution layer Page 3-- 24 - of 105 The using of Cisco layer 3 switches on this layer will support IP routing, switching, and the implementation of inter-VLAN routing on this level. A Cisco router firewall with an advances security version is configured with the following security configurations: [3] Access control lists, Cisco IOS IPS configurations, DMZ connection link to the DMZ Inspection rule, and context based access control list On the Core layer A Cisco router supporting advance security version is also used here to provide a connection to the ISP/internet (Public network). It is the network perimeter router onto which to configure NAT/PAT and is the network backbone fibre.[3] A Virtual LAN topology is used on Cisco packet tracer, and GNS3 software to simulate to secured LAN. Devices used on this software application are Cisco network devices such as router, and switches, running Cisco IOS images. 3.2 Project Scope The focus of this project is on securing Wired Local Area Network, the technology used to secure LANs, and the security threats that are faced on this type of networks. This report is not going to discuss the security of wireless LANs or even voice. It should be noted that Wide Area Networks are not dealt with here as well but only dealt with as a source of public traffic which should be controlled when accessing the LAN. During the project implementation phase, the report refers to the traffic from the WAN in this case the internet as untrusted traffic which should be controlled in and out going due to the network security threats that it poses to the wired LAN. Page 3-- 25 - of 105 The following are the assumptions held during the implementation of this project. I. II. It’s assumed that physical devices are in a secure university laboratory. It’s assumed that companies should not sit back after all the security measures /configurations are done on the network, but continually monitor, patch vulnerabilities by installing software patches and test the vulnerabilities of the LAN security. III. It is the assumption that the devices used and the configurations done are Cisco based configurations on Cisco devices. However, it should be noted that there is interoperability of this technology with other vendor’s devices. IV. It’s also assumed that the implemented security measures done in this project is acting as a microcosm setup that can be applied to a production network. The following are the risks that may jeopardise my project or the constraints, and the contingency plan in place. I. The limited access to the laboratories which is put in place by the university management has hampered a quick implementation and less time and experience on the real devices. II. Also the time allocated to the supervisors to be spending with us is really not enough, for instance they are only allowed 15 minutes to spend with us as far as the project is concerned. III. The unreliable software packages used like packet tracer and the lack of GNS3 Cisco IOS images act as constraints to doing my project. IV. The lack of network devices that I would have liked to implement on the security configurations is a big setback. Page 3-- 26 - of 105 3.3 I. Contingency Plans To use network software simulation packages like GNS3 and packet tracer 5.3.1 in case no access to laboratories granted. II. To negotiate more time to be allowed spend in the laboratory and also work very closely with my supervisor. III. To use of alternative devices available that performs more or less the same functions as the ones intended to use when designing the topology. 3.4 Scenario As my final year project am required to secure a wired LAN. A research by reading about the LAN security history, evolution of LAN security threats, types of threats, ways of mitigating these threats and practical implementation of a secured wired area network. With this background information and with a virtual topology is to be used to have a secure LAN. The topology includes the network devices that are used such as: the Cisco layer 2 catalysts switches series 2960, Cisco layer 3 catalyst switches series 3560, and as an alternative to the Cisco Adaptive security appliance (ASA) a Cisco Router firewall series 2811 version 12.2 is used. Cisco IOS IPS software is configured on the Router as a firewall. The project is implemented in the London Metropolitan University laboratory that has got Cisco networking devices mentioned above. In order to meet the specific requirements of the project, I have put an emphasis on securing protocols to be used on the LAN, layer 2 of the OSI model (Data link layer), and secure the internal/private network from un-trusted external traffic. Page 3-- 27 - of 105 3.5 Chapter Summary This chapter of the report is about the approach or style used to implement the project which is designed basing on the network hierarchal design model comprising of the three layers i.e. access, distribution, and core. The limits of the project are also outlined and shown to be covering only the securing of the Wired LAN, with contingency plans put in places such as use of different network simulation software like GNS3 in case there is no access to real/ physical network devices. Lastly but not the least, the scenario is given which is a requirement by London Metropolitan University as a client to secure a wired LAN. Page 3-- 28 - of 105 Chapter 4 : Practical simulation and results The following is the Figure showing a secured LAN topology. Secured Wired LAN Topology Figure 4: Secured LAN Topology Page 4-- 29 - of 105 The following table shows the Network devices and the cables that are used in the implementation phase of the project. Table 5: Types of Network devices used Table 6 Network Configuration Table: Routers Page 4-- 30 - of 105 Table 7 Network configuration table: Switches Table 8 End-system configuration table: End devices Page 4-- 31 - of 105 The following is the detailed discussion, illustration, explanation of the configurations and results achieved by the measures implemented to secure a wired LAN Cisco catalyst Switches. At this level the following are the security configurations that are configured on catalyst switches are as follows: 4.1 Security Configuration on Cisco catalyst Switches 4.1.2 Message of the day / login Banner A legal warning to anyone who gains unauthorised access to this switch that he/she will be prosecuted if unlawful access is attempted has been configured using the command line “Banner login $ ...$” in global configuration mode shown below.[2] ! --- Displays a login message L3switche1(config)#banner login $ This switch is the property of FDS Tech. Disconnect now if you are unauthorised to access. Any violations will be prosecuted. $ 4.1.3 Port level Port Security To prevent MAC table overflows and MAC Spoofing all access switch ports are allowed a maximum of one MAC address learned dynamically per each port from the list as determined by the Network Administrator. This is achieved by using command line “switchport portsecurity maximum 1”, and “switchport port-security mac-address sticky”. Any violation of this setting will trigger a shutdown of the port achieved by this command “switchport port-security violation shutdown”. For all the non-used access port are disabled by “shutdown” command. This port security measures will control unauthorised expansion of the network and prevent the port from forwarding frames with a source MAC address that is not assigned to it or is outside the group of the defined addresses on that port. The following below is the combination of the Port security configuration enabled only on access mode ports as mentioned above: [9] ,[4] Page 4-- 32 - of 105 ! ---- enable switch port security on access port L3swtich1(config)# interface fa0/1 L3swtich1(config-if)#switchport mode access L3swtich1(config-if)#switchport port-security L3swtich1(config-if)#switchport port-security maximum 1 L3swtich1(config-if)#switchport port-security violation shutdown L3swtich1(config-if)#switchport port-security mac-address security sticky ! --- Shutdown switch unused ports L3swtich1(config)#interface range fa0/1 - 24 L3swtich1(config-range-if)#shutdown L3swtich1(config-range-if)#end 4.1.4 BPDU Guard In order to prevent any rogue switch on the network by an attacker, BPDU guard is configured on user-facing ports with Port-Fast enabled. Using the command line “spanningtree bpduguard enable” in interface configuration mode. An unauthorized BPDUs received on ports with this feature enabled will be disabled thus eliminating invalid configurations from attackers. The following illustrates the configuration that enables BPDU guard configuration.[4] ! --- Enables bpdu guard on user-ports L3swtich1(config)#interface fa0/2 L3swtich1(config-if)#spanning-tree bpduguard enable And to verify that this configuration is done on the interface in question the following output displays this application combined with port security, and shutdown configurations output: !---- Output of switch port security configured on the port interface FastEthernet0/4 Page 4-- 33 - of 105 switchport access vlan 2 switchport mode access switchport port-security switchport port-security mac-address sticky switchport port-security mac-address sticky 0001.C9DA.0939 switchport port-security violation shutdown ! ---- Unused interfaced are shutdown interface FastEthernet0/5 switchport access vlan 99 shutdown ! To further enhance security on the switch to watch out for login attacks login access is configured to be disabled for 30 seconds if there is 3 failed logins within 10 seconds or less. This is shown by the configuration below, followed by its verification output. !---- Enables login to be disabled for 30 sec after three failed attempts within 10 sec L3swtich1 (config)#login block-for 30 attempts 3 with 10 L3swtich1(config)#login quiet-mode access-class 101 L3swtich1 (config)#login delay 3 L3swtich1 (config)#login on-failure L3swtich1 (config)#login on-failure log L3swtich1 (config)#login on-success log L3swtich1 (config)#end L3switch1# ! --- Verifies enhanced login security by use of the show login command L3switch1#sh login A default login delay of 1 second is applied. No Quiet-Mode access list has been configured. All failed login is logged. All successful login is logged. Page 4-- 34 - of 105 Router enabled to watch for login Attacks. If more than 3 login failures occur in 10 seconds or less, Logins will be disabled for 30 seconds. Router presently in Normal-Mode. Current Watch Window Time remaining: 7 seconds. Login failures for current window: 0. Total login failures: 0. L3switch1# 4.1.5 Storm Control To control broadcast, multicasts, or uncast of hostile packets flooding the LAN segments that degrades the network performance, a 50% suppression level is set on all ports connecting switches to switches (trunk ports) by using the following command line; “Storm- control broadcast level 50” in interface configuration mode.[4] The following configuration enables storm control on ports connecting switches to other switches (trunk ports). For example on L3switch1 switch it’s configured on fa0/2 ! ---- enables Storm control on the interface L3swtich1(config)#interface fa0/2 L3swtich1(config-if)#storm-control broadcast level 50 4.1.6 Root Guard This configuration helps to limit the switch ports on which the root bridge can be negotiated in switched networks. It is deployed on ports that connect to switches that should not be the root bridge. When the attacker sends out spoofed BPDUs in order to become a root bridge the switch receiving the BPDUs will ignore them and put the port in a root-inconsistent state, and the port will recover until the attacker stops sending BPDUs. Root guard is the best practice Page 4-- 35 - of 105 even though there may be a switch with a zero priority and a lower MAC address, and therefore a lower a lower bridge ID. The following configuration enables root guard:[4] ! --- Enable guard root feature on the interface fa0/1 L3swtich2(config)#interface fa0/4 L3swtich2(config-if)#spanning-tree guard root 4.1.7 Spanning Tree Protocol feature - PortFast To eliminate the vulnerability of a longer waiting time a port has to transition from blocking to forwarding state, the ports that are configured with portfast feature are access ports interfaces in order to shorten the waiting time the port has to transition from blocking to forwarding immediately bypassing listening and learning phases by using the following command on all switch access ports “spanning-tree portfast” The following configuration enables portfast on switch port in the access mode. This helps in mitigating STP attacks. ! --- Enable portfast feature on the interface L3swtich1(config)#interface fa0/2 L3swtich1(config-if)#spanning-tree portfast 4.1.8 Root Bridge Layer 3switch1 is configured as the primary root bridge to serve as a known reference point for all spanning-tree calculations to determine which redundant paths to block. Layer 3 switch2 set as secondary root. This is to eliminate any root bridge manipulation on the network. This is shown in the following configuration below that is configure on L3switch1 root bridge primary, and L3switch2 as a secondary root bridge:[4] ! --- Enables the switch to be Root Bridge (primary and secondary) Page 4-- 36 - of 105 L3swtich1(config)#spanning-tree vlan 1 root primary L3swtich2(config)#spanning-tree vlan 1 root secondary The following output verifies that L3switch1 is the root bridge. L3switch1#sh spanning-tree VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 24577 Address 0001.4390.419A This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 24577 (priority 24576 sys-id-ext 1) Address 0001.4390.419A Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 20 Interface Role Sts Cost Prio.Nbr Type ---------------- ---- --- --------- -------- -------------------------------Fa0/2 Desg FWD 19 128.2 P2p Fa0/4 Desg FWD 19 128.4 P2p 4.1.9 VLAN Trunk Security In order to mitigate VLAN hopping attacks, trunking is enabled on trunk ports, and the native VLAN 1 is changed to VLAN 99 on all trunk ports with “switchport trunk native vlan 99” to mitigate double tagging. To mitigate switch spoofing, auto trunking negotiations and DTP is disabled with “switchport trunk encapsulation dot1q”and enabled trunking manually with “switchport mode trunk”. The combined configuration on trunk ports of L3switch1, L3switch2, L2switch1, and L2switch2 devices is shown below.[4] ! – enable trunking on the link and sets native vlan 99 on it L3switch1(config)# interface fa0/1 Page 4-- 37 - of 105 L3switch1(config-if)#no shutdown L3switch1(config-if)#switchport mode trunk L3switch1(config-if)#switchport trunk encapsulation dot1q L3switch1(config-if)#switchport trunk native vlan 99 L3switch1(config-if)#switchport nonnegotiable ! --- Associate all other ports with the new native vlan 99 L3switch1(config-if)#interface range fa0/5 – 24 L3switch1(config-if)#interface range g0/1 - 2 L3switch1(config-if)#switchport access vlan 99 The following output verify of trunk link security as performed on L3switch2: 4.110 VLANs VLAN segmentations coupled with inter-VLAN routing implemented on L3switch1, and L3switch2 separate sensitive data departments such as the management, enhance LAN security, and mitigate broadcast storms propagating the entire network which can used as a tool by attackers to broadcast attacks to the entire network . The following configuration shows this implementation. ! --- creates VLAN 2, assign IP address, and subnet mask an interface L3switch1(config)# vlan 2 Page 4-- 38 - of 105 L3switch1(config-vlan)#exit L3switch1(config)#interface vlan 2 L3switch1(config-if)#ip address 192.168.20.1 255.255.255.0 ! --- Assigns an interface to a vlan and enables it too. L2switch1(config)# interface fa0/2 L2switch1(config-if)#switchport access vlan 2 L2switch1(config)#no shutdown 4.1.11 High Availability with Hot Standby Routing Protocol (HSRP) As it is one of objectives, Hot Standby Router Protocol (HSRP) is configured on the switches on the LAN to provide network with redundancy, and make sure that the traffic on the LAN is immediately and transparently recover from first hop failures in network edge devices. The configuration to achieve this is done on the L3switches (1 and 2) as shown in this configuration below: [11] On L3switch1 On L3switch2 interface Vlan3 ip address 192.168.30.3 255.255.255.0 standby 2 192.168.30.1 Standby 2 priority 160 Standby 2 preempt Standby 2 track fa0/3 65 Standby 2 authentication VLAN3 interface Vlan3 ip address 192.168.30.3 255.255.255.0 standby 2 192.168.30.1 Standby 2 preempt Standby 2 track fa0/3 65 Standby 2 authentication VLAN3 In this case the standby IP address is 192.168.30.1, and the HSRP will prefer the Layer 3 switch with a higher priority. Both switches have preempt to become the active switch when its priority is higher than all other HSRP configured switches in the hot standby group. Page 4-- 39 - of 105 4.2 Security Configuration to manage router security on Cisco Routers In order to Implementing Router security basing on the project design starts with securing the access to the router by following the planned steps below: 4.2.1 Message of the day / login Banner A legal warning to anyone who gains unauthorised access to this router that he/she will be prosecuted has been configured using the command line “Banner login $ ...$” in global configuration mode shown below: ! --- Displays a login message firewallRouter(config)#banner login $This router is the property of FDS Tech. Disconnect now if you are unauthorised to access it. Any violations will be prosecuted. $ 4.2.2 Password requirement A strong password is a fundamental element of controlling secure access to the router. For this reason password security is enhanced as follows: There is a minimum length of 10 characters required for all passwords used. This is configured from the global configuration mode. Also a configuration that encrypts all passwords that are configured on the router is done by use of “service password encryption” command line which prevents all plaintext passwords to be displayed in plain text or readable form. Also configured is an encrypted password requirement to access the global configuration mode by use of the “enable secret password”. Any authentication failures are configured to be logged on the syslog server. The combined configuration below illustrates the above: ! --- enables global encrypted password, sets minimum length password, encrypts all password configured and logs failed authentication Page 4-- 2 - of 105 firewallRouter(config)#enable secret cisco12345 firewallRouter(config)#security passwords min-length 10 firewallRouter(config)#service password-encryption firewallRouter(config)#security authentication failure rate 5 log 4.2.3 Secure remote administrative access to routers In addition, line console 0,VTY, and aux security is enhanced by setting passwords, exectimeout setting to close down the live connection on these ports if they are left idle, set authentication, authentication retries in case of any failures. To secure line VTY, the secure shell (SSH) transport mechanism is configured with the command line transport input ssh which enables the sending of data in an encrypted form instead of plain text as it is with telnet. To guard against both malicious attacks, and orphaned sessions caused by remote system crashes TCP keepalives is enabled on incoming connections using the service tcpkeepalives-in in global configuration command. For Aux line, a no password and login is configured in combination to secure this access port. The configuration on the line VTY, and console port is illustrated below respectively: [4] ! --- Enables password, and time out on console line firewallRouter(config)#line console 0 firewallRouter(config-line)#password cisco12345 firewallRouter(config-line)#exec-timeout 2 30 firewallRouter(config-line)#login firewallRouter(config-line)#logging synchronous Page 4-- 3 - of 105 The following output verifies that valid username and password should be used within a specific allowed time to have access. The output shows a failed login, login warning, timed out login and a display login log with the date and time when it happened. In this second part, valid username and password are verified, access granted to global and privileged configuration modes. Page 4-- 4 - of 105 The VTY line on the router is often used for remote access, and to enhance security for the data pass on this connection SSH input transport mechanism, exec-timeout, and authentication is configured as illustrated below: ! --- Creates domain name: FDS.com firewallRouter(config)# ip domain-name FDS.com firewallRouter(config)#crypto key generate rsa (generated 1024 bit RSA keys) firewallRouter(config)#username Admin1 secret Admin1pass ! --- Enables ssh, time out, and authentication retries on vty firewallRouter(config)#line vty 0 4 firewallRouter(config-line)#password cisco12345 firewallRouter(config)#no transport input firewallRouter(config)#transport input ssh firewallRouter(config)#ip ssh exec-timeout 2 30 firewallRouter(config)#ip ssh authentication-retries 3 firewallRouter(config)#login local firewallRouter(config)#exit ! ---- secure orphaned remote connections to the router firewallRouter(config)#service tcp-keepalives-in In order to verify the configuration of secure socket shell (SSH) on line VTY, a ping command using the DOS prompt on the management host which is on VLAN 2 to the router interfaces of the perimeter, and firewall router. A valid username and password are required to open the connection on the foreign host (router). An invalid login is also shown that causes the connection to be shut down. Page 4-- 5 - of 105 SSH connection to the firewall Router ! ---- Secure unused Aux ports firewallRouter(config)#line aux 0 firewallRouter(config-line)#no password firewallRouter(config-line)#login firewallRouter(config-line)#exit Page 4-- 6 - of 105 To further enhanced the router security to watch out for login attacks the logins are configured to be disabled for 30 seconds if there is 3 failed logins within 10 seconds or less. This is shown by the configuration below followed by its verification. !---- Enables login to be disabled for 30 sec after three failed attempts within 10 sec firewallRouter(config)#login block-for 30 attempts 3 with 10 firewallRouter(config)#login quiet-mode access-class 101 firewallRouter(config)#login delay 3 firewallRouter(config)#login on-failure firewallRouter(config)#login on-failure log firewallRouter(config)#login on-success log firewallRouter(config)#end The output below verifies the enhanced login security configuration that is applied on logins. It should be noted that this configuration is done on all the network devices used in the implementation phase. Enhanced login security Page 4-- 7 - of 105 4.2.4 Secure router network services In order to further secure the perimeter and firewall routers, some IP and network services that are not needed to support traffic and protocols on this network are disabled with a “no” command. Some of these services can present vulnerability in the router security that can be manipulated by an attacker to gain access to the LAN. The following configuration shows the sample configuration:[2],[4] This configuration disables IP services ! --- Disables router ip and network services PerimeterRouter(config)#no service udp-small-servers PerimeterRouter(config)#no service tcp-small-servers PerimeterRouter(config)#no ip bootp server PerimeterRouter(config)#no service finger PerimeterRouter(config)#no ip finger PerimeterRouter(config)#no ip http servers PerimeterRouter(config)#no snmp-servers The following disables network services that allow certain packets to pass through the router used by remoter users. ! --- Disables router services PerimeterRouter (config)#no cdp run PerimeterRouter(config)#no service config PerimeterRouter(config)#no ip source-route PerimeterRouter(config)#no ip classless ! --- Secures interfaces Page 4-- 8 - of 105 PerimeterRouter(config)#interface fa0/1 PerimeterRouter(config-if)#no ip directed-broadcast PerimeterRouter(config-if)#no ip proxy-arp PerimeterRouter(config-if)#shutdown 4.2.5 Configure Authentication, Accounting, Authorization protocol For more secured Administration management, a local authentication data base is configured on both perimeter and firewall routers, comprising of user account with a username, secret (encrypted) password, privilege level 15. As note, in a production environment the database can be widened as may be required. AAA protocol services are enabled with “aaa new-model” command line on both the perimeter and firewall routers to offer authentication, authorisation, and accounting of users accessing the network resources. AAA service is configured to use the local database by configuring default login authentication method list with the command line “aaa authentication login default local”. Configure local user database and enabling AAA on both routers. The following combined configuration illustrates the above: [4] ! --- Configures a local user and password firewallRouter(config)#username Admin1 privilege 15 secret Admin1pass !--- Enables aaa on the router firewallRouter(config)#aaa new-model firewallRouter(config)#aaa authentication login default local firewallRouter(config)#aaa authentication login TELNET-LOGIN local ! --- Applying the authentication method list to line console, and vty firewallRouter(config)#line console 0 firewallRouter(config-if)#login authentication default firewallRouter(config-if)#end Page 4-- 9 - of 105 firewallRouter(config)#line vty 0 4 firewallRouter(config)#login authentication TELNET-LOGIN firewallRouter(config)#end For the purposes of authentic time synchronisation on all the devices on the LAN, NTP authentication is configured on the Routers and switches, set a password, and a trusted key is as NTP client for the NTP server as mention above in the log router section. The following illustrates the above configuration: ! --- Enables ntp authentication, sets key, password for the router as ntp client firewallRouter(config)#ntp authenticate firewallRouter(config)#ntp authentication-key 1 md5 cisco12345 firewallRouter(config)#ntp trusted-key 1 firewallRouter(config)#ntp server "192.168.20.3" keyt 1 And the following output verifies firewall router as an NTP client for the NTP server IP address 192.168.20.3 having the synchronised time as well. 4.2.6 Log router activity The network activity logs are sent to syslog server acting as a central management station where a regularly review of all the logged activities is done. The activities configured to send messages to the syslog are for instance: the IPS inspections on every packet that enters or Page 4-- 10 - of 105 goes out of the private network on the router firewall, the login failures and successes extra. A time stamps setting is configured with Service timestamps command line. The routers, switches are configured as syslog/NTP clients, enabling them to synchronise their hardware clock as learned from the NTP server, and log massages with correct time stamps to the syslog server. These logs with the time stamps are used to determine whether the router has been compromised, allow the tracing of network attacks more credibly, and verify if the router is working properly. The above is achieved by the following configuration:[4] ! --- enables perimeter and firewall to log messages to the syslog server PerimeterRouter(config)#logging 192.168.20.3 firewallRouter(config)#logging 192.168.20.3 !--- enables routers to synchronise date and time with the NTP server firewallRouter(config)#ntp update-calendar firewallRouter(config)#service timestamps log datetime msec 4.2.7 Syslog server The syslog solution consists of the syslog server and client. A syslog server receives and store log messages, for instance the firewall logs; all the IPS process on the packets that pass in and out of the firewall, the audit session trails, login failures and successes, SSH sessions and many more activities on the network. The following screen shots shows the logged messages generated on the syslog server with the time of the activity happening, host name, and the message (what happened).[4] Page 4-- 11 - of 105 Syslog server Screen shot Page 4-- 12 - of 105 4.2.8 IPS software firewall The Cisco IOS intrusion prevention system is configured on the firewall router operating in the inline mode as a network based IPS implementation system. This is to inspect, analyse the content and payload of packets at layer 2 through layer 7, monitor ingress, and egress traffic in order to stop all malicious traffic. The IPS is configured to send log messages to the syslog server with “IP IPS notify log” and “logging syslog ip address” The following configuration illustrates IPS software configuration.[4] ! ---- Creates an IOS ips directory, storage location, ips rule, and enables logging firewallRouter#mkdir ipsdir firewallRouter(config)#ip ips config location flash:ipsdir Page 4-- 13 - of 105 firewallRouter(config)#ip ips name iosip firewallRouter(config)#ip ips notify log firewallRouter(config)#logging host 192.168.20.3 ! ---- Enable ips to use signature categories, first retire signature and un-retire all ios-ips basic firewallRouter(config)#ip ips signature-category firewallRouter(config-ips-category-action)#category all firewallRouter(config-ips-category-action)#retired true firewallRouter(config-ips-category-action)#exit firewallRouter(config-ips-category)#category ios_ips basic firewallRouter(config-ips-category-action)#retired false firewallRouter(config-ips-category-action)#exit firewallRouter(config-ips-category-action)#exit ! --- Apply the ips rule to the interface fa0/0, fa1/0, and fa1/1 firewallRouter(config)#interface fa0/0 firewallRouter(config-if)#ip ips iosips out firewallRouter(config-if)#ip iosips in !--- modify the event action of the signature to alert, and drop firewallRouter(config)#ip is signature-definition firewallRouter(config-sigdef)#signature 2004 0 firewallRouter(config-sigdef-sig)#status firewallRouter(config-sigdef-sig-status)#retired false firewallRouter(config-sigdef-sig-status)#enable true firewallRouter(config-sigdef-sig-status)#exit firewallRouter(config-sigdef-sig)#engine firewallRouter(config-sigdef-sig-engine)#event-action produced-alert firewallRouter(config-sigdef-sig-engine)#event-action deny-packet-inline firewallRouter(config-sigdef-sig-engine)#exit firewallRouter(config-sigdef-sig-engine)#exit Page 4-- 14 - of 105 The following screenshot shows ISP processing/ inspecting in-line all the packets from subnet 192.168.20.2 outbound through the firewall and the replies inbound through the firewall router back to the VLAN 2 (source). ISP processing/ inspecting in-line 4.2.9 Secure EIGRP routing protocol authentication In order to safe guard the information carried in the routing protocol, EIGRP routing protocol is configured authentication using message digest algorithm 5 (MD5). This algorithm will allow routers to compare signatures that should all be the same within the EIGRP area. The following command is used to configure routing protocol authentication for EIGRP on the perimeter router, and the same configuration is done on the firewall routers.[2] Page 4-- 15 - of 105 EIGRP authentication on the perimeter router ! --- Creating a key chain for the EIGRP routing protocol on the subnet on perimeter Router PermiterRouter(config)#router eigrp 1 PermiterRouter(config)#network 192.168.60.0 255.255.255.252 PermiterRouter(config)#exit PermiterRouter(config)#key chain EIGRP-KEY PermiterRouter(config-keychain)#key 1 PermiterRouter(config-keychain)#key-string cisco PermiterRouter(config-keychain)#exit PermiterRouter(config-keychain)#exit ! --- Enables and applying the authentication key chain on the interface PermiterRouter(config)#interface fa0/1 PermiterRouter(config-if)#ip authentication mode eigrp 1 md5 PermiterRouter(config-if)#ip authentication key-chain eigrp 1 EIGRP-KEY Configuring EIGRP authentication on the firewall router ! --- Creating a key chain for the EIGRP routing protocol on the subnet on firewall Router firewallRouter(config)#router eigrp 1 firewallRouter(config)#network 192.168.60.0 255.255.255.252 firewallRouter(config)#network 192.168.40.0 255.255.255.0 firewallRouter(config)#network 10.10.10.0 255.255.255.0 firewallRouter(config)#network 10.20.20.0 255.255.255.0 firewallRouter(config)#exit firewallRouter(config)#key chain EIGRP-KEY firewallRouter(config-keychain)#key 1 firewallRouter(config-keychain)#key-string cisco firewallRouter(config-keychain)#exit firewallRouter(config-keychain)#exit ! --- Enables and applying the authentication key chain on the interface firewallRouter(config)#interface fa0/1 Page 4-- 16 - of 105 firewallRouter(config-if)#ip authentication mode eigrp 1 md5 firewallRouter(config-if)#ip authentication key-chain eigrp 1 EIGRP-KEY 4.2.10 Securing the router IOS image on perimeter, and firewall routers In order to have the router IOS images secured a secure boot-image command is used to enable IOS image resilience on the router. Also to secure the boot configurations the secure boot-config command is used to secure the boot configuration. The following configuration illustrates the above configuration.[4] ! --firewallRouter(config)#secure boot-image firewallRouter(config)#secure boot-config IOS image resilience verification. 4.2.11 Access Lists I have configured extended access control list on the firewall router to filtering traffic from the internet/ISP web-server accessing the internal/private web server on the 192.168.40.0 subnet which is the DMZ zone on the private network, and to limit public initiated connection Page 4-- 17 - of 105 access the internal/private 192.168.20.0 and 192.168.30.0 subnets (VLANs 2 and 3). I have also used ACL to allow internal/private users to access selected internet services like web browsing, FTP, FTP-data, pop3, SMTP, SNMP, https, and only to allow replies for only those established connections from the private network by use of the “established” command. an inspection rule is created by use of context-based access control (CBAC) to inspect the traffic allowed in and out of the outside interface of the firewall as shown in the configuration, and verified by the ping command. [2] Access control list configurations The following access-list 111 deny all packets containing IP address from any local address 127.0.0.0/8, IP multicast range, private 172.16.0.0 in order to Mitigate IP address spoofing with ACL and its applied on the fa0/1 192.168.60.1 inbound the firewall router. ! ----deny all packets containing IP address 127.0.0.0/8, private 172.16.0.0, IP multicast range firewallRouter(config)#access-list 111 deny ip 127.0.0.0 0.255.255.255 any log firewallRouter(config)#access-list 111 deny ip 224.0.0.0 15.255.255.255 any log firewallRouter(config)#access-list 111 deny ip host 255.255.255.255 any log firewallRouter(config)#access-list 111 deny ip 172.16.0.0 0.15.255.255 any log firewallRouter(config)#access-list 111 permit ip any 192.168.0.0 0.0.255.255 ! --- applied on the fa0/1 192.168.60.1 inbound firewallRouter(config)#interface fa0/1 firewallRouter(config-if)#ip access-group 111 in ! ---The following access-list 107 permits all the required ICMP messages for proper network operations outbound to the fa0/ 1 ip 192.168.60.1 on the firewall router while denying all others. firewallRouter(config)#access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 echo-reply firewallRouter(config)#access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 parameter-problem Page 4-- 18 - of 105 firewallRouter(config)#access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 packet -too-big firewallRouter(config)#access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 source-quench firewallRouter(config)#access-list 107 deny icmp any any log firewallRouter(config)#interface fa0/1 firewallRouter(config-if)#ip access-group 107 out The following access-list 103 and 104 is configured on interface fa0/0 ip10.10.10.2 of the firewall router for VLAN 2 traffic and it permits TCP, IP, ICMP and allow replies for only the connections that are established form the private subnet of VLAN 2 (192.168.20.0). firewallRouter(config)#access-list 103 permit icmp 209.165.200.0 0.0.0.255 192.168.20.0 0.0.0.255 firewallRouter(config)#access-list 103 permit ip 192.168.60.0 0.0.0.255 192.168.20.0 0.0.0.255 firewallRouter(config)#access-list 103 permit ip 192.168.40.0 0.0.0.255 192.168.20.0 0.0.0.255 firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq www firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq ftp firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq 20 firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq 443 firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq smtp firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq pop3 firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 192.168.60.2 eq 22 Page 4-- 19 - of 105 firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 192.168.60.2 eq 23 firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 192.168.60.2 eq 161 firewallRouter(config)#access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 192.168.60.2 eq 53 firewallRouter(config)#access-list 104 permit icmp 209.165.200.0 0.0.0.255 192.168.20.0 0.0.0.255 established firewallRouter(config)#int fa0/0 firewallRouter(config-if)#ip access-group 103 out firewallRouter(config-if)#ip access-group 104 in ! ---The following access-list 105 and 106 is configured on interface fa1/1 ip10.20.20.2 of the firewall router for vlan 3 traffic and it permits tcp, ip, icmp and allow replies for only the connections that are established form the private subnet of vlan 3 (192.168.30.0). firewallRouter(config)#access-list 105 permit icmp 209.165.200.0 0.0.0.255 192.168.30.0 0.0.0.255 firewallRouter(config)#access-list 105 permit ip 192.168.60.0 0.0.0.255 192.168.30.0 0.0.0.255 firewallRouter(config)#access-list 105 permit ip 192.168.40.0 0.0.0.255 192.168.30.0 0.0.0.255 firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq www firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq ftp firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq 20 firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq 443 firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq smtp firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq pop3 firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 192.168.60.2 eq 22 firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 192.168.60.2 eq 23 Page 4-- 20 - of 105 firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 192.168.60.2 eq 161 firewallRouter(config)#access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 192.168.60.2 eq 53 firewallRouter(config)#access-list 106 permit icmp 209.165.200.0 0.0.0.255 192.168.30.0 0.0.0.255 established firewallRouter(config)#int fa1/1 firewallRouter(config-if)#ip access-group 105 out firewallRouter(config-if)#ip access-group 106 in 4.3 Simulation and verification of user access to different Subnets of the LAN/ Internet The following screen shot shows using a ping command to verify that the private/internal VLANs users (on network 192.168.20.0, and 192.168.30.0) are being able to access the internet but only allowing required or established reply(only initiated internally). This is enforced by the access control list as shown in the access control list section above. The ping command is executed from VLAN 2 and VLAN 3 as shown in the two screen shots below: Successfully ping to the ISP/Internet ping form PCO host on VLAN 3 Page 4-- 21 - of 105 Successfully ping to the ISP/Internet form PCO host on VLAN 2 Page 4-- 22 - of 105 Public users access DMZ web server but not private VLAN subnets The following screen shot shows using a ping command to verify that the public users (on the 209.165.200.0 network) are only allowed to access the DMZ web server subnet (on the internal network 192.168.40.0) but not the private network. This is enforced by the access control list as shown in the access control list section above.[7] ISP/WEB server pings successfully the Company DMZ Web server Page 4-- 23 - of 105 ISP/WEB server pings unsuccessfully the private VLAN 2, and 3 subnets Private subnets (VLAN 2 & 3) have inter- VLAN routing and can access to DMZ Also the following ping command output verifies that the internal private subnets (192.168.20.0 and 192.168.30.0) on different VLANs 2, 3 have connectivity with the DMZ subnet (192.168.40.0) for the purposed of file and data access on the server firm. This is enforced by the access control list as shown in the access control list section above. Page 4-- 24 - of 105 Ping Form PCO host on VLAN 2 to the DMZ web server and Host on VLAN 3 successfully Page 4-- 25 - of 105 Ping Form PC1 host on VLAN 3 to the DMZ web server and Host on VLAN 2 successfully 4.4 Context-based access control (CBAC) inspection rule The following configuration is done for the inspection rule on the firewall router. firewallRouter(config)#ip access-list extended out-in firewallRouter(config)#permit ip any any firewallRouter(config)#exit ! --firewallRouter(config)#interface fa0/1 firewallRouter(config-if)#ip access-group out-in in ! --firewallRouter(config)#ip inspect name in-out-in icmp Page 4-- 26 - of 105 firewallRouter(config)#ip inspect name in-out-in http firewallRouter(config)#ip inspect name in-out-in telnet firewallRouter(config)#ip inspect name in-out-in udp firewallRouter(config)#ip inspect name in-out-in tcp ! --firewallRouter(config)#ip inspect audit-trail firewallRouter(config)#service timestamps debug datetime msec firewallRouter(config)#logging host 192.168.20.3 ! --firewallRouter(config)#interface fa0/1 firewallRouter(config-if)#ip inspect in-out-in out The screen shot below shows that the inspection rule is enabled to inspection telnet, TCP, HTTP, UDP protocols in and out through the firewall router. 4.4.1 Inspection rule/Audit-trail enabled screen shot Page 4-- 27 - of 105 4.4.2 Simulation of inspection /audit-trail process 4.5 Port Address Translation PAT / NAT Overload I have configured NAT/PAT overload on the perimeter router using this command line “ip nat inside source list 1 interface overload”. NAT overload has only one publically exposed IP address. Incoming packets from the public network are routed to their private destination on the private network by referring to the NAT overload perimeter router that trucks public to private port pairs. In addition to the above I have used a static route “ip nat inside source static local-ip global ip”, and the access control list discussed in the next subheading, allow the public users/internet users to access only the company/private web server in the DMZ zone. At the same time allowing private network users to access the internet without exposing their private host IP addresses. By this configuration I also achieve the following:[2] Page 4-- 28 - of 105 Protect the private network address being advertised to the public thus securing the internal network. Provide consistency for internal network addressing scheme by use of private addresses and NAT enabling support of new public addressing scheme without a need to change the inside/internal client address. The configuration illustrates the complete command line configuration done on the perimeter router, followed by the Nat translations performed by these configurations on the perimeter router, and lastly the debug output of the Nat process on this same router. NAT/PAT configuration ! --- Establishes a static route to the DMZ web server perimiterRouter(config)#ip nat inside source static 192.168.40.2 255.255.255.0 ! --- Identify which addresses are eligible to be translated perimiterRouter(config)# access-list 1 permit 192.168.0.0 0.0.255.255 ! --- Identify the outside interface fa0/1 as the inside global address to be overloaded perimiterRouter(config)#ip nat inside source list 1 interface fa0/1 overload !--- Identify the inside NAT interface perimiterRouter(config)#interface fa0/0 perimiterRouter(config-if)#ip nat inside ! --- Identify the outside NAT interface perimiterRouter(config)#interface fa0/1 perimiterRouter(config)#ip nat outside Verification of Nat translations, debug, statistics, ! --- This output generated before any translations done perimeterRouter#sh ip nat translations Pro Inside global Inside local --- 209.165.200.226 192.168.40.2 Outside local --- Outside global --Page 4-- 29 - of 105 ! --- After the translation initiated by the ping command perimeterRouter#sh ip nat translations Pro Inside global Inside local Outside local Outside global icmp 209.165.200.225:37192.168.20.2:37 209.165.200.226:37 209.165.200.226:37 icmp 209.165.200.225:38192.168.20.2:38 209.165.200.226:38 209.165.200.226:38 icmp 209.165.200.225:39192.168.20.2:39 209.165.200.226:39 209.165.200.226:39 icmp 209.165.200.225:40192.168.20.2:40 209.165.200.226:40 209.165.200.226:40 --- 209.165.200.226 192.168.40.2 --- --- ! ---- Display live NAT translations as the happen on the PAT/NAT router IP NAT debugging is on perimeterRouter# *Dec 07, 12:35:23.3535: NAT: s=192.168.20.2->209.165.200.225, d=209.165.200.226 [79] *Dec 07, 12:35:23.3535: NAT*: s=209.165.200.226, d=209.165.200.225->192.168.20.2 [195] perimeterRouter# *Dec 07, 12:35:25.3535: NAT: s=192.168.20.2->209.165.200.225, d=209.165.200.226 [80] *Dec 07, 12:35:25.3535: NAT*: s=209.165.200.226, d=209.165.200.225->192.168.20.2 [196] perimeterRouter# *Dec 07, 12:35:26.3535: NAT: s=192.168.20.2->209.165.200.225, d=209.165.200.226 [81] *Dec 07, 12:35:26.3535: NAT*: s=209.165.200.226, d=209.165.200.225->192.168.20.2 [197] perimeterRouter# *Dec 07, 12:35:26.3535: NAT: expiring 209.165.200.225 (192.168.20.2) icmp 37 (37) perimeterRouter# *Dec 07, 12:35:27.3535: NAT: s=192.168.20.2->209.165.200.225, d=209.165.200.226 [82] *Dec 07, 12:35:27.3535: NAT*: s=209.165.200.226, d=209.165.200.225->192.168.20.2 [198] perimeterRouter# *Dec 07, 12:35:27.3535: NAT: expiring 209.165.200.225 (192.168.20.2) icmp 38 (38) Page 4-- 30 - of 105 perimeterRouter# *Dec 07, 12:35:28.3535: NAT: expiring 209.165.200.225 (192.168.20.2) icmp 39 (39) perimeterRouter# *Dec 07, 12:35:29.3535: NAT: expiring 209.165.200.225 (192.168.20.2) icmp 40 (40) perimeterRouter#un all All possible debugging has been turned off perimeterRouter# ! ---- Displays the NAT statistics after any translations perimeterRouter#sh ip nat statistics Total translations: 5 (1 static, 4 dynamic, 4 extended) Outside Interfaces: FastEthernet0/1 Inside Interfaces: FastEthernet0/0 Hits: 61 Misses: 154 Expired translations: 85 Dynamic mappings: perimeterRouter# 4.6 DHCP implementation The implementation of DHCP is configured on the layer 3 switches, 2 DHCP pools are configured one for VLAN 2 on L3switch1 and the other VLAN 3 on L3switch2 dynamically offers to the network devices IP address from a pool of allowed configured IP address and excluding those that are required for security purposes as maybe required. This configuration below achieved the above: [2], [6] ! --- Two IP addresses for the default gateway and the syslog server/ management are excluded from the pool of addresses. L3switch1(config)#ip dhcp excluded-address 192.168.20.1 L3switch1(config)#ip dhcp excluded-address 192.168.20.3 Page 4-- 31 - of 105 ! --- Creates the IP pool name on the DHCP server L3switch1(config)#ip dhcp pool LAN-POOL-1 L3switch1(dhcp-config)#network 192.168.20.0 255.255.255.0 L3switch1(dhcp-config)#default-router 192.168.20.1 L3switch1(dhcp-config)#end 4.6.1 DHCP Snooping To protect the Network against rogue DHCP servers, DHCP snooping is implemented to create a logical firewall between un-trusted hosts and DHCP servers. The following is the illustration of the configuration that achieves the above that is configured on both DHCP servers on the secured wired LAN:[6] !---Enables DHCP snooping on the switch L3swtich1(config)#ip dhcp snooping !--- DHCP snooping is not active until DHCP snooping is enabled on a VLAN. L3swtich1 (config)#ip dhcp snooping vlan 2 !--- Configures the interface connected to the DHCP server as trusted. L3swtich1(config)#interface fastEthernet 0/2 L3swtich1(config-if)#ip dhcp snooping trust 4.6.2 Dynamic ARP inspection To make sure that valid and only Valid ARP packet requests and responses are forwarded by performing an IP-to-MAC mapping, the dynamic ARP inspection feature is configured to achieve this. The following configuration is configured on both L3switches (1 and 2) DCHP servers VLANS and applied on the interface as shown below:[6] !--- Enables dynamic ARP inspection on the VLAN L3swtich1(config)#ip arp inspection vlan 2 Page 4-- 32 - of 105 !--- Configures the interface connected to the DHCP server as trusted. L3swtich1(config)#interface fastEthernet 0/2 L3swtich1(config-if)#ip arp inspection trust 4.6.3 IP source guard This feature is configured to restrict IP traffic on un-trusted layer 2 ports by filtering traffic based on DHCP snooping binding database or manually configuring IP source binding as result it will prevent IP spoofing attacks when hosts tries to spoof or use IP address of another host. The following configuration is configured on both L3switches (1 and 2) DCHP servers VLANS and applied on the interface as shown below:[6] !--- Enables IP source guard with source IP filtering L3swtich1(config)#interface fastEthernet 0/2 L3swtich1(config-if)#ip verify source 4.7 Chapter Summary This chapter has discussed and show the heart and soul of the project by showing the steps taken and how they are done in order to have a secured wired LAN. Among the security measures taken are to secure the layer 2 devices like the switches, layer 3 switches and routers , all the way through layer 7 of the OSI model. The examples of some of the configures security measures include securing Device access line and ports, configures passwords, Access control lists, firewalls, VLANs, NAT, Provide a reliable addressing scheme, configuring of the DMZ, creating logs, and many more. Page 4-- 33 - of 105 Chapter 5 : Critical appraisal, recommendations and suggestions for further work 5.1 Critical appraisal The following is the critical appraisal for the meaning of the results from the implementation of the project. 1. The VLAN implementation on the LAN is used to achieve the following objectives as shown below: Security: VLANs have been configured to separate sensitive data departments, for example the management department VLAN 2 , and VLAN 3 human resource form the rest of the network subnets. Broadcast storm mitigation: By segmenting the network into VLANs such as 2, and 3, it is made it possible to manage and confine the broadcast storms to devices within specific VLANs other than propagating throughout the entire network. Cost reduction: VLANs don’t need very expensive network upgrades and its more efficient use of the existing bandwidth and uplink. Higher performance: The VLANs implementation here has helped to divide a flat layer 2 network into multiple logical workgroups (broadcast domain) thus reducing unwanted traffic on the network and boost performance. 2. By using port address translation (PAT/NAT) it is been possible to separate the private network by using the class C IP address of 192.168.0.0- 192.168.255.255 and class A 10.0.0.0 -10.255.255.255 from the public/ internet address. PAT prevents the private Page 5-- 34 - of 105 IP addresses to be advertised on the public network. As a result secure the private network and improve the LANs addressing scheme. 3. Configuring username, password with a minimum length of 10 characters both alphabetic and numerical, encryption and a legal warning for any unauthorised access on the network devices such as the switches and routers enhances their security. Valid login credentials will have to be entered to have access. Any plain text passwords will be ciphered. 4. The configuration of the context based access control inspection rule helps to inspect and provide an audit trail for the protocols which are allowed in the private network through the firewall router. This rule is a Cisco software firewall that is configured in this case to enhanced inspection of packets through the firewall router. For instance, it is configured to inspect http, telnet, UDP to mention but a few. 5. The use of the hierarchal network design model approach to secure the LAN, it is made it possible to have a step by step approach starting from: The access layer with tool like port security, root guard, storm controls, BPDU guard, SSH transport input, VLAN trunking and disabling of the DTP, shut down shut down of all unused ports and services, primary root bridge, encryption of all passwords used, timeout on console, VTY are configured. On the distribution layer, in order to manage and control traffic in and out of different subnets to provide security, minimise the effects of any security breach across the network, Cisco IOS firewall, access control lists, and the secured EIGRP routing protocol are configured. Page 5-- 35 - of 105 The core layer is dedicated to transport traffic with PAT translations performed on in and out traffic on the network. In addition, all other required basic security configuration is done on the routers used at this level: for example, minimum length password requirement on all access lines, disable unused ports and services, to mention but a few. 6. Access control lists have enabled the control of traffic that is: allowed to in and out of the private network subnet to the public network, and the DMZ, For instance, the public network users are not allowed access to the private network but allowed access to the DMZ zone, private network users are allowed access to the internet but for only limited services such as www, ftp, ftp-data, amongst others and only allow replies to those connections initiated from the private VLAN subnets. 7. The router firewall is configured with the Cisco IOS IPS that assessing, tracks, and analyses any risk of the packets in-line going in and out on all interface connected to this firewall router. If the IPS detects unwanted security risk packets it drops the packet. 8. Authentication, authorisation and accounting protocol (AAA) is enabled to secure the access to network resources by limiting access to only those who have the right to access, and are what they say to be. This is achieved with configuring of a user’s database locally that contains the usernames, passwords, and the privileges’ granted, against which every login is checked / authenticated, authorised to access the resources in question and also provide the accountability for that login and logging any access to resources. Page 5-- 36 - of 105 9. The information that is logged on the syslog server from the managed devices helps to achieve the following: To have an insight into the nature of the attacks towards the LAN, To use the logged information for the purposes of troubleshooting, To have a clear picture of events correlation information of the multiple network devices (that is to say, the relationship between events occurring on different systems). 10. Lastly but not the least, the DMZ segment is offering the public users, (our customers) the access to the resources such the company web server within a lower level security zone and at the same time protecting our private subnets. It’s one way of providing a window into the company dealings. 5.2 Suggestions for Further work 5.2.1 Backup IOS software images In order to manage Cisco IOS images running on the Cisco devices on the LAN, and safeguard them against attacks that can put the router configurations or the operating systems at risk. Administrators should save, backup, restore configuration, and IOS images. For this reason, therefore, the report recommends IOS software images, configuration files, and revision level of Cisco IOS images files that be maintained, and should be copied on the central TFTP server as a backup.[4] Page 5-- 37 - of 105 5.2.2 Continuous network monitoring It is critical to verify that the counter measures are in place are working properly. To assist with the compliance of the company security policy, the Network Security Wheel that defines a continuous process of secure, monitor, test, and improve should be followed in order to achieve continuous security on the LAN.[2] 5.3 Recommendations 5.3.1 Virtual private network technology (VPN) As the company grows and it start having remote worker/ branches/ or teleworkers, or even within the LAN, VPN technology can be of great advantage to increase and maintain greater security on sensitive company data/ transactions.[2] 5.3.2 Cisco Adaptive Security Appliance (ASA) firewall As proposed in the interim report, the report recommends the use of the Cisco security appliance (ASA) as a modern up-to-date firewall router. It is modelled on a self-defending Network (SDN) principle having several protective and integrated layers such as firewalls, intrusion prevention, and anomaly mitigation. Cisco Adaptive Security Appliance provides state-full application inspection of all application and services traffic based on explicitly preconfigured polices and rules. This inspection keeps tracks of every connection passing through the interface making sure that they are valid connections, and monitors established, closed, resets or negotiates state of connections, and maintains a database with this information in a stable table. ASA provides intelligent threat defence and secure communications services that stop attacks before they affect business Page 5-- 38 - of 105 continuity. Packet headers and contents of the packets are examined through up to the application layer. [3] Cisco Adaptive Security Appliance can be configured to inspect the following protocols: Extended Simple Mail Transfer Protocol (ESMTP) This restricts the type of SMTP commands that can pass through Cisco ASA. Skinny Protocol (Simple Client Control Protocol -SCCP) To support a unified wired LAN (Audio and data), the Cisco ASA offers the ability to inspect skinny transactions using this protocol that making the wired LAN a secure unified network. Simple Network Management Protocol (SNMP) The Cisco ASA can be configured to deny traffic based on the SNMP packet versions. Early versions are less secure. This practice can be incorporated as a security policy thus making the LAN more secure. Trivial File Transfer Protocol (TFTP) Cisco ASA TFTP application inspection is used to: (i) Prevent hosts from opening invalid connections, and (ii) Enforces the creation of a secondary channel initiated from the server thus restricting TFTP clients creating them. Real Time Streaming Protocol (RSTP) Cisco ASA supports the inspection of this protocol which is a multimedia streaming protocol as stipulated in RFC 2326 which could have disastrous embedded codes. This protocol mostly use TCP port 554 application, and the applications that use RSTP are Real Audio, Apple Quick Time, Real Player, Cisco IPTV. [3] Page 5-- 39 - of 105 5.4 ASA Intrusion detection and Prevention system Even though I have configures the Cisco IOS IPS in my project. I strongly recommend the implement Inline Intrusion prevention system on the Cisco ASA which is more secure than promiscuous mode but affects overall throughput. In this case the Cisco ASA will direct all traffic to the Adaptive Inspection Prevention Security Service Module for process and analyse, dropping any malicious packets, generate an alarm, or reset connection, before it is forwarded by the ASA. This will mitigate network attacks such as Denial of Service (i.e. TCP sync flood attacks, land attacks, Smurf attacks), Distributed Denial of Service, Session Hijacking (i.e. Man- in-the- Middle).[3] 5.5 DNS Implementation on the Cisco ASA Traditionally, DNS queries will require not only relying on generic UDP handling based on activity timeouts. With the Cisco Adaptive Security Appliance, UDP connections associated with DNS queries and responses are torn down as soon as a reply to a DNS query has been received (like the DNS guard feature in Cisco PIX firewall). Cisco ASA DNS will further provide more security measures such as:[3] Guarantees that the ID’s of the DNS reply matches ID’s of DNS query, Allows translation of DNS packets using NAT, Reassembles DNS packets to verify its length which has a maximum of 65,553 bytes making any packets larger than that to be dropped. 5.6 Host- Based Intrusion Detection Systems Since I did implement my project in controlled environment I didn’t have the opportunity to implement Cisco Security Agent software firewall. However, I recommend this host based Page 5-- 40 - of 105 firewall should be installed on individual servers or client machines to safeguard critical computer systems and will intercept any attacks.[3] 5.7 Chapter Summary In this chapter of the report an in-depth critical appraisal is discussed showing how the methods have been used to achieve the required results and the meaning of this result. Also the recommendations are given for future considerations such as the use of the Cisco Adaptive Security Appliance, and suggestions of further work like bucking up IOS configurations and continuous monitoring of the LAN’s security Page 5-- 41 - of 105 Chapter 6 : Conclusion Over the course of implementing the project the main goal is to ultimately secure a wired Local Area Network. The implementation phase project carried out in a secured London Metropolitan University laboratory enabled the achievement of the objective to secure the physical layer (layer 1) of the OSI mode. Through the research, simulations, and analysis, it’s been possible to have a secure layer 2 to through layer 7 of the OSI model layers with the necessary security configuration such as switch port security, shut down unused ports and services, change native VLAN from 1 to any other number, IP source guard, DHCP Snooping, dynamic ARP inspections, VLAN segmentation, password requirements. Just to mention but a few. In addition, by using Network address translation / port address translation (NAT/PAT) technology, access list control, and configuration of a demilitarized zone (DMZ) I have managed to secure the private network from receiving untrusted traffic from the public network/internet. I have achieved redundancy, reliability on the network by having extra backup trunk links and using the 3 layered network design that includes access, distribution, and core. The implementation of VLANs and inter-VLAN routing improves for security, reliability, and it’s cost effective. It is required for companies, governments and non-governments organisations, schools, and homes put in place Network Security Policies which acts as a framework and guideline to be followed by the network users in order to achieved continuously secure network. Network Security Professionals should be employed and continually install software patches, monitor, and test the LAN security. They should also keep learning and sharing information about the new security threats. Having said that it should be noted that over the last 20 years companies have come to realise a great need to secure their LANs due to the increasing dynamic network security threats that has resulted in loss of data, leakage of confidential information, political Page 6-- 42 - of 105 collisions between countries, identity loss which resulted in big financial losses, damaged company brands, and individuals. As a result they are committing a lot of money to maintain a secure LAN environment so as to achieve confidentiality, Integrity, and availability on their networks. I have learnt a lot about the network security threats and the technology to mitigate these threats in order to have a secured wired LAN. Also learnt; how to organise meaningfully my time in order to achieve my intended goals in a given limited time, the techniques and approach on how to carry out a meaningful research on specific topics. And also gained skills in poster presentation, writing a well-structured report, presentation skills, increased my confidence, and prepared myself for a future carrier as a computer network security professional. Page 6-- 43 - of 105 References: 1. Local Area Networks (LANS). (2011, 12 14). Retrieved 10 20, 2011, from www.referenceforbusiness.com: http://www.referenceforbusiness.com/small/IncMail/Local-Area-Networks-LANS.html 2. Bob Vachon, Rick Graziani. (2008). Accessing the WAN. Indianapolis: Cisco Press. 3. Hucaby. (2005). Cisco ASA and PIX Firewall Handbook. Indianapolis: Cisco Press. 4. Micheal Watkins, Kevin Wallace,. (2010). CCNA Security . Indianapolis: Cisco Press. 5. orbit-computer-solutions. (2011, 12 14). Free Computer Training and Home Networking Tutorials. Retrieved 11 25, 2011, from www.orbit-computer-solutions.com: http://www.orbit-computer-solutions.com/ 6. press, c. (2011, 12 14). Catalyst 6500 Release 12.2SXF and Rebuilds Software Configuration Guide - DHCP Snooping. Retrieved 10 29, 2011, from cisco.com: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/confi guration/guide/snoodhcp.html 7. Press, C. (2011, 12 14). Demilitarized Zone (DMZ) Port - Cisco Systems:. Retrieved 10 22, 2011, from cisco.com: http://www.cisco.com/en/US/docs/ios/12_3/12_3x/12_3xr/dmz_port.html#wp1046651 8. Press, C. (2011, 12 14). Ethernet-to-the-Factory 1.2 Design and Implementation Guide Implementation of Security [Design Zone for Manufacturing] - Cisco Systems:. Retrieved 12 01, 2011, from cisco.com: http://www.cisco.com/en/US/docs/solutions/Verticals/EttF/ch5_EttF.html#wp103160 Page 6-- 44 - of 105 9. Press, C. (2011, 12 14). Layer 2 Security Features on Cisco Catalyst Layer 3 Fixed Configuration Switches Configuration Example - Cisco Systems:. Retrieved 11 13, 2011, from cisco.com: http://www.cisco.com/en/US/products/hw/switches/ps5023/products_configuration_ex ample09186a00807c4101.shtml#ipsourceguard 10. Rick Graziani, Allan Johnson. (2009). Routing Protocols and Concepts. Indianapolis: Cisco Press. 11.http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094afd.sht ml Page 6-- 45 - of 105 Appendix A: A.1 Device documentation with a show run command A.1.1 Secured Perimeter Router documentation perimeterRouter#sh run Building configuration... Current configuration : 2397 bytes ! version 12.4 service tcp-keepalives-in service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname perimeter ! boot-start-marker boot-end-marker ! security authentication failure rate 5 log security passwords min-length 10 enable secret 5 $1$CuvP$QG5GryTJC0z6DJsTYuF3E0 ! aaa new-model ! aaa authentication login default local enable aaa authentication login TELNET_LOGIN local ! aaa session-id common memory-size iomem 15 no ip source-route ip cef ! no ip bootp server no ip domain lookup ip domain name FDS.com ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 login block-for 30 attempts 3 within 10 login delay 3 login quiet-mode access-class 101 login on-failure log login on-success log ! Page 6-- 46 - of 105 voice-card 0 ! key chain EIGRP-KEY key 1 key-string 7 1511021F0725 ! username Admin1 privilege 15 secret 5 $1$mERr$ZR1fkPDr3Z4icChNe.bBZ. secure boot-image secure boot-config ! ip ssh time-out 15 ip ssh authentication-retries 4 ! interface FastEthernet0/0 description connecting an inside interface ip address 192.168.60.2 255.255.255.252 ip authentication mode eigrp 1 md5 ip authentication key-chain eigrp 1 EIGRP-KEY ip nat inside ip virtual-reassembly shutdown duplex auto speed auto ! interface FastEthernet0/1 ip address 209.165.200.225 255.255.255.224 ip nat outside ip virtual-reassembly shutdown duplex auto speed auto ! interface Serial0/2/0 no ip address shutdown ! interface Serial0/2/1 no ip address shutdown clock rate 125000 ! router eigrp 1 network 192.168.0.0 no auto-summary ! no ip classless ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 209.165.200.255 ! ip http server no ip http secure-server Page 6-- 47 - of 105 ip nat inside source list 1 interface FastEthernet0/1 overload ip nat inside source static 192.168.40.2 209.165.200.225 ! access-list 1 permit 192.168.0.0 0.0.255.255 no cdp run ! control-plane ! banner motd ^C This switch is the property of FDS Tech. Disconnect now if you are unauthorised access. Any violations will be prosecuted. ^C ! line con 0 exec-timeout 2 30 logging synchronous line aux 0 line vty 0 4 exec-timeout 2 30 logging synchronous login authentication TELNET_LOGIN transport input ssh line vty 5 15 login authentication TELNET_LOGIN ! scheduler allocate 20000 1000 ntp authentication-key 1 md5 0822455D0A165445415F59 7 ntp authenticate ntp trusted-key 1 ntp update-calendar ntp server 192.168.20.3 key 1 end A.1.2 Secured Firewall Router documentation firewallRouter#sh run Building configuration... Current configuration : 4081 bytes ! version 12.4 service tcp-keepalives-in service timestamps debug datetime msec localtime year service timestamps log datetime msec service password-encryption ! hostname firewallRouter ! boot-start-marker boot-end-marker ! Page 6-- 48 - of 105 security authentication failure rate 5 log security passwords min-length 10 enable secret 5 $1$vtP7$ngKYPBqqhuhqGIWRbiFc4. ! aaa new-model ! aaa authentication login default local enable aaa authentication login TELNET-LOGIN local ! aaa session-id common memory-size iomem 15 no ip source-route ip cef ! no ip bootp server no ip domain lookup ip domain name FDS.com ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ip ips name iosips login block-for 30 attempts 3 within 10 login delay 3 login quiet-mode access-class 101 login on-failure log login on-success log ! voice-card 0 ! key chain EIGRP_KEY key 1 key-string 7 00071A150754 ! ip inspect audit-trail ip inspect name in-out-in icmp ip inspect name in-out-in telnet ip inspect name in-out-in http ip inspect name in-out-in tcp ip inspect name in-out-in udp ! ip ips config location flash:ipsdir/ retries 1 ip ips name iosips ip ips signature-category category all retired true category ios_ips basic retired false ! username Admin1 privilege 15 secret 5 $1$mERr$ZR1fkPDr3Z4icChNe.bBZ. secure boot-image secure boot-config ! ip ssh time-out 15 Page 6-- 49 - of 105 ip ssh authentication-retries 4 ! interface FastEthernet0/0 description connecting to L3switch1 ip address 10.20.20.2 255.255.255.0 ip authentication mode eigrp 1 md5 ip authentication key-chain eigrp 1 EIGRP-KEY ip access-group 106 in ip access-group 105 out ip ips iosips in ip ips iosips out duplex auto speed auto ! interface FastEthernet1/1 description connecting to L3switch2 ip address 10.10.10.2 255.255.255.0 ip authentication mode eigrp 1 md5 ip authentication key-chain eigrp 1 EIGRP-KEY ip access-group 106 in ip access-group 105 out ip ips iosips in ip ips iosips out duplex auto speed auto ! interface FastEthernet0/1 description connecting to perimeter router ip address 192.168.60.1 255.255.255.252 ip authentication mode eigrp 1 md5 ip authentication key-chain eigrp 1 EIGRP-KEY ip access-group 107 out ip inspect in-out-in in ip inspect in-out-in out duplex auto speed auto ! interface FastEthernet1/0 description connecting to DMZserver ip address 192.168.40.1 255.255.255.0 ip ips iosips in ip ips iosips out duplex auto speed auto ! router eigrp 1 network 10.0.0.0 network 192.168.0.0 no auto-summary ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 192.168.60.2 Page 6-- 50 - of 105 ip route 192.168.20.0 255.255.255.0 FastEthernet0/0 ip route 192.168.30.0 255.255.255.0 FastEthernet0/1 ! ip http server no ip http secure-server ! logging 192.168.20.3ip access-list extended out-in permit ip any any access-list 103 and 104 remark permits tcp,ip ,icmp and allow replys for only the connections that are established form the private subnet of vlan 2,and applied outbound int fa0/0 on the firewall router. access-list 103 permit icmp 209.165.200.0 0.0.0.255 192.168.20.0 0.0.0.255 access-list 103 permit ip 192.168.60.0 0.0.0.255 192.168.20.0 0.0.0.255 access-list 103 permit ip 192.168.40.0 0.0.0.255 192.168.20.0 0.0.0.255 access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq www access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq ftp access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq 20 access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq 443 access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq smtp access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 209.165.200.226 eq pop3 access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 192.168.60.2 eq 22 access-list 103 permit tcp 192.168.20.0 0.0.0.255 host 192.168.60.2 eq telnet access-list 105 and 106 remark permits tcp,ip ,icmp and allow replys for only the connections that are established form the private subnet of vlan 3,and applied outbound int fa1/1 on the firewall router. access-list 105 permit icmp 209.165.200.0 0.0.0.255 192.168.30.0 0.0.0.255 access-list 105 permit ip 192.168.60.0 0.0.0.255 192.168.30.0 0.0.0.255 access-list 105 permit ip 192.168.40.0 0.0.0.255 192.168.30.0 0.0.0.255 access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq www access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq ftp access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq 20 access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq 443 access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq smtp access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 209.165.200.226 eq pop3 access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 192.168.60.2 eq 22 access-list 105 permit tcp 192.168.30.0 0.0.0.255 host 192.168.60.2 eq telnet access-list 107 remark permits all the required ICMP messages for proper network operations outbound to the fa0/ while denying all others on the firewall router. access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 echo-reply access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 parameter-problem access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 packet -too-big access-list 107 permit icmp 209.165.200.0 0.0.0.255 192.168.0.0 0.0.255.255 source-quench access-list 107 deny icmp any any log access-list 111 permit ip any 192.168.0.0 0.0.255.255 no cdp run ! control-plane ! banner motd ^CC This switch is the property of FDS Tech. Disconnect now if you are unauthorised access. Any violations will be prosecuted ^C ! line con 0 exec-timeout 2 30 password 7 13061E010803557878707D Page 6-- 51 - of 105 logging synchronous line aux 0 line vty 0 4 exec-timeout 2 30 password 7 1511021F07257A767B6760 logging synchronous transport input ssh line vty 5 exec-timeout 2 30 login authentication TELNET-LOGIN transport input ssh line vty 6 15 exec-timeout 2 30 login authentication TELNET-LOGIN ! scheduler allocate 20000 1000 ntp authentication-key 1 md5 0822455D0A165445415F59 7 ntp authenticate ntp trusted-key 1 ntp update-calendar ntp server 192.168.20.3 key 1 end firewallRouter# A.1.3 Secured Layer 3Switch1 documentation L3switch1#sh run ! !Building configuration... ! Current configuration : 4106 bytes ! ! Last configuration change at 00:28:07 UTC Mon Mar 1 1993 ! version 12.2 no service pad no service timestamps debug uptime service timestamps log datetime msec service password-encryption ! hostname L3switch1 ! boot-start-marker boot-end-marker ! enable secret 5 $1$mERr$WvpW0n5HghRrqnrwXCUUl. ! no aaa new-model system mtu routing 1500 ip routing Page 6-- 52 - of 105 ip arp inspection vlan 1 no ip domain-lookup ip domain-name FDS.com ! ip dhcp excluded-address 192.168.20.1 ip dhcp excluded-address 192.168.20.3 ! ip dhcp pool LAN-POOL-1 network 192.168.20.0 255.255.255.0 default-router 192.168.20.1 ! ip dhcp snooping vlan 2 ip dhcp snooping login block-for 30 attempts 3 within 10 login on-failure log login on-success log ! spanning-tree mode pvst spanning-tree extend system-id spanning-tree vlan 1,20,30 priority 24576 ! vlan internal allocation policy ascending ! ip ssh version 2 ! interface FastEthernet0/1 no switchport ip address 10.20.20.1 255.255.255.0 ! interface FastEthernet0/2 switchport trunk encapsulation dot1q switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate ip arp inspection trust storm-control broadcast level 50.00 spanning-tree guard root ip verify source ip dhcp snooping trust ! interface FastEthernet0/3 no switchport ip address 10.30.30.1 255.255.255.0 storm-control broadcast level 50.00 ! interface FastEthernet0/4 switchport trunk encapsulation dot1q switchport mode trunk switchport nonegotiate storm-control broadcast level 50.00 spanning-tree guard root ! Page 6-- 53 - of 105 ! --- Output omitted interface FastEthernet0/5 switchport access vlan 99 shutdown ! ! --- Output omitted interface GigabitEthernet0/2 switchport access vlan 99 shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan2 description connecting to the managment vlan ip address 192.168.20.2 255.255.255.0 standby 1 192.168.20.1 Standby 1 priority 160 Standby 1 preempt Standby 1 track fa0/3 70 Standby 1 authentication VLAN2 ! interface Vlan3 description connecting HR vlan ip address 192.168.30.3 255.255.255.0 standby 2 192.168.30.1 Standby 2 priority 160 Standby 2 preempt Standby 2 track fa0/3 65 Standby 2 authentication VLAN3 ! interface Vlan99 description connecting native vlan ip address 192.168.10.1 255.255.255.0 ! router eigrp 1 network 10.0.0.0 ! ip http server ip http secure-server ! ip route 0.0.0.0 0.0.0.0 10.20.20.2 ! logging esm config logging 192.168.20.3 no cdp run no cdp tlv location no cdp tlv app ! Page 6-- 54 - of 105 banner login ^C This switch is the property of FDS Tech. Disconnect now if you are unauthorised access. Any violations will be prosecuted. ^C ! line con 0 exec-timeout 2 30 password 7 0822455D0A165445415F59 logging synchronous login line vty 0 4 exec-timeout 2 30 password 7 0822455D0A165445415F59 logging synchronous login transport input ssh line vty 5 15 exec-timeout 2 30 password 7 0822455D0A165445415F59 login transport input ssh ! ntp authentication-key 1 md5 0822455D0A165445415F59 7 ntp authenticate ntp trusted-key 1 ntp server 192.168.20.3 key 1 end L3switch1# A.1.4 Secured Layer 3Switch2 documentation L3switch2#sh run Building configuration... Current configuration : 3673 bytes ! ! Last configuration change at 00:07:06 UTC Mon Mar 1 1993 ! version 12.2 no service pad no service timestamps debug uptime service timestamps log datetime msec service password-encryption ! hostname L3switch2 ! boot-start-marker boot-end-marker ! enable secret 5 $1$mERr$WvpW0n5HghRrqnrwXCUUl. ! no aaa new-model system mtu routing 1500 Page 6-- 55 - of 105 ip routing no ip domain-lookup ip domain-name FDS.com ! ip dhcp excluded-address 192.168.30.1 ! ip dhcp pool LAN-POOL-1 network 192.168.30.0 255.255.255.0 default-router 192.168.30.1 ! ip dhcp snooping vlan 1 ip dhcp snooping login block-for 30 attempts 3 within 10 login on-failure log login on-success log ! spanning-tree mode pvst spanning-tree extend system-id spanning-tree vlan 1 priority 28672 ! vlan internal allocation policy ascending ! ip ssh version 2 ! interface FastEthernet0/1 no switchport ip address 10.10.10.1 255.255.255.0 ! interface FastEthernet0/2 switchport trunk encapsulation dot1q switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate ip arp inspection trust storm-control broadcast level 50.00 ip verify source ip dhcp snooping trust ! interface FastEthernet0/3 no switchport ip address 10.30.30.2 255.255.255.0 ! interface FastEthernet0/4 switchport trunk encapsulation dot1q switchport mode trunk switchport nonegotiate storm-control broadcast level 50.00 ! interface FastEthernet0/5 switchport access vlan 99 shutdown ! Page 6-- 56 - of 105 ! --- Output omitted interface GigabitEthernet0/2 switchport access vlan 99 shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan2 description connecting to the management vlan ip address 192.168.20.2 255.255.255.0 standby 1 192.168.20.1 Standby 1 preempt Standby 1 track fa0/3 70 Standby 1 authentication VLAN2 ! interface Vlan3 description connecting to the HR vlan ip address 192.168.30.3 255.255.255.0 standby 2 192.168.30.1 Standby 2 preempt Standby 2 track fa0/3 65 Standby 2 authentication VLAN3 ! interface Vlan99 description connecting native vlan ip address 192.168.10.1 255.255.255.0 ! router eigrp 1 network 10.0.0.0 ! ip http server ip http secure-server ! ip route 0.0.0.0 0.0.0.0 10.10.10.2 ! logging esm config logging 192.168.20.3 no cdp run no cdp tlv location no cdp tlv app ! banner login ^C This switch is the property of FDS Tech. Disconnect now if you are unauthorised access. Any violations will be prosecuted. ^C ! line con 0 exec-timeout 2 30 password 7 0822455D0A165445415F59 logging synchronous Page 6-- 57 - of 105 login line vty 0 4 exec-timeout 2 30 password 7 0822455D0A165445415F59 transport input ssh logging synchronous login line vty 5 15 exec-timeout 2 30 password 7 0822455D0A165445415F59 transport input ssh logging synchronous login ! end L3switch2# A.1.5 Secured Layer 2Switch1 documentation L2switch1#sh run ! !Building configuration... ! Current configuration : 3494 bytes ! version 12.1 no service pad no service timestamps debug uptime service timestamps log datetime msec service password-encryption ! hostname L2switch1 ! ip subnet-zero no ip domain-lookup ! spanning-tree mode pvst no spanning-tree optimize bpdu transmission spanning-tree extend system-id no spanning-tree vlan 2 ! interface FastEthernet0/1 switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate no ip address storm-control broadcast level 50.00 ! interface FastEthernet0/2 switchport access vlan 2 Page 6-- 58 - of 105 switchport mode access switchport port-security switchport port-security mac-address sticky switchport port-security mac-address sticky 00e0.a3dd.0752 no ip address spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/3 switchport mode trunk switchport nonegotiate no ip address storm-control broadcast level 50.00 spanning-tree guard root ! interface FastEthernet0/4 switchport access vlan 2 switchport mode access switchport port-security switchport port-security mac-address sticky switchport port-security mac-address sticky 0001.c9da.0939 no ip address ! interface FastEthernet0/5 switchport access vlan 99 no ip address shutdown ! ! --- Output omitted interface GigabitEthernet0/2 switchport access vlan 99 no ip address ! interface Vlan1 no ip address no ip route-cache shutdown ! interface Vlan2 no ip address no ip route-cache shutdown ! interface Vlan99 no ip address no ip route-cache ! ip default-gateway 192.168.20.1 ip http server ! banner login ^C This switch is the property of FDS Tech. Disconnect now if you are Page 6-- 59 - of 105 unauthorised access. Any violations will be prosecuted. ^C ! line con 0 exec-timeout 2 30 password 7 104D000A061843595F507F logging synchronous login line vty 0 4 exec-timeout 2 30 password 7 1511021F07257A767B6760 transport input ssh logging synchronous login local line vty 5 15 exec-timeout 2 30 password 7 1511021F07257A767B6760 transport input ssh login local ! end L2switch1# A.1.6 Secured Layer 2Switch2 documentation L2switch2#sh run Building configuration... Current configuration : 3347 bytes ! version 12.1 no service pad no service timestamps debug uptime service timestamps log datetime msec service password-encryption ! hostname L2switch2 ! ip subnet-zero no ip domain-lookup ! spanning-tree mode pvst no spanning-tree optimize bpdu transmission spanning-tree extend system-id no spanning-tree vlan 3 ! interface FastEthernet0/1 switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate no ip address storm-control broadcast level 50.00 ! Page 6-- 60 - of 105 interface FastEthernet0/2 switchport mode trunk switchport nonegotiate no ip address storm-control broadcast level 50.00 ! interface FastEthernet0/3 switchport access vlan 3 switchport mode access switchport port-security switchport port-security mac-address sticky switchport port-security mac-address sticky 00e0.f9a9.bab6 no ip address spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/4 switchport access vlan 99 no ip address shutdown ! ! --- Output omitted interface GigabitEthernet0/2 switchport access vlan 99 no ip address ! interface Vlan1 no ip address no ip route-cache shutdown ! interface Vlan3 no ip address no ip route-cache ! interface Vlan99 no ip address no ip route-cache ! ip default-gateway 192.168.30.1 ip http server ! logging 192.168.20.3 banner motd ^C This switch is the property of FDS Tech. Disconnect now if you are unauthorised access. Any violations will be prosecuted. ^C ! line con 0 exec-timeout 2 30 password 7 104D000A061843595F507F logging synchronous login line vty 0 4 Page 6-- 61 - of 105 exec-timeout 2 30 password 7 1511021F07257A767B6760 transport input ssh logging synchronous login local line vty 5 15 exec-timeout 2 30 password 7 1511021F07257A767B6760 transport input ssh login local end L2switch2# Page 6-- 62 - of 105 Appendix B: B.1 Glossary Authentication, authorization, and accounting (AAA) Provides a mechanism to address the unauthorised access to a network through systematic, scalable access security. Demilitarized zone (DMZ) sometimes referred to as a screened subnet. Denial of service (DOS) A class of attack in which the attacker seeks to make a given resource such as a server unavailable to legitimate users by overwhelming the resources with requests for services that appear to legitimate. Default Gateway It’s the route used by the devices when it has no other explicitly defined route to the destination network. Encryption Applying a specific algorithm to data to alter its appearance, making it incomprehensible to those who are not authorised to see the information. Endpoint The final point of connection in a communication channel. Firewall Allows the segmentation of the network into different physical subnet works, thereby limiting the potential damage that could spread from one subnet to another. Firewalls may be a piece of software or hardware that acts as a barrier between the internal (trusted) and the external (untrusted) network, such as the internet. FTP This is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet GNS3 It is a graphical network simulator that allows simulation of complex networks. Page 6-- 63 - of 105 HTTP The underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands IEEE 802.5 A standard that defines Token Ring technology as a LAN protocol where all stations are connected in a ring and each station can directly hear transmissions only from its immediate neighbour. IP Is the primary protocol in the Internet Layer of the Internet Protocol Suite that is responsible for the delivering datagrams from the source host to the destination host basing on their addresses. Intrusion Prevention System (IPS) This monitors systems activities for malicious or unwanted behaviours. It can react in real time to block or prevent those activities. LAN storms Is when packets floods the LAN creating excessive traffic, and degrading the network performance Network Address Translation (NAT) Employed by networks that use private IP addresses. It is used to translate embedded addresses and to update any checksum or other fields that are affected by the translation. MAC Short for Media Access Control address, a hardware address that uniquely identifies each node of a network. MAC address spoofing occurs when one host poses as another to receive otherwise inaccessible data, or to circumvent security configurations. MAC address table overflows MAC flooding takes advantage of this limitation by flooding the switch with fake source MAC addresses until the switch MAC address table is full. As a result the switch begins to flood all incoming traffic to all ports due to lack of space Page 6-- 64 - of 105 to learn any legitimate MAC addresses. At this point the attacker with access to LAN can see all of the frames sent from one host to another. OSI Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. PAT Sometime called NAT overloading. It maps multiple private IP addresses to a single public IP address or a few addresses. POP3 It is a client/server protocol in which e-mail is received and held for you by your Internet server. Syslog A protocol used to collect log information. It consists of two primary components: syslog servers and syslog clients. A syslog server receives and stores log messages sent from syslog clients. STP manipulation attack In an STP manipulation attack, the attacking host broadcasts STP configurations, with BPDUs of a lower bridge priority in an attempt to be elected as the root bridge by forcing spanning-tree recalculations. If the attack is successfully done, the attacking host becomes the root bridge and sees a number of frames wouldn’t have been accessible. Secure Shell (SSH) A protocol that provides encryption and authentication functions for remote terminal sessions via telnet. STP a link management protocol that is part of the IEEE 802.1 standard for media access control bridges. Transmission Control Protocol (TCP) One of the internet protocol suite that provides reliable, in-order delivery of a stream of bytes – transport protocol, suitable for applications such as file transfer and e-mails. Page 6-- 65 - of 105 VPN it is a means to securely and privately transmits data over an unsecured and shared network infrastructure. VLAN A group of hosts with a common set of requirements that communicate as if they were attached to the same wire regardless of their physical location. VLAN attacks the attacker accesses works vulnerable trunk port enabling him to spoof DTP messages and causes the switch to enter into trunking mode, or bring up a rogue switch and enable trunking as a result access all the VLANs on the victim switch. Page 6-- 66 - of 105 Appendix C: C.1 Project proposal Page 6-- 67 - of 105