tcp/syn attack – use acl to allow traffic from tcp connections that were established from the...

8
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network that have only the SYN flag set. (DoS) Verify that the security policy specifies how ACLs will be implementation to support the secure processing environment. Consult the reference material for more thorough narrative for ACL best practices.

Upload: buck-garrett

Post on 28-Dec-2015

221 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network that have only the SYN flag set. (DoS)

• Verify that the security policy specifies how ACLs will be implementation to support the secure processing environment.

• Consult the reference material for more thorough narrative for ACL best practices.

Page 2: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• Routing protocols – gathers information about available networks.

• OSPF, BGP, RIP are IETF standards• IS-IS is ISO standard• EIGRP is Cisco Proprietary

• Authenticated router updates ensure that the update messages came from legitimate sources, bogus messages are automatically discarded.

• Configure passive-interfaces to prevent update distribution.

• Review configuration to verify implementation.

Page 3: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• Cisco Discovery Protocol (CDP) – Cisco proprietary protocol, provides the capability for sharing system information between Cisco products

• If this information is not required for operational needs, then it should be disabled.

• Review config to verify that CDP is disabled.

Page 4: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• Port Security – no security by default.

• All switch ports or interfaces should be secured before the switch is deployed.

• If port not being used, configure shutdown.

• MAC addresses are learned dynamically by default and not saved in config file.

• Static entries are manually entered for each port and saved in the running configuration.

• Sticky entries are similar to static entries except they are dynamically learned and are saved in the config.

Page 5: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• Each active port can be restricted by a maximum MAC address count with an action selected for any violations.

Page 6: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• Verify that policy establishes minimum security requirements for port security.

• Verify that unused ports are disabled.

• Verify that active ports are restricted by a maximum MAC address count.

• Verify that the action selected for any violations is based on established policy requirements.

Page 7: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• A Virtual Local Area Network (VLAN) is a broadcast domain configured in the switch.

• All members of a VLAN are grouped logically into the same broadcast domain independent of their physical location.

• Routing is required for communication among members of different VLANs.

Page 8: TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network

• Cisco switches use VLAN 1 as the default VLAN to assign to their ports, including the management ports.

• Protocols such as CDP and VTP, need to be sent on a specific VLAN, VLAN 1.

• VLAN 1 may span the entire network

• Provides attackers easier access and extended reach for their attacks.