© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-2 Discovering Neighbors with Cisco Discovery Protocol Cisco Discovery Protocol runs on Cisco IOS devices. Summary information includes: –Device identifiers –Address list –Port identifier –Capabilities list –Platform
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-3 Neighbor Discovery Protocols Cisco Discovery Protocol –Cisco Layer 2 protocol –Has additional capabilities (VLAN or PoE negotiation) –Enabled by default LLDP –Standard-based Layer 2 protocol –Disabled by default Provides a summary of directly connected switches, routers, and other Cisco devices Discovers neighbor devices regardless of which protocol suite they are running
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-4 Cisco Discovery Protocol Configuration switch(config)# [no] cdp run switch(config-if)# [no] cdp enable switch# show cdp neighbor [detail] switch# show cdp neighbor Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID Local Intrfce Holdtme Capability Platform Port ID c Fas 0/8 168 S I WS-C2960- Fas 0/8
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-5 LLDP Configuration switch(config)# [no] lldp run switch(config-if)# [no] lldp enable switch# show lldp neighbor [detail] switch# show lldp neighbor Capability codes: (R) Router, (B) Bridge, (T) Telephone, (C) DOCSIS Cable Device (W) WLAN Access Point, (P) Repeater, (S) Station, (O) Other Device ID Local Intf Hold-time Capability Port ID c Fa0/8 120 B Fa0/8 Total entries displayed: 1
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-6 Vulnerabilities of Discovery Protocols
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-7 Vulnerabilities of the Telnet Protocol The Telnet connection sends text unencrypted and potentially readable.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-8 About SSH SSH replaces the Telnet session with an encrypted connection.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-9 Configuration of SSH Configure username and password. Configure domain name. Generate RSA keys. –SSH process is automatically started. Allow SSH protocol on vty lines. switch(config)# username xyz password abc123 switch(config)# ip domain-name xyz.com switch(config)# crypto key generate rsa switch(config)# ip ssh version 2 switch(config)# line vty 0 15 switch(config-line)# login local switch(config-line)# transport input ssh
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-10 Configuration of vty ACLs Create standard or extended IP ACL. Configure access-class on line vty.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-11 Configuration of an HTTP Server Configure username and password. Configure domain name. Generate RSA keys. Enable HTTPS (SSL) server. Configure HTTP authentication. Configure an access list to limit access. sw(config)# access-list 100 permit ip any sw(config)# username xyz password abc123 sw(config)# ip domain-name xyz.com sw(config)# crypto key generate rsa sw(config)# no ip http server sw(config)# ip http secure-server sw(config)# http access-class 100 in sw(config)# http authentication local
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-12 Switch Security Recommendations Secure switch access Configure system passwords. Authenticate admin access via TACACS+ server. Configure encrypted or hashed passwords. Secure physical access to the console. Secure Telnet access with ACL. Use SSH when possible. Use HTTPS (SSL) when possible. Configure system-warning banners. Use syslog to log system messages. Disable unused services.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-13 Switch Security Recommendations (Cont.) Secure switch protocols Trim Cisco Discovery Protocol and LLDP and use only as needed. Secure spanning tree. Mitigate compromises through a switch Take precautions for trunk links. Minimize physical port access. Establish standard access port configuration for both unused and used ports. Shut down unused ports.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-14 Summary Cisco Discovery Protocol / LLDP packets can expose some network information. Authentication information and data carried in Telnet sessions is vulnerable. SSH provides a more secure option for Telnet. vty ACLs should be used to limit Telnet access to switch devices. Web service should be secured by using HTTPS and limiting who should access the web server and from where. Sound security measures and trimming of unused applications are recommended.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-15