You are on page 1of 2

Turn It On

To help you get the most functionality, value and ROI from your Cisco
Power Up routers and switches, we want to ensure you’re aware of the many
Turn on all these features to
powerful features residing within. Our Turn it On program is designed to
leverage the full value of Cisco
empower Federal agencies like yours to take full advantage of Cisco’s
routers and switches.
powerful core networking solutions to maximize your productivity,
efficiency and technology investment.
• Protective QoS Features
- Control Plane Policing (CoPP)
Catalyst Integrated Security Features (CISF)
- Network-Based Application
Recognition (NBAR) Layer 2 switched environments can prove easy targets for security attacks. These attacks
• VRF-Lite/Multi-VRF CE exploit normal protocol processing such as a switches’ ability to learn MAC addresses,
end-station Media Access Control (MAC) address resolution through Address Resolution
• Advanced VPN Services:
Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP) IP address assignments.
- Dynamic Multipoint VPN And because any user can gain access to any Ethernet port and potentially hack into the
(DMVPN)
network using readily available, menu-driven hacker tools available on the Internet, open
- Group Encrypted Transport campus networks cannot guarantee network security.
(GET VPN)
The rich set of industry-leading integrated security features on Cisco Catalyst Switches
• Catalyst Integrated (CISF) proactively protect your critical network infrastructure. Delivering powerful,
Security Features (CISF) easy-to-use tools to effectively prevent the most common—and potentially damaging—
• Spanning-Tree Protocol (STP) Toolkit Layer 2 security threats, CISF provides robust security throughout the network. And
• Encapsulated Remote Switched these powerful features already reside on your Cisco Catalyst switches. All you have to
Port Analyzer (ERSPAN) do is turn them on.

• Dynamic Intelligent Routing Strong protection against common attacks


Solutions
CISF works on switchports to intelligently guard against today’s most prevalent and
- IP Service-Level Agreement potentially crippling attacks.
(IPSLA)
CISF 1: Port Security
- Optimized Edge Routing (OER)
- Embedded Event Manager Function: Shuts down MAC address-flooding attacks
(EEM) How it Works: Limits and identifies the MAC addresses of stations allowed access to

Catalyst Integrated Security Features (CISF)


the same physical port. When a switch is either configured for static MAC addresses or
dynamically learns them, Port Security limits the number of learned MAC addresses to
deny MAC address-flooding.

Raising the Bar on Surveillance Attacks – MAC-Based Attacks

Raising the Bar on Surveillance Attacks


Contact your Cisco Systems MAC-Based Attacks

Engineer for more information 00:0e:00:aa:aa:aa Only 3 MAC

and assistance in turning on the 00:0e:00:bb:bb:bb Addresses


Allowed on
the Port:
full functionality of your Cisco 132,000
Bogus
Shutdown

routers and switches. MACs

To learn about enabling


additional Cisco features, visit
www.cisco.com/go/turniton. Problem:
Script Kiddie” hacking tools enable attackers to flood switch cam tables
Solution:
Catalyst Security Toolkit recognizes MAC flooding
with bogus macs; turning the VLAN into a “hub” and eliminating privacy attack and locks down the port and sends an SNMP trap
CISF 2: DHCP Snooping Dynamic ARP Inspection Protection against Recognizance/
ARP Scan’s
Function: Prevents against server spoofing and “man in the
middle” attacks
Dynamic ARP Inspection
How it Works: Easily enabled on all Layer 2 ports, Cisco’s Protection against ARP poisoning (ettercap, dsnif, arpspoof)
patented DHCP Snooping feature defines trusted ports for DHCP Snooping
legitimate DHCP servers that can send DHCP requests and My GW is Dynamic ARP Inspection
10.1.1.1
offers. By intercepting all DHCP messages within the VLAN, the DHCP Requests DHCP Responses
switch acts much like a small security firewall between users and
Untrusted Trusted
the legitimate DHCP server. Network attackers can no longer
DHCP
assign themselves as the default gateway or reroute and monitor I’m your GW:
Not by my Server
binding table
traffic flow between the two endpoints. Gratuitous ARP 10.1.1.1

DHCP Snooping Protection against Rogue/Malicious DHCP


Dynamic ARP Inspection
Server
1. Use DHCP Snooping Binding Table

DHCP Snooping 2. Track MAC to IP from DHCP transactions

Protection against Rogue/Malicious DHCP Server 3. Rate limit ARP Requests from client ports. Stop port scanning
4. Drop BOGUS gratuitous ARP’s. Stop ARP Poisoning / MIM attacks
DHCP Snooping Function

DHCP DHCP Responses

Requests Untrusted Trusted CISF 4: IP Source Guard


DHCP
Server Function: Prevents IP host spoofing

Unauthorized DHCP Responses How it works: Prevents attackers and Internet worms from
DHCP Snooping
launching attacks by assuming a valid user’s IP address. IP
1. Track the Request (Discover) Source Guard only permits forwarding of packets with valid
2. Track the Response (Offer) source addresses.
3. Rate limit Requests on Trusted Interfaces. Limit DOS attacks IP Source Guard Protection against incorrect/malicious hard
on DHCP Server
coded IP Address
4. Deny Responses (Offers) on non trusted interfaces. Stop
Malicious or errant DHCP Server
IP Source Guard
Protection against incorrect/malicious hard coded IP Address
CISF 3: Dynamic ARP Inspection DHCP Snooping/ Dynamic ARP Inspection
My GW is IP Source Guard
Function: Adds security to ARP using DHCP snooping table 10.1.1.1

How it Works: Cisco’s patented Dynamic ARP Inspection (DAI) DHCP Requests DHCP Responses

feature helps ensure that the access switch relays only “valid” Untrusted Trusted

ARP requests and responses. DAI intercepts every ARP packet Not by my
DHCP
Server
on the switch, and verifies the ARP information before updating Manually change IP I’m your GW: binding table
Address to gateway’s 10.1.1.1 Port ACL
the switch ARP cache or forwarding packets to the appropriate address
destination. This prevents malicious hosts from invisibly
eavesdropping on the conversation between the two endpoints IP Source Guard

to glean passwords, data or listen to IP phone conversations. 1. Use DHCP Snooping Binding Table
2. Track IP Address to Port associations
3. Dynamically Program Port ACL to drop traffic not originating
from IP Address assigned via DHCP
Make the switch to security
Cisco’s Integrated Security Features are
Notes
available in varying capacities on these Catalyst • The 4 items that make up CISF’s are available in different fashions on
switches, as well as on some End-of-Sale (EoS) different switches. In fact some of the features are available on EoS
switches as well.
switches.
• Everything here is inline with a secure port. With a dynamically learned
• 3560/3560-E • 4500 mac address we can limit the number of learned mac addresses in order
to deny mac address-flooding.
• 3750/3750-E • 6500

Contact your Cisco Systems Engineer for more information and assistance in turning on the full functionality of your Cisco
routers and switches. To learn about enabling additional Cisco features, visit www.cisco.com/go/turniton.
Copyright © 2007 Cisco Systems, Inc. All rights reserved. Cisco, Cisco Systems, and the Cisco Systems logo are registered
trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

You might also like