The measures to defend the network from VLAN
hopping consist of a series of best practices for all switch
ports and a set of parameters to follow when establishing a
trunk port: - Configure all unused ports as access ports
so that trunking cannot be negotiated across those links.
- Place all unused ports in the shutdown state and associate
with a VLAN designated only for unused ports, carrying no user
data traffic.
- When establishing a trunk link,
configure the following:
- Make the native VLAN different
from any data VLANs
- Set trunking as “on,” rather than
negotiated
- Specify the VLAN range to be carried on the
trunk
Note: The configuration
commands in Figure do not work on access ports that support
VoIP because they will be configured as trunk ports. However,
on all other access ports, it is best practice to apply these
commands to mitigate VLAN hopping.
Content 8.2
Protecting Against VLAN Attacks 8.2.3 VLAN
Access Control Lists Cisco multilayer switches support
three types of ACLs: - Router access control list
(RACL): Applied to Layer 3 interfaces such as SVI or L3
routed ports. It controls the access of routed traffic between
VLANs. RACLs are applied on interfaces for specific directions
(inbound or outbound). You can apply one access list in each
direction. To improve performance in Cisco Catalyst multilayer
switches, RACLs are supported in ternary content addressable
memory (TCAM).
- Port access control list
(PACL): Applied on a Layer 2 switch port, trunk port, or
EtherChannel port. PACLs perform access control on traffic
entering a Layer 2 interface. With PACLs, you can filter IP
traffic by using IP access lists and non-IP traffic by using
MAC addresses. When you apply a PACL to a trunk port, it
filters traffic on all VLANs present on the trunk port.
- VLAN access control list (VACL): Supported in
software on Cisco multilayer switches. Filtering based on Layer
2 or Layer 3 parameters within a VLAN. Unlike RACLs, VACLs are
not defined by direction (input or output).
Catalyst
switches support four ACL lookups per packet: input and output
security ACL, and input and output Quality of Service (QoS)
ACL. Catalyst switches use two methods of performing a merge:
order independent and order dependent. With order-independent
merge, ACLs are transformed from a series of order-dependent
actions to a set of order-independent masks and patterns. The
resulting access control entry (ACE) can be very large. The
merge is processor and memory intensive. An order-dependent
merge is a recent improvement on some Catalyst switches in
which ACLs retain their order-dependent aspect. The computation
is much faster and is less processor intensive. RACLs are
supported in hardware through IP standard ACLs and IP extended
ACLs, with permit and deny actions. ACL processing is an
intrinsic part of the packet forwarding process. ACL entries
are programmed in hardware. Lookups occur in the pipeline
whether ACLs are configured or not. With RACLs, access list
statistics and logging are not supported.
Content
8.2 Protecting Against VLAN Attacks
8.2.4 Configuring VACLs VACLs (also called VLAN
access maps in Cisco IOS software) apply to all traffic on the
VLAN. You can configure VACLs for IP and MAC-layer traffic.
VACLs follow route-map conventions in which map sequences are
checked in order. When a matching permit ACE is encountered,
the switch takes the action. When a matching deny ACE is
encountered, the switch checks the next ACL in the sequence or
checks the next sequence. Three VACL actions are permitted:
- Permit (with capture, Catalyst 6500 only)
- Redirect (Catalyst 6500 only)
- Deny
(with logging, Catalyst 6500 only)
Two features are
supported only on the Cisco Catalyst 6500: - VACL
capture: Forwarded packets are captured on capture ports.
The capture option is only on permit ACEs. The capture port can
be an IDS monitor port or any Ethernet port. The capture port
must be in an output VLAN for Layer 3 switched traffic.
- VACL redirect: Matching packets are redirected to
specified ports. You can configure up to five redirect ports.
Redirect ports must be in a VLAN where the VACL is
applied.
The VACL capture option copies traffic to
specified capture ports. VACL ACEs installed in hardware are
merged with RACLs and other features. Figure lists the commands
used to configure VACLs. Figure describes the steps used to
configure VACLs. Figure shows a sample configuration. The above
configuration does not allow any host using a source IP address
from 10.1.0.0 through 10.1.255.255 to send frames across this
switch. If the switch receives a frame sourced from this range
of IP addresses, they are dropped. It does not matter which
VLAN the frame originates from or if the frame is destined for
the same originating VLAN. Frames with any other source are
allowed to forward. Note: You may also specify MAC
address filtering within a VLAN using VACL configurations.
Content 8.2 Protecting Against VLAN
Attacks 8.2.5 Private VLANs and Protected
Ports Internet service providers (ISPs) often have devices
from multiple clients, as well as their own servers, on a
single Demilitarized Zone (DMZ) segment or VLAN. As security
issues proliferate, it becomes necessary to provide traffic
isolation between devices, even though they may exist on the
same Layer 3 segment and VLAN. Catalyst 6500/4500/3750/3560
switches implement private VLANs to keep some switch ports
shared and some isolated, although all ports exist on the same
VLAN. The 2960 supports “protected ports,” which is
functionally similar to PVLANs on a per-switch basis. The
traditional solution to address these ISP requirements is to
provide one VLAN per customer, with each VLAN having its own IP
subnet. A Layer 3 device then provides interconnectivity
between VLANs and Internet destinations. These are the
challenges with this traditional solution: - Supporting
a separate VLAN per customer may require a high number of
interfaces on service provider network devices.
-
Spanning tree becomes more complicated with many VLAN
iterations.
- Network address space must be divided
into many subnets, which wastes space and increases management
complexity.
- Multiple ACL applications are required to
maintain security on multiple VLANs, resulting in increased
management complexity.
PVLANs and protected ports
provide Layer 2 isolation between ports within the same VLAN.
This isolation eliminates the need for a separate VLAN and IP
subnet per customer. A protected port does not forward any
traffic (unicast, multicast, or broadcast) to any other port
that is also a protected port. Traffic cannot be forwarded
between protected ports at Layer 2; all traffic passing between
protected ports must be forwarded through a Layer 3 device. The
forwarding behavior between a protected port and a
non-protected port is not affected and proceeds normally. The
example in Figure shows how to configure Fast Ethernet 0/1
interface as a protected port and verify the configuration.
PVLANs are supported on Catalyst 3560, 3750, 4500 and 6500
switches. A port in a PVLAN can be one of three types:
- Isolated: Has complete Layer 2 separation from
other ports within the same PVLAN, except for the promiscuous
port. PVLANs block all traffic to isolated ports, except the
traffic from promiscuous ports. Traffic received from an
isolated port is forwarded only to promiscuous ports.
- Promiscuous: Communicates with all ports within the
PVLAN, including the community and isolated ports. The default
gateway for the segment would likely be hosted on a promiscuous
port, given that all devices in the PVLAN need to communicate
with that port.
- Community: Communicate among
themselves and with their promiscuous ports. These interfaces
are isolated at Layer 2 from all other interfaces in other