Sunday, June 17, 2012

802.1X Authentication Using EAP

  • Switches can use IEEE 802.1X to perform user authentication.
  • User authentication requires the user to supply a username & password, verified by a RADIUS server, before the switch will enable the switch port for normal user traffic.
  • IEEE 8802.1X defines some of the LAN user authentication, but it also uses the Extensible Authentication Protocol (EAP).
  • EAP: an internet standard (RFC 3748), as the underlying protocol used for authentication.
  • EAP also provides One-time passwords (OTPs).

IP Source Guard

  • It add one more check to the DHCP snooping logic.
  • When enabled along with DHCP snooping, IP Source Guard checks the source IP address of received packets against the DHCP snooping binding database.
  • It checks both the source ip & source MAC address against that same database.
  • If the entries do not match, the frame is filtered.
  • ip verify source
    • to check source ip address only
  • ip verify source port-security
    • check both the source ip & MAC address
  • ip source binding mac-address vlan vlan-id ip-address interface interface-id
    • Global command to create static entries that will be used in addition to the DHCP snooping binding database.

DCHP Snooping Commands


Command
Purpose
ip dhcp snooping vlan vlan-range
Global command to enable DHCP snooping for one or more VLANs
[no] ip dhcp snooping trust
Interface command to enable or disable a trust level on an interface;
Ip dhcp snooping binding mac-addre vlan vlan-id ip-addre interface interface-id expiry seconds
Global command to add static entries to the DHCP snooping binding database
Ip dhcp snooping verify mac-address
Global command to add static entries to the DHCP snooping binding database
Ip dhcp snooping limit rate rate
Sets the maximum number of DHCP messages per second to mitigate DoS attack.