What are the three components of AAA, and how do they work together to secure network access?
AAA stand for Authentication, Authorization, and Accounting, and it forms a foundational framework for enforcing access control policies. There three components work together to ensure that only legitimate users can access network resources, that their actions are appropriately restricted, and their activities are logged for auditing and analysis.
Together, AAA provides scalable and secure way to manage user access in a network. It ensures that access is granted only to verified users, that their permissions are appropriately enforced, and that their actions are recorded for accountability.
Compare and contrast RADIUS and TACACS+ protocols.
Both Radius and TACACS+ are protocols used to implement AAA services, but they differ significantly in design, functionality, and use cases.
In summary, RADIUS is better suited for access control in multi-vendor environments, while TACACS+ excels in administrative control within Cisco-centric networks. The choice between them depends on specific requirements of the network environment, such as security, flexibility, and vendor compatibility.
Briefly explain each stage of the AAA security service?
The AAA security consists of three distinct but interrelated stages: Authentication, Authorization, and Accounting. Each stage plays a critical role in securing network access and managing user interactions.
Together, these stages together provide a comprehensive framework for managing network access. Authentication ensures identity verification, authorization ensures access control, and accounting provides visibility into user behaviour.
What is 802.1x Protocol? Brief explain the role of Authenticator, supplicant and Authentication server.
IEEE 802.1X is a port-based network access control protocol that provides secure authentication for devices attempting to connect to a LAN or WLAN. It is a key component of identity-based networking, which grants access based on user identity rather than physical location.
The protocol involves three main entities:
802.1X uses EAPOL (Extensible Authentication Protocol over LAN) for communication between supplicant and authenticator. If authentication is successful, the port transitions into authorized state, allowing normal traffic. If not, access is denied or restricted to guest VLAN. This protocol is essential for securing campus networks against unauthorized access.
What is MAC flooding and does port security help mitigate this attack?
MAC flooding is a Layer-2 attack that targets the Content Addressable Memory (CAM) table of a switch. The CAM table stores MAC addresses and associated switch ports. It has a finite size, and when it becomes full, the switch can no longer learn new MAC addresses.
Attacker performs MAC flowing by sending a large number of frames with spoofed, random, source MAC addresses. This fills up the CAM table, causing the switch to enter a fail-open mode where it floods incoming traffic out all ports. This allows the attacker to intercept traffic not intended for them, leading to potential data breaches.
Port Security is a mitigation technique that restricts the number of MAC addresses that can be learned on a switch port. It can be configured to:
By limiting MAC address learning, port security prevents the CAM table from being overwhelmed, thereby protecting the switch from MAC flooding attacks. It is a fundamental security feature in campus networks.