Allied Telesis Layer 3 Switches manual Protecting the user, Using private VLANs

Page 18
Products AT-8600 Series AT-8700XL Series Rapier i Series Rapier Series AT-8800 Series AT-8948
x900-48 Series
AT-9900 Series AT-9924Ts
x900-24 Series
Software Versions All

Protecting the user

Protecting the user

This section describes the following methods of protecting users from other users on the network:

z“Using private VLANs” on page 18. This feature isolates switch ports in a VLAN from other switch ports in the same VLAN.

z“Using local proxy ARP and MAC-forced forwarding” on page 19. These features force all traffic in a network to go via an access router.

z“Using IPsec to make VPNs” on page 24. This feature creates secure tunnels through an insecure network.

z“Protecting against worms” on page 25. These methods reduce the damage worms do to users of the network.

Using private VLANs

Private VLANs are an excellent way of preventing hosts on a subnet from attacking each other. Essentially, each switch port is isolated from other ports in the VLAN, but can access another network through an uplink port or uplink trunk group. All traffic between private ports is blocked, not just Layer 2 traffic.

 

uplink port

switch

 

hacker

legitimate

 

customer

Private VLANs are reasonably flexible. A private port can be a member of multiple private VLANs. However, a port cannot be a private port in some VLANs and a non-private port in others.

On AT-8600, AT-8700XL, Rapier i and AT-8800 Series switches running 2.9.1 or later, each private VLAN can have multiple uplink ports. This allows you to use private VLANs on

switches that are connected in a ring topology. Also, you can group private ports together on these switches, which allows the ports in a group to communicate with each other but not with other ports in the VLAN.

Note that ports are only isolated from ports on the same physical switch, not from ports on other switches reached through an uplink port.

Configuration 1. Create the VLAN, specifying that it is private.

2.Add the uplink port, or the ports in the uplink trunk group, to the VLAN. For a trunk group, the ports must already be trunked together, and you must specify all the ports in the trunk group. Note that on Rapier 48i and AT-8748XL switches, the uplink and private ports must be in the same switch instance. See the Switching chapter of the Software Reference for more information about switch instances.

3.Add the private ports to the VLAN.

Create A Secure Network With Allied Telesis Managed Layer 3 Switches

18

Image 18 Contents
Contents IntroductionEdge switch Access Router Securing the device Protecting the networkProtecting against packet flooding Bandwidth limiting Using QoS policy-based storm protection Configuration To use storm protectionConfiguration on one or more ports Reboot after turning on enhanced modeRest of the QoS configuration is as normal, so Protecting against rapid MAC movementControlling multicast traffic Igmp snoopingConfiguration For each port Igmp filteringIgmp throttling Using Secure Shell SSH ConfigurationManaging the device securely Using SSL for secure web access Using SNMPv3Configuration 1. Enable Snmp Managing the device securely Whitelisting telnet hosts Building a whitelist through layer 3 filtersBuilding a whitelist through QoS Identifying the user IP spoofing and trackingTrouble with ARP Rejecting Gratuitous ARP Garp Dhcp snoopingSetting up Dhcp snooping Using static binding for rigid controlUsing 802.1x port authentication Using Dhcp snooping to track clientsUsing ARP security Using private VLANs Protecting the userUsing local proxy ARP and MAC-forced forwarding To remove ports from the VlanLocal proxy ARP Configuration of access router Example Add ip int=vlan104 ip=address-in-192.168.4.0-subnet MAC-Forced Forwarding Macff Access Using IPsec to make VPNsSwitches EdgeProtecting against worms Blocking worms through classifier-based filtersBlocking worms through QoS actions Edge switch Edge switch 1 is directly connected to the access routerEdge switch Add ip int=vlan500 ip=172.16.5.103 mask=255.255.255.0 Access Router C613-16103-00 REV a