Larry,

According to Ken Kaminski at Lexington office, you are vulnerable to Vlan
hopping.
--

RFC 1149 Compliant.
Get in my head:
http://sar.dynu.com


""Larry Letterman""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> we have been pruning or clearing Vlan 1 from our data vlans
> for a good while with 6509's and supervisor 1a-ge2. Our management
> stays on Vlan 1 and our data stays on the others.
>
>
> Larry Letterman
> Cisco Systems
> [EMAIL PROTECTED]
>
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Kent Hundley
> Sent: Friday, March 22, 2002 8:30 PM
> To: [EMAIL PROTECTED]
> Subject: RE: Catalyst 6509 [7:39192]
>
>
> Correct, it's essentially a 802.1q native VLAN issue, not a VLAN 1 issue
per
> se. I would note though that although the change to make a non-active VLAN
> the native VLAN is an obvious fix, it strikes me as a bug that Cisco does
> not perform a sanity check on native VLAN frames to ensure that they in
> fact, do not have a 802.1q frame tag.  This is what causes the issue since
> packets on the native VLAN are not supposed to have a 802.1q frame tag.
>
> On a related note, it _is_ now possible to clear VLAN 1 from a trunk.  It
> disallows all non-management related traffic, i.e. anything other than
VTP,
> CDP, etc.  So this should in theory also "fix" the VLAN hopping issue,
> although it's probably cleaner to just assign a non-active VLAN as the
> native VLAN.
>
>
> http://www.cisco.com/warp/public/473/21.html#case
>
> The Case of VLAN 1
> VTP pruning cannot be applied to VLANs that need to exist everywhere and
to
> be allowed on all switches in the campus (to be able to carry VTP, CDP
> traffic, and other control traffic). There is a way, however, to limit the
> extent of VLAN 1. This is a feature called VLAN 1 disable on trunk, and it
> is available on Catalyst 4000, 5000, and 6000 family switches since Cisco
> IOS releave 5.4(x). This allow you to prune VLAN 1 from a trunk as you
would
> do for any other VLAN, but this pruning will not include all of the
control
> protocol traffic that will still be allowed on the trunk (DTP, PagP, CDP,
> VTP, and so on). However, you will block all user traffic on that trunk.
> Using this feature, you can completely avoid the VLAN spanning the entire
> campus, and as such, STP loops will be limited in extent, even in VLAN 1.
> You can configure VLAN 1 to be disabled as you would configure other VLANs
> to be cleared from the trunk by issuing the following commands:
>
> Console> (enable) set trunk 2/1 des
> Port(s)  2/1 trunk mode set to desirable.
> Console> (enable) clear trunk 2/1 1
> Removing Vlan(s) 1 from allowed list.
> Port  2/1 allowed vlans modified to 2-1005.
>
>
> Regards,
> Kent
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Steven A. Ridder
> Sent: Friday, March 22, 2002 7:18 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Catalyst 6509 [7:39192]
>
>
> I'm embarrased to say, I got it wrong, you must use any Vlan but 1 on the
> trunk port.  Here's the direct quote from the link below"
>
> "... prolonged discussions took place with the switch vendor to discuss
the
> implications of the results above. After consultation with their
developers
> it was concluded that the traffic from VLAN 1 was allowed to hop to other
> VLANs because the trunk port was also set (implicitly) to native VLAN 1.
> They suggested that by changing the native VLAN of the trunk port the VLAN
> hopping could be eliminated. This was tested and was found to be
true......"
>
>
> http://www.sans.org/newlook/resources/IDFAQ/vlan.htm
>
> --
>
> RFC 1149 Compliant.
> Get in my head:
> http://sar.dynu.com
>
>
> ""MADMAN""  wrote in message
> [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > How??
> >
> > C6509> (enable) clear vlan 1
> > VLAN number must be in the range 2..1000,1025..4094.
> > C6509> (enable)
> >
> >   You can disable it on trunks however
> >
> >   dave
> >
> > "Steven A. Ridder" wrote:
> > >
> > > The big problem with Vlan 1 is that if it exists on your network a
> hacker
> > > can do VLAN hopping (not a good thing).  Cisco recommends deleting
Vlan
> 1
> > > from switches.
> > >
> > > --
> > >
> > > RFC 1149 Compliant.
> > > Get in my head:
> > > http://sar.dynu.com
> > >
> > > ""maverick hurley""  wrote in message
> > > [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > > absoultly it will help for security, The thing to remember is that
> your
> > > > ports are default for native vlan1. You can specify a different vlan
> > > number
> > > > for your management like vlan 5. But in case of trunking
> mishaps/issues
> > > and
> > > > vlan pruning issues it is safer using vlan 1.
> > --
> > David Madland
> > Sr. Network Engineer
> > CCIE# 2016
> > Qwest Communications Int. Inc.
> > [EMAIL PROTECTED]
> > 612-664-3367
> >
> > "Emotion should reflect reason not guide it"




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=39290&t=39192
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to