S 3.302 Routers and switches

Logo Router und Switches

Description

Networks play an increasingly important role as parts of the IT infrastructure, since applications are increasingly operated using local area networks or wide area networks. The availability, integrity, and confidentiality of the networks must be ensured and at least meet the requirements of the applications regarding the protection of these three basic values of information security.

A network consists of active and passive network technology. Passive network technology is primarily considered to be the structured cabling system. This also includes patch fields (cable distributors configurable using plug-in panels), protective cabinets, and connection sockets at the workplace. Active network technology includes hubs, bridges, switches, and routers, for example. In state-of-the-art networks, switches today frequently replace hubs and bridges. The failure of one or more components of the active network technology (routers and switches) may lead to the complete shutdown of the entire IT infrastructure. Since these components form the basis and the backbone of the IT infrastructure, routers and switches must be protected against unauthorised accesses and manipulations.

The mode of operation of routers is described in S 2.276 Functional description of a router. Safeguard S 2.277 Functional description of a switch describes the mode of operation of a switch. The most important function-related differences of the active network components illustrated in the following figure are explained briefly.

Präsentation eines Hub, Bridge, Switch und Router
Figure: Hub, Bridge, Switch and Router

Collision domain

A collision domain is an individual segment within the network access procedure CSMA/CD (Carrier Sense Multiple Access with Collision Detection). All devices connected in the same segment are part of this collision domain. If two devices try to send packets into the network at the same time, this is referred to as a collision. Both devices wait for a randomly selected period and then try to send the packet again. This waiting time reduces the efficient bandwidth available to the devices.

Broadcast domai

Broadcast information is not directed to a certain terminal device, but to all "adjacent" terminal devices. Those devices in the network receiving the respective broadcast information of the other devices together form a broadcast domain. Devices consolidated in a broadcast domain do not have to be located in the same collision domain. In this case, the IP protocol is also referred to as an IP subnet. For example, the stations with the IP addresses from 192.168.1.1 to 192.168.1.254 form a broadcast domain in an IP subnet with a subnet mask of 255.255.255.0.

Hub

Hubs work on OSI layer 1 (bit transmission layer). All connected devices are located in the same collision domain and thus in the same broadcast domain. Today, hubs are replaced by access switches (see S 2.277 Functional description of a switch).

Bridge

Bridges connect networks on OSI layer 2 (protection layer) and segment collision domains. Every segment and/or port at a bridge forms its own collision domain. All connected stations are normally part of a broadcast domain. Bridges may also be used in order to connect networks with different topographies (Ethernet, Token Ring, FDDI, etc.) on OSI layer 2 (transparent bridging, translational bridging). Bridges are predominantly used for load balancing in networks. The relief is achieved by a bridge no longer forwarding every data packet as the central transition between two network segments. A bridge has an internal MAC address table showing the connected segments corresponding MAC addresses can be found in. For example, if the bridge is provided a data packet from sub-segment A for a station in sub-segment B, the data packet is forwarded. On the contrary, if the bridge is provided with a data packet from sub-segment A for a station in sub-segment A, this data packet will not be transmitted into sub-segment B. This way, sub-segment B is relieved. Nowadays, bridges are replaced by switches.

Layer-2-Switch

Traditional layer 2 switches connect networks on OSI layer 2. Every switch port forms its own collision domain. Normally, all connected stations are part of a broadcast domain. This means that a layer 2 switch uses the destination MAC address in the MAC header as decision criterion as to which port the incoming data packets are forwarded to. Despite the comparable mode of operation, there are two essential differences from bridges:

Occasionally, switches are also referred to as multiport bridges.

Router

Routers work on OSI layer 3 (network layer) and transport data packets based on the destination IP address in the IP header. Every interface on a router constitutes its own broadcast domain and therefore also a collision domain. Routers are not able to connect networks with different topologies. Routers are used in order to segment local networks or to connect local networks via wide area networks. A router identifies a suitable connection between the source system and/or source network and the destination system and/or destination network. In most cases, this is performed by forwarding the data packet to the next router, the so-called next hop. Further information is described in S 2.276 Functional description of a router.

Routers must analyse every IP packet before forwarding. This results in delays and therefore in a lower throughput when compared to "classic" switches.

Layer 3 switch and layer 4 switch

Layer 3 and layer 4 switches are switches additionally offering routing functionality. Layer 2 switches use the destination MAC address in the MAC header of a packet to decide which port data packets are forwarded to. A layer 3 switch handles data packets like a router the first time (destination IP addresses in the IP header). All following data packets of the sender to this recipient are then forwarded on OSI layer 2 (destination MAC address in the MAC header). This way, such a switch can achieve a significantly higher throughput rate when compared to traditional routers.

Another distinction between a router and a layer 3 switch includes the number of ports for connecting individual terminal devices. Normally, a layer 3 switch has significantly more ports.

Differentiation

This module describes the threats and safeguards regarding the use of routers and switches. The differentiation between routers and switches is made more difficult by the introduction of the denominations layer 2 switch, layer 3 switch, or layer 4 switch by different manufacturers. Due to the amalgamation of the functions of routers and switches, the majority of the safeguards described are applicable to both the routers and switches.

A huge selection of different routers and switches from different manufacturers is available on the market. The description of the safeguards and threats in this module is designed as manufacturer-independently as possible.

Along with the comprehensive aspects and the infrastructural safeguards, module S 4.1 Heterogeneous networks must be taken into consideration when using routers and switches. Specifically when integrating the active network components into comprehensive network and system management, module S 4.2 Network and system management is of particular importance. When using a router as packet filter or as dial-in option, modules S 3.301 Security gateway (firewall) and S 4.4 VPN must be taken into consideration additionally.

Along with specifically manufactured devices, different operating systems (for example diverse Unix derivatives, Windows 2000, etc.) also offer routing functions. This means that a router may consist of a corresponding computer with one or more network cards and a default operating system. In smaller local networks , this may be a cost-effective alternative under some circumstances. Along with the security safeguards described in this module, the security safeguards of the operating system used (Unix, Windows 2000, etc.) must be taken into consideration when operating such a router.

Threat scenario

Along with the threats generally applicable to the majority of IT systems, there is a host of specific threats for active network components.

These threats are often based in known vulnerabilities in the protocols used such as TCP, UDP, IP, or ICMP. For examples, routing tables on routers may be modified with the help of vulnerabilities in dynamic routing protocols. Another threat includes the often missing or poor authentication option on active network components.

Active network components are often delivered with an insecure default configuration (see T 4.49 Insecure default settings on routers and switches) that should be checked when commissioning the devices. In order to securely separate subnets with different protection requirements, the use of virtual networks (VLANs) is sometimes suggested. However, a couple of attack methods are known which enable the overcoming of the boundaries between VLANs and accessing of other VLANs in an unauthorised manner (see T 5.115 Overcoming the boundaries between VLANs).

An overview of the threat situation regarding the use of routers and switches can be found in the following:

Organisational Shortcomings

T 2.1 Lack of, or insufficient, rules
T 2.3 Lack of, inadequate, incompatible resources
T 2.4 Insufficient monitoring of security safeguards
T 2.22 Lack of or insufficient evaluation of auditing data
T 2.27 Lack of or insufficient documentation
T 2.44 Incompatible active and passive network components
T 2.54 Loss of confidentiality through hidden pieces of data
T 2.98 Incorrect planning and design of the use of routers and switches

Human Error

T 3.64 Incorrect configuration of routers and switches
T 3.65 Incorrect administration of routers and switches

Technical Failure

T 4.49 Insecure default settings on routers and switches

Deliberate Acts

T 5.4 Theft
T 5.51 Abuse of routing protocols
T 5.66 Unauthorised connection of IT systems to a network
T 5.112 Manipulation of ARP tables
T 5.113 MAC spoofing
T 5.114 Misuse of spanning tree
T 5.115 Overcoming the boundaries between VLANs

Method recommendation

The security safeguards assigned to this module are based on the lifecycle of the active network components. Safeguards categorised in the following cycles are described:

In the following, the safeguards to be taken into consideration when using routers and switches are listed:

Planning and design

S 2.276 (Z) Functional description of a router
S 2.277 (Z) Functional description of a switch
S 2.278 (Z) Typical operational scenarios in which routers and switches are used
S 2.279 (A) Drawing up a security policy for routers and switches

Purchasing

S 2.280 (C) Criteria for the procurement and selection of suitable routers and switches

Implementation

S 1.43 (A) Secure installation of active network components
S 3.38 (B) Administrator training on routers and switches
S 4.201 (A) Secure basic local configuration of routers and switches
S 4.202 (A) Secure basic network configuration of routers and switches
S 4.203 (A) Configuration checklist for routers and switches
S 5.111 (C) Configuration of access control lists on routers

Operation

S 2.281 (A) Documentation of the system configuration of routers and switches
S 2.282 (A) Regular checking of routers and switches
S 2.283 (B) Software maintenance on routers and switches
S 4.204 (C) Secure administration of routers and switches
S 4.205 (C) Logging on routers and switches
S 4.206 (C) Protection of switch ports
S 5.112 (C) Security aspects of routing protocols

Disposal

S 2.284 (C) Secure withdrawal from operation of routers and switches

Contingency Planning

S 6.91 (C) Data backup and recovery on routers and switches
S 6.92 (C) Contingency planning for routers and switches