Implementasi Private Virtual Local Area Network Menggunakan Mikrotik Routerboard

Total Page:16

File Type:pdf, Size:1020Kb

Implementasi Private Virtual Local Area Network Menggunakan Mikrotik Routerboard 1 IMPLEMENTASI PRIVATE VIRTUAL LOCAL AREA NETWORK MENGGUNAKAN MIKROTIK ROUTERBOARD TUGAS AKHIR OLEH : RANKA ARDEPA 09030581620013 PROGRAM STUDI TEKNIK KOMPUTER JURUSAN SISTEM KOMPUTER FAKULTAS ILMU KOMPUTER UNIVERSITAS SRIWIJAYA 2019 2 IMPLEMENTASI PRIVATE VIRTUAL LOCAL AREA NETWORK MENGGUNAKAN MIKROTIK ROUTERBOARD TUGAS AKHIR Diajukan Untuk Melengkapi Salah Satu Syarat Memperoleh Gelar Ahli Madya Komputer OLEH : RANKA ARDEPA 09030581620013 PROGRAM STUDI TEKNIK KOMPUTER JURUSAN SISTEM KOMPUTER FAKULTAS ILMU KOMPUTER UNIVERSITAS SRIWIJAYA 2019 3 4 5 6 MOTTO DAN PERSEMBAHAN Motto : "Setiap orang mempunyai cara dan jalananya masing-masing dalam mencapai kesuksesanya.” Kupersembahkan Kepada : Allah SWT. yang memberikan nikmat iman, kesehatan, kekuatan dan kesabaran. Kedua orang tua saya tercinta (Sandi Arapat dan Eka Wati) terima kasih untuk seluruh kasih sayang, doa, dukungan dan segala hal yang telah engkau lakukan terhadap saya. I love you so much. Kedua pembimbing saya (Ahmad Heryanto, M.T.) dan (Rido Zulfahmi, M.T.) yang telah banyak membantu dan membimbing saya dalam penyelesaian Tugas Akhir. Terima kasih. Sahabat – sahabat saya yang selalu mendoakan dan memberikan semangat untuk tetap berusaha. Seluruh teman seperjuangan Teknik Komputer 2016 yang sudah berbagi moment suka dan duka selama 3 tahun. Almamaterku. 7 KATA PENGANTAR Alhamdulillah puji syukur penulis panjatkan kehadirat Allah SWT. Karena atas rahmat dan hidayah-Nya penulis dapat menyelesaikan Tugas Akhir dengan baik. Tugas Akhir ini berjudul " IMPLEMENTASI PRIVATE VIRTUAL LOCAL AREA NETWORK MENGGUNAKAN MIKROTIK ROUTERBOARD ". Tugas Akhir ini merupakan salah satu syarat untuk menyelesaikan masa studi pada program Diploma Komputer Universitas sriwijaya. Tidak lupa, kita junjung tinggi kemuliaan dan kesejahtaraan kepada Nabi Muhammad SAW. dan keluarganya. Dalam penulisan laporan ini, penulis menyadari, bahwa tanpa adanya bimbingan, bantuan, dorongan, dan petunjuk serta dukungan dari semua pihak tidak mungkin laporan ini dapat terselesaikan. Untuk itu penulis mengucapkan terima kasih yang setulusnya kepada: 1. Bapak Huda Ubaya, M.T. sebagai koordinator program studi Teknik Komputer, Fakultas Ilmu Komputer, Universitas Sriwijaya. 2. Bapak Ahmad Heryanto, M.T. sebagai dosen pembimbing pertama. 3. Bapak Rido Zulfahmi, M.T. sebagai pembimbing kedua. 4. Seluruh dosen pengajar di Diploma Komputer Universitas Sriwijaya. 5. Kedua orang tua, adik, keluarga dan sahabat-sahabat saya tercinta yang selama ini selalu mendoakan dan memberikan semangat serta dukungannya. 6. Teman sekelas yang tetap memberi semangat dalam setiap keadaan dan tetap berusaha bersama. 8 7. Seluruh teman-teman Fakultas Ilmu Komputer yang telah berbagi pengalam dan ilmu selama di Fakultas Ilmu Komputer. Dengan ini penulis mengucapkan terima kasih kepada semua pihak yang telah membantu dalam menyelesaikan laporan Tugas Akhir ini. Semoga Allah SWT senantiasa memberikan ridho dan berkah-Nya kepada kita. Semoga laporan Tugas Akhir ini dapat bermanfaat bagi kita semua. Aamiin. Palembang, Agustus 2019 Penulis 9 10 11 DAFTAR ISI LEMBAR PENGESAHAN ii HALAMAN PERSETUJUAN iii LEMBAR PERNYATAAN iv MOTTO DAN PERSEMBAHAN v KATA PENGANTAR vi Abstract viii Abstrak ix DAFTAR ISI x DAFTAR GAMBAR xii DAFTAR TABEL xv DAFTAR LAMPIRAN xvi BAB I PENDAHULUAN 1 1.1 Latar Belakang 1 1.2 Tujuan dan Manfaat 3 1.2.1 Tujuan 3 1.2.2 Manfaat 3 1.3 Batasan Masalah 3 1.4 Metode Penelitian 4 1.5 Sistematika Penulisan 5 BAB II TINJAUAN PUSTAKA 7 2.1. Pengertian Jaringan Komputer 7 2.1.1. Topologi Jaringan Komputer 8 2.2 Sejarah Mikrotik 12 2.3 Jenis-Jenis Mikrotik 13 2.3.1 Mikrotik RouterOS 13 2.3.2 Mikrotik RouterBoard 14 2.3.3 Mikrotik CRS (Cloud Router Switch) 15 2.3.4 Fitur-Fitur Mikrotrik 15 2.4 Jaringan Virtual Local Area Network( VLAN) 18 2.4.1 Prinsip Kerja VLAN 19 2.4.2 Tipe-Tipe VLAN 20 2.4.3 Pembagian VLAN 21 2.4.4 VLAN ID 23 2.5 Private VLAN 24 2.5.1 Prinsip Kerja P- VLAN 24 2.5.2 Subdomain P-VLAN 24 2.5.3 Multiple Switches P- VLAN Spanning 26 2.5.4 Subdomain P- VLAN Dalam Satu Router 26 2.5.5 Private VLAN Pada Switch EX Tunggal 27 2.5.6 Private VLAN Spanning Multiple Switch Seri EX 28 2.5.6 Routing Antara VLAN Isolated Dan Community 28 2.6 VLAN Tagging 29 2.7 Perbedaan VLAN dan Private VLAN 30 12 2.8 Perangkat Lunak Jaringan 31 2.8.1 Winbox 31 2.8.2 Wireshark 31 BAB III PERANCANGAN SISTEM 32 3.1 Pendahuluan 32 3.2 Tahapan Perancangan 32 3.3 Waktu dan Tempat Penelitian 34 3.4 Metode Literatur 35 3.5 Perangkat Hardware dan software 35 3.5.1 Perangkat Keras (hardware) 35 3.5.2 Perangkat Lunak (software) 36 3.6 Metode Konsultasi 36 3.7 Metode Perancangan 36 3.7.1 Perancangan pada Mikrotik RouterBoard 37 3.7.2 Perancangan Implementasi 39 3.8 Alur Pengerjaan Tugas Akhir 40 BAB IV PEMBAHASAN DAN HASIL 42 4.1 Pendahuluan 42 4.2 Remote Login pada Mikrotik RouterBoard 42 4.3 Implementasi 43 4.3.1 Konfigurasi VLAN Tagging pada MikrotikRouterboard 44 4.3.2 Konfigurasi Private VLAN pada MikrotikRouterboard 45 4.3.3 Konfigurasi Port Master pada Interface Mikrotik RouterBoard 46 4.3.4 Konfigurasi VLAN Divisi Keuangan pada Mikrotik RouterBoard 47 4.3.5 Konfigurasi VLAN Staff Karyawan pada Mikrotik RouterBoard 51 4.4 Pengujian dan Hasil dari Sistem Private VLAN 55 4.4.1 Konfigurasi IP Address Pada PC / Laptop Client. 55 4.4.2 Analisis Jaringan Menggunakan Aplikasi Wireshark 58 4.4.3 Tes Private VLAN 61 4.5 Pembahasan 67 BAB V KESIMPULAN DAN SARAN 68 5.1 Kesimpulan 68 5.2 Saran 68 DAFTAR PUSTAKA 69 LAMPIRAN 71 13 DAFTAR GAMBAR Gambar 2. 1 Topologi Bus ..................................... Error! Bookmark not defined. Gambar 2. 2 Topologi Star ..................................... Error! Bookmark not defined. Gambar 2. 3 Topologi Ring ................................... Error! Bookmark not defined. Gambar 2. 4 Topologi Mesh .................................. Error! Bookmark not defined. Gambar 2. 5 Topologi Tree .................................... Error! Bookmark not defined. Gambar 2. 6 Mikrotik Routes Os ........................... Error! Bookmark not defined. Gambar 2. 7 Mikrotik Routerboard........................ Error! Bookmark not defined. Gambar 2. 8 MikrotikRouterboard Crs .................. Error! Bookmark not defined. Gambar 2. 9 VLAN Port-Based .............................. Error! Bookmark not defined. Gambar 2. 10 MAC Address-Based ....................... Error! Bookmark not defined. Gambar 2. 11 Subdomain P- VLAN ....................... Error! Bookmark not defined. Gambar 2. 12 Multiple Switches P- VLAN Spanning............Error! Bookmark not defined. Gambar 2. 13 Subdomain P- VLAN Dalam Satu Router.......Error! Bookmark not defined. Gambar 2. 14 Private VLAN dalam satu switch .... Error! Bookmark not defined. Gambar 2. 15 P- VLAN Spanning multiple Switch Seri EX ..Error! Bookmark not defined. Gambar 3. 1 Kerangka Kerja.................................................................................Error! Bookmark not defined. Gambar 3. 2 Topologi Private VLAN ..................... Error! Bookmark not defined. Gambar 3. 3 Alur Pengerjaan ................................. Error! Bookmark not defined. 14 Gambar 4. 1 Remote Login melalui Winbox .....................................................Error! Bookmark not defined. Gambar 4. 2 VLAN ID Tagging.............................. Error! Bookmark not defined. Gambar 4. 3 Ip Address VLAN 100 ........................ Error! Bookmark not defined. Gambar 4. 4 Switch Port ........................................ Error! Bookmark not defined. Gambar 4. 5 VLAN Table ....................................... Error! Bookmark not defined. Gambar 4. 6 VLAN ID ............................................ Error! Bookmark not defined. Gambar 4. 7 Konfigurasi port master .................... Error! Bookmark not defined. Gambar 4. 8 Hasil Konfigurasi port master ........... Error! Bookmark not defined. Gambar 4. 9 VLAN ID Isolated .............................. Error! Bookmark not defined. Gambar 4. 10 Hasil Konfigurasi VLAN ID Divisi Keuangan ..... Error! Bookmark not defined. Gambar 4. 11 Egress VLAN Tagged VLAN10 ....... Error! Bookmark not defined. Gambar 4. 12 Ingress Vlan Translation VLAN ID 10 ...........Error! Bookmark not defined. Gambar 4. 13 Egress Vlan Trasnlation VLAN 10 .. Error! Bookmark not defined. Gambar 4. 14 Port Isolation Profile VLAN Divisi Keuangan..... Error! Bookmark not defined. Gambar 4. 15 Port Isolation pada Divisi Keuangan.............Error! Bookmark not defined. Gambar 4. 16 VLAN ID Staff Karyawan................ Error! Bookmark not defined. Gambar 4. 17 Egress Vlan Tagged VLAN 20......... Error! Bookmark not defined. Gambar 4. 18 Ingress Vlan Translation VLAN ID 20 ...........Error! Bookmark not defined. 15 Gambar 4. 19 Egress Vlan Trasnlation VLAN 20 .. Error! Bookmark not defined. Gambar 4. 20 Port Isolation Profile VLAN Community .......Error! Bookmark not defined. Gambar 4. 21 Port Community untuk staff karywan ............Error! Bookmark not defined. Gambar 4. 22 IP Address PC/Laptop 0 Divisi Keuangan.....Error! Bookmark not defined. Gambar 4. 23 IP Address PC/Laptop 1 Divisi Keuangan.....Error! Bookmark not defined. Gambar 4. 24 IP Address PC/Laptop 2 Staff Karyawan ......Error! Bookmark not defined. Gambar 4. 25 IP Address PC/Laptop 3 Staff Karyawan ......Error! Bookmark not defined. Gambar 4. 26 IP Address PC/Laptop 4 Staff Karyawan .....Error! Bookmark not defined. Gambar 4. 27 Tampilan Awal Aplikasi Wireshark Error! Bookmark not defined. Gambar 4. 28 Analisis Jaringan Pada Client VLAN Divisi Keuangan ........... Error! Bookmark not defined. Gambar
Recommended publications
  • AT-GS950/16 Gigabit Ethernet Switch
    AT-GS950/16 Gigabit Ethernet Switch AT-GS950/16 Web Interface User Guide AT-S114 Version 1.1.0 [1.00.021] 613-001857 Rev A Copyright © 2013 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc. Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners. Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of such damages. Contents List of Figures ................................................................................................................................................ 11 List of Tables ................................................................................................................................................. 15 Preface ...........................................................................................................................................................
    [Show full text]
  • Vlans Feature Overview and Configuration Guide
    TechnicalTTechnicalechnical GuideGuidGuidee Virtual LANs (VLANs) Feature Overview and Configuration Guide VLAN Introduction This guide describes Virtual LANs (VLANs), VLAN features and configuration on the switch. It begins with a description of what a VLAN is, its evolution and purpose, and also provides the meaning of some common VLAN terminology. This is followed with a detailed look at VLAN implementation. Port-based VLAN membership is the most common way to split a network into sets of virtual LANs. We look at how this is achieved using the VLAN tagging. The use of double-tagging (or VLAN stacking) to tunnel VLANs across Layer 2 networks is described, and an example is provided for the configuration of VLAN stacking. Next we discuss private VLANs and the communication rules that limit what is possible between devices operating within the VLAN. AlliedWare Plus™ has two private VLAN solutions: private VLANs for ports in Access Mode private VLANs for ports in Trunked Mode Configuration examples are provided for both of these solutions. Then, we look at combining private VLANs with other features, such as: EPSR, ARP, LLDP, GVRP, Link aggregation, and management servers. The guide ends with a section on configuring protocol based VLANs and then describes how data counters are used to count both the number of received frames or the number of received bytes (octets) belonging to a particular VLAN. C613-22001-00 x REV C alliedtelesis.com Products and software version that apply to this guide This guide applies to all AlliedWare Plus™ products, running version 5.4.4 or later. However, not all features in this guide are supported on all products.
    [Show full text]
  • Configuring Vlans, Spanning Tree, and Multi-Link Trunking on Avaya Ethernet Routing Switch 4900 and 5900 Series
    Configuring VLANs, Spanning Tree, and Multi-Link Trunking on Avaya Ethernet Routing Switch 4900 and 5900 Series Release 7.4 NN47211-502 Issue 06.01 April 2017 © 2014-2017, Avaya Inc. IF YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Notice SERVICE. While reasonable efforts have been made to ensure that the Licenses information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED “Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN such modifications, additions, or deletions were performed by or on AVAYA AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA the express behalf of Avaya.
    [Show full text]
  • Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide
    Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-20920-02 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Private VLAN and Cisco UCS Configuration Prior to 2.2(2C)
    Contents Introduction Prerequisites Requirements Components Used Background Information Theory PVLAN Implementation in UCS Goal Configure Network Diagrams PVLAN on vSwitch: Isolated PVLAN with Promiscuous Port on an Upstream Device Configuration in UCS Configuration of Upstream Devices Troubleshooting Isolated PVLAN on N1K with Promiscuous Port on an Upstream Device Configuration in UCS Configuration of Upstream Devices Configuration of N1K Troubleshooting Isolated PVLAN on N1K with Promiscuous Port on the N1K Uplink Port-Profile Configuration in UCS Configuration of Upstream Devices Configuration of N1K Troubleshooting Community PVLAN on N1K with Promiscuous Port on the N1K Uplink Port-Profile Troubleshooting Isolated PVLAN and Community PVLAN on VMware DVS Promiscuous Port on the DVS Verify Troubleshoot Introduction This document describes private VLAN (PVLAN) support in the Cisco Unified Computing System (UCS), a feature introduced in Release 1.4 of the Cisco UCS Manager (UCSM). It also details the features, the caveats, and the configuration when PVLANs are used in a UCS environment. THIS DOCUMENT IS FOR USE WITH UCSM VERSION 2.2(2C) AND EARLIER VERSIONS. In versions later than Version 2.2(2C), changes have been made to UCSM and ESXi DVS is supported. There are also changes in how tagging works for the PVLAN NIC. Prerequisites Requirements Cisco recommends that you have knowledge of these topics: ● UCS ● Cisco Nexus 1000 V (N1K) ● VMware ● Layer 2 (L2) switching Components Used This document is not restricted to specific software and hardware versions. The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration.
    [Show full text]
  • Configuring Private Vlans
    CHAPTER18 Configuring Private VLANs This chapter describes how to configure private VLANs in Cisco IOS Software Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Software Releases 12.2SX Command References at this URL: http://www.cisco.com/en/US/docs/ios/mcl/122sx_mcl.html This chapter consists of these sections: • Understanding Private VLANs, page 18-1 • Private VLAN Configuration Guidelines and Restrictions, page 18-6 • Configuring Private VLANs, page 18-11 • Monitoring Private VLANs, page 18-17 Understanding Private VLANs These sections describe how private VLANs work: • Private VLAN Domains, page 18-2 • Private VLAN Ports, page 18-3 • Primary, Isolated, and Community VLANs, page 18-3 • Private VLAN Port Isolation, page 18-4 • IP Addressing Scheme with Private VLANs, page 18-4 • Private VLANs Across Multiple Switches, page 18-5 • Private VLAN Interaction with Other Features, page 18-5 Cisco IOS Software Configuration Guide, Release 12.2(33)SXH and Later Releases OL-13013-02 18-1 Chapter 18 Configuring Private VLANs Understanding Private VLANs Private VLAN Domains The private VLAN feature addresses two problems that service providers encounter when using VLANs: • The switch supports up to 4096 VLANs. If a service provider assigns one VLAN per customer, the number of customers that service provider can support is limited. • To enable IP routing, each VLAN is assigned a subnet address space or a block of addresses, which can result in wasting the unused IP addresses and creating IP address management problems. Using private VLANs solves the scalability problem and provides IP address management benefits for service providers and Layer 2 security for customers.
    [Show full text]
  • 5517 M. Foschiano Category: Informational Cisco Systems ISSN: 2070-1721 February 2010
    Independent Submission S. HomChaudhuri Request for Comments: 5517 M. Foschiano Category: Informational Cisco Systems ISSN: 2070-1721 February 2010 Cisco Systems' Private VLANs: Scalable Security in a Multi-Client Environment Abstract This document describes a mechanism to achieve device isolation through the application of special Layer 2 forwarding constraints. Such a mechanism allows end devices to share the same IP subnet while being Layer 2 isolated, which in turn allows network designers to employ larger subnets and so reduce the address management overhead. Some of the numerous deployment scenarios of the aforementioned mechanism (which range from data center designs to Ethernet-to-the- home-basement networks) are mentioned in the following text to exemplify the mechanism's possible usages; however, this document is not intended to cover all such deployment scenarios nor delve into their details. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc5517. HomChaudhuri & Foschiano Informational [Page 1] RFC 5517 Private VLANs February 2010 Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors.
    [Show full text]
  • Hacking Layer 2: Fun with Ethernet Switches Sean Convery, Cisco Systems [email protected]
    Hacking Layer 2: Fun with Ethernet Switches Sean Convery, Cisco Systems [email protected] l2-security-bh.ppt © 2002, Cisco Systems, Inc. All rights reserved. 1 Agenda ¥ Layer 2 Attack Landscape ¥ Specific Attacks and Countermeasures (Cisco and @Stake Testing)Ñhttp://www.atstake.com MAC Attacks VLAN ÒHoppingÓ Attacks ARP Attacks Spanning Tree Attacks Layer 2 Port Authentication Other Attacks ¥ Summary and Case Study l2-security-bh.ppt © 2002, Cisco Systems, Inc. All rights reserved. 2 Caveats ¥ All attacks and mitigation techniques assume a switched Ethernet network running IP If shared Ethernet access is used (WLAN, Hub, etc.) most of these attacks get much easier If you arenÕt using Ethernet as your L2 protocol, some of these attacks may not work, but you may be vulnerable to different ones J ¥ Attacks in the ÒtheoreticalÓ category can move to the practical in a matter of days ¥ All testing was done on Cisco equipment, Ethernet switch attack resilience varies widely from vendor to vendor ¥ This is not a comprehensive talk on configuring Ethernet switches for security; the focus is on L2 attacks and their mitigation l2-security-bh.ppt © 2002, Cisco Systems, Inc. All rights reserved. 3 Why Worry about Layer 2 Security? OSI Was Built to Allow Different Layers to Work without Knowledge of Each Other Host A Host B Application Stream Application Application Presentation Presentation Session Session Transport Protocols/Ports Transport Network IPIP AddressesAddresses Network MAC Addresses Data Link Data Link Physical Links Physical Physical l2-security-bh.ppt
    [Show full text]
  • Configure Your Switch
    TRENDnet User’s Guide Table of Contents Contents SYSTEM REQUIREMENTS .............................................................................................................114 INSTALLATION...............................................................................................................................114 PRODUCT OVERVIEW .......................................................................................................2 USING THE UTILITY ......................................................................................................................115 DISCOVERY LIST............................................................................................................................116 FEATURES............................................................................................................................................ 2 DEVICE SETTING ...........................................................................................................................117 FRONT VIEW ....................................................................................................................................... 3 MAIN MENU OPTIONS .................................................................................................................118 NDICATORS LED I ............................................................................................................................... 3 REAR VIEW ........................................................................................................................................
    [Show full text]
  • Virtual LAN Security Best Practices
    Application Note Virtual LAN Security Best Practices Independent security research firm @stake [9] recently conducted a Security Review [1] of the virtual LAN (VLAN) technology on the Cisco Catalyst 2950, Catalyst 3550, Catalyst 4500, and Catalyst 6500 series switches. Although no intrinsic security weaknesses emerged from this review, it has been pointed out that an improper or inadequate switch configuration can be the source of undesired behavior and possible security breaches. Over the past years, Cisco Systems has been If a user does not want one of his or her advocating best-practices guidelines for devices to be tampered with, physical access secure network configuration in several to the device must be strictly controlled. documents. The SAFE Blueprint [2] or the Furthermore, it is important for any Best Practices for Catalyst 4500, 5000, and network administrator to use all the proven 6500 Series Switches [3] are examples of security tools available on Cisco platforms: such documents. However, there has been from the very basic configuration of system no single document that collects all of the passwords, the use of IP permit filters, and VLAN-related best practices for easier login banners, all the way to more advanced perusal by customers and field engineers. tools such as RADIUS, TACACS+, The purpose of this paper is to present in a Kerberos, SSH, SNMPv3, IDS, and so forth. comprehensive way all of the (More details are provided in [3].) recommendations that Cisco engineers have Only after all the basic security components accumulated to aid with the proper are in place, is it possible to turn attention configuration of VLANs on Cisco switches.
    [Show full text]
  • Quick Setup Guide
    QUICK SETUP GUIDE Luxul L2/L3 Managed Switches XMS-2624P, XMS-5248P, XMS-7048P AMS-1208P, AMS-2616P, AMS-2624P, AMS-4424P AMS-2600 Quick Installation Quick System Setup IP Configuration and Routing PoE VLANs Private VLANs Spanning Tree CONTENTS INTRODUCTION .......................................................... 1 QUICK INSTALLATION .................................................... 2 Rack Installation ................................................................................. 2 Ethernet and Power Connections .................................................................. 2 Network Cabling ................................................................................. 2 IP Addressing .................................................................................... 2 Getting Connected ............................................................................... 3 Logging In ....................................................................................... 3 MANAGED SWITCH BASICS ................................................ 4 QUICK SETUP: SYSTEM .................................................... 5 System ........................................................................ 5 Information. 5 IP ............................................................................................... 6 NTP ............................................................................................. 8 Time ............................................................................................ 9 Log ............................................................................................
    [Show full text]
  • Vlans and Trunks
    Expert Reference Series of White Papers VLANs and Trunks 1-800-COURSES www.globalknowledge.com VLANs and Trunks Alan Thomas, CCNA, CCSI, Global Knowledge Instructor Introduction Virtual Local Area Networks (VLANs) provide several benefits to enterprise networks. VLANs provide a measure of flexibility, improve user mobility, ease the application of security measures, and increase the overall efficiency of the network. Trunks also provide benefits, specifically the ability to reduce the number of physical connections needed between switches in order to support multiple VLANs. This paper describes VLANs and trunks. It includes an overview of Ethernet-based computer networks, which includes definitions of several terms. This paper also includes technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout. Overview The Open Systems Interconnect (OSI) communications model is a seven-layer reference model that describes the functions necessary for two endpoints to communicate. The 2nd Layer of the OSI model is called the Data Link Layer. Its functions are to format data for transmission on the physical media and to define how devices access the physical media (twisted pair copper, fiber optic, or wireless). Ethernet is the Layer 2 protocol used for devices that connect to a Local Area Network (LAN). Ethernet defines how data is formatted for transmission by creating frames. Figure 1 shows a sample Ethernet frame. Figure 1---Ethernet Frame When data is transmitted along the media, the data is just a series of bits. Ethernet defines how the sending and receiving device will interpret those bits.
    [Show full text]