Security switches are worth learning. Here we mainly introduce how to set up a secure switch system. switches play an important role in the enterprise network, usually at the core of the entire network. In the network era where hackers are intruding into the cloud and the virus is raging, the core security switch also takes responsibility for network security. Therefore, to ensure the performance of professional security products, vswitches must be considered in network construction.
As a result, the security switch is integrated with security authentication, ACL (Access Control List, Access Control List), firewall, intrusion detection, and even anti-virus functions, network security really needs to "arm your teeth"
Meaning of layer-3 Security Switch
The most important role of a vswitch is to forward data. Under hacker attacks and virus intrusion, a security switch must be able to maintain its efficient data forwarding rate without being disturbed by attacks, this is the most basic security function required by the vswitch. At the same time, as the core of the entire network, the security switch should be able to distinguish and control permissions for users who access and access network information. More importantly, vswitches should also work with other network security devices to monitor and block unauthorized access and network attacks.
802.1x Enhanced Security Authentication
In traditional LAN environments, as long as there are physical connection ports, unauthorized network devices can access the LAN, or unauthorized users can access the network through devices connected to the LAN. This poses potential security threats to some enterprises.
In addition, in schools and smart community networks, network billing is involved, so it is also important to verify the legality of user access. IEEE 802.1x is a good medicine to solve this problem. It has been integrated into a layer-2 smart switch to complete access security review for users.
802.1x is a newly standardized LAN access control protocol that complies with the IEEE 802 protocol set. It is all called Port-based access control protocol. Based on the advantages of IEEE 802 LAN, it provides a method to authenticate and authorize users connected to the LAN, so as to accept access from legitimate users and protect network security.
802.1x protocol and LAN are seamlessly integrated. 802.1x uses the physical features of the switched LAN architecture to implement device authentication on the lanport. During the authentication process, the lanport either acts as the authenticator or the requester. When the lanport is used as the authenticator, you must first authenticate the lanport before the user needs to access the corresponding service through the port. If the authentication fails, access is not allowed. When the lanport is used as the requester, the lanport is responsible for submitting an access service application to the authentication server. Port-based MAC locking only allows trusted MAC addresses to send data to the network. Data streams from any untrusted device are automatically discarded to ensure maximum security. In 802.1x protocol, only the following three elements can be used to complete port-based access control user authentication and authorization.
1. Client. Generally, it is installed on your workstation. When you need to access the Internet, activate the client program and enter the necessary username and password. The client sends a connection request.
2. Authentication System. In the Ethernet system, the authentication switch is used to upload and release user authentication information, and to open or close the port based on the authentication result.
3. Authentication Server. Check the identity (user name and password) sent by the client to determine whether the user has the right to use the network service provided by the network system, the switch is enabled or the port is closed according to the authentication result.
Traffic Control
The traffic control technology of the Security Switch limits abnormal traffic flowing through the port to a certain range, so as to prevent the bandwidth of the switch from being abused without limit. The traffic control function of the security switch can control abnormal traffic to avoid network congestion.
Anti-DDoS
Once a company suffers a large-scale distributed denial-of-service attack, it will affect the normal network usage of a large number of users, seriously or even cause network paralysis, and become the biggest headache for service providers. A Security Switch uses special technologies to prevent DDoS attacks. It can intelligently detect and block malicious traffic without affecting normal services, so as to prevent the network from being threatened by DDoS attacks.