[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference netcad::hub_mgnt

Title:DEChub/HUBwatch/PROBEwatch CONFERENCE
Notice:Firmware -2, Doc -3, Power -4, HW kits -5, firm load -6&7
Moderator:NETCAD::COLELLADT
Created:Wed Nov 13 1991
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:4455
Total number of notes:16761

1149.0. "DR900TM security" by HGOVC::BURANCELEUNG () Thu Jun 23 1994 02:54

    Hi,
    
    From notes 356.1, knowing that DR900TM can setup the port privacy and
    also prevent from eavesdrop.
    
    After I enter an authorized address to a port, lets say PORT 2A, 
    any station other than that address cannot connect to the network, 
    that's nice and what I want.
    
    But I have problem to have the featurn of eavesdrop. It is becuase
    when I turn on the LAN ANALYZER software of that autorized station,
    that station can still collect all the data throughout the network.
    What I assume is once the privacy feature is turn, only the 
    packet with the destination address same as the authorized can
    go through the port and then to the station.
    
    So my question is can 900TM support eavesdrop capability ? If not,
    when ? Of if yes, how can I trun it on ?
    
    Besides the function "Jam unauthorized packet" function within 
    the screen which setup the authorized dim out. Is it  not
    supported in this version ?
    
    Thanks,
    Burance (HKMCS).
    
T.RTitleUserPersonal
Name
DateLines
1149.1It's in there...LEVERS::PAGLIARORich Pagliaro, Hub Products GroupThu Jun 23 1994 14:5948
    Burance,
    
>>  From notes 356.1, knowing that DR900TM can setup the port privacy and
>>  also prevent from eavesdrop.
    
    Port privacy and eavesdrop protection are the same thing. The
    DECrepeaters support eavesdrop/privacy protection and intrustion
    protection.

>>  After I enter an authorized address to a port, lets say PORT 2A, 
>>  any station other than that address cannot connect to the network, 
>>  that's nice and what I want.
    
    What you describe here is intrusion protection. That is, the port is
    automatically disabled when an intrusion is detected. This is enabled
    by selecting the "Disable Port On Intrusion" Intrusion Mode in the
    HUBwatch repeater security screen.

>>  What I assume is once the privacy feature is turn, only the 
>>  packet with the destination address same as the authorized can
>>  go through the port and then to the station.
   
    Packets whose unicast destination addresses do not match a port's
    authorized address are still trasnsmitted out that port, but they are
    garbled. Broadcast/multicast packets and packets with authorized
    unicast destination addresses are transmitted in the clear.
 
>>  So my question is can 900TM support eavesdrop capability ? If not,
>>  when ? Of if yes, how can I trun it on ?
  
    The DECrepeater 900TM supports eavesdrop protection now. You can enable
    eavesdrop protection on a port by simply "pressing" the Enforce Privacy
    button in the HUBwatch repeater security view.  

>>  Besides the function "Jam unauthorized packet" function within 
>>  the screen which setup the authorized dim out. Is it  not
>>  supported in this version ?
    
    "Jam unauthorized packets" is an alternate mode of intrusion protection
    which is not and will *NEVER* be supported on the DECrepeater
    900TM/900GM/900FP/90TS/90FS due to HARDWARE restrictions. Future
    per-port switching repeaters will support this function.

    Regards,

    Rich
    
    
1149.2In and OUtHGOVC::BURANCELEUNGThu Jun 23 1994 17:1334
Hi Rich, 

Thanks for your reply in .-1.   

Now I understand the term "instrusion protection". But for the
eavesdrop, I still have query because I have problem to define
in and out.
  
As shown in the diagram :
                           <-- IN
                    +---------------- Station 1 (S1)
		    |	    ---> OUT
		+---+--------------------------------------+
 		|   A1   .....				   | 
		|   D1   ......				   |
		+------------------------------------------+

DR900TM is now attached to the DEChub900. Port A1 is registered with
address S1 in its authorized list.

I have tried that if S1 executes the lan analyzer software, it can 
see all the packets run "OUT" from the port. And I have turned on
the "ENFORECED PRIVACY". 

I don't konw what my interpretation is right or wrong. Is it true 
that when the "ENFORCED PRIVACY" is enabled, only the packets with 
destination address S1 and Broadcast/multicast address can go 
    "OUT" and then listened by the station;
other packets with destination address other than S1 is FILTERED out
by the port ??
    
Thanks again !
Burance. 
    
1149.3More details...LEVERS::PAGLIARORich Pagliaro, Hub Products GroupThu Jun 23 1994 20:02120
   Burance,

   If you have eavesdrop/privacy set up correctly, S1 (which I assume is
   running in promiscuous mode) should be receiving frames with destination
   addresses equal to S1 or some broadcast/multicast address. It should also
   be receiving many frames with CRC/Frame Check Sequence errors. These would
   correspond to frames with unicast destination addresses NOT equal to S1,
   which have been garbled.That is, these unauthorized frames are NOT FILTERED 
   out, per se, in a manner similar to how a bridge might work. 

   In the currently shipping version of the DECrepeater 900TM firmware (V1.0G)
   eavesdrop/privacy will only be enabled on a port if you have selected 
   "Enforce Privacy" in the HUBwatch repeater security view AND manually 
   assigned at least one authorized address to that port. 

   In a soon to be released upgrade, the 900TM & 900GM will be able to 
   enforce eavesdrop protection based upon the dynamically changing last source
   address seen on a port. This mode is enabled on a given port when "Enforce 
   Privacy" is selected in the HUBwatch repeater security screen but no 
   authorized addresses are assigned to a port.  This eavesdrop security mode 
   is supported in the currently shipping version of the DECrepeater 
   900FP/90FS/90TS.  

   One way to tell if eavesdrop and/or instrusion security are active is to 
   observe the "Security Status" field in  the upper right corner of the 
   HUBwatch repeater security window. If it reads "Enabled" then eavedrop aand
   or intrusion security are operational.
    
    Attached is an excerpt from Digital's repeater MIB extension which 
   graphically describes repeater security functions.

   Regards,

   Rich


  
--  +
--
--                    The Security Package
--
--  Implementation of the Security Package group is optional
--
--     
--  This group contains objects for managing security functions on all
--  repeater ports. To enforce security, a repeater port should be assigned
--  a list of MAC addresses belonging to stations authorized to use that
--  port. The Security Address Table performs this mapping of authorized
--  addresses to repeater ports. The maximum number of addresses which can
--  be assigned to each port is implementation dependent.
--
--  The group defines two distinct types of security capabilities,
--  intrusion detection/protection and eavesdrop prevention, each of which
--  can be enabled/disabled on a per port basis. The Security Control Table
--  manages the selection of these security features.
--
--                                  ____________
--                                 |  Repeater  |
--                                 |            |  ___ ___ ______
--                                 | Authorized | | B | A | DATA | 
--                                 | Addresses  | |___|___|______|   _________
--                                 | __________ |  <============    | Station |
--                                 |      A     []=================[]    A    |
--                 ___ ___ ______  |            |                   |_________|
--                | B | A | DATA | |_ _ _ _ _ _ |
--    _________   |___|___|______| |            |
--   | Station |   <=============  |            |
--   |    B    []=================[]      B     |  Eavesdrop Prevention
--   |_________|                   |            |  _____________
--                                 |_ _ _ _ _ _ | | garbled pkt |
--                                 |            | |_____________|    _________
--                                 |            |  +++++++++++++>   | Station |
--            Eavesdrop Prevention |      C     []=================[]    C    |
--                  _____________  |            |                   |_________|
--                 | garbled pkt | |_ _ _ _ _ _ |
--     _________   |_____________| |            |
--    | Station |   <++++++++++++  |            |
--    |    X    []================[]      D     |
--    |_________|  ==============> |____________|
--                  ___ ___ ______
--                 | C | X | DATA | 
--                 |___|___|______|
--         !! INTRUSION SECURITY VIOLATION !!
--
--
--
--  Intrusion detection/protection prevents a station from transmitting
--  data to any other station from a repeater port it is not authorized to
--  use. To enforce intrusion protection, the repeater compares the source
--  addresses of packets received from a given port with the address(es) in
--  that port's authorized address list. If the addresses do not match, the
--  intrusion is logged in the Security Violations Log Table and
--  appropriate action is taken. The actual action taken depends upon the
--  intrusion security mode selected.  An example of an intrusion violation
--  is depicted in the above figure. Here, Station X transmits a packet to
--  Station C from a repeater port which it is not authorized to use.
--     
--  Eavesdrop prevention prevents a station authorized to use a given
--  repeater port from receiving data packets addressed to any station
--  other than itself. To enforce eavesdrop prevention, the repeater
--  compares the unicast destination address of a packet being transmitted
--  out a given repeater port with the address(es) in that port's
--  authorized address list. If the addresses do not match, a garbled
--  version of the packet is transmitted. Otherwise, the packet is
--  transmitted unaltered. Packets with multicast or broadcast destination
--  addresses are never subject to eavesdrop prevention. An example of
--  eavesdrop prevention is depicted in the above figure. Here, Station A
--  transmits a packet addressed to Station B.  Station B receives the
--  packet correctly but Station C and Station X receive a garbled version
--  of the original packet.
--                                                                         
--  If eavesdrop prevention is enabled on a given port but that port's
--  authorized address list is empty, the repeater may optionally enforce
--  eavesdrop prevention based the last source address seen on that port
--  (as indicated by rptrAddrTrackLastSourceAddr or
--  rptrAddrTrackNewLastSrcAddress). 
--
--  -

    
1149.4STRWRS::KOCH_PIt never hurts to ask...Fri Jul 28 1995 12:468
    
    Can we get an update on repeater security which was enabled in the last
    upgrade of the firmware.
    
    Did the two types of intrusion detection get enabled? That is the
    method where it learns 1 address (DECnet/Ethernet) and then maintains
    that address until cleared and then the other one which is tied to only
    delivering clear packets to the station currently plugged into a port?
1149.5NETCAD::HERTZBERGHistory: Love it or Leave it!Fri Aug 04 1995 16:4021
    >>  Did the two types of intrusion detection get enabled? That is the
    >>  method where it learns 1 address (DECnet/Ethernet) and then maintains
    >>  that address until cleared ...
    
    The auto-learning of security addresses requires cooperation between
    Hubwatch and the repeater firmware.  The 900TP and 900CP support this
    now with the just-released version of Hubwatch.  Support for this 
    feature in the other security-capable repeaters (900TM, 900GM, 900FP, 
    90TS, 90FS) will be incorporated in the soon-to-be-released code 
    updates for these products (you'll still need the latest version of 
    Hubwatch).
    
    >>  ...and then the other one which is tied to only delivering clear 
    >>  packets to the station currently plugged into a port?
    
    Not sure what this part of the question means.  Eavesdropping
    protection works by jamming the data portion of any unicast packet
    whose source address is not an authorized address.  This feature has
    been shipping for some time now.  The only new part is the
    auto-learning of authorized addresses, discussed above.