Community discussions

MikroTik App
 
engineertote
Member Candidate
Member Candidate
Topic Author
Posts: 177
Joined: Tue May 19, 2009 1:36 pm

Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Mon Oct 31, 2011 4:22 pm

Dears

i have problem with my PPP server , its easily attacked by using Sniffer program Like Cain&Abel and copy of mikrotik OS installed on Virtual machine on the attacker PC and they can see the username / password of the online users and then simply use it .

i have upgrade the router to 5.7 and enable the PPP encryption , yes the encryption fixed the sniffing on the PPP users but the attacker got my Mikrotik int. MAC address and configure it on his virtual one .

i do appreciate any idea to solve this issue.


Regards
 
Feklar
Forum Guru
Forum Guru
Posts: 1724
Joined: Tue Dec 01, 2009 11:46 pm

Re: Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Mon Oct 31, 2011 5:36 pm

It sounds like you'll need to set up layer2 security then, basically isolate each end user from each other. Client Isolation on the access points (Default forwarding turned off on MT radios), and port isolation or VLANs on switches. Depending on your CPE's you might be able to set up firewalls to prevent things like that too. A router cannot prevent people from talking to each other over a layer2 network, it can only control the traffic that flows over it. That means you need to set up your layer2 network in such a way as to isolate your end users and prevent thing like that.
 
engineertote
Member Candidate
Member Candidate
Topic Author
Posts: 177
Joined: Tue May 19, 2009 1:36 pm

Re: Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Mon Oct 31, 2011 7:04 pm

Thanks for your reply , is EOIP solve this issue ?
 
fewi
Forum Guru
Forum Guru
Posts: 7717
Joined: Tue Aug 11, 2009 3:19 am

Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Mon Oct 31, 2011 7:07 pm

That question doesn't make any sense. EoIP doesn't provide any security. Nowhere on the wiki page for EoIP does it suggest it that it would.

Look up the terms Feklar told you about. Google them.
 
engineertote
Member Candidate
Member Candidate
Topic Author
Posts: 177
Joined: Tue May 19, 2009 1:36 pm

Re: Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Mon Oct 31, 2011 10:31 pm

Fewi

My network is : Mikrotik router ---- Cisco Switch --- Clients "My clients is not end users "only P2P links to resellers , from my side i do isolate them in my main switch so the users in port1 not see the users in port 2 also using EOIP tunnel for each P2P client with seperate PPP server for each one that its not allow users of the client A to work on the access point of Client B .

The problem is , Client A that he is connected to port 1 in my switch have end users and those users able to see each others with in them small network also using managed switch at the clients side will not solve the issue because he will connect his access point to one port and its will be PTMP so the end users will see each others .

the question is :

1- can i prevent virtual PC using Virtual Mikrotik from connecting to my network using my Interface MAC address and see the end users on them network ?
2- the clietns using Mikrotik + r52h as PTMP Access point , is it possible to isolate the end users in this case .


with my regards
 
Feklar
Forum Guru
Forum Guru
Posts: 1724
Joined: Tue Dec 01, 2009 11:46 pm

Re: Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Tue Nov 01, 2011 3:57 am

You obviously don't have port isolation set up if a client is able to set up their CPE or a virtual machine to do that then and mess up your network. If you have a managed Cisco switch, then you can do port isolation, that has been a standard feature on them for years.

Port isolation means this: Any port that is isolated cannot trade ANY frames with another port that is also isolated. So someone setting up their PC in such a manner would only matter to the person doing it, not anyone else connected to that switch. This means every port except your uplink ports, or ports that are connected to devices that you want everyone to have access to should be set up as isolated. If you have control over the access point, as suggested above, turn off default forwarding, then people cannot transfer frames over the radio card itself without explicit rules set up to allow it.
 
oeyre
Member Candidate
Member Candidate
Posts: 137
Joined: Wed May 27, 2009 12:48 pm

Re: Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Tue Nov 01, 2011 1:18 pm

Go and read about "switchport protected" (cisco) and bridge port horizon (MikroTik).
 
engineertote
Member Candidate
Member Candidate
Topic Author
Posts: 177
Joined: Tue May 19, 2009 1:36 pm

Re: Virtual Mikrotik with Cain&Abel simpl PPPOE attack

Tue Nov 01, 2011 1:35 pm

Thanks for all ,, Problem fixed


regards

Who is online

Users browsing this forum: Bing [Bot], Google [Bot], Javokhir, rspott and 237 guests