Title: Securing the Perimeter
1- Securing the Perimeter
-
- Thomas LeeChief TechnologistQA
- thomas.lee_at_qa.com
2Continuing from Yesterday
3Scripting IPSec
- netsh ipsec is the starting point
4NAT Traversal-the problem
- NAT device cannot update IPSec auth-data
- Hash includes IP address of source
- When natted, the recepient will get data from a
different IP address - IKE ports can not be changed (UDP 500)
- See http//tinyurl.com/2j99q for more information
about NAT issues
5NAT-T Changes
- UDP encapsulation for ESP
- A UDP header is placed between the outer IP
header and the ESP header, encapsulating the ESP
PDU. The same ports that are used for IKE are
used for UDP-encapsulated ESP traffic. - A modified IKE header format
- The IPSec NAT-T IKE header contains a new Non-ESP
Marker field that allows a recipient to
distinguish between a UDP-encapsulated ESP PDU
and an IKE message. IPSec NAT-T-capable peers
begin to use the new IKE header after they have
determined that there is an intermediate NAT. - A new NAT-Keepalive packet
- A UDP message that uses the same ports as IKE
traffic, contains a single byte (0xFF) and is
used to refresh the UDP port mapping in a NAT for
IKE and UDP-encapsulated ESP traffic to a private
network host. - A new Vendor ID IKE payload
- This new payload contains a well-known hash
value, which indicates that the peer is capable
of performing IPSec NAT-T.
6NAT-T (continued)
- A new NAT-Discovery (NAT-D) IKE payload
- This new payload contains a hash value that
incorporates an address and port number. An IPSec
peer includes two NAT-Discovery payloads during
Main Mode negotiationone for the destination
address and port and one for the source address
and port. The recipient uses the NAT-Discovery
payloads to discover whether a NAT translated
addresses or port numbers, and, based on which
addresses and ports were changed, which peers are
located behind NATs. - New encapsulation modes for UDP-encapsulated ESP
transport mode and tunnel mode - These two new encapsulation modes are specified
during Quick Mode negotiation to inform the IPSec
peer that UDP encapsulation for ESP PDUs should
be used. - A new NAT-Original Address (NAT-OA) IKE payload
- This new payload contains the original
(untranslated) address of the IPSec peer. For
UDP-encapsulated ESP transport mode, each peer
sends the NAT-OA IKE payload during Quick Mode
negotiation. The recipient stores this address in
the parameters for the SA
7NAT/IPSec more Info
- IKE Negotiation for IPSec Security Associations
- http//www.microsoft.com/technet/community/columns
/cableguy/cg0602.mspx - Windows 2000 IPSec Web Site
- http//www.microsoft.com/windows2000/technologies/
communications/ipsec/default.asp - L2TP/IPSec NAT-T Update for Windows XP and
Windows 2000 - http//support.microsoft.com/default.aspx?scidkb
en-us818043
8Agenda
- Introduction
- What is the Perimeter?
- Securing with
- Using Microsoft Internet Security and
Acceleration (ISA) Server to Protect Perimeters - Using Internet Connection Firewall (ICF) to
Protect Clients - Protecting Wireless Networks
- Protecting Communications by Using IPSec
9Defense in Depth
- A layered approach
- Increases an attackers risk of detection
- Reduces an attackers chance of success
Policies, Procedures, Awareness
Physical Security
Data
Application
Host
Internal Network
Perimeter
10Agenda
- Introduction
- What is the perimeter?
- Securing the perimeter with
- Using Microsoft Internet Security and
Acceleration (ISA) Server to Protect Perimeters - Using Internet Connection Firewall (ICF) to
Protect Clients - Protecting Wireless Networks
- Protecting Communications by Using IPSec
11Perimeter Connections Overview
12Defending The Perimeter
- Properly configured firewalls and border routers
are the cornerstone for perimeter security - The Internet and mobility increase security risks
- VPNs/ wireless networking soften the perimeter
- Traditional packet-filtering firewalls block only
network ports and computer addresses - Most modern attacks occur at the application
layer - Perimeter security useless if breech is from the
inside
13Defending at the Client
- The client is part of the perimeter too!
- Client defenses block attacks that bypass
perimeter defenses or originate on the internal
network - Client defenses include, among others
- Operating system hardening
- Antivirus software
- Personal firewalls
- Client defenses require configuring many
computers - In unmanaged environments, users may bypass
client defenses
14What About Intrusion Detection?
- Detects the pattern of common attacks, records
suspicious traffic in event logs, and/or alerts
administrators - Threats and vulnerabilities are constantly
evolving, which leaves systems vulnerable until a
new attack is known and a new signature is
created and distributed - Is ID really helpful?
15Agenda
- Introduction
- What is the perimeter?
- Securing the perimeter with
- Using Microsoft Internet Security and
Acceleration (ISA) Server to Protect Perimeters - Using Internet Connection Firewall (ICF) to
Protect Clients - Protecting Wireless Networks
- Protecting Communications by Using IPSec
16Firewall Design Three-Homed
17Firewall Design Back-to-Back
18What Firewalls Do NOT Protect Against
- Malicious traffic that is passed on open ports
and not inspected at the application layer by the
firewall - Any traffic that passes through an encrypted
tunnel or session - Attacks after a network has been penetrated
- Traffic that appears legitimate
- Users and administrators who intentionally or
accidentally install viruses - Administrators who use weak passwords
19Software vs. Hardware Firewalls
20Types of Firewall Functions
- Packet Filtering
- Stateful Inspection
- Application-Layer Inspection
Multi-layer Inspection (Including
Application-Layer Filtering)
21Protecting Perimeters
- ISA Server has full screening capabilities
- Packet filtering
- Stateful inspection
- Application-level inspection
- ISA Server blocks all network traffic unless you
allow it - ISA Server provides secure VPN connectivity
- ISA Server is ICSA certified and Common Criteria
certified
22Demonstration 1Application-Layer Inspection in
ISA Server Web Publishing
23Traffic That Bypasses Firewall Inspection
- SSL tunnels through traditional firewalls because
it is encrypted, which allows viruses and worms
to pass through undetected and infect internal
servers - VPN traffic is encrypted and cannot be inspected
- Instant Messenger (IM) traffic often is not
inspected and might be used to transfer files
24Inspecting All Traffic
- Use intrusion detection and other mechanisms to
inspect VPN traffic after it has been decrypted - Remember Defense in Depth
- Use a firewall that can inspect SSL traffic
- Expand inspection capabilities of your firewall
- Use firewall add-ons to inspect IM traffic
25SSL Inspection
- SSL tunnels through traditional firewalls because
it is encrypted, which allows viruses and worms
to pass through undetected and infect internal
servers. - ISA Server can decrypt and inspect SSL traffic.
Inspected traffic can be sent to the internal
server re-encrypted or in the clear.
26Demonstration 2SSL Inspection in ISA Server
27ISA Server Hardening
- Harden the network stack
- Disable unnecessary network protocols on the
external network interface - Client for Microsoft Networks
- File and Printer Sharing for Microsoft Networks
- NetBIOS over TCP/IP
28Best Practices
- Use access rules that only allow requests that
are specifically allowed - Use ISA Servers authentication capabilities to
restrict and log Internet access - Configure Web publishing rules only for specific
destination sets - Use SSL Inspection to inspect encrypted data that
is entering your network
29Agenda
- Introduction
- What is the Perimeter?
- Securing with
- Using Microsoft Internet Security and
Acceleration (ISA) Server to Protect Perimeters - Using Internet Connection Firewall (ICF) to
Protect Clients - Protecting Wireless Networks
- Protecting Communications by Using IPSec
30Overview of ICF
- Internet Connection Firewall in Microsoft Windows
XP and Microsoft Windows Server 2003
What It Is
- Helps stop network-based attacks, such as
Blaster, by blocking all unsolicited inbound
traffic
What It Does
- Ports can be opened for services running on the
computer - Enterprise administration through Group Policy
Key Features
31Enabling ICF
- Enabled by
- Selecting one check box
- Network Setup Wizard
- New Connection Wizard
- Enabled separately for each network connection
32ICF Advanced Settings
- Network services
- Web-based applications
33ICF Security Logging
- Logging options
- Log file options
34ICF in the Enterprise
- Configure ICF by using Group Policy
- Combine ICF with Network Access Quarantine Control
35Best Practices
- Use ICF for home offices and small business to
provide protection for computers directly
connected to the Internet - Do not turn on ICF for a VPN connection (but do
enable ICF for the underlying LAN or dial-up
connection - Configure service definitions for each ICF
connection through which you want the service to
work - Set the size of the security log to 16 megabytes
to prevent an overflow that might be caused by
denial-of-service attacks
36Demonstration 3Internet Connection Firewall
(ICF) Configuring ICF ManuallyTesting
ICFReviewing ICF Log FilesConfiguring Group
Policy Settings
37Agenda
- Introduction
- What is the Perimeter?
- Securing with
- Using Microsoft Internet Security and
Acceleration (ISA) Server to Protect Perimeters - Using Internet Connection Firewall (ICF) to
Protect Clients - Protecting Wireless Networks
- Protecting Communications by Using IPSec
38Wireless Security Issues
- Limitations of Wired Equivalent Privacy (WEP)
- Static WEP keys are not dynamically changed and
therefore are vulnerable to attack. - There is no standard method for provisioning
static WEP keys to clients. - Scalability Compromise of a static WEP key by
anyone exposes everyone. - Limitations of MAC Address Filtering
- Attacker could spoof an allowed MAC address.
39Possible Solutions
- Password-based Layer 2 Authentication
- IEEE 802.1x PEAP/MSCHAP v2
- Certificate-based Layer 2 Authentication
- IEEE 802.1x EAP-TLS
- Other Options
- VPN Connectivity
- L2TP/IPsec (preferred) or PPTP
- Does not allow for roaming
- Useful when using public wireless hotspots
- No computer authentication or processing of
computer settings in Group Policy - IPSec
- Interoperability issues
40WLAN Security Comparisons
41802.1x
- Defines port-based access control mechanism
- Works on anything, wired or wireless
- No special encryption key requirements
- Allows choice of authentication methods using
Extensible Authentication Protocol (EAP) - Chosen by peers at authentication time
- Access point doesnt care about EAP methods
- Manages keys automatically
- No need to preprogram wireless encryption keys
42802.1x on 802.11
Wireless
Access Point
Radius Server
Ethernet
Laptop Computer
802.11
RADIUS
43System Requirements for 802.1x
- Client Windows XP
- Server Windows Server 2003 IAS
- Internet Authentication Serviceour RADIUS server
- Certificate on IAS computer
- 802.1x on Windows 2000
- Client and IAS must have SP3
- See KB article 313664
- No zero-configuration support in the client
- Supports only EAP-TLS and MS-CHAPv2
- Future EAP methods in Windows XP and Windows
Server 2003 might not be backported
44802.1x Setup
- Configure Windows Server 2003 with IAS
- Join a domain
- Enroll computer certificate
- Register IAS in Active Directory
- Configure RADIUS logging
- Add AP as RADIUS client
- Configure AP for RADIUS and 802.1x
- Create wireless client access policy
- Configure clients
- Dont forget to import the root certificate
45Access Policy
- Policy condition
- NAS-port-type matches Wireless IEEE 802.11 OR
Wireless Other - Windows-group ltsome group in ADgt
- Optional allows administrative control
- Should contain user and computer accounts
46Access Policy Profile
- Profile
- Time-out 60 min. (802.11b) or 10 min.
(802.11a/g) - No regular authentication methods
- EAP type protected EAP use computer certificate
- Encryption only strongest (MPPE 128-bit)
- Attributes Ignore-User-Dialin-Properties True
47Wireless Protected Access (WPA)
- A specification of standards-based, interoperable
security enhancements that strongly increase the
level of data protection and access control for
existing and future wireless LAN systems - WPA Requires 802.1x authentication for network
access - Goals
- Enhanced data encryption
- Provide user authentication
- Be forward compatible with 802.11i
- Provide non-RADIUS solution for Small/Home
offices - Wi-Fi Alliance began certification testing for
interoperability on WPA products in February 2003
48Best Practices
- Use 802.1x authentication
- Organize wireless users and computers into groups
- Apply wireless access policies using Group Policy
- Use EAP-TLS for certificate-based authentication
and PEAP for password-based authentication - Configure your remote access policy to support
user authentication as well as machine
authentication - Develop a method to deal with rogue access
points, such as LAN-based 802.1x authentication,
site surveys, network monitoring, and user
education
49Agenda
- Introduction
- What is the Perimeter?
- Securing with
- Using Microsoft Internet Security and
Acceleration (ISA) Server to Protect Perimeters - Using Internet Connection Firewall (ICF) to
Protect Clients - Protecting Wireless Networks
- Protecting Communications by Using IPSec
50Overview of IPSec
- What is IP Security (IPSec)?
- A method to secure IP traffic
- Framework of open standards developed by the
Internet Engineering Task Force (IETF) - Why use IPSec?
- To ensure encrypted and authenticated
communications at the IP layer - To provide transport security that is independent
of applications or application-layer protocols
51IPSec Scenarios
- Basic permit/block packet filtering
- Secure internal LAN communications
- Domain replication through firewalls
- VPN across untrusted media
52Implementing IPSec Packet Filtering
- Filters for allowed and blocked traffic
- No actual negotiation of IPSec security
associations - Overlapping filtersmost specific match
determines action - Does not provide stateful filtering
- Must set "NoDefaultExempt 1" to be secure
53Packet Filtering Is Not Sufficient to Protect
Server
- Spoofed IP packets containing queries or
malicious content can still reach open ports
through firewalls - IPSec does not provide stateful inspection
- Many hacker tools use source ports 80, 88, 135,
and so on, to connect to any destination port
54Traffic Not Filtered by IPSec
- IP broadcast addresses
- Cannot secure to multiple receivers
- Multicast addresses
- From 224.0.0.0 through 239.255.255.255
- KerberosUDP source or destination port 88
- Kerberos is a secure protocol, which the Internet
Key Exchange (IKE) negotiation service may use
for authentication of other computers in a domain - IKEUDP destination port 500
- Required to allow IKE to negotiate parameters for
IPSec security - Windows Server 2003 configures only IKE default
exemption
55Secure Internal Communications
- Use IPSec to provide mutual device authentication
- Use certificates or Kerberos
- Preshared key suitable for testing only
- Use Authentication Header (AH) to ensure packet
integrity - AH provides packet integrity
- AH does not encrypt, allowing for network
intrusion detection - Use Encapsulation Security Payload (ESP) to
encrypt sensitive traffic - ESP provides packet integrity and confidentiality
- Encryption prevents packet inspection
- Carefully plan which traffic should be secured
56IPSec for Domain Replication
- Use IPSec for replication through firewalls
- On each domain controller, create an IPSec policy
to secure all traffic to the other domain
controllers IP address - Use ESP 3DES for encryption
- Allow traffic through the firewall
- UDP Port 500 (IKE)
- IP protocol 50 (ESP)
57Best Practices
- Plan your IPSec implementation carefully
- Choose between AH and ESP
- Use Group Policy to implement IPSec Policies
- Consider the use of IPSec NICs
- Never use Shared Key authentication outside your
test lab - Choose between certificates and Kerberos
authentication - Use care when requiring IPSec for communications
with domain controllers and other infrastructure
servers
58Demonstration 4IPSec Configuring and Testing a
Simple IPSec PolicyConfiguring and Testing an
IPSec Packet Filter
59Session Summary
- Introduction/Defense in Depth
- Using Perimeter Defenses
- Using ISA Server to Protect Perimeters
- Using ICF to Protect Clients
- Protecting Wireless Networks
- Protecting Networks by Using IPSec
60Next Steps
- Stay informed about security
- Sign up for security bulletins
- http//www.microsoft.com/security/security_bullet
ins/alerts2.asp - Get the latest Microsoft security guidance
- http//www.microsoft.com/security/guidance/
- Get additional security training
- Find online and in-person training seminars
- http//www.microsoft.com/seminar/events/security.
mspx - Find a local CTEC for hands-on training
- http//www.microsoft.com/learning/
61For More Information
- Microsoft Security Site (all audiences)
- http//www.microsoft.com/security
- TechNet Security Site (IT professionals)
- http//www.microsoft.com/technet/security
- MSDN Security Site (developers)
- http//msdn.microsoft.com/security
62Questions and Answers
63(No Transcript)