Title: Networkers Template
1(No Transcript)
2Designing SecureEnterprise Network
C
405 NW98
3Infrastructure Security
4The Security Wheel
2 SECURE
1 Corporate Security Policy
5 MANAGE IMPROVE
3 MONITOR
4 AUDIT/TEST
5Procedures and Operations
Rules
Training
PeriodicReview
Delegationof Authority
6Goals of the Session
- Define what to protect
anything that could cause problems if it were to
stop or malfunction - Decide how to protect itgood enough vs. absolute
protection - Think about the cost of protection vs. the
cost of loss or corruption
7Agenda
- I. Introduction
- II. Router/Switch Self-Protection
- III. Resource Protection
- IV. Perimeter Protection
- V. Sustaining Network Security
- VI. Security Sustainment Validation
- VII. Conclusions
8II. Router/Switch Self-Protection
- Threats
- Avoidance Measures
9Intruder Attack Points
- The administrative interfaces
- Console
- Telnet
- SNMP
- Overload the data interface
- Overload the processor
10The Administrative Interface
Routergt
- Password Protection
- Password Encryption
11Banners
- Select an appropriate login banner that tells who
is allowed into the system
12Native Passwords
line console 0 login password one4all exec-timeout
1 30
User Access Verification Password
ltone4allgt routergt
The native passwords can be viewed by anyone
logging in with the enabled password
13Service Password-Encryption (7)
- Will encrypt all passwords on the Cisco IOSwith
Cisco-defined encryption type 7 - Use enable password 7 ltpasswordgt for cut/paste
operations - Cisco proprietary encryption method
14Service Password-Encryption
hostname Router ! enable password one4all !
service password-encryption ! hostname
Router ! enable password 7 15181E00F
15Enable Secret (5)
- Uses MD5 to produce a one-way hash
- Cannot be decrypted
- Use enable secret 5 ltpasswordgtto cut/paste
another enable secret password
16Enable Secret 5
17Password of Caution
- Even passwords that are encrypted in the
configuration are not encrypted on the wire as an
administrator logs into the router
100101
18Use Good Passwords
hmm, How about Pancho?
- Do not use passwords that can be easily guessed
19Authentication Mechanisms
- Local Password
- Kerberos
- TACACS
- RADIUS
- One-time Passwords
20Cisco IOS TACACS Authentication
Encrypts passwords with encryption (7).
version 11.2 ! service password-encryption ! hostn
ame Router ! aaa new-model aaa authentication
login ruth tacacs enable aaa authentication
login sarah tacacs local enable secret 5
1hM3l.s/DgJ4TeKdDk ! username john password
7 030E4E050D5C username bill password 7
0430F1E060A51 !
Define list ruth to use TACACS then the
enable password
Define list sarah to use TACACS then the local
user and password
enable secret overrides the (7) encryption
Define local users
21Cisco IOS TACACS Authentication
Defines the IP address of the TACACS server
tacacs-server host 10.1.1.2 tacacs-server key
ltkeygt ! line con 0 login authentication
ruth line aux 0 login authentication ruth line
vty 0 4 login authentication sarah length 29
width 92 ! end
Defines the encryption key for
communicating with the TACACS server
Uses the authentication mechanisms listed in
ruth TACACS then enable password
Uses the authentication mechanisms listed in
sarah TACACS then a local user/password
22PIX TACACS Authentication
PIX Version 4.2(2) enable password
BjeuCKspwqCc94Ss encrypted password
nU3DFZzS7jF1jYc5 encrypted tacacs-server host
10.1.1.2 ltkeygt aaa authentication telnet outbound
0 0 0 0 tacacs aaa authentication ftp outbound 0
0 0 0 tacacs aaa authentication http outbound 0
0 0 0 tacacs no snmp-server location no
snmp-server contact snmp-server community
notpublic no snmp-server enable traps telnet
10.1.1.2 255.255.255.255 ... Cryptochecksuma21af6
7f58849f078a515b177df4228 end OK
Enable Password
Telnet Password
Defines the IP address of the TACACS server and
the key
Defines the services that require authentication
Defines the device that can Telnet into the PIX
23Encrypted Telnet Sessions
- Kerberos v5
- Strong Authentication within the session
- Relies heavily upon DNS and NTP
24One-Time Passwords
- May be used with TACACS or RADIUS
- The same password will never be reused by an
authorized administrator - Key CardsCryptoCard token server included with
CiscoSecure - Support for Security Dynamics and Secure
Computing token servers in Cisco Secure
25Restrict Telnet Access
26SNMP Access Control
RORead Only RWRead Write
27Switch Access Security
28SNMP
- Version one sends cleartext communitystrings
and has no policy reference - Version two addresses some
of the known security weaknessesof SNMP
version one - Version three is being worked on
29Identification Protocol
- The Identification Protocol (Auth) can be enabled
for sessions to the router
Telnet Host (D23, S4909)
Authwhos using (D23, S4909)
Auth (D23, S4909) is Chris
Telnet (D23, S4909) proceed
RFC 1413 Identification Protocol The
information returned by this protocol is at most
as trustworthy as the host providing it...
30Resource Deprivation Attacks
version 11.2 ! no service udp-small-servers no
service tcp-small-servers !
- Daytime (13)
- Chargen (19)
These are disabled by default in IOS 11.3
31Resource Deprivation Attacks
32ARP Control
33Switch Port Security
Consolegt set port security 3/1 enable
01-02-03-04-05-06 Consolegt set port security 3/2
enable Consolegt
Consolegt show port 3 Port Status Vlan Level
Duplex Speed Type ---- --------
---- ------ ------ -----
------------ 3/1 connect 1 normal
half 10 10 BASE-T 3/2 connect 1
normal half 10 10
BASE-T Port Security Secure-Src-Addr
Last-Src-Addr Shutdown ----
-------- -----------------
----------------- ------- 3/1
enabled 01-02-03-04-05-06 01-02-03-04-05-06
No 3/2 enabled 05-06-07-08-09-10
10-11-12-13-14-15 Yes Consolegt
34AdministratorAuthorization Levels
- Sixteen administrative levels that can be used to
delegate authority - Cisco IOS commands can be associated with a level
35Audit TrailCisco IOS Syslog
unix tail cisco.log Feb 17 214826
10.1.1.101.9.132 31 Mar 2 115155 CST
SYS-5-CONFIG_I Configured from console by vty0
(10.1.1.2) unix date Tue Feb 17 214953 CST
1998 unix
version 11.2 service timestamps log datetime
localtime show-timezone ! logging 10.1.1.2
Routergtsho clock 115344.764 CST Tue Mar 2
1993 Routergt
36Audit TrailPIX Syslog
unix tail pix.log Feb 20 074625 10.1.1.1.2.2
Begin configuration reading from terminal Feb
20 074629 10.1.1.1.2.2 111005 End
configuration OK Feb 20 074632 10.1.1.1.2.2
111001 Begin configuration writing to memory Feb
20 074632 10.1.1.1.2.2 111004 End
configuration OK unix
PIX Version 4.2(2) names logging console
informational logging monitor informational loggin
g buffered informational logging trap
informational logging facility 20 logging host
inside 10.1.1.2
37(No Transcript)
38III. Resource Protection
- Individual Resources
- Threats
- Avoidance measures
39Spoofing
interface Serial 1 ip address 172.26.139.2
255.255.255.252 ip access-group 111 in no ip
directed-broadcast ! interface ethernet 0/0 ip
address 10.1.1.100 255.255.0.0 no ip
directed-broadcast Access-list 111 deny ip
127.0.0.0 0.255.255.255 any Access-list 111 deny
ip 10.1.0.0 0.0.255.255 any Access-list 111
permit ip any any
172.16.42.84
10.1.1.2
IP (D10.1.1.2 S10.1.1.1)
40ICMP Filtering
Extended Access List access-list 101 permit icmp
any any lttypegt ltcodegt
Summary of Message Types 0 Echo Reply 3
Destination Unreachable 4 Source Quench
5 Redirect 8 Echo 11 Time Exceeded
12 Parameter Problem 13 Timestamp 14
Timestamp Reply 15 Information Request 16
Information Reply ICMP Codes are not shown
no ip unreachables (IOS will not send)
no ip redirects (IOS will not send
or
accept)
RFC 792 INTERNET CONTROL MESSAGE PROTOCOL
41Source Routing
interface Serial 1 ip address 172.16.139.2
255.255.255.252 ip access-group 111 in no ip
source routing ! Access-list 111 permit ip
10.16.0.0 0.0.255.255 any
Private
Im 10.16.99.99 and heres the route back to me
Network 10.16.0.0
RFC 791 Internet protocol
42Example Scenario
43Cisco IOS with an Access List
44Cisco PIX
45Cisco IOS Firewall Feature Set
46Intranet Protection Costs
- Versus
- Loss
- Corruption
- Ease of Use
47IV. Perimeter Protection
48Firewall Protection
The Internet
Demilitarized Zone (DMZ)
DNS
WWW
Mail
- Use access control lists on the screening router
to control traffic - Isolate each server from traffic with a switch
49Syn Attack
TCP syn (D172.18.1.2 S1.1.1.1)
TCP syn (D172.18.1.2 S1.1.1.2)
TCP syn (D172.18.1.2 S1.1.1.3)
TCP syn (D172.18.1.2 S1.1.1.4)
TCP syn (D172.18.1.2 S1.1.1.5)
172.18.1.2
TCP syn (D172.18.1.2 S2.1.1.1)
TCP syn (D172.18.1.2 S2.1.1.2)
50Cisco IOS Syn Attack Defense
51Cisco IOS Syn Attack Defense
ip tcp intercept ltaccess-list-numbergt ip tcp
intercept mode watch
TCP syn
TCP syn/ack
TCP ack
- How many session requests in the last one minute?
- How many incomplete sessions are there?
- How long do I wait for the final ack?
52PIXSyn Attack Defense
PIX Version 4.2(2) static (inside,outside)
171.68.41.7 10.1.1.2 netmask
255.255.255.255 0 0 max_conns
em_limit conduit permit tcp host 171.68.41.7
eq smtp any
Inside
Outside
max_conns - the maximum number of TCP connections
allowed em_limit - the embryonic connection limit
53Cisco IOS Firewall Feature Set Syn Attack Defense
ip inspect tcp synwait-time seconds ip inspect
tcp finwait-time seconds ip inspect tcp
idle-time seconds
TCP syn
TCP syn/ack
TCP ack
- How many session requests in the last one minute?
- How many incomplete sessions are there?
- How long do I wait for the final ack?
54Extranet Options
Virtual Private Networking
Private Links
Partner
Gateway
Campus Backbone
Internet
Partner
EDI Translator
Purchasing System
Partner
55Electronic Commerce
Internet
Internet
Gateway Router
Demilitarized Zone (DMZ)
Web Server
Secure Commerce Servers
Intranet
Firewall
Enterprise Servers
Intranet
56VPN Security Requirements
- Encryption for authentication, confidentiality
and integrity - Physical line separation via private lines or
frame relay
or
57Virtual Private Dial Network
- Layer 2 Forwarding
- Layer 2 Tunnel Protocol
58VPDN Entrance to the Enterprise
Internet
Internet
Screening Router
Demilitarized Zone (DMZ)
Home Gateway
Firewall
Intranet
Intranet
59Dial Access Protection
Screening Router
DNS
WWW
Mail
60V. Sustaining Network Security
61Dynamic Routing Protocols
Path Redundancyto Route Around Failures
62Keyed Hashing forAuthentication and Integrity
- Secret key and message arehashed together
- Recomputation of digest verifies that the message
originated with the peer and that the message was
not altered in transit
Secret Key
Hash Function
983lna9458hk7436gq
63Route Update Authentication and Integrity
IP HDR
Key
Route Update Data
Assemble the Packet with the Key
Signature
To the Wire
Reassemble the Packet with the Signature
IP HDR
Signature
Route Update Data
64Route Filtering
router rip network 10.0.0.0 distribute-list 1
in ! access-list 1 deny 0.0.0.0 access-list 1
permit 10.0.0.0 0.255.255.255
Router sho ip proto Routing Protocol is "rip"
Sending updates every 30 seconds, next due in 12
seconds Invalid after 180 seconds, hold down
180, flushed after 240 Outgoing update filter
list for all interfaces is not set Incoming
update filter list for all interfaces is 1
Redistributing rip
65Secure Vital Services
- Network Time Protocol Sources
- Domain Name Servers
- Certificate Authority
66Multi-Level Security -TCSEC, ITSEC and CC
- Not really needed in Enterprise Networks
- Difficult to implement
(unless youre the military)
67Session Protection through Encryption
Application to Application
Application
End to End
End to Intermediate
Network
Intermediate to Intermediate
Link
Link
Link
68Session Protection through Network Layer
Encryption
Shared Secret Key
Shared Secret Key
Internet
Decrypt
Encrypt
(Cleartext)
(Cleartext)
(Ciphertext)
IPSecthe IETF working group defining IP Security
69NetRanger
NetRanger Director
- Sensors watch for attacks or problems
- NetRanger stops active attacks
70NetSonar Vulnerability Scanning
- Network mapping
- Identify live hosts
- Identify services on hosts
- Vulnerability scanning
- Analyze discovery data for potential
vulnerabilities - Confirm vulnerabilities on targeted hosts
71VI. Security Sustainment Validation
- What steps can you take to make sure that your
network will continue to be secure?
72Modeling Tools
- NetSys Modeling can verify the access controls in
your network
73Validating Your Policy through Network Management
Systems
Management
- What to monitor?
- What to measure?
Access
Core
Workgroup
Track and report trends that show how you are
achieving your security goals
IBM
74VII. Conclusions
For the want of a nail, the shoe was lost. For
the want of a shoe, the horse was lost. For the
want of a horse, the rider was lost. For the
want of a rider, the battle was lost. For the
want of a battle, the Kingdom was lost. And all
for the want of a horse shoe nail.
75(No Transcript)