Ilovepdf Merged
Ilovepdf Merged
• Firewall Configuration
• With a firewall in place, the landscape is much different. A company will place
a firewall at every connection to the Internet.
• The firewall can implement security rules. For example, one of the security
rules inside the company might be:
• Out of the 500 computers inside this company, only one of them is permitted to
receive public FTP traffic. Allow FTP connections only to that one computer
and prevent them on all others
What Firewall Software Does?
• Firewalls use one or more of three methods to control traffic flowing in and
out of the network:
• Packet filtering
• Proxy service
• Stateful inspection
• A newer method that doesn't examine the contents of each packet but
instead compares certain key parts of the packet to a database of trusted
information
Working of Firewall
Firewall Software Configuration
• Firewalls are customizable. This means that you can add or remove filters
based on several conditions. Some of these are:
• IP addresses
• For example, if a certain IP address outside the company is reading too
many files from a server, the firewall can block all traffic to or from that IP
address
• Domain names
• A company might block all access to certain domain names, or allow access
only to spe cific domain names. Ex: www.howstuffworks.com
Some common protocols that you can set
firewall filters for include:
• IP (Internet Protocol) - the main delivery system for information over the
Internet
• TCP (Transmission Control Protocol) - used to break apart and rebuild
information that travels over the Internet
• HTTP (Hyper Text Transfer Protocol) - used for Web pages
• FTP (File Transfer Protocol) - used to download and upload files
• UDP (User Datagram Protocol) - used for information that requires no
response, such as streaming audio and video
• ICMP (Internet Control Message Protocol) - used by a router to exchange
the information with other routers
• SMTP (Simple Mail Transport Protocol) - used to send text-based
information (e-mail)
• SNMP (Simple Network Management Protocol) - used to collect system
information from a remote computer
• Telnet - used to perform commands on a remote computer
Firewall Software Configuration
• Ports
• For example, if a server machine is running a Web (HTTP) server and an
FTP server, the Web server would typically be available on port 80, and the
FTP server would be available on port 21.
• A company might block port 21 access on all machines but one inside the
company.
• The firewall will sniff (search through) each packet of information for an
exact match of the text listed in the filter.
• For example, you could instruct the firewall to block any packet with the
word "X-rated" in it. The key here is that it has to be an exact match.
• The "X-rated" filter would not catch "X rated" (no hyphen). But you can
include as many words, phrases and variations of them as you need. Some
operating systems come with a firewall built in.
Why Firewall Security?
• Access or abuse of unprotected computers
• Remote login
• Application backdoors
• SMTP session hijacking
• Operating system bugs
• Denial of service
• E-mail bombs
• Macros
• Viruses
• Spam
• Redirect bombs - Hackers can use ICMP to change (redirect) the path
information takes by sending it to a different router
• Source routing
Security against unauthorized access or abuse
• Proxy servers can also make your Internet access work more efficiently. If
you access a page on a Web site, it is cached (stored) on the proxy server.
• Setting up a DMZ is very easy. If you have multiple computers, you can
choose to simply place one of the computers between the Internet
connection and the firewall.
Configuring a Simple Firewall
• The Cisco 1800 integrated services routers support network traffic filtering
by means of access lists.
• The router also supports packet inspection and dynamic temporary access
lists by means of Context Based Access Control (CBAC).
• The use of inspection rules in CBAC allows the creation and use of
dynamic temporary access lists.
• These dynamic lists allow temporary openings in the configured access lists
at firewall interfaces.
• These openings are created when traffic for a specified user session exits
the internal network through the firewall.
1. Multiple networked devices—Desktops, laptop PCs, switches
2 Fast Ethernet LAN interface (the inside interface for NAT)
3 PPPoE or PPPoA client and firewall implementation—Cisco
1811/1812 or Cisco 1801/1802/1803 series integrated services router,
respectively
4 Point at which NAT occurs
5 Protected network
6 Unprotected network
7 Fast Ethernet or ATM WAN interface (the outside interface for NAT)
• The firewall is applied to the outside WAN interface (FE0) on the Cisco
1811 or Cisco 1812 and protects the Fast Ethernet LAN on FE2 by filtering
and inspecting all traffic entering the router on the Fast Ethernet WAN
interface FE1.
• Note that in this example, the network traffic originating from the corporate
network, network address 10.1.1.0, is considered safe traffic and is not
filtered
Configuration Tasks
• Ex:
• Router(config)# access-list 103 permit host 200.1.1.1 eq isakmp any
• Creates an access list which prevents Internet- initiated traffic from reaching
the local (inside) network of the router, and which compares source and
destination ports.
• Step 2
• access-list access-list-number {deny | permit} protocol source source-wildcard
destination destination-wildcard
• Example:
• Repeat this command for each inspection rule that you wish to use.
• Step 3 exit
• Returns to global configuration mode.
• Example: Router(config-if)# exit
• Router(config)#
Apply Access Lists and Inspection Rules
to Interfaces
• Step 4 interface type number
• Enters interface configuration mode for the outside network interface on
your router.
• Example:
• Router(config)# interface fastethernet 0
• Router(config-if)#
• Step 6 exit
Configuration Example
• A telecommuter is granted secure access to a corporate network, using
IPSec tunnelling.
• IPSec tunnelling secures the connection from the Home LAN to the
corporate network.
• Like the Internet Firewall Policy, HTTP need not be specified because Java
blocking is not necessary. Specifying TCP inspection allows for single-
channel protocols such as Telnet and HTTP. UDP is specified for DNS.
Configuration Example
• The following configuration example shows a portion of the configuration
file for the simple firewall scenario described in the preceding sections
• ip inspect name firewall tcp
• ip inspect name firewall udp
• ip inspect name firewall rtsp
• ip inspect name firewall h323
• ip inspect name firewall netshow
• ip inspect name firewall ftp
• ip inspect name firewall sqlnet
Configuration Example
• interface vlan 1 ! This is the internal home network
• ip inspect firewall in ! inspection examines outbound traffic
• no cdp enable
• interface fastethernet 0 ! FE0 is the outside or internet exposed
interface
• ip access-group 103 in ! acl 103 permits ipsec traffic from the
corp. router as well as denies internet initiated traffic inbound.
• ip nat outside
• no cdp enable
Configuration Example
• ! acl 103 defines traffic allowed from the peer for the ipsec tunnel.
• access-list 103 permit icmp any any ! allow icmp for debugging but should
be disabled due to security implications.
• access-list 103 deny ip any any ! prevents internet initiated traffic inbound.
no cdp run
Information Security Management
CSE3502
Dr. Parimala M,
Associate Professor, SITE
Module – 1: Information Security
Devices
• DHCP Server logging - utilize a system to improve the asset inventory and
help detect unknown systems through this DHCP information
Asset Inventory Tool Cont.…
• All equipment acquisitions should automatically update the inventory system
• Maintain an asset inventory of all systems connected to the network and the
network devices themselves
• The inventory should include every system that has an Internet Protocol (IP)
address on the network
• The asset inventory created must also include data on whether the device is a
portable and/or personal device
• Make sure that asset inventory database is properly protected and a copy stored
in a secure location.
– Create separate VLANs for BYOD (bring your own device) systems or
other untrusted devices.
• Use tools to pull information from network assets such as switches and
routers regarding the machines connected to the network.
• The asset inventory database and alerting system must be able to identify
the location, department, and other details of where authorized and
unauthorized devices are plugged into the network.
• To evaluate the implementation of Control 1 on a periodic basis, the
evaluation team
– will connect hardened test systems to at least 10 locations on the
network, including a selection of subnets associated with demilitarized
zones (DMZs), workstations, and servers. Two of the systems must be
included in the asset inventory database, while the other systems are
not.
– must verify that the systems generate an alert or e-mail notice regarding
the newly connected systems within 24 hours of the test machines
being connected to the network.
– must verify that the system provides details of the location of all the
test machines connected to the network.
– must verify that the system provides information about the asset owner.
– must verify that the test systems are automatically isolated from the
production network within one hour of initial notification and that an e-
mail or alert indicating the isolation has occurred.
– must verify that the connected test systems are isolated from production
systems.
1.2. Testing the Traffic Filtering Devices
• Traffic Filtering - to reduce security threats, organisations
use various devices, technologies and techniques
• institution/organisation - to improve the efficiency of
filtering and increase the level of security in its network
should apply the following recommendations:
– Define traffic-filtering rules
– Select a traffic-filtering technology
– Implement defined rules
– Maintain all the components of the solution
Packet-filtering functionality
(stateless firewall)
• A packet filter enables the implementation of control of access to resources
by deciding whether a packet should be allowed to pass, based on the
information contained in the IP packet header.
• Does not analyse the content of the packet (unlike a content filter), nor does
it attempt to determine the sessions to which individual packets belong,
based on the information contained in the TCP or UPD header, and
therefore it does not make any further decisions in that regard. For this
reason, the process is also known as stateless packet inspection
• Stateless firewall devices analyse each packet individually and filter them
based on the information contained in Layers 3 and 4 of the OSI reference
model
Packet Filters
Filtering Decision is made based on the following information:
• source IP address
• destination IP address
• protocol
• source port number
• destination port number
The advantages of applying packet filters:
• simple implementation
• supported by most routers, so there is no need to invest in new equipment and software
• rarely cause bottlenecks in the area of their application, even at high speeds in Gigabit
networks.
The disadvantages of applying packet filters:
• vulnerability to IP spoofing attacks
• vulnerability to attacks that exploit problems within the TCP/IP specification and the protocol
stack
• problems with filtering packets that are fragmented (causing interoperability and
nonfunctioning of VPN connections)
• no support for the dynamic filtering of some services
• dynamic negotiation about the ports that will be used in communication – passive FTP).
Stateful packet inspection
• improves the packet filtering process by monitoring the state of each connection
established through a firewall device.
• TCP protocol, allows two-way communication and that TCP traffic is characterized by
three phases:
• establishing the connection- records each connection in the state table
• data transfer
– -device monitors the parameters in the header of L3 packet and L4 segment and
makes a filtering decision depending on their values and the content of state table.
– The state-table contains all currently active connections. As a result, a potential
attacker trying to spoof a packet with a header indicating that the packet is a part of
an established connection can only be detected by the stateful inspection firewall
device, which verifies whether the connection is recorded in the state-table.
• Based on the filtering rules defined on the APG device, proxy agents decide
whether network traffic will be allowed or not.
• There are also APG devices with the capability of packet decryption, analysis and
re-encryption, before a packet is forwarded to the destination host.
APG devices Deficiencies
• requires a significantly greater utilisation of resources, i.e., they require
more memory and greater utilization of processor time for analyzing and
interpreting each packet passing through the device.
• As a result, APG devices are not suitable for filtering real-time
applications.
• Another deficiency of these devices is the limitation in the number of
services that can be filtered through them.
• APG devices do not always support the filtering of new applications or
protocols.
• Due to their price, APG devices are commonly used for protecting data
centres or other networks containing publicly available servers that are of
high importance to an organisation.
• In order to reduce the load on APG devices and achieve greater efficiency,
modern networks more frequently use dedicated proxy servers.
Dedicated Proxy (DP) Server
• Dedicated Proxy (DP) servers also have a role as “intermediaries” in
the communication between two hosts, although their traffic-
filtering capabilities are significantly lower,
• intended for the analysis of the operation of specific services and
protocols (e.g., HTTP or SMTP).
• Due to their limited traffic-filtering capabilities, DP devices are
deployed behind firewall devices in the network architecture.
• Their main function is to perform specialised filtering of a specific
type of traffic (based on a limited set of parameters) and carry out
the logging operation.
• The execution of these specific activities significantly reduces the
load on the firewall device itself, which is located in front of the DP
server.
• The most widely used devices of this type are Web Proxy servers.
Solutions Combining Traffic Filtering with
Other Technologies
1. NAT (Network Address Translation)
NAT is a technology that enables devices that use private IP
addresses to communicate with devices on the Internet.
• This technology translates private IP addresses, which can be
used by devices within a Local Area Network (LAN), into
publicly available Internet addresses.
• There are three types of NAT translations:
– Dynamic NAT- dynamically allocates the private address to
publicly available IP addresses
– Static NAT – Each private address is translated into
separate public IP address
– Port Address Translation PAT- Each client on a LAN
establishes a connection with a device on the internet is
assigned a different port number of the public IP address
2. VPN (Virtual Private Network)
• VPN (Virtual Private Network) technology is used to increase the security
of data transfer through a network infrastructure that does not provide a
sufficient degree of data security.
• It enables the encryption and decryption of network traffic between
external networks and an internal, protected network.
• VPN functionality - available on firewall devices or implemented on VPN
servers that are placed behind firewall devices in the network architecture.
• firewall device cannot perform an inspection, access control or logging of
the network traffic, and therefore cannot scan it for certain security threats.
• VPN service requires the application of certain filtering rules of the firewall
device in order to enable its uninterrupted operation.
• special attention should always be paid to making sure that the appropriate
protocols and the TCP/UDP services that are necessary for the functioning
of the chosen VPN solution are supported.
3. IDP (Intrusion Detection and Prevention)
• Network Intrusion Detection (ID)
– based on monitoring the operation of computer systems or networks
and analysing the processes they perform, which can point to certain
incidents.
• Network Intrusion Prevention (IP)
– process of detecting network intrusion events, but also includes the
process of preventing and blocking detected or potential network
incidents.
• Network Intrusion Detection and Prevention systems (IDP)
– based on identifying potential incidents
– logging information about them
– attempting to prevent them
– alerting the administrators responsible for security
– identify problems concerning the adopted security policies
– To document existing security threats and
– To discourage individuals from violating security rules
– IDP systems use various incident detection methods
Primary Classes of Detection Methodology
– 1. Signature-based detection-
• process of comparing the known forms in which the
threat has appeared in the network
• Cannot identify new threats and complex forms of
communication
– 2. Anomaly-based detection
• Based on behaviour of users, hosts or application
• It detects even the previously unknown threats
– 3. Detection based on stateful protocol analysis
• Protocols are defined by the manufactures of IDP
devices
Intrusion Detection
System
Configuring Secure Content
Management
Content Management
• Advent of Web 2.0 technologies and proliferation of file sharing
protocols, data sharing portals, media streaming, etc. by the users
expand the attack surface of an organization. They create enormous
opportunities for external threats to exploit weaknesses.
• Allowing the inbound and outbound connections — as access given
to the employees to initiate or receive traffic — creates issues of
employee productivity. Also contributes to bandwidth issue as
connection to public or media streaming sites consumes an
organization’s network bandwidth.
• While allowing legitimate traffic, organizations may not like their
employee to indulge in different forms of entertainment and
attractions available online, which can lead to security threats, data
leakage and productivity issues.
• Security has been evolving to address these challenges through a set
of practices and technical solutions under a category which can
broadly be classified as ‘Secure Content Management’ (SCM).
The Importance of Secure Content
Management
Unrestricted Access - The Risks include:
• Impacted employee productivity
– Prevent non-productive web surfing
– Preserves network bandwidth
• Liability Exposure
– Peer-to-peer networking
– File sharing
• Hacker Attacks and Privacy Violations
– Vulnerable to backdoor attacks
How Secure Content Management Works
• Securing content starts with controlling access to
certain Web sites based on predetermined criteria.
– At a basic level, user access to Internet content is
controlled using the URL address or the URL content
category (such as nudity or gambling).
– Basic content management solutions can also examine
the way the content is delivered, such as through Java
applets or ActiveX scripts, and determine access
permissions accordingly.
• More advanced content management solutions
also provide the ability to block applications such
as instant messaging and peer-to-peer services.
Site Blocking Versus Content
Monitoring
Site Blocking Content Monitoring
list-based or URL-based filters to keyword-blocking approach
identify and block certain Web sites
Some solutions rely on white lists that compares the keyboard data to a user-
allow access to only those sites that defined library of words and phrases.
appear on the list. When a match to one of the blocked
Ex: a retail store might create a white list words or phrases is detected, the solution
containing only the company’s Web site, filters or blocks the data, or in some
shipping Web sites and supplier Web sites. cases even closes the application.
Other solutions use black lists, which The problem with this approach is that it
permit access to all sites except those on can inadvertently block legitimate pages
the black list. The black list approach is based on the fact that they contain one or
preferable for businesses whose more targeted keywords.
employees need less restrictive Internet For example, a Web site about cancer
access. With a black list approach, the research could be blocked because it
database of Web sites is organized into contains the word “breast.”
categories, such as “violence” or “drugs,” More advanced content monitoring
and network administrators can solutions not only examine the individual
Site Blocking
• Effectiveness and manageability of site blocking
depends on a number of factors:
– Database size
– Update frequency
– Category organization
• A general limitation of site blocking is that it
focuses exclusively on HTTP-based Web traffic.
• It does not block instant messaging, e-mail
attachments, peer-to-peer applications and other
applications that could contain security threats.
Solution Architecture
• CMS can be embedded on a network device
such as a proxy server, on firewall or on
dedicated server.
• Three deployment methods includes,
– Client solutions
– Standalone solutions
– Integrated solutions