5 Implementing Secure Network Solutions
5 Implementing Secure Network Solutions
Introduction
Load Balancer
Virtual IP
Persistence
Virtual Local Area Network (VLAN)
Intranet
Extranet
Demilitarized Zone (DMZ)
East-West Traffic
Zero Trust
Split tunnel
Full tunnel
Remote access VPN
Site-to-site VPN
IPSec
SSL/TLS
Layer 2 Tunneling Protocol (L2TP)
Broadcast storm prevention
Bridge Protocol Data Unit (BPDU) guard
Loop prevention
Dynamic Host Configuration Protocol (DHCP) snooping
Jump Servers
Proxy Servers
Network-based intrusion detection system (NIDS)
Network-based intrusion prevention system (NIPS)
Hardware Security Module (HSM)
Firewalls
Route security
Quality of Service (QoS)
IPv6
Port Spanning
Port Mirroring
Port Taps
File integrity monitors
Access Control Lists (ACLs)
DNS
Network access control (NAC)
Out-of-band management
Learning Outcomes
In this module, you will complete the following exercises:
Exam Objectives
The following exam objectives are covered in this lab:
Load Balancing
Network Segmentation
Virtual Private Network (VPN)
DNS
Network Access Control (NAC)
Out-of-band Management
Port Security
Network Appliances
Access Control List (ACL)
Route Security
Quality of Service (QoS)
Implications of IPv6
Port Spanning/Port Mirroring
Monitoring Services
File Integrity Monitors
in more detail.
Lab Duration
It will take approximately 1 hour to complete this lab.
Lab Topology
During your session, you will have access to the following lab
configuration.
Depending on the exercises, you may or may not use all of the
devices, but they are shown here in the layout to get an overall
understanding of the topology of the lab.
In this exercise, you will learn about load balancing and load
balancers.
Learning Outcomes
After completing this exercise, you should have further knowledge
of:
Active/Active
Active/Passive
Scheduling
Virtual IP
Persistence
Your Devices
This exercise contains supporting materials for Security+.
Active/Active
Active/Passive
Scheduling
Virtual IP
When the servers are configured with a load balancer, you do not
need to connect to it individually. There would be one virtual IP
assigned to the load balancer and one name, and the users can use
either one. The virtual IP is the IP address assigned to the load
balancer configuration that the users will connect to. It is like a
normal IP address except that it is assigned to the load balancer
configuration, unlike being assigned to a physical network adapter.
For example, you have two Web servers that are connected to the
load balancer. The following IP addresses are assigned:
Persistence
Learning Outcomes
After completing this exercise, you should have further knowledge
of:
Your Devices
This exercise contains supporting materials for Security+.
Intranet
The Intranet is the internal network of an organization. Intranet is
available only to the employees of an organization in most cases.
However, some organizations may allow visiting vendors and
contractors to connect to their Intranet. The key purpose of the
Intranet is to share resources, such as files and folders. You can
also have an internal Web application that serves a specific
business goal.
Extranet
East-West Traffic
Zero Trust
In this exercise, you will learn about VPN and the different types.
Learning Outcomes
After completing this exercise, you should have further knowledge
of:
Always On
Split Tunnel vs. Full Tunnel
Remote Access vs. Site-to-site
IPSec
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
HTML5
Layer 2 Tunneling Protocol (L2TP)
Your Devices
This exercise contains supporting materials for Security+.
Always On
With a full tunnel VPN connection, all the network traffic is routed
through the enterprise network, for example, if a user is connected
to the full tunnel VPN and visits a specific website, the enterprise
network handles the internet traffic. This type of VPN connection is
more secure but is more resource-intensive.
IPSec
SSL is a protocol that is now replaced by the TLS protocol. SSL was
mainly used to secure the information between two endpoints. For
example, SSL was primarily used between a Webserver and a client
that was trying to access a Webpage. TLS is an upgraded version of
SSL and provides improved security. When a website is configured
with an SSL/TLS certificate, the Hypertext Transfer Protocol Secure
(HTTPS) is used to encrypt the network traffic from the website.
Figure 3.2
Screenshot of SSL/TLS certificate: Showing the SSL/TLS certificate
on www.google.com.
HTML5
A VPN connection can be of two types. The first one is that you use
a client application that is installed on your system. The second
type is the clientless connection, which is done through HTML 5
VPN portal. You need to access the HTML 5 VPN portal address
through a web browser and authenticate using a username and
password.
After you log on to the HTML 5 VPN portal, you can access the
internal network resources.
Layer 2 Tunneling Protocol (L2TP)
Learning Outcomes
After completing this exercise, you should have further knowledge
of:
Your Devices
You will be using the following devices in this lab. Please power
these on now.
Figure 4.1
Screenshot of DHCP Snooping Feature: Showing the DHCP
Snooping Feature on a software managing switch.
Step 1
Ensure that all the required devices are powered on. Connect
to PLABWIN10.
Step 2
The Intranet page is displayed. Type the following URL in the
address bar:
http://ui.linksys.com/WRT320N/1.0.00/index.htm
Press Enter.
Figure 4.3 Screenshot of PLABWIN10: Typing the URL in the
Microsoft Edge address bar.
Step 3
The Linksys Webpage is displayed. Click the Wireless tab.
Figure 4.4 Screenshot of PLABWIN10: Clicking the Wireless tab.
Step 4
Click the Wireless MAC Filter tab.
Figure 4.5 Screenshot of PLABWIN10: Clicking the Wireless MAC
Filter tab.
Step 5
The Windows MAC Filter tab is displayed. Click Enabled and
then ensure Prevent PCs listed below from accessing the
wireless network is selected.
Figure 4.6 Screenshot of PLABWIN10: Clicking Enabled and then
ensuring Prevent PCs listed below from accessing the wireless
network is selected.
Step 6
Either you can add the MAC addresses manually or use the
Wireless Client List and add a client.
Step 7
The Wireless Client List window is displayed. Select the only
listed client and then select Save to MAC Address Filter List.
Click Add.
Figure 4.8 Screenshot of PLABWIN10: Select the only listed client
and then select Save to MAC Address Filter List. Clicking Add.
Step 8
Click Close.
Figure 4.9 Screenshot of PLABWIN10: Clicking Close.
Step 9
Click Save Settings.
address does not get added to the list. However, in the real
add a MAC address to the list for MAC filtering. You will likely
Leave all devices in their current state and proceed to the next
exercise.
Learning Outcomes
After completing this exercise, you should have further knowledge
of:
Jump Servers
Proxy Servers
Network-based Intrusion Detection System (NIDS)/Network-
Based Intrusion Prevention System (NIPS)
Hardware Security Module (HSM)
Firewalls
Route Security
Quality of Service (QoS)
Implications of IPv6
Port Spanning/Port Mirroring
Monitoring Services
File Integrity Monitors
DNS
Network Access Control (NAC)
Out-of-band Management
Your Devices
You will be using the following device in this lab. Please power this
on now.
Proxy Servers
Signature-based
Signature-based IDS or IPS strictly work with the signatures, which
must be updated regularly. Each signature has a specific pattern,
which identifies a particular threat. If any pattern is found in the
signatures, then it is considered to be a threat. IDS or IPS works
similarly to an antivirus, which is also dependent on malicious
software signatures. If these signatures are not regularly updated,
new malicious threats might not be detected while monitoring the
network traffic with IDS and IPS utilities.
Behavior-based
Behavior-based IDS or IPS continue to monitor the behavior of the
processes and programs. If there is a change in the behavior of any
process or program, an alert is generated.
Heuristic-based
Heuristic-based IDS or IPS uses an algorithm to scan applications,
network traffic, and programs. Based on the algorithm, it can
determine whether something, such as traffic, is malicious or not. It
actively monitors the programs and network traffic to determine if
it is malicious or not.
Anomaly-based
Anomaly-based IDS can detect any traffic that is new or unusual. It
can also help in detecting any potential network hardware exploits.
Once installed, it needs to gather network traffic information to
create a baseline of the traffic. Once the baseline is developed, any
deviation from it will raise an alarm. It is important to note that
network traffic patterns may vary from time to time. For example,
the addition of a new web application server. If baselines are not
updated after any new additions, a high number of false positives
may be generated.
AES
RSA
SHA-1
Triple DES
Diffie-Hellman Key Exchange
Let’s take the example of a Web server that you have. The Web
server is configured to run a website with a certificate. You notice
that after the certificate configuration, the webserver has slowed
down. You want the webserver to give good performance while
using the certificate, and at the same time, you also want to protect
its private key.
HSM Functions
HSM can perform various functions, such as:
Types of HSM
There are typically three types of HSM:
Sensors
There are a variety of tasks that can be performed with the network
traffic. Various components help you achieve these tasks. For
example, a sensor helps you monitor the traffic. However, its
location for placement is critical for monitoring the traffic. For
example, a sensor can be placed in a manner that would be able to
monitor only one system’s traffic. Sensors are typically used with
the NIDS and NIPS.
Collectors
Collectors are responsible for collecting data from the sensors. The
collectors would typically be used with the Security information and
event management (SIEM) systems. The collectors are responsible
for collecting and bringing in the information to a SIEM.
Aggregators
Aggregators are responsible for putting the data into a common
repository. They are typically used with SIEM, where the
information from various network devices and servers is collated.
They aggregate the events to find the correlation between them.
Firewalls
There are several different types of firewalls. Some of the key ones
are:
There are several products out in the market that have most of
these features. Some NGFW may also have a reverse proxy, URL
filtering, and IDS/IPS built-in. An example of NGFW is Untangle.
Stateful
A stateful firewall has the capability of inspecting the packets,
whether they are fragmented or not. It can also block unauthorized
traffic from entering the network. It also allows access only to
specific ports with the respective protocols. A stateful firewall uses
the active sessions to perform packet inspection.
Stateless
Stateless firewalls are ACL-based, which watch for the network to
act on the source or destination addresses. They make packet
filtering decisions based on the packet headers. A stateless firewall
cannot inspect the traffic patterns.
Firewall
Anti-spam
Content filtering
Data Loss Prevention (DLP)
Malware scanner
Content/URL Filter
A content filter is used to prevent user access to certain
applications, such as executables. In addition to firewalls and
antivirus, content filtering devices, IPS, and sandboxing are
examples of active security appliances.
URL filters will restrict access to certain sites when using a proxy
server. URL filtering allows or denies access to specific Website
URLs that are contained within a defined list. Using a URL filter can
block sites based on the type of content.
Cisco ASA
WatchGuard
Fortinet FortiGate
SonicWall TZ
PFSense
ClearOSFirewall
Endian Firewall Community (EFC)
IPFire
NetDeep Secure
Untangle
Glasswire
Route Security
These are only some of the methods that can be used. Other
methods, such as Peer Prefix Filtering, Prefix List, Distribute List,
and Maximum Prefix Filtering methods, can also be used.
When QoS is in place, voice and video traffic are given high priority
over data traffic, which uses the TCP protocol. Unlike UDP, the TCP
protocol can retransmit the lost packets and assemble the packets
in the correct order to reassemble the data files. Therefore, QoS is
an essential need for UDP-based traffic.
Implications of IPv6
It is a known fact that the IPv4 addresses are running out. Hence, a
new upgraded version known as IPv6 was released. IPv6 has a
much larger addressing space, which offers trillions of IP
addresses. Despite several other benefits, there are some
implications of IPv6. Some of the key implications are:
Port Taps
Alternate to port mirroring, you can also use a special device for
mirroring data. It is a passive device that is placed on the network
to capture the data from a specific port. Port taps are easy to
install, and once installed, you do not need to do anything. It
mirrors the received and sent traffic in real-time.
Monitoring Services
Each operating system has several types of files. It can have DLL,
executable, logs, text, and other system files that are required for
the operating system to function. Similar to the operating system,
various applications also have such files that the applications use.
All these files are considered configuration files, which must remain
intact for the operating system and applications to run.
Per-user basis
Per group basis
Using an effective right mask
For users other than the ones in the group for a file
In this task, you will learn to implement the access control list. To
do this, perform the following steps:
Step 1
Connect to PLABKALI. In the Enter your username text box, type
the following:
root
Passw0rd
Click Log In or press Enter.
Figure 5.5 Screenshot of PLABKALI: Entering the user credentials
and then pressing Enter.
Step 2
The terminal window will be open.
You first need to check if the kernel supports ACL. Type the
following command:
Step 3
Clear the screen by entering the following command:
clear
You will apply the ACL to a partition. Let’s first check the partition
that has been mounted. Type the following command:
df -h
Press Enter.
Step 4
Clear the screen by entering the following command:
clear
touch /plab.txt
Press Enter.
Step 5
You need to verify the permissions on the /plab.txt file. Type the
following command:
ls -l /plab.txt
Press Enter.
The permissions for /plab.txt are now displayed. Notice that other
users will be able to read the file.
Step 6
You need to ensure that no one has read, write, and execute
permissions for the /plab.txt file other than the root user. Type the
following command:
Press Enter.
Step 7
You need to verify the permissions for this file again. Type the
following command:
ls -l /plab.txt
Press Enter.
The permissions for /plab.txt are now displayed. Notice that other
users do not have permissions for this file.
Step 8
Clear the screen by entering the following command:
clear
getfacl /plab.txt
Press Enter.
Step 9
Clear the screen by entering the following command:
clear
Step 10
You can now verify the permissions on the /plab.txt file. Type the
following command:
getfacl /plab.txt
Press Enter.
Step 11
Clear the screen by entering the following command:
clear
You can also verify the permissions with the ls command. Type the
following command:
ls -l /plab.txt
Press Enter.
Step 12
Clear the screen by entering the following command:
clear
After assigning ACLs, you can remove ACLs if required.
The setfacl command with the -b parameter removes all applied
ACLs from a specific file or directory. Type the following command:
setfacl -b /plab.txt
Press Enter.
Step 13
To verify the permissions on the /plab.txt file, type the following
command:
getfacl /plab.txt
Press Enter.
Notice that no ACL is assigned. The file has the permissions that
you had earlier defined for the root user.
DNS
You can secure the DNS server by adding a set of extensions,
known as DNSSec, ensuring that the DNS information is not altered
during transmission.
You can also use a dissolvable agent that runs once on the system
and then, based on the NAC policies, allows or denies access to the
user system. After that, the agent is removed from the system.
Out-of-band Management
Keep all devices that you have powered on in their current state
Review
Well done, you have completed the Implementing Secure
Network Solutions Practice Lab.
Summary
You completed the following exercises:
Feedback
Shutdown all virtual machines used in this lab. Alternatively, you