290 likes | 298 Views
Experiences in Deploying Machines Registration and Integrated Linux Firewall with Traffic Shaper for Large Campus Network. Kasom Koth- a rsa 1 , Surasak Sanguanpong 2 , Pirawat Watanpongse 2 , Surachai Chitpinityon 3 , Chalermpol Chatampan 3
E N D
Experiences in Deploying Machines Registration and Integrated Linux Firewall with Traffic Shaper for Large Campus Network Kasom Koth-arsa1, Surasak Sanguanpong2, Pirawat Watanpongse2,Surachai Chitpinityon3 , Chalermpol Chatampan3 {Kasom.K, Surasak.S, Pirawat.W, Surachai.Ch, cpccpc}@ku.ac.th 1Engineering Computer Center, Faculty of Engineering 2Department of Computer Engineering, Faculty of Engineering 3Office of Computer Services Kasetsart University APAN, Xi’an, Network Security, 29th August 2007 This work is partially supported by Commission of Higher Education (CHE), UniNET, Thailand
Kasetsart University • Established in 1943 A.D. • 7 campuses with ~43,000 students, ~9600 academic and supported staffs
Internet JGN TIEN2 45 Mbps 630 Mbps 155 Mbps 10 GigE ThaiSARN UniNet Bangkhen 1 Gbps 1 Gbps 1 Gbps (backup) 2 Mbps 34 Mbps 10 GigE 34 Mbps 34 Mbps SakonNakhon Supan Buri SriRacha Kampaengsaen NontriNet Quick Facts • University Network - NontriNet • 41,992 MAC addresses (As of 2007/08/28) • 8,852 Clients (Personal, Wired) • 3,269 Clients (Service, Wired) • 29,342 Clients (Wireless) • 495 Servers • 34 misc. devices • Avg. In/out Traffic • 550/490 Mbps
Obstacles & Opportunities • Large number of hosts • Hard to keep track • Non-productive bandwidth usage • P2P file sharing • QoS issues • Security issues
Special Requirements • Fully-integrated information database • Low cost • Customizable • Extensible • Scalable
Our Designed Features • Web-based Machines Registration • Linux Firewall & Traffic Shaper extension
SMART(Simple Machine Address Registration Tool) • Mandatory Web-based Machines Registration • Registration Enforcement Agent: The Overlord • Centralized Database: Command Center • Distributed Data Entry: the Interface
Target Subnetwork SMART: Architecture Diagram Statistics Detection Rules Policies Overlord Command-Center Observer Detected Incident Sniffed Packets Sniffed Packets Injected Packets (TCP hijacking)
Command Center Command-Center Database Manager MAC Policy Detection Rules Administrators Overlords, Observers Network Anomaly Web Interface Users Users Logs Policies Overlord Statistics Documents Communicator Statistics Detection Rules Observer Detected Incident
Target Subnetwork Overlord (TCP Hijack) Overlord Command Center Communicator Policies Statistics Table of MACs’ Policy + Statistics Policy Checker Sniffed Packets Packet Sniffer Packet Injector Injected Packets (TCP hijacking)
Target Subnetwork Observer Observer Command Center Communicator Detection Rules Detected Incident Table of Detection Rules Pattern Matcher Packet Sniffer Sniffed Packets
Linux Firewall & Traffic Shaper Extension • Intelligent Master Controller • User-friendly configuration interface • Automatic egress SYN-flood/P2P blocking • Per-host traffic shaping
Mechanism • Use Linux server as a bridge • Traffic classification through iptables • Traffic control through tc • Use IPP2P and our in-house daemon to identify P2P traffic • Use our in-house daemon to detect some problematic network pattern
Hardware • Dell Power Edge 2900 • Xeon 5160 Dual core(3.0GHz) • 1 GB of RAM • 160 GB SATA hard disk • 2 x SUN 10 Gigabit Ethernet Controller PCI Express Card (SR module)
Software • Linux 2.6.18-8.1.8.el5 (CentOS’s stocked kernel) on CentOS 5 (64 bit) • bridge-utils • ebtables • iptables • IPP2P • Our in-house developed daemon for automatically adjust the shaping/blocking policy.
Simplified Network Diagram Gigabit Ethernet Link Gateway Router (OSPF/BGP) Traffic Shaper/ Firewall (Bridge) Core Router (OSPF) UniNet 10 GigE 10 GigE Gigabit Ethernet Links NECTEC 10 GigE Gigabit Ethernet Link Bypass/failover path for IPv4, main connection for IPv6 and multicast IPv4.
How we shape the traffic • Use iptables’ ‘MARK’ target to mark the class of traffic for every packets • Hierarchical Token Bucket (HTB) as packet shaper • Stochastic Fairness Queuing (SFQ) as queuing algorithm
Traffic Classification • Port-based • Content based (L7) • using IPP2P through iptables • Automatically adjust iptables’ rules using our daemon
Sample Reports - Bandwidth Incoming Traffic Outgoing Traffic Stop Shaping Restart Shaping Turn off shaping during Friday morning to Monday morning
Sample Reports - Packet Incoming Traffic Outgoing Traffic Stop Shaping Restart Shaping Turn off shaping during Friday morning to Monday morning
Sample Reports - SYN Flood Blocking Bandwidth Real Outgoing Traffic Attempt Outgoing Traffic Packet A host infected with an Internet worm send a large amount of SYN packets at 9:19.
Sample Reports - Shaping by Classes Traffic shaping was turned off during 21:21 to 21:53.
Sample Reports - Shaping by Classes P2P allow in the night P2P Traffic allow in the night. No P2P allow
Misc. reports Detected hosts Last seen IP matrix Number of last seen hosts
Conclusions • Complete control of unregistered machines • Prevent unauthorized/unregistered net usage • Automatic co-operate between registration and firewall/traffic shaping • Complete control of P2P traffics under desired policy (class, usage period, bandwidth, etc.) • Prevent our machines from becoming a source of SYN-flood attack
Conclusions (cont.) • Free up NOC officer’s time • Real-world, low-cost, high-efficiency implementation (currently online)
References • The Official BitTorrent Home Page http://www.bittorrent.org/ • Kazaa http://www.kazaa.com/ • Netfilter/iptables project homepage http://www.netfilter.org/ • Official IPP2P homepage http://www.ipp2p.org/ • HTB home http://luxik.cdi.cz/~devik/qos/htb/ • SFQ queuing discipline http://www.opalsoft.net/qos/DS-25.htm