490 likes | 706 Views
Chapter 10. SECURING YOUR NETWORK PERIMETER. CHAPTER OBJECTIVES. Establish secure topologies. Secure network perimeters. Implement firewalls. SECURING YOUR NETWORK PERIMETER. Secure the network perimeter, not just individual components. Secure connections between components.
E N D
Chapter 10 SECURING YOUR NETWORK PERIMETER
Chapter 10: SECURING YOUR NETWORK PERIMETER CHAPTER OBJECTIVES • Establish secure topologies. • Secure network perimeters. • Implement firewalls.
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING YOUR NETWORK PERIMETER • Secure the network perimeter, not just individual components. • Secure connections between components. • Use security zones. • Manage network traffic between security zones. • The most important zone or boundary is the Internet. • Firewalls are boundary control devices.
Chapter 10: SECURING YOUR NETWORK PERIMETER ESTABLISHING SECURE TOPOLOGIES • Secure topology is a network design. • Group devices in security zones. • Segregate network traffic. • Control the information flow.
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURITY ZONES • Security zones group assets with similar security requirements. • They segregate mission critical systems. • Access control mechanisms define what access is allowed between zones. • Security zones reduce the attack surface of network resources. • Security zones focus your attention on possible threats and vulnerabilities.
Chapter 10: SECURING YOUR NETWORK PERIMETER VIRTUAL LOCAL AREA NETWORKS (VLANS) • Used to segment a network into smaller subnetworks • Used to create security zones • Are virtual subnets • Are created by using switches • Are supported by routers
Chapter 10: SECURING YOUR NETWORK PERIMETER VIRTUAL LOCAL AREA NETWORKS (VLANS) (CONT.) • Restrict broadcast traffic • Are flexible and scalable • Hide the physical configuration of network • Need secure and physically protected switches
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING NETWORK PERIMETERS • Establish boundaries between security zones. • Separate the private network from the Internet. • Define allowed traffic that can cross the perimeter. • Use routers and firewalls to control perimeter traffic. • Filter for malicious code. • Monitor for intrusion activities.
Chapter 10: SECURING YOUR NETWORK PERIMETER ESTABLISHING NETWORK SECURITY ZONES • Place firewalls between internal and external networks. • Use multiple firewalls if you need to create multiple layers of protection. • Put Internet-accessible resources in separate network segments. • The segment between firewalls is called a perimeter network, demilitarized zone (DMZ), or screened subnet
Chapter 10: SECURING YOUR NETWORK PERIMETER COMMON SECURITY ZONES • Intranet • Perimeter network • Extranet • Internet
Chapter 10: SECURING YOUR NETWORK PERIMETER CONFIGURATION OF SECURITY ZONES
Chapter 10: SECURING YOUR NETWORK PERIMETER INTRANET • Is the primary and most sensitive security zone of an organization • Is also known as an internal network, private network, or LAN • Contains all private internal resources • Is considered a trusted network • Is vulnerable to internal attackers
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING AN INTRANET • Deploy firewalls against all other networks. • Install and update antivirus solutions. • Audit and monitor online activity. • Secure systems hosting confidential data. • Manage the security of the physical infrastructure.
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING AN INTRANET (CONT.) • Check for unauthorized devices. • Restrict access to critical systems. • Control physical access. • Remove all unnecessary services from server systems.
Chapter 10: SECURING YOUR NETWORK PERIMETER PERIMETER NETWORK • Grant controlled access to public resources • Prevent external traffic from entering intranet • Are also called DMZs or screened subnets • Are used to provide a buffer between the private trusted network and the Internet or untrusted network segments
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING A PERIMETER NETWORK • Use firewalls to provide protection from external untrusted networks. • Remove all unnecessary services. • Audit all online activity. • Separate name resolution services. • Remove or restrict remote management services. • Carefully document and audit all physical and logical configurations. • Frequently back up data and configurations.
Chapter 10: SECURING YOUR NETWORK PERIMETER EXTRANET • Is used for partner access to controlled resources • Is used to share information between members of multiple organizations • Requires authenticated external connections • Is often directly accessible from the Internet • Might use virtual private networks (VPNs)
Chapter 10: SECURING YOUR NETWORK PERIMETER METHODS OF EXTRANET ACCESS
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING AN EXTRANET • Use firewalls to provide protection from the external network. • Authenticate all access. • Remove all unnecessary services. • Audit all network and service access.
Chapter 10: SECURING YOUR NETWORK PERIMETER PERIMETER NETWORK TYPES • Perimeter networks are established by means of firewalls. • Firewalls manage traffic across the boundaries of different security zones. • There are two common perimeter networks designs: • Three-pronged design • Back-to-back design
Chapter 10: SECURING YOUR NETWORK PERIMETER THREE-PRONGED PERIMETER NETWORK DESIGN • Uses a single firewall • Connects the Internet, an intranet, and a perimeter network • Can be a single point of failure
Chapter 10: SECURING YOUR NETWORK PERIMETER THREE-PRONGED PERIMETER NETWORK
Chapter 10: SECURING YOUR NETWORK PERIMETER BACK-TO-BACK PERIMETER NETWORK DESIGN • Uses two firewalls • Is also called buffer network or screened subnet • Has no single point of failure • Supports more restrictive security rules • Increases the security of the intranet • Provides defense-in-depth protection
Chapter 10: SECURING YOUR NETWORK PERIMETER BACK-TO-BACK PERIMETER NETWORK
Chapter 10: SECURING YOUR NETWORK PERIMETER USING AN N-TIER ARCHITECTURE • An n-tier architecture provides multiple tiers of security zones. • Each tier supports a portion of a business operation. • Traffic is controlled between each tier. • Compromise of one tier does not imply complete failure.
Chapter 10: SECURING YOUR NETWORK PERIMETER A 3-TIER NETWORK DESIGN
Chapter 10: SECURING YOUR NETWORK PERIMETER BASTION HOSTS • A bastion host is a single host that provides all externally accessible services. • A single firewall routes external traffic to the bastion host. • All access is tightly controlled and monitored. • This is the least secure network design.
Chapter 10: SECURING YOUR NETWORK PERIMETER A BASTION HOST DESIGN
Chapter 10: SECURING YOUR NETWORK PERIMETER NETWORK PERIMETER SECURITY AND TRAFFIC CONTROL • Block all traffic by default. • Define exceptions for authorized traffic. • Allow only required network traffic. • Don't trust all outgoing traffic by default. • Inspect blocked traffic and track down the source.
Chapter 10: SECURING YOUR NETWORK PERIMETER FIREWALL FUNCTIONS • Protect a network from malicious hackers and software • Block external threats • Filter inbound and outbound traffic • Separate private networks from the Internet • Separate subnets or individual systems
Chapter 10: SECURING YOUR NETWORK PERIMETER FIREWALL TYPES • Packet filtering • Application filtering • Circuit-level inspection • Stateful inspection • Content inspection • Proxy server functionality
Chapter 10: SECURING YOUR NETWORK PERIMETER USING PACKET FILTERING • A packet filtering firewall inspects the header of each packet. • The firewall forwards or drops each packet based on rules. • Packet filter rules focus on inbound or outbound packets. • Packet filter rules judge source or destination address, other header field content, or packet size. • Most firewalls and routers can perform packet filtering.
Chapter 10: SECURING YOUR NETWORK PERIMETER COMMON FILTER-FOCUSED HEADER FIELDS • Source IP Address • Destination IP Address • IP Protocol ID • Source TCP or UDP Port Number • Destination TCP or UDP Port Number
Chapter 10: SECURING YOUR NETWORK PERIMETER COMMON FILTER-FOCUSED HEADER FIELDS (CONT.) • Protocol and Port Numbers • ICMP Message Type • Fragmentation Flags • IP Options
Chapter 10: SECURING YOUR NETWORK PERIMETER A PACKET FILTERING FIREWALL
Chapter 10: SECURING YOUR NETWORK PERIMETER CIRCUIT-LEVEL INSPECTION • This type of inspection does not examine each packet. • Circuit-level inspection monitors connection establishment. • If a connection is allowed, no further restrictions are imposed. • Circuit-level inspection is more efficient than packet-filtering. • Many firewalls can perform circuit-level inspection.
Chapter 10: SECURING YOUR NETWORK PERIMETER STATEFUL INSPECTION • Combines features of packet-filtering and circuit-level firewalls • First, restricts connections only to authorized users • Second, inspects subsequent packets to restrict traffic based on context
Chapter 10: SECURING YOUR NETWORK PERIMETER APPLICATION LAYER FILTERING • Examines the content or payload of packets • Inspects packets based on the application used • Requires complex rules • Can detect a wide range of attacks and malicious code • Has slower performance than other methods
Chapter 10: SECURING YOUR NETWORK PERIMETER TUNNELING • Tunneling is a technique used to bypass a firewall’s inspection mechanisms. • Tunneling encapsulates network packets in allowed network traffic. • Encryption is a common tunneling option. • If content inspection is not possible, an intrusion detection system (IDS) might be needed.
Chapter 10: SECURING YOUR NETWORK PERIMETER PROXY SERVERS • Is a circuit-level or application layer operation • Accepts connections from clients • Establishes a distinct connection to external servers • Has no direct connection between client and server • Supports content checking and resource caching
Chapter 10: SECURING YOUR NETWORK PERIMETER A PROXY SERVER
Chapter 10: SECURING YOUR NETWORK PERIMETER NETWORK ADDRESS TRANSLATION (NAT) • Allows multiple internal clients to access the Internet over a few public leased addresses • Converts and manages traffic through translation of IP addresses and port numbers • Allows use of the private IP addresses (10.x.x.x, 172.16.x.x–172.31.x.x, and 192.168.x.x) • Hides the internal network structure and address scheme • Prevents external entities from directly accessing internal clients
Chapter 10: SECURING YOUR NETWORK PERIMETER NAT VARIATIONS • Static NAT • Dynamic NAT • Port address translation (PAT)
Chapter 10: SECURING YOUR NETWORK PERIMETER FIREWALL ISSUES • Misconfiguration is a common cause of firewall failure. • Avoid default-allow and a default-deny rules. • Manage the rule execution order. • Keep firewalls patched and updated.
Chapter 10: SECURING YOUR NETWORK PERIMETER FIREWALL VULNERABILITIES • Compromising the firewall management console or password • Circumventing the firewall • Physically tampering with the firewall • Creating outbound connections
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING FIREWALLS • Keep current on vendor-released information on your firewall. • Keep the firewall patched and updated. • Keep virus scanners updated. • Maintain physical access control. • Document the firewall configuration.
Chapter 10: SECURING YOUR NETWORK PERIMETER SECURING FIREWALLS (CONT.) • Restrict management access. • Use complex passwords. • Test the firewall's filters and rules. • Look for bypasses or circumventions of the firewall's security.
Chapter 10: SECURING YOUR NETWORK PERIMETER SUMMARY • Security zones divide parts of the network that have different security requirements. • VLANs are a method for dividing a single physical network into separate broadcast domains. • Typical security zones are intranets, extranets, perimeter networks, and the Internet. Firewalls are often used to control traffic between these security zones.
Chapter 10: SECURING YOUR NETWORK PERIMETER SUMMARY (CONT.) • The two most commonly used firewall topologies are the back-to-back design and the three-pronged design. A back-to-back design provides multiple layers of protection. The bastion host design provides the lowest level of security. • Firewalls differ in the features that they provide. Common features are packet filtering, circuit-level inspection, stateful inspection, application layer filtering, and proxy server functionality. • NAT allows multiple computers to communicate with the Internet by using a single routable IP address or a range of IP addresses. The main security benefit of NAT is that it hides hosts from the Internet.