1.07k likes | 1.47k Views
Securing an Extranet. Identifying Common Firewall Strategies Securing Internet-Accessible Resources in a Demilitarized Zone (DMZ) Securing Data Flow Through a DMZ. Identifying Common Firewall Strategies. Identifying firewall features to protect the extranet Comparing DMZ configurations.
E N D
Securing an Extranet • Identifying Common Firewall Strategies • Securing Internet-Accessible Resources in a Demilitarized Zone (DMZ) • Securing Data Flow Through a DMZ
Identifying Common Firewall Strategies • Identifying firewall features to protect the extranet • Comparing DMZ configurations
Firewall Services • Network Address Translation (NAT) • Packet filtering • Static address mapping • Stateful inspection of network traffic • Advanced features
Private Network Addressing • RFC 1918 reserves three ranges of IP addresses for private network addressing: • 10.0.0.0 – 10.255.255.255 (10.0.0.0/8) • 172.16.0.0 – 172.31.255.255 (172.16.0.0/12) • 192.168.0.0 – 192.168.255.255 (192.168.0.0/16)
Typical Packet Filter Fields • Source address • Source port • Destination address • Destination port • Protocol • Action
Port Numbers • To determine what ports are used by specific services and applications, view the Services text file in the systemroot\system32\drivers\etc folder. • To view a listing of well-known port numbers, go to www.isi.edu/in-notes/iana/assignments /port-numbers.
Firewall Strategies • Choose one of the following typical firewall strategies, based on the organization's risk level. • Specify allowed protocols and prohibit everything else. • Specify prohibited protocols and allow everything else. • Higher security networks specify the allowed protocols and prohibit everything else.
Stateful Inspection • Simple packet filters might not provide enough security. • Packet filters define which ports are left open at the firewall to redirect network traffic to Internet-accessible resources. • Many protocols use random ports above port 1024 at the client computer side. • Stateful inspection allows the firewall to inspect and open the ports used for an initial connection and then close them when the connection is terminated. • If any suspect ports are requested, the firewall can recognize the attack and drop the connection. • Stateful inspection allows firewall rules to be established so that User Datagram Protocol (UDP)-based protocols (such as SNMP) can pass through successfully.
Advanced Techniques • Configuring time-out tolerance • Allows the firewall to disconnect sessions before the synchronize (SYN) queue overflows • Impedes SYN flood attacks, which attempt to lock up the firewall and prevent further connections by flooding it with incomplete Transmission Control Protocol (TCP) sessions • Content scanning • Allows the firewall to inspect the commands transmitted within a session • Can also scan all incoming content for known virus signatures
Making the Decision: Designing Firewall Features • NAT • Packet filters • Static address mapping • Stateful inspection • Time-out tolerances • Content scanning
Applying the Decision: Designing the Market Florists Firewall • NAT • The private network client computers require access to the Internet. • All outgoing IP addresses will be replaced with the NAT common address (client.marketflorist.tld IP address: 131.107.88.2). • Packet filters • Packet filtering must be defined to allow only the authorized protocols to connect to each network resource. • Several protocols are allowed to enter the extranet for each Market Florist server.
Applying the Decision: Designing the Market Florists Firewall (Cont.) • Static address mapping • www.marketflorist.tld • ftp.marketflorist.tld • mail.marketflorist.tld • vpn.marketflorist.tld • Stateful inspection • Flower Power uses UDP as its transport protocol. • UDP-based applications do not establish sessions. • Stateful inspection ensures that the Flower Power connections are not hijacked. • Stateful inspection ensures that all response packets use the same IP addresses and UDP ports that were used by the initial request packets.
Applying the Decision: Designing the Market Florists Firewall (Cont.) • Time-out tolerance • Time-outs disconnect sessions to protect the Web site and other extranet resources from a denial of service attack. • Time-out tolerance prevents SYN flooding attacks against the network. • Content scanning • To prevent uploads of data to the MFFTP server, the firewall should deploy content scanning and prevent all attempts to use the FTP PUT command. • This provides greater protection by scanning the File Transfer Protocol (FTP) transmissions for disallowed commands.
Comparing DMZ Configurations • It is unadvisable to host Internet-accessible resources within the private network. • Place all Internet-accessible resources in a network segment (called a DMZ) between the private network and the public network. • Other terms for DMZ are screened subnet and perimeter network. • There are three types of DMZ designs: three-pronged firewall, mid-ground, and hybrid (or multizone). • A DMZ is part of the public and private network.
Making the Decision:Choosing Among DMZ Strategies • Three-pronged firewall DMZ • Mid-ground DMZ • Hybrid DMZ
Applying the Decision: Developing a DMZ Strategy for Market Florist
Securing Internet-Accessible Resources in a DMZ • Securing Internet Information Server (IIS) • Securing other services within the DMZ
Securing Internet Information Server (IIS) • The content on a Web server is the most common network resource exposed to the Internet. • IIS 5.0, included with Microsoft Windows 2000 Server, allows an organization to host Web sites. • Additional configuration is required to fully secure an IIS server when it is exposed to the Internet.
Preventing Attacks Against the Web Servers • Change all default account names. • Ensure that the Web server is not a member of the same forest as the private network.
Preventing Attacks Against the Web Servers (Cont.) • Separate content into different folders by type.
Preventing Attacks Against the Web Servers (Cont.) • Secure available content by type.
Preventing Attacks Against the Web Servers (Cont.) • Remove all sample applications from the Web server.
Preventing Attacks Against the Web Servers (Cont.) • Disable unnecessary services. • Block commonly attacked ports with Internet Protocol Security (IPSec). • Enable IIS logging. • Implement Secure Socket Layer (SSL) to protect secure areas of the Web server. • Deploy an intrusion detection system. • Disable the use of parent paths. • Apply the IIS 5.0 security checklist. • Mitigate against successful attacks. • Maintain the latest service packs and hot fixes for the Web server.
Making the Decision: Securing a Web Server • Track all access to the Web server. • Provide the strongest security to Web-accessible data. • Prevent an attacker from accessing unauthorized areas of the disk subsystem. • Prevent port scans against commonly attacked ports. • Detect hacking attempts. • Prevent a successful attack against the Web server from compromising other data stored on the network. • Ensure that the latest security fixes are applied to the Web server. • Limit the effect of a successful hacking attempt. • Apply the recommended security configuration for the Web server.
Applying the Decision: Configuring the Web Server for Market Florist • Configure the Web server as a Network Load Balancing Service (NLBS) cluster. • Configure the NLBS cluster to load balance equally among the four nodes. • Apply any additional security configurations uniformly against all four servers.
Applying the Decision: Configuring the Web Server for Market Florist (Cont.) • Configuration for the four Web servers • Enable auditing on each Web server. • Separate the content from the rest of the Web site. • Implement SSL on the Web server. • Apply Internet Protocol Security (IPSec) to restrict public network access to the Web server. • Apply the IIS 5.0 security checklist recommendations to the IIS servers.
Applying the Decision: Configuring the Web Server for Market Florist (Cont.) • Recommended IPSec filters
Securing Other Services Within the DMZ • FTP services • Telnet services • Domain Name System (DNS) services • Terminal Services • All services
Making the Decision: Protecting Internet-Accessible Resources • Protect the following resources: • FTP services • Telnet services • DNS services • All services • Interaction between servers
Applying the Decision: Protecting Internet-Accessible Resources at Market Florist • Implement the following resources: • FTP service • DNS service • Telnet services • Terminal Services • Interaction between servers
Securing Data Flow Through a DMZ • Determining a firewall strategy • Securing DNS resolution traffic • Securing Web traffic • Securing FTP traffic • Securing mail traffic • Securing application traffic • Securing Terminal server traffic • Securing VPN traffic
Specify Allowed Protocols and Prohibit Everything Else • The packet filters identify all protocols that can pass through the firewall. • If the packet filter does not identify a packet, the packet is assumed to be disallowed and is dropped. • This strategy is typically used at external firewalls to define which protocols are allowed to enter the DMZ and the private network. • This strategy is also used in high-security networks where only authorized protocols are allowed to enter the DMZ and the private network.
Specify Prohibited Protocols and Allow Everything Else • The packet filters identify all protocols that must be dropped at the firewall. • If the packet filter does not identify a packet, the packet is allowed to pass through the firewall. • This strategy is typically used at internal firewalls to block private network users from specific protocols. • This strategy is also used in lower security networks where only unauthorized protocols are blocked at the firewall.
Order of the Packet Filters • The order of processing depends on the specific firewall product. • Two common methods for processing packet filters: • Process the packet filters in the order in which they are entered. • Process the most specific packet filters before the more general packet filters.
Making the Decision: Choosing Firewall Strategies • The "Specify allowed protocols and prohibit everything else" strategy • The "Specify prohibited protocols and allow everything else" strategy • The "Specify allowed protocols and prohibit everything else” strategy and then create packet filters that deny specific protocols
Applying the Decision: Choosing a Firewall Strategy for Market Florist • The "Specify allowed protocols and prohibit everything else" strategy best meets the security needs of the Market Florist network. • It allows Market Florist to define only authorized protocols that can enter the DMZ and the private network. • If a protocol is not included in the packet filter list, the protocol is assumed to be denied access to the DMZ or private network.
Securing DNS Resolution Traffic • The DNS service is used as a locator service in a Microsoft Windows 2000 network. • DNS is also used as the locator service for the Internet. • When designing security for the DNS service, define how DNS traffic moves through the private network and the DMZ to the Internet. • Separate the internal DNS service from the external DNS service.