Carol Sabbar and Jim Walsh Carthage College Towards a Better September: Controlling Residence Hall Computing.

Slides:



Advertisements
Similar presentations
Use of Simplex Satellite Configurations to support Internet Traffic Geoff Huston Telstra Internet March 1998.
Advertisements

Student Guide Access List.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v Ethernet LANs Maximizing the Benefits of Switching.
Access Control Lists. Types Standard Extended Standard ACLs Use only the packets source address for comparison 1-99.
Access Control List (ACL)
Developing an Effective & Affordable Security Infrastructure in a Small College Environment.
What is access control list (ACL)?
© 2003, Cisco Systems, Inc. All rights reserved..
Configuring and Troubleshooting ACLs
Mitigating Layer 2 Attacks
Bilge Akdağ & M.Mert Kişman WELCOME TO OUR PRESENTATION.
Configuring Transparent Bridging and Integrated Routing and Bridging
Basic IP Traffic Management with Access Lists
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Starting a Switch.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5-1 Establishing Serial Point-To-Point Connections Configuring Serial Point-To-Point Encapsulation.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—6-1 Establishing Serial Point-To-Point Connections Configuring Frame Relay.
The Latest In Denial Of Service Attacks: “Smurfing” Description and Information to Minimize Effects Craig A. Huegen Cisco Systems, Inc. NANOG 11 Interprovider.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
NetPass and Northwestern By Julian Y. Koh As told by Robert Vance NUIT-Telecom & Network Services.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Poor Man’s Firewall A firewall that can be setup and implemented with a minimum amount of time and money.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Troubleshooting Switch Issues.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
1 Semester 2 Module 11 Access Control Lists (ACLs) Yuda college of business James Chen
Advance Configuration IOS Commands. Overview of Router Modes Router(config)# Router>enable Router#config term Exit Ctrl-Z (end) User EXEC Mode Privileged.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
Chapter 4 Queuing, Datagrams, and Addressing
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Configuring a Catalyst Switch.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 WAN Connections Configuring Serial Encapsulation.
LAN vs WAN Local Area Network Examples: Wide Area Networks Examples:
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
M. Menelaou CCNA2 Module 9. M. Menelaou One of the primary functions of a router is to determine the best path to a given destination. A router learns.
Virtual Local Area Networks. Should I V-LAN? 1. Security V-LANs can restrict access to network resources.
Network Certification Preparation. Module - 5 Basic troubleshooting of IP addressing issues Basic troubleshooting of RIP and IGRP Basic troubleshooting.
© 1999, Cisco Systems, Inc Chapter 12 Establishing Serial Point-to-Point Connections.
Introduction to Cisco Routers and Switches Willis Kim 8 October 2005.
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
© 2002, Cisco Systems, Inc. All rights reserved..
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
1 What Are Access Lists? –Standard –Checks Source address –Generally permits or denies entire protocol suite –Extended –Checks Source and Destination address.
VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Configuring a Cisco Router.
Router Basics Chapter 6 Connecting People To Information.
NetPro-ITI Ethernet LANs. Microsegmentation Microsegmentation of the Network.
BNL PDN Enhancements. Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security.
Point to Point Protocol Open Standard Protocol (works with same and different company Routers i.e. Cisco– Nortel, Cisco–Multicom. Supports Authentication.
Xbox Wireless Errors & Troubleshooting. Network: Failed Internet: Failed Xbox LIVE: Failed NAT: Connection Warning.
Lab 12 – Cisco Firewall.
Youngstown State University Cisco Regional Academy
© 2002, Cisco Systems, Inc. All rights reserved.
Instructor Materials Chapter 7: Access Control Lists
CCNA 2 v3.1 Module 9 Basic Router Troubleshooting
© 2002, Cisco Systems, Inc. All rights reserved.
Managing IP Traffic with ACLs
Maximizing the Benefits of Switching
2018 Valid Cisco Exam Dumps IT-Dumps
Starting a Switch Ethernet LANs.
Configuring a Cisco Router
Access Control Lists CCNA 2 v3 – Module 11
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
5 – Switch Configuration
Use of Simplex Satellite Configurations to support Internet Traffic
© 2002, Cisco Systems, Inc. All rights reserved.
ACCESS CONTROL LIST Slides Prepared By Adeel Ahmed,
ITIS 6167/8167: Network and Information Security
Presentation transcript:

Carol Sabbar and Jim Walsh Carthage College Towards a Better September: Controlling Residence Hall Computing

Surviving September? Can it really get better? Do we have any control at all? Who we are: Lowly IT people from a liberal arts college with a pretty limited budget and about 1,200 resident students whose computers are all infected…

Fall 2003 – Blaster! What happened? Blaster and Welchia infected nearly every student computer on campus DoS attacks shut down the core switch We shut down whole residence halls to protect the core We thought that students could help themselves… or not… We turned off ports for hundreds of rooms We cleaned and patched hundreds of student computers

We survived but… We resolved to never let that happen again We had to figure out something Identify what happened and why Figure out how to prevent it Figure out what we could afford

Determining the Causes Vlan110 is up, line protocol is up Hardware is Cat5k Virtual Ethernet, address is c6d.d800 (bia c6d.d800) Description: Hedberg User VLAN Internet address is /16 MTU 1500 bytes, BW Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:00, output 00:00:00, output hang never Last clearing of "show interface" counters 2d00h Input queue: 1/75/1139/55 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue :0/40 (size/max) 5 minute input rate bits/sec, 37 packets/sec 5 minute output rate bits/sec, 25 packets/sec packets input, bytes, 0 no buffer Received broadcasts, 0 runts, 0 giants, 170 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored packets output, bytes, 0 underruns 0 output errors, 0 interface resets 0 output buffer failures, 0 output buffers swapped out

Identifying the Culprits Seeing the traffic Understanding how worms work Finding infected computers –How many are patched –How many have anti-virus The patch is not the fix, and anti-virus won’t clean these Finding the secondary problems: –Spyware –Peer-to-peer

Looking forward to 2004 Containing outbreaks –Can we isolate them to a building? –To a room? Preventing infections –Can we mandate patches? –SP2: good or bad? –Can we mandate anti-virus? Chasing down infected machines faster and easier –Can we identify infected machines?

What we couldn’t do… Some proven solutions just wouldn’t work for us. These included: Perfigo or Bradford software – too expensive Anything requiring an agent on a student computer – too many installations to do A Packeteer for ResNet users only – too expensive Broadcast storm control – anomaly related to our wiring plant in res halls

Isolating Outbreaks Subnets –Already in place but only the base ACLs (details on next screen) –Isolation to the building –Moving them out to the edge switches –Required new hardware –Required outside expertise Storm control on ports –Problematic in our environment –Maybe fall 2005

ACLs on Cisco Switches Extended IP access list 180 deny icmp any any (92 matches) deny udp any any eq tftp deny udp any any eq 135 deny tcp any any eq 135 deny udp any any eq netbios-ss deny tcp any any eq 139 deny tcp any any eq 445 deny udp any any eq 445 deny tcp any any eq 4444 permit ip host deny ip any (1410 matches) permit ip any any ( matches)

Preventing infections – Part 1 Distribution of Symantec anti-virus in summer 2004 –Changing our Symantec licensing to make it “free” –Mailing out the CDs, “Update before you get here!” –Handing them out at check-in –We do not yet check for its existence before network access

Preventing infections – Part 2 Patching –Is SP2 really recommended? –In November, we decided “yes” –Working on PatchLink for on-campus computers, but requires agent for student computers –We do not yet require any specific patches for network access

NetReg – a Tool for the Hunt Required registration in fall 2004 Decreases identifying infected machines by several steps Turned off rooms posted on our web site Need to have someone well-versed in Linux to set it up

Fall 2004 – Any Better? No dorms totally shut down in Sept We cleaned less than 20 computers in September and October Infections seldom traveled from building to building Infected machines were identified and ports unplugged the same day A different story in November… started in an administrative building with no ACLs

New Problems With the elimination of the bulk of virus-related outages, we experienced other problems: Rogue wireless/wired routers More spyware Issues with Windows settings like “connection bridging” and 802.1x Some education issues related to NetReg

Looking forward to fall 2005 Do all the same as last year Increase functionality of NetReg? Use a product like Cisco Network Access Control? Deploy more switches that can discard DHCP response packets Deploy our own wireless in res halls We’re open for suggestions…