1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 8 City College.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

AP STUDY SESSION 2.
© 2004, Cisco Systems, Inc. All rights reserved.
1
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Packet filtering using cisco access listsINET97 / track 2 # 1 packet filters using cisco access lists Fri 19 June 97.
1 Hyades Command Routing Message flow and data translation.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
Timing: This chapter takes about 2 hours to cover.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Student Guide Access List.
Break Time Remaining 10:00.
Turing Machines.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
PP Test Review Sections 6-1 to 6-6
Any Questions?.
Access Control Lists. Types Standard Extended Standard ACLs Use only the packets source address for comparison 1-99.
Access Control List (ACL)
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
CCENT Study Guide Chapter 12 Security.
What is access control list (ACL)?
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Configuring and Troubleshooting ACLs
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
DMZ (De-Militarized Zone)
Route Optimisation RD-CSY3021.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Essential Cell Biology
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
PSSA Preparation.
Physics for Scientists & Engineers, 3rd Edition
Select a time to count down from the clock above
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Chapter 9: Access Control Lists
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
Cisco IOS Firewall ( CBAC-Context Based Access Control)
NESCOT CATC1 Access Control Lists CCNA 2 v3 – Module 11.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
1 Semester 2 Module 11 Access Control Lists (ACLs) Yuda college of business James Chen
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 Classic IOS Firewall using CBACs.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Access Control List ACL. Access Control List ACL.
Access Control Lists (ACLs)
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Cisco IOS Firewall Context-Based Access Control Configuration
Managing IP Traffic with ACLs
Chapter 4: Access Control Lists (ACLs)
Access Control Lists CCNA 2 v3 – Module 11
Presentation transcript:

1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 8 City College of San Francisco Spring 2007

2 © 2005 Cisco Systems, Inc. All rights reserved. Network Security 1 Module 8 – Configure Filtering on a Router

3 © 2005 Cisco Systems, Inc. All rights reserved. Learning Objectives 8.1 Filtering Technologies 8.2 Cisco IOS Firewall Context-Based Access Control 8.3 Configure Cisco IOS Firewall Context-Based Access Control

4 © 2005 Cisco Systems, Inc. All rights reserved. Module 8 – Configure Filtering on a Router 8.2 Cisco IOS Firewall Context-Based Access Control

5 © 2005 Cisco Systems, Inc. All rights reserved. Cisco IOS Firewall CBAC –Packets are inspected upon entering the firewall by CBAC if they are not specifically denied by an ACL. –CBAC permits or denies specified TCP and UDP traffic through a firewall. –A state table is maintained with session information. –ACLs are dynamically created or deleted. TCP UDP Internet

6 © 2005 Cisco Systems, Inc. All rights reserved. Cisco IOS ACLs Provide traffic filtering by: –Source and destination IP addresses –Source and destination ports Can be used to implement a filtering firewall –Ports are opened permanently to allow traffic, creating a security vulnerability. –Do not work with applications that negotiate ports dynamically.

7 © 2005 Cisco Systems, Inc. All rights reserved. How CBAC Works

8 © 2005 Cisco Systems, Inc. All rights reserved. How CBAC Works (Cont)

9 © 2005 Cisco Systems, Inc. All rights reserved. CBAC Supported Protocols –TCP (single channel) –UDP (single channel) –RPC –FTP –TFTP –UNIX R-commands (such as rlogin, rexec, and rsh) –SMTP –HTTP (Java blocking) –Java –SQL*Net –RTSP (such as RealNetworks) –H.323 (such as NetMeeting, ProShare, CUSeeMe) –Other multimedia Microsoft NetShow StreamWorks VDOLive

10 © 2005 Cisco Systems, Inc. All rights reserved. Alerts and Audit Trails CBAC generates real-time alerts and audit trails. Audit trail features use Syslog to track all network transactions. With CBAC inspection rules, you can configure alerts and audit trail information on a per- application protocol basis.

11 © 2005 Cisco Systems, Inc. All rights reserved. Access Control List (ACL) Review

12 © 2005 Cisco Systems, Inc. All rights reserved. Identifying Access Lists Access list number (All IOS versions)The number of the access list determines what protocol it is filtering: –(1-99) and ( )Standard IP access lists. –( ) and ( )Extended IP access lists. –( )Standard IPX access lists. Access list name (IOS versions > 11.2)You provide the name of the access list: –Names contain alphanumeric characters. –Names cannot contain spaces or punctuation and must begin with a alphabetic character. Cisco routers can identify access lists using two methods:

13 © 2005 Cisco Systems, Inc. All rights reserved. Basic Types of IP Access Lists StandardFilter IP packets based on the source address only. ExtendedFilter IP packets based on several attributes, including: –Protocol type. –Source and destination IP addresses. –Source and destination TCP/UDP ports. –ICMP and IGMP message types. Cisco routers support two basic types of IP access lists:

14 © 2005 Cisco Systems, Inc. All rights reserved. Standard Numbered Access List Format Austin2(config)# access-list 2 permit Austin2(config)# access-list 2 deny Austin2(config)# access-list 2 permit Austin2(config)# interface e0/1 Austin2(config-if)# ip access-group 2 in Router(config)# access-list access-list-number {deny | permit} source [source-wildcard]

15 © 2005 Cisco Systems, Inc. All rights reserved. Standard Named Access List Format Austin2(config)# ip access-list standard protect Austin2(config-std-nacl)# deny Austin2(config-std-nacl)# permit Austin2(config)# exit Router(config)# ip access-list standard access-list-name Router(config-std-nacl)# {deny | permit} source [source-wildcard]

16 © 2005 Cisco Systems, Inc. All rights reserved. Extended Numbered Access List Format Miami(config)# access-list 103 permit tcp any established Miami(config)# access-list 103 permit tcp any host eq smtp Miami(config)# interface e0/0 Miami(config-if)# ip access-group 103 in Router(config)# access-list access-list-number {deny | permit} {protocol-number | protocol-keyword}{source source-wildcard | any | host} {source-port} {destination destination-wildcard | any | host} {destination-port} [established][log | log-input] Internet Miami e0/ SMTP host

17 © 2005 Cisco Systems, Inc. All rights reserved. Extended Named Access List Format Miami(config)# ip access-list extended mailblock Miami(config-ext-nacl)# permit tcp any established Miami(config-ext-nacl)# permit tcp any host eq smtp Miami(config-ext-nacl)# exit Router(config)# ip access-list extended access-list-name Router(config-ext-nacl)# {deny | permit} {protocol-number | protocol- keyword} {source source-wildcard | any | host} {source-port} {destination destination-wildcard | any | host} {destination-port} [established][log | log-input]

18 © 2005 Cisco Systems, Inc. All rights reserved. Commenting IP Access-List Entries Miami(config)# access-list 102 remark Allow traffic to file server Miami(config)# access-list 102 permit ip any host Router(config)# remark message

19 © 2005 Cisco Systems, Inc. All rights reserved. Basic Rules for Developing Access Lists Rule #1Write it out! – Just use Notepad –Get a piece of paper and write out what you want this access list to accomplish. –This is the time to think about potential problems. Rule #2Setup a development system. –Allows you to copy and paste statements easily. –Allows you to develop a library of access lists. –Store the files as ASCII text files. Rule #3Apply access list to a router and test. –If at all possible, run your access lists in a test environment before placing them into production. Here are some basic rules you should follow when developing access lists:

20 © 2005 Cisco Systems, Inc. All rights reserved. Access List Directional Filtering Austin1 s0/0e0/0 e0/1 Internet InboundOutbound InboundData flows toward router interface. OutboundData flows away from router interface.

21 © 2005 Cisco Systems, Inc. All rights reserved. Applying Access Lists to Interfaces Tulsa(config)# interface e0/1 Tulsa(config-if)# ip access-group 2 in Tulsa(config-if)# exit Tulsa(config)# interface e0/2 Tulsa(config-if)# ip access-group mailblock out Router(config)# ip access-group {access-list-number | access- list-name} {in | out}

22 © 2005 Cisco Systems, Inc. All rights reserved. Displaying Access Lists Miami# show access-lists Extended IP access list permit ip any host Extended IP access list mailblock 10 permit tcp any established Miami# Router# show access-lists {access-list-number | access- list-name}

23 © 2005 Cisco Systems, Inc. All rights reserved. Module 8 – Configure Filtering on a Router 8.3 Configure Cisco IOS Firewall Context- Based Access Control

24 © 2005 Cisco Systems, Inc. All rights reserved. CBAC Configuration –Pick an Interface – Internal or External. –Configure IP Access Lists at the interface –Set audit trails and alerts. –Set global timeouts and thresholds. –Define PAM. –Define inspection rules. –Apply inspection rules and ACLs to interfaces. –Test and verify.

25 © 2005 Cisco Systems, Inc. All rights reserved. Enable Audit Trails and Alerts Router(config)# logging on Router(config)# logging Router(config)# ip inspect audit-trail Router(config)# no ip inspect alert-off Enables the delivery of audit trail messages using Syslog ip inspect audit-trail Router(config)# Enables real-time alerts no ip inspect alert-off Router(config)#

26 © 2005 Cisco Systems, Inc. All rights reserved. ip inspect max-incomplete high number ip inspect max-incomplete low number Defines the number of existing half-opened sessions that cause the software to start deleting half-opened sessions (aggressive mode) Defines the number of existing half-opened sessions that cause the software to stop deleting half-opened sessions Global Half-Opened Connection Limits Router(config)#

27 © 2005 Cisco Systems, Inc. All rights reserved. ip inspect one-minute high number ip inspect one-minute low number Defines the number of new half-opened sessions per minute at which they start being deleted Defines the number of new half-opened sessions per minute at which they stop being deleted Router(config)# Global Half-Opened Connection Limits

28 © 2005 Cisco Systems, Inc. All rights reserved. Port-to-Application Mapping Overview Ability to configure any port number for an application protocol. CBAC uses PAM to determine the application configured for a port.

29 © 2005 Cisco Systems, Inc. All rights reserved. ip port-map appl_name port port_num Router(config)#ip port-map http port tcp 8080 Maps a port number to an application. access-list permit acl_num ip_addr ip port-map appl_name port port_num list acl_num Router(config)#ip port-map http port tcp 8000 list 99 Router(config)#access-list 99 permit host Maps a port number to an application for a given host. access-list permit acl_num ip_addr wildcard_mask ip port-map appl_name port port_num list acl_num Maps a port number to an application for a given network. User-Defined Port Mapping – port forwarding Router(config)#

30 © 2005 Cisco Systems, Inc. All rights reserved. show ip port-map Shows all port mapping information. show ip port-map appl_name Shows port mapping information for a given application. show ip port-map port port_num Shows port mapping information for a given application on a given port. Display PAM Configuration Router# Router# sh ip port-map ftp Default mapping: ftpport 21 system defined Host specific: ftpport 1000 in list 10 user

31 © 2005 Cisco Systems, Inc. All rights reserved. ip inspect name inspection-name protocol [alert {on|off}] [audit-trail {on|off}] [timeout seconds] Inspection Rules for Application Protocols –Defines the application protocols to inspect. –Will be applied to an interface Available protocols: tcp, udp, cuseeme, ftp, http, h323, netshow, rcmd, realaudio, rpc, smtp, sqlnet, streamworks, tftp, and vdolive. alert, audit-trail, and timeout are configurable per protocol and override global settings. Router(config)# Router(config)# ip inspect name FWRULE smtp alert on audit-trail on timeout 300 Router(config)# ip inspect name FWRULE ftp alert on audit-trail on timeout 300

32 © 2005 Cisco Systems, Inc. All rights reserved. Router(config)# ip inspect name FWRULE http java-list 10 alert on audit-trail on timeout 300 Router(config)# ip access-list 10 deny Router(config)# ip access-list 10 permit Controls java blocking with a standard ACL. Inspection Rules for Java ip inspect name inspection-name http java-list acl-num [alert {on|off}] [audit-trail {on|off}] [timeout seconds] Router(config)#

33 © 2005 Cisco Systems, Inc. All rights reserved. Router(config)# ip inspect name FWRULE rpc program-number wait-time 0 alert off audit-trail on Allows given RPC program numberswait-time keeps the connection open for a specified number of minutes. Inspection Rules for RPC Applications ip inspect name inspection-name rpc program-number number [wait-time minutes] [alert {on|off}] [audit-trail {on|off}] [timeout seconds] Router(config)#

34 © 2005 Cisco Systems, Inc. All rights reserved. Router(config)# ip inspect name FWRULE smtp Allows only the following legal commands in SMTP applications: DATA, EXPN, HELO, HELP, MAIL, NOOP, QUIT, RCPT, RSET, SAML, SEND, SOML, and VRFY. If disabled, all SMTP commands are allowed through the firewall, and potential mail server vulnerabilities are exposed. Inspection Rules for SMTP Applications ip inspect name inspection-name smtp [alert {on|off}] [audit-trail {on|off}] [timeout seconds] Router(config)#

35 © 2005 Cisco Systems, Inc. All rights reserved. Router(config)# ip inspect name FWRULE fragment max 254 timeout 4 Protects hosts from certain DoS attacks involving fragmented IP packets –maxnumber of unassembled fragmented IP packets. –timeoutseconds when the unassembled fragmented IP packets begin to be discarded. Inspection Rules for IP Packet Fragmentation ip inspect name inspection-name fragment max number timeout seconds Router(config)#

36 © 2005 Cisco Systems, Inc. All rights reserved. ip inspect inspection-name {in | out} Applying Inspection Rules and ACLs –Applies the named inspection rule to an interface. Router (config-if)# Router(config)# interface e0/0 Router(config-if)# ip inspect FWRULE in Applies the inspection rule to interface e0/0 in inward direction.

37 © 2005 Cisco Systems, Inc. All rights reserved. General Rules for Applying Inspection Rules and ACLs Interface where traffic initiates –Apply ACL on the inward direction that permits only wanted traffic. –Apply rule on the inward direction that inspects wanted traffic. All other interfaces –Apply ACL on the inward direction that denies all unwanted traffic.

38 © 2005 Cisco Systems, Inc. All rights reserved. ExampleTwo Interface Firewall

39 © 2005 Cisco Systems, Inc. All rights reserved. Apply an ACL and inspection rule to the inside interface in an inward direction. Permit inside-initiated traffic from the network. Router(config)# interface e0/0 Router(config-if)# ip inspect OUTBOUND in Router(config-if)# ip access-group 101 in Router(config)# access-list 101 permit ip any Router(config)# access-list 101 deny ip any any Router(config)# ip inspect name OUTBOUND tcp Router(config)# ip inspect name OUTBOUND udp Configure CBAC to inspect TCP and UDP traffic. Outbound Traffic

40 © 2005 Cisco Systems, Inc. All rights reserved. Router(config)# interface e0/1 Router(config-if)# ip access-group 102 in Router(config)# access-list 102 permit icmp any host Router(config)# access-list 102 permit tcp any host eq www Router(config)# access-list 102 deny ip any any Apply an ACL and inspection rule to outside interface in inward direction. Permit outside-initiated ICMP and HTTP traffic to host Inbound Traffic

41 © 2005 Cisco Systems, Inc. All rights reserved. ExampleThree-Interface Firewall

42 © 2005 Cisco Systems, Inc. All rights reserved. Apply an ACL and inspection rule to the inside interface in an inward direction. Permit inside-initiated traffic from network. Router(config)# interface e0/0 Router(config-if)# ip inspect OUTBOUND in Router(config-if)# ip access-group 101 in Router(config)# access-list 101 permit ip any Router(config)# access-list 101 deny ip any any Router(config)# ip inspect name OUTBOUND tcp Router(config)# ip inspect name OUTBOUND udp Configure CBAC to inspect TCP and UDP traffic. Outbound Traffic

43 © 2005 Cisco Systems, Inc. All rights reserved. Apply an ACL and inspection rule to the outside interface in an inward direction. Permit outside-initiated ICMP and HTTP traffic to host Router(config)# interface e0/1 Router(config-if)# ip access-group 102 in Router(config)# access-list 102 permit icmp any host Router(config)# access-list 102 permit tcp any host eq www Router(config)# access-list 102 deny ip any any Inbound Traffic Router(config)# ip inspect name INBOUND tcp Configure CBAC to inspect TCP traffic.

44 © 2005 Cisco Systems, Inc. All rights reserved. Router(config)# interface e1/0 Router(config-if)# ip access-group 103 in Router(config-if)# ip access-group 104 out Router(config)# access-list 103 permit icmp host any Router(config)# access-list 103 deny ip any any Router(config)# access-list 104 permit icmp any host Router(config)# access-list 104 permit tcp any host eq www Router(config)# access-list 104 deny ip any any Permit only ICMP traffic initiated in the DMZ. Permit only outward ICMP and HTTP traffic to host DMZ-Bound Traffic Apply proper access lists and an inspection rule to the interface.

45 © 2005 Cisco Systems, Inc. All rights reserved. show ip inspect name inspection-name show ip inspect config show ip inspect interfaces show ip inspect session [detail] show ip inspect all Displays CBAC configurations, interface configurations, and sessions. show Commands Router# Router# sh ip inspect session Established Sessions Session C ( :35009)=>( :34233) tcp SIS_OPEN Session 6156F0CC ( :35011)=>( :34234) tcp SIS_OPEN Session 6156AF74 ( :35010)=>( :5002) tcp SIS_OPEN

46 © 2005 Cisco Systems, Inc. All rights reserved. debug ip inspect function-trace debug ip inspect object-creation debug ip inspect object-deletion debug ip inspect events debug ip inspect timers General debug commands. debug Commands Router# debug ip inspect protocol Protocol-specific debug. Router(config)#

47 © 2005 Cisco Systems, Inc. All rights reserved. no ip inspect Removes entire CBAC configuration. Resets all global timeouts and thresholds to the defaults. Deletes all existing sessions. Removes all associated dynamic ACLs. Remove CBAC Configuration Router(config)#

48 © 2005 Cisco Systems, Inc. All rights reserved. Firewall and ACL Main Window

49 © 2005 Cisco Systems, Inc. All rights reserved. 49 © 2005, Cisco Systems, Inc. All rights reserved.