Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.

Slides:



Advertisements
Similar presentations
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Advertisements

CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
NESCOT CATC1 Access Control Lists CCNA 2 v3 – Module 11.
Web Server Administration
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Internet…issues Managing the Internet
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Access Lists 1 Network traffic flow and security influence the design and management of computer networks Access lists are permit or deny statements that.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.

Web Design Terms and Concepts Ms. Scales. Q. What is a Server? A. A server is a computer that stores information many people can access. It runs special.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
Access Control Lists Written by Bill Reed 03/11/05.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Virtual Local Area Networks. Should I V-LAN? 1. Security V-LANs can restrict access to network resources.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Access Control List ACL. Access Control List ACL.
Access Control Lists (ACLs)
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Access Control List (ACL)
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 9 Intermediate TCP/IP/ Access Control Lists (ACLs)
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
CCNA – Cisco Certified Network Associates Access Control List (ACL) By Roshan Chaudhary Lecturer Islington College.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
ACLs ACLs are hard. Read, read, read. Practice, practice, practice ON TEST4.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Sem 3 Access Control Lists. Summary of Access Lists Access lists perform serveral functions within a Cisco router, including: ** Implement security /
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
ACCESS CONTROL LIST.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Lab 12 – Cisco Firewall.
Instructor Materials Chapter 5 Providing Network Services
Unit 4: Transport protocols
Networking for Home and Small Businesses – Chapter 6
Implementing TMG Server Publishing
Working at a Small-to-Medium Business or ISP – Chapter 7
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Introducing ACL Operation
IIS.
Access Control Lists CCNA 2 v3 – Module 11
Working at a Small-to-Medium Business or ISP – Chapter 7
Firewalls.
Firewalls Chapter 8.
Applications Layer Functionality & Protocols
Networking for Home and Small Businesses – Chapter 6
Computer Networks Protocols
Presentation transcript:

Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012

Educational Goals The students will understand effective firewall configuration. Firewalls need configuration. You can’t just take them out of the box and plug them in. While the simulation uses a Cisco-like format, the actual command format is not important This simulator was designed by Ken Williams with help from several A&T students for an NSF funded workshop

Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax Participants can take benign or malicious actions against other players to score points The interactive and competitive nature of the simulation helps students learn about firewalls while having fun

Simulated Network During the simulation you assume the role of network administrator and are required to configure your firewall to protect your network You can also “attack” the simulated networks of other students. If you are successful, you will earn points and the other student will lose points. During the simulation the security requirements will change requiring you to change your firewall’s configuration.

Real World Security The firewall simulator is a Java applet that runs in a browser and communicates with a server program The applet is signed using a self generated certificate. Your browser will warn you about the evil “Ken Williams”. The Windows firewall may complain about using UDP port 49,876 although it seems to work. Click “Allow” when asked.

Firewall Configuration Window

Simulation Process When you first start, you must enter your name to identify yourself to other participants. Configure your firewall to allow needed services while preventing attacks. Once the actions are enabled, you can take actions against other players. Reconfigure your firewall whenever necessary to correct problems. New tasks will appear that may require you to reconfigure your firewall.

Coming and Going The access-list commands specify source and destination addresses. If the source address starts with 152.8, then the traffic is going out from your network to the Internet. If the source is any other address, then the traffic is coming into your network.

Cisco-Like Configuration Syntax access-list number {permit | deny} [protocol] {any | ipaddr mask | host ipaddr} {any | ipaddr mask | host ipaddr} [operator port] The entire access-list command must be written on one line.

Rule Parameters The number is required but is ignored Permit allows traffic that fits this description Deny prohibits traffic that fits this description Protocol can be TCP or UDP If protocol is omitted, it applies to all traffic If a port is specified, the protocol must be TCP or UDP

Address Formats You can specify a source or destination IP address in three different formats: any – all addresses match host – This address matches one specific computer with the given address IPaddress mask – This address is compared to the given IP address ignoring the bits that are one in the mask.

Example This permits any computer on the Internet to connect to the computer whose IP address is using the TCP protocol and port 443. access-list 111 permit tcp any host eq 443

Example This prevents any UDP traffic from reaching computers in X subdomain access-list 112 deny udp any Note: access-list statements must be written on one line.

Order is Important When a packet arrives at your firewall, it will be compared with each access-list statement in the order they appear. The first statement that applies to that packet determines if it is permitted or denied. For incoming traffic, there is an implicit deny everything at the end of the access-lists. For outgoing traffic, there is an implicit permit everything at the end of the access-lists.

Try It Write an access statement to allow all users in your network to use the computer at

Possible Solution Write an access statement to allow all users in your network to use the computer at access-list 111 permit any host

Restricting a Port Port numbers are used to identify specific applications The access-list statement must end with an operator and a port number The operators are: eqequal ltless than gtgreater than neqnot equal rangea range of ports; you must specify two different port numbers

Useful Port Numbers 21FTP 23Telnet 25Simple Mail Transport Protocol 53Domain Name Servers 80HTTP 110POP3 client 123Network Time Protocol Microsoft NETBIOS 143IMAP4 client 161Simple Network Maintenance Protocol 443HTTPS 445Windows File Sharing 1863MSN Instant messaging 3389Windows Remote Desktop Protocol 5190AOL instant messenger

Example This allows FTP traffic to your local server at access-list 113 allow tcp any host eq 21 Note: access-list statements must be written on one line.

Firewall Configuration The firewall configuration window should contain all of your access-list commands. Some real firewalls allow you to input only one line at a time or upload a file of commands The simulator allows you to update your list of firewall rules

Try It Write a firewall configuration statement to allow everyone in your network to get POP3 from the server at

Possible Solution Write a firewall configuration statement to allow everyone in your network to get POP3 from the server at access-list 111 permit tcp host any eq 110

Your Simulated Network There is a link on the webpage to a diagram of the simulated network showing the computers and their IP addresses. Your domain has the Internet address of /16

Initial Needed Services Access by the public to your web site from other servers using SMTP Domain Name Server access

Fairness Once you have successfully attacked another student, you may not initiate the same attack against the same student for 45 seconds When a configuration change is specified, you have 45 seconds before anyone can be attacked related to that change

Simulator System Requirements The simulation is designed to run on regular PCs with no special networking restrictions. Participants need a Java enabled browser. Runs on Windows, Linux, etc. Safe to run in a public environment. The web server has to run the central monitor program. UDP port has to be open on real firewalls.