How topology decisions affect speed/availability/security/cost/etc. Network Topology.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

DMZ (De-Militarized Zone)
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Presented by Serge Kpan LTEC Network Systems Administration 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Small Office Service Serial Router Connects Internal Stations to Shared Broadband Access Service Small Office Serial Router Shared Broadband Line ISP.
Security Awareness: Applying Practical Security in Your World
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wi-Fi Structures.
Subnetting.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
A Guide to major network components
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Computer Networks IGCSE ICT Section 4.
Networking Components Chad Benedict – LTEC
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 6: Packet Filtering
Common Devices Used In Computer Networks
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
CIS 450 – Network Security Chapter 3 – Information Gathering.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
HUB Connects multiple workstations, servers, and other devices to a network. Can be used to connect two or more computers to one network port. Handles.
Wireless Networks and the NetSentron By: Darren Critchley.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Networking Network Classification, by there: 3 The Rules they use to exchange data: Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Security fundamentals Topic 10 Securing the network perimeter.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Introduction to Networking. What is a Network? Discuss in groups.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Planning the Addressing Structure
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Unit Communication Hardware
Port Knocking Benjamin DiYanni.
Virtual LANs.
Client-Server and Peer to Peer networks
Firewalls Routers, Switches, Hubs VPNs
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Computer communications
Planning the Addressing Structure
AbbottLink™ - IP Address Overview
Introduction to Network Security
Presentation transcript:

How topology decisions affect speed/availability/security/cost/etc. Network Topology

Metrics for judging network design Cost $$$ Bandwidth Maintenance hours Clock cycles Electricity Space Cooling requirements Others... Security Confidentiality Integrity Availability Authenticity Non-repudiation Biggest design trade-off: Availability vs. Confidentiality

Dynamic vs. static addressing * Recommended settings: All workstations dynamic, all servers static. Workstation Webserver Fileserver Workstation Dynamic addresses: Allow machines to be easily added and removed Simplifies management, reduces errors Static addresses: Must/should be used for some servers Reduces traffic for other servers (e.g. arp queries, DNS lookups) Can be set in /etc/network/interfaces file DHCP server Dynamic Static DNS server Static Either (Static recommended. Dynamic possible with discovery/DNS.) Mailserver Either (Static recommended. Dynamic possible with DNS.) Gateway Router Static

Network “Attack Surface” * Each available port is theoretically open to attack ISP/Internet Webserver DNS server Switch Router w/o NAT IP: IP: Ports: IP: Ports: ISP/Internet Switch Router w/ NAT IP: IP: Ports: 80, 443 IP: Port: 53 Workstation IP: Ports: Webserver DNS server Workstation IP: Ports: None

Basic Network Attacks “Front door” vs. “Back door” “Front door” attack originates from outside the network. Assume that the only open port on the router is 80, which goes to webserver 1. Attacker finds an exploitable bug in the webserver. 2. Attacker sends a packet that contains code that creates a shell between attacker and webserver 3. Attacker uses the shell to “pivot” to the workstation and fileserver Workstation ISP/Internet Webserver Fileserver Switch Router w/ NAT * “Pivot” – to attack a device and gain a foothold (e.g. a shell) then use that foothold to attack other visible devices (ssh/telnet/metasploit/etc.).

Basic Network Attacks “Front door” vs. “Back door” “Back door” attack originates from inside the network. 1. Attacker sends an with a malicious attachment 2. A workstation user clicks the attachment and runs the code 3. The code opens a connection to the hacker 4. The hacker now has a shell on the workstation and can install more software or pivot to other machines Workstation ISP/Internet Webserver Fileserver Switch Router w/ NAT

Most basic topology * All servers & workstations in the ISP’s subnet * All IPs are visible to Internet Workstation ISP/Internet Webserver Fileserver Switch Workstation Router w/o NAT WAP* * (WAP)Wireless Access Point PRO: All IPs are easily accessible from anywhere in the world (Maximum Availability) Low hardware costs CON: All IPs are easily accessible from anywhere in the world (Minimum Confidentiality) Can access every port on every IP remotely Very large attack surface Cost of buying one IP address for each device

Adding NAT * All servers & workstations in a single private subnet * Subnet IPs are hidden from Internet * The subnet appears as a single IP address for the router Workstation ISP/Internet Webserver Fileserver Switch Workstation Router w/ NAT WAP PRO: Much smaller attack surface than previous slide Only a few IP/port pairs are accessible through router CON: All IPs are in the same subnet. An attacker who pwns one box can pivot to the others.

Multiple isolated networks * Public servers are in blue subnet * Private servers & workstations are in green subnet Workstation ISP/Internet Webserver Fileserver Switch Workstation Router w/ NAT WAP PRO: An attack against one network will not grant access to the other CON: Extra Internet IP address is required Extra routers, switches, licenses, etc. are required Maintenance-intensive Difficult to give special priviliges on bluenet from greennet machines Switch Router w/ NAT Router w/ NAT

One network with a DMZ * Public servers are in blue subnet * Private servers & workstations are in green subnet Workstation ISP/Internet Webserver Fileserver Switch Workstation Router w/ NAT WAP PRO: An attack against the public webserver will not grant access to workstations or the private fileserver CON: An extra router is required “Double-NATing” of green subnet Complexity increases chance of misconfigurations Fileserver no longer available from outside LAN WAP is a big target for attacks – will allow attacker to pivot to fileserver or workstations Switch Router w/ NAT

Moving WAP to DMZ * Wireless devices can now only connect to the public (blue) subnet Workstation ISP/Internet Webserver Fileserver Switch Workstation Router w/ NAT WAP PRO: An attacker can no longer access the private fileserver after attacking the WAP (Confidentiality UP) CON: Mobile users no longer have access to the private fileserver (Availability DOWN) Attacker can still pivot from WAP to webserver Switch Router w/ NAT

Single router with multiple subnets * WAP is moved to its own (purple) subnet Workstation ISP/Internet Webserver Fileserver Switch Workstation Router w/ NAT WAP PRO: Increased separation of devices makes it difficult for attacker to pivot Fewer routers CON: More complex & expensive router required Router rules are more complex, easier to misconfigure

How many server applications per physical server? Webserver, Fileserver, DNS, DHCP, FTP Webserver PRO: Fewer physical servers to buy & maintain Reduced cost, space, electrical req. Security: Only one box to patch Fewer passwords to forget Fileserver DNS DHCP FTP PRO: Can buy smaller servers for each task Can put servers in different subnets Security: Only 2-3 ports open per machine Much easier to find attacks in logfiles & create firewall rules A successful attack against one service does not grant control over all services

Initial plan for class networks * Each group of 4 will build the following: Workstation SI455 internet Webserver Fileserver Switch Workstation Router w/ NAT Bluenet: Public – services available to other groups Greennet: Private – services available only to user workstations Switch Router w/ NAT DNS FTP Workstation DHCP Authentication Server server