Firewalls, VPNs, and Intrusion Detection Systems in a University Environment Bob Winding, CISSP Information Security University of Notre Dame Copyright.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
University of Notre Dame Border Patrol: Access Denied! Robert Riley, Dan Rousseve, Bob Winding University of Notre Dame Copyright This work is the.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Border Patrol: Access Denied! Robert Riley, Dan Rousseve, Bob Winding University of Notre Dame Copyright This work is the intellectual property of.
Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Module 3 Windows Server 2008 Branch Office Scenario.
Firewall Configuration Strategies
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Property of the University of Notre Dame Copyright David Seidl, Bob Winding, Mike Chapple, Bob Richman, This work is the intellectual property of.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Remote Networking Architectures
Firewall Slides by John Rouda
Network security policy: best practices
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Chapter 6: Packet Filtering
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Windows 7 Firewall.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Educause/Internet 2 Computer and Network Security Task Force
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security of a Local Area Network
CompTIA Security+ Study Guide (SY0-401)
Unit 27: Network Operating Systems
IS4680 Security Auditing for Compliance
Introduction to Network Security
Presentation transcript:

Firewalls, VPNs, and Intrusion Detection Systems in a University Environment Bob Winding, CISSP Information Security University of Notre Dame Copyright Robert Winding This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Introduction History and Culture Security Zones A layered approach –Network and host firewalls –Network and host IDS –VPNs to group users and provide remote access Implementation Issues, outcomes, and evolution Q&A

History and Culture 12,000 Students, 3,000 employees, private institution Notre Dame launched its network with a Class B address space and no perceptible border Culture values the notions of convenience, “Unfettered access”, and privacy Security is not perceived to be an issue

History and Culture 3 years ago ND created an InfoSec group First step was to look at the network –Hacked servers –Viruses –Endless probing We had some near misses

Security Zones OIT decided that it would first protect assets it owned, and/or, that were housed in the datacenter The datacenter is considered one of several security zones Secure the datacenter with an eye on applying appropriate security to other campus entities

Zone Approach

Policy Ideally security controls would support specific policies ND has made some significant progress in this area, including a password strength policy, clear text credential policy, etc. As more specific policies are developed we rely on the acceptable use policy as the basis of our controls

Layered Approach

ND Tripwire is termed both a host IDS and host integrity assurance tool It has both an open source variant, Tripwire Academic Source Release (ASR) and a commercial version The commercial version has security features that prevent the compromise of tripwire itself and provide central management

ND Tripwire works by applying a tripwire policy to the file system of a server This policy can be thought of as extended file attributes Tripwire policies can monitor many attributes of files or directories

ND Many compromises (rooting) of servers often change system files or registry settings Things like netstat, dir/ls, ps, etc. This is done to cover the hacker’s tracks The complexity in Tripwire is in the policy construction and management ND uses Tripwire as an after-the-fact alert that our other protections have failed

Firewalls Packet Filtering Stateful Inspection Application Proxy Host –McAfee Desktop Firewall –Windows 2003 IP Security –IP filters Network – Sidewinder and PIX

Host Firewalls Host based firewalls were selected and implemented for each platform used in the datacenter Host firewalls were implemented by individual support engineers based on templates developed in consultation with InfoSec The rulesets were designed to be liberal with outbound traffic and strict with inbound traffic

Host Firewalls Ruleset templates were developed for servers that would reside behind the firewall The desire was to simplify the ruleset and govern intra-zone peer traffic The basic principles are –Trust the firewall –Drop local LAN traffic not explicitly permitted (peer dependencies)

Datacenter Security

The Datacenter Firewall Secure Computing Sidewinder G2, in High Availability configuration Balance security and ruleset complexity –Highly constrained public service access –Group related services to reduce rules –All servers have basic net services outbound. –Monitoring and SysAdmin zones have special privilege Alerting and auditing detect problems early, ease management

Datacenter Security

VPN-SA and Monitor Zone The VPN for System Administrators Access granted by 2 factor authn/authz Can access any server via admin protocols or through an IP KVM Monitoring zone can access any server with defined monitoring protocols, snmp icmp, etc. Systems in these zones have no inbound public access

Core Services Zone This zone provides services to other servers Some direct database connections by “fat” client applications and “power user” administrators are allowed Backups via this zone are permitted To provide a compensating control access to these services are restricted by group VPN and or subnet

Admin-DMZ Zone This zone houses servers that support the administrative operations of the University Servers in this zone have some form of restricted access, by VPN or subnet The address restriction is tied to the audience, ex. Administrative Offices, Health Services, etc.

DMZ Zone This zone houses the publicly accessible services By public we mean there is no source address restriction These services can be accessed from anywhere in the world

NO-NAT DMZ Zone This zone houses servers whose services/protocols are broken by NAT All other “internal” zones are privately addressed

VPNs VPNs are used to group user traffic, provide remote access, and insure confidentiality where no other cryptography is employed A Cisco 3060 concentrator and FreeRADIUS server are integrated into our Enterprise Directory to provide Authentication and Authorization for VPN Groups The result is a trusted address that is used by the firewall to provide location independent access

Issues (General) Most early issues were the result of diverse opinions and philosophies among our engineering and security staff regarding security The tuning and management of Tripwire was problematic

Issues (FW) Knowledge of networking and host firewalls was limited among some our system administrators and the learning curve was a significant challenge Knowledge of how products work at the port/protocol level can be problematic ND’s unfamiliarity of FW performance and reliability

Issues (networking) Components of our network were designed for speed and or availability without consideration of security Retrofitting security devices like firewalls and IDS sensors is not always easy or completely effective.

Outcomes ND implemented major components of its security architecture We’ve migrated over 100 servers behind the firewall including ND’s new ERP system There have been no servers compromised behind the datacenter firewall ND has adopted build standards for servers and a fairly robust change control process

Outcomes IDS has become instrumental in detecting hacked machines and viruses IDS in conjunction with other devices is used to suppress viruses and encourage users to fix their machines through “SoftDisco” Security is becoming a proactive part of system design

Outcomes There is still some friction when security issues threaten a project deadline Areas like Operations, Networking, and Security need to work much more closely and complementary Policy development remains an area that requires a lot of effort

Evolution ND is implementing additional security zones with Cisco PIX and Sidewinder firewalls –Ticketing office –Police station and Hotel –Academic services We are still debating the issue of a general border firewall There is still debate over implementing a separate administrative network

Evolution SSL Termination Failover in the event of a major component failure, router, BigIP, Firewall Re-architecting the IDS

Questions?