Edge Protection 111. The Old World: Network Edge Core routers individually secured Every router accessible from outside “outside” Core telnet snmp.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Access Control Lists. Types Standard Extended Standard ACLs Use only the packets source address for comparison 1-99.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Chapter 9: Access Control Lists
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Introducing ACLs.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—6-1 Access Control Lists Introducing ACL Operation.
IPv6 Transition : Why a new security mechanisms model is necessary?
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 4 – Implementing Firewall Technologies.
1 Access Lists. 2 Introduction ACL (access list)  a list of conditions that categorize packets. Rules:  Sequential order.  Until a match is made. 
Standard, Extended and Named ACL.  In this lesson, you will learn: ◦ Purpose of ACLs  Its application to an enterprise network ◦ How ACLs are used to.
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing Base on RFC 2827 Lector Kirill Motul.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Effective Uses of Packet- Filtering Devices. Filtering Based on Source Address: The Cisco Standard ACL 1.One of the things that packet-filtering technology.
Access Control Key concepts: Controlling the data flow within a network ACL (access control lists)
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
TCOM 515 Lecture 6.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
Windows 7 Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Access Control Lists (ACLs)
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Access Control List (ACL)
BGP operations and security draft-jdurand-bgp-security-02.txt Jerome Durand Gert Doering Ivan Pepelnjak.
Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.
Lecture 4 Denial of Service Attack
Access-Lists Securing Your Router and Protecting Your Network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Access Control Lists Accessing the WAN – Chapter 5.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
ISP Edge NAT 10/8 “Home” Network Upstreams and Peers /32
© 2004 AARNet Pty Ltd Measurement in aarnet3 4 July 2004.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
ACCESS CONTROL LIST.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 4: Implementing Firewall Technologies
Access Control Lists (ACL). Access-List Overview 4 A Filter through which all traffic must pass 4 Used to Permit or Deny Access to Network 4 Provides.
Identify the traffic that should go across the VPN. Check the ACL configuration Try to ping across the tunnel using a ping that matches the ACL We should.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Access Control Lists Mark Clements. 17 March 2009ITCN 2 This Week – Access Control Lists What are ACLs? What are they for? How do they work? Standard.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
Cryptography and Network Security
Draft-lewis-infrastructure-security-00.txt Infrastructure Protection BCP Darrel Lewis, James Gill, Paul Quinn, Peter Schoenmaker.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Security fundamentals
Accessing the WAN – Chapter 5
Instructor Materials Chapter 7: Access Control Lists
Accessing the WAN – Chapter 5
Accessing the WAN – Chapter 5
Chapter 4: Access Control Lists (ACLs)
COS 561: Advanced Computer Networks
* Essential Network Security Book Slides.
Access Control Lists Last Update
Chapter 8: Monitoring the Network
Protocols 1 Key Revision Points.
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Chabot College ELEC Access Control Lists - Introduction.
ACCESS CONTROL LIST Slides Prepared By Adeel Ahmed,
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Edge Protection 111

The Old World: Network Edge Core routers individually secured Every router accessible from outside “outside” Core telnet snmp

“outside” Core The New World: Network Edge Core routers individually secured PLUS Infrastructure protection Routers generally NOT accessible from outside telnet snmp

Infrastructure ACLs Basic premise: filter traffic destined TO your core routers –Do your core routers really need to process all kinds of garbage? Develop list of required protocols that are sourced from outside your AS and access core routers –Example: eBGP peering, GRE, IPSec, etc. –Use classification ACL as required Identify core address block(s) –This is the protected address space –Summarization is critical  simpler and shorter ACLs

Infrastructure ACLs Infrastructure ACL will permit only required protocols and deny ALL others to infrastructure space ACLs now need to be IPv4 and IPv6! ACL should also provide anti-spoof filtering –Deny your space from external sources –Deny RFC1918 space –Deny multicast sources addresses (224/4) –RFC3330 defines special use IPv4 addressing

Digression: IP Fragments Fragmented Packets can cause problems... –Fragmented packets can be used as an attack vector to bypass ACLs –Fragments can increase the effectiveness of some attacks by making the recipient consume more resources (CPU and memory) due to fragmentation reassembly Reality Check – Routers & Switches should not be receiving fragments! –In today’s networks, management & control plane traffic should not be fragmenting. –If it does, it means something is BROKE or someone is attacking you. Recommendation – Filter all fragments to the management & control plane … logging to monitor for errors and attacks.

Infrastructure ACLs Infrastructure ACL must permit transit traffic –Traffic passing through routers must be allowed via permit IP any any iACL is applied inbound on ingress interfaces Fragments destined to the core can be filtered via the iACL

SRC: DST: Any SRC: Valid DST: Rx (Any R) SRC: eBGP Peer DST: CR1 eBGP SRC: Valid DST: External to AS (e.g. Customer) ACL “in” Infrastructure ACL in Action PR1PR2 R1 CR1 R4 R2 R3 R5 CR2

Iterative Deployment Typically a very limited subset of protocols needs access to infrastructure equipment Even fewer are sourced from outside your AS Identify required protocols via classification ACL Deploy and test your iACLs

Step 1: Classification Traffic destined to the core must be classified NetFlow can be used to classify traffic –Need to export and review Classification ACL can be used to identify required protocols –Series of permit statements that provide insight into required protocols –Initially, many protocols can be permitted, only required ones permitted in next step –ACL Logging can be used for additional detail; hits to ACL entry with logging might increase CPU utilization: impact varies by vendor/platform Regardless of method, unexpected results should be carefully analyzed  do not permit protocols that you can’t explain!

Step 2: Begin to Filter Permit protocols identified in step 1 to infrastructure only address blocks Deny all other to addresses blocks –Watch access control entry (ACE) counters –ACL logging can help identify protocols that have been denied but are needed Last line: permit anything else  permit transit traffic The iACL now provides basic protection and can be used to ensure that the correct suite of protocols has been permitted

Steps 3 & 4: Restrict Source Addresses Step 3: –ACL is providing basic protection –Required protocols permitted, all other denied –Identify source addresses and permit only those sources for requires protocols –e.g., external BGP peers, tunnel end points Step 4: –Increase security: deploy destination address filters if possible

Infrastructure ACLs Edge “shield” in place Not perfect, but a very effective first round of defense –Can you apply iACLs everywhere? –What about packets that you cannot filter with iACLs? –Hardware limitations Next step: secure the control/management planes per box “outside” telnet snmp Core