Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Network.

Slides:



Advertisements
Similar presentations
Chapter 9: Access Control Lists
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Guide to Network Defense and Countermeasures Second Edition
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
FIREWALLS Chapter 11.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
System Security Scanning and Discovery Chapter 14.
Firewall Configuration Strategies
Intrusion Detection Systems and Practices
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Computer Security and Penetration Testing
Lesson 19: Configuring Windows Firewall
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Penetration Testing Security Analysis and Advanced Tools: Snort.
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Access Control List (ACL)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Security fundamentals Topic 10 Securing the network perimeter.
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Role Of Network IDS in Network Perimeter Defense.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 4 Network Security Tools and Techniques.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Security fundamentals
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
IS3220 Information Technology Infrastructure Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
Chapter 4: Access Control Lists (ACLs)
* Essential Network Security Book Slides.
Chapter 4: Protecting the Organization
Introduction to Network Security
Presentation transcript:

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Network Security, Firewalls, and VPNs

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Firewall management = testing, monitoring, & troubleshooting, review, backup- backup-backup.  Why one over the other?  The simplest form is a - packet filtering firewall.  Major threats: internal vs. external  Software versus hardware  Building versus buying

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. STIGs would be of benefit is in the configuration of a desktop computer. Most OS are not secure! A STIG describes how to minimize network-based attacks / preventing system access when the attacker is either physically at the machine, or over a network. STIGs also describe maintenance processes, such as software updates and vulnerability patching.vulnerability patching

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Create a written firewall policy  Evaluate potential and known threats  Confirm that the existing firewall policy and setup is sufficient or correct based on known threats  Maintain physical security control over all access to firewalls  Limit and filter Internet connectivity

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Filter systems attached to the network  Defense in depth – layer defenses along pathways of communication and transaction  Use Internet Protocol Security (IPSec) to secure all intranet communications  Harden internal and border firewalls  Focus on default deny rather than default permit  Monitor logs for signs of breach attempts

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Create an intrusion and incident response plan  Create business continuity and disaster recovery plans  Prioritize securing against the largest threats first  Probability, frequency, and consequences  Develop and periodically confirm your firewall checklist  Periodically reassess your security assumptions against current evolving guidelines

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Perform internal compliance audits periodically  Use an ethical hacking team to attempt penetration of the network  You won't learn unless you make mistakes! There are always new lessons to be learned and new challenges to be met – keep educating yourself!

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Specialized device or computer installed with specialized software  Selectively filters and blocks traffic between networks  Involves hardware and software combination  Firewall location  Between two interconnected private networks  Between private network and public network (network-based firewall)

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Packet-filtering firewall  Simplest firewall  Examines header of every entering packet  Can block traffic entering or exiting a LAN  Firewall default configuration  Blocks most common security threats  Preconfigured to accept and deny certain traffic types  Network administrators often customize settings

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Port blocking  Prevents connection to and transmission completion through ports  Optional firewall functions  Encryption  User authentication  Central management  Easy rule establishment  Filtering based on data contained in packets

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Optional firewall functions (cont’d.)  Logging, auditing capabilities  Protect internal LAN’s address identity  Monitor data stream from end to end (stateful firewall)  Tailoring a firewall  Consider type of traffic to filter  Consider exceptions to rules  Packet-filtering firewalls  Cannot distinguish user trying to breach firewall from authorized user

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Exploit can convert almost any protocol at any layer of the OSI model into an encapsulation or tunneling protocol Works in two Modes TransportTunnel

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Strictly enforce deny by default for both inbound and outbound communications  Clearly define in the acceptable use policy (AUP) what is not authorized and deemed a risk  Use network and host IDS/IPS monitoring  Deploy whitelist controls to prevent the installation of unapproved software  Limit mobile code, such as ActiveX, Java, Flash, Silverlight, and JavaScript

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Use a brute-force technique to craft packets and other forms of input directed toward the target Stress a system to determine whether it will react improperly, fail, or reveal unknown vulnerabilities. Can discover coding errors, buffer overflows, race conditions, remote exploit flaws, injection weaknesses, and so on Can take a significant amount of time to discover anything interesting

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Firewalls are incomplete security on their own  Tools and software will be dictated by budget and threat evaluation—don’t over buy or under buy  The nature of exploits and attack methodologies can change quickly which limits the useful lifespan of any recommendation

 Nmap (Zenmap)  Netstat  Tcpview  Fport  Snort

 Nmap – a network mapper, port scanner, and OS fingerprinting tool. Can check the state of ports, identify targets, and probe services.  Tcpview – a GUI tool to list the current open, listening, and connection sockets on a system as well as the service/program related to each socket  Wireshark – a free packet capture/protocol analyzer/sniffer that can analyze packets/frames as the enter or leave a firewall  Kali– a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. Can perform attacks against or through a firewall for testing purposes  Netstat – a simple command line tool to list the current open, listening, and connection sockets on a system

Fport - a command line tool to list the current open, listening, and connection sockets on a system as well as the service/program related to each socket Snort – a open source rule-based IDS that can detect firewall breaches Nessus – an open source vulnerability assessment engine that can scan for known vulnerabilities Netcat – a hacker tool that creates network communication links using UDP or TCP ports that support the transmission of standard input and output. Commonly creates covert channels to control a target system remotely or bypass a firewall. Can test a firewall’s ability to detect and block covert channels. Cryptcat offers similar capabilities using encryption Syslog – a centralized logging service that hosts a duplicate copy of log files. Provides real-time backup of every log on every participating host

 Nessus  OpenVAS  Wireshark  Netcat  Kali  Syslog

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Control traffic through routers  Router’s main functions  Examine packets  Determine destination  Based on Network layer addressing information  ACL (access control list)  Also called access list  Routers can decline to forward certain packets  ACL variables used to permit or deny traffic  Network layer protocol (IP, ICMP)  Transport layer protocol (TCP, UDP)  Source IP address  Source netmask  Destination IP address  Destination netmask  TCP or UDP port number

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Router receives packet, examines packet  Refers to ACL for permit, deny criteria  Drops packet if deny characteristics match  Forwards packet if permit characteristics match  Access list statement examples  Deny all traffic from source address with netmask  Deny all traffic destined for TCP port 23  Separate ACL’s for:  Interfaces; inbound and outbound traffic

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Trouble involving network security demands a prompt resolution Be patient Know your firewall thoroughly Focus Isolate the problem Simplify – KISS IT Try the quick-and-easy fixes first Avoid destructive or non-reversible solutions Try the free options before the costly ones Let the problem guide and direct you – READ ME Make fixes one at a time Test after each attempt Reverse or undo solution failures

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.  Good documentation and planning makes troubleshooting firewalls simpler  Useful troubleshooting information  Complete hardware and software inventory (relative to firewalls)  Written and electronic copies of configuration settings  Firewall policy  Change documentation  Previous troubleshooting logs  Activity, error, and alert logs  Maintenance logs  Any information about the current problem

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.

Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved.