Network Security Principles & Practices

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 2 – Single Area OSPF Single Area OSPF Link State Routing.
Advertisements

To Infinity & Beyond If you use HSRP Modified from the instructor bridge materials and covered in “Scaling Networks” chapter 2 curriculum - by Mark Anderson.
RIP V2 CCNP S1(5), Chapter 4.
Routing Basics By Craig Lindstrom. Overview Routing Process Routing Process Default Routing Default Routing Static Routing Static Routing Dynamic Routing.
Copyright 2002 Year 2 - Chapter 5/Cisco 3 - Module 5 Routing Protocols: IGRP By Carl Marandola.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Implementing Layer 3 High Availability
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—6-1 Implementing Layer 3 High Availability Configuring Layer 3 Redundancy with HSRP.
Understanding Layer 3 Redundancy. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Upon completing this lesson, you will be able.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 1 Implementing Secure Converged Wide Area Networks (ISCW)
IST 228\Ch5\IP Routing1. 2  Review of Chapter 4 Start the router simulator. You will see the prompt "Router>". This is the user mode prompt. Change the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5 Sandra Coleman, CCNA, CCAI.
Enhanced IGRP (EIGRP) EIGRP Characteristics. EIGRP Configuration. Verifying EIGRP.
Each computer and router interface maintains an ARP table for Layer 2 communication The ARP table is only effective for the broadcast domain (or LAN)
Distance Vector Protocols
Chapter 12 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Read a routing table  Configure a static route 
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Adjust and Troubleshoot Single- Area OSPF Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Routing Dynamically Routing Protocols Assist. Prof. Pongpisit.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
Sybex CCENT Chapter 8: IP Routing Instructor & Todd Lammle.
Routing and Routing Protocols Routing Protocols Overview.
HSRP Redundancy & Failover:
Instructor & Todd Lammle
1 Virtual Router Redundancy Protocol (VRRP) Speaker: Li-Wen Chen Date:
Dynamic Routing Protocol EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol developed by Cisco.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Routing and Packet Forwarding Routing Protocols and.
RIP2 (Routing Information Protocol) Team Agile. Routing Protocols Link State – OSPF – ISIS Distance vector – RIP (version 1 and 2) – IGRP (Cisco Proprietary)
Enhanced Interior Gateway Routing Protocol EIGRP 1.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 7 Distance Vector Routing Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
© 2003, Cisco Systems, Inc. All rights reserved..
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
1 Version 3.1 Module 6 Routed & Routing Protocols.
CO5023 Single Area OSPF. Routing So far, we’ve looked at issues concerning the distribution and access layers. Routing is the process used to interconnect.
S7C8 Hot Standby Router Protocol
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
University of the Western Cape Chapter 12: Routing Protocols Interior and Exterior Routing Protocols Aleksandar Radovanovic.
© 2002, Cisco Systems, Inc. All rights reserved..
Click to edit Master subtitle style Chapter 10: Routing Protocols.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Year 2 - Chapter 5/Cisco 3 - Module 5 Routing Protocols: IGRP.
Prof. Alfred J Bird, Ph.D., NBCT Office – McCormick 3rd floor 607 Office Hours – Monday 3:00 to 4:00 and.
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Working at a Small-to-Medium Business or ISP – Chapter 6
Click to edit Master subtitle style
Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0)
© 2002, Cisco Systems, Inc. All rights reserved.
Routing Information Protocol
Chapter 2: Static Routing
Introduction to Networking
© 2002, Cisco Systems, Inc. All rights reserved.
Virtual Router Redundancy Protocol (VRRP)
CCNA 2 v3.1 Module 7 Distance Vector Routing Protocols
IS3120 Network Communications Infrastructure
Chapter 2: Static Routing
Chapter 3: Dynamic Routing
Chapter 2: Static Routing
CCNA 3 v3 JEOPARDY Module 1 CCNA3 v3 Module 1 K. Martin.
Routing Information Protocol
Chapter 4: EtherChannel and HSRP
Working at a Small-to-Medium Business or ISP – Chapter 6
Chapter 4: EtherChannel and HSRP
© 2002, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

Network Security Principles & Practices By Saadat Malik Cisco Press 2003

– Chapter 3 – Device Security A device is a node helping to form the topology of the network. A compromised device may be used by the attacker as a jumping board. A DoS attack may be launched against a device. Network Security

Two aspects of device security Physical security Placing the device in a secure location Logical security Securing the device against nonphysical attacks Network Security

Physical security Considerations: Using redundant devices? Network topology (serialized, star, fully meshed?) Where to place the network devices? Media security (wire tapping, physical eavesdropping) Adequate/uninterrupted power supply disasters Network Security

Device Redundancy Means of achieving redundancy: A backup device (router, switch, gateway, …) is configured to take over the functionality of a failed active device. Means of achieving redundancy: Use routing to enable redundancy Use a redundancy protocol Hot Standby Router Protocol (HSRP) Virtual Router Redundancy Protocol (VRRP) Failover protocols Network Security

Cisco Command Reference Cisco IOS Commands Master List, Release 12.2 http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122mindx/l22index.htm Network Access Security Commands http://www.cisco.com/en/US/products/sw/iosswrel/ps1824/products_command_reference_chapter09186a0080087141.html Configuration Guide for the Cisco Secure PIX Firewall Version 6.0: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/index.htm PIX Command Reference: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/commands.htm#xtocid0 Note: A PDF file may be downloaded from the above sites. Cisco Command Summary: http://networking.ringofsaturn.com/Cisco/ciscocommandguide.php Other useful sites: http://www.elings.com/ Windows Administration Support Portal http://www.freebraindumps.com/CCIE/ http://www.groupstudy.com/ Network Security

EIGRP (used in Example 3-1) IGRP: Cisco’s Interior Gateway Routing Protocol EIGRP: Enhanced IGRP A router running EIGRP stores all its neighbors' routing tables so that it can quickly adapt to alternate routes. If no appropriate route exists, EIGRP queries its neighbors to discover an alternate route. These queries propagate until an alternate route is found. To enable EIGRP on the router you simply need to enable eigrp and define a network number. This is done as follows: Router# conf t Router(config)# router eigrp 1 Router(config-router)# network 172.16.0.0 http://networking.ringofsaturn.com/Cisco/eigrp.php Network Security

Routing-enabled Redundancy To set up routing in such a way that the routing protocols converge to one set of routes under normal conditions, and a different set of routes when some of the devices fail. (floating) static routes with varying weights: example 3-1 Dynamic routing protocols: e.g., Routing Information Protocol (RIP) http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/rip.htm Network Security

Dynamic routing using RIP Alternative paths are used when the normal path fails. Fig. 3-3 Network Security

HSRP Host Standby Routing Protocol proprietary (Cisco) A host uses a IP address as its default gateway. A virtual router is set up for that IP: a pair of IP and MAC addresses The addresses are ‘taken’ by a set of routers configured with HSRP One of the routers is designated as the active router. When the active router fails, one of the standby routers takes ownership of the IP and the MAC addresses. Network Security

HSRP HSRP group (aka. standby group) election protocol Packet format of HSRP messages: Fig. 3-4 Messages: hello, coup hello, resign How HSRP provides redundancy? Fig. 3-5 (next slide) A virtual IP is shared between router A and B, so when B becomes the active router, no change of default gateway IP is needed in the end hosts. Network Security

Example HSRP Implementation Fig. 3-5 Network Security

HSRP Drawback: not very secure The authentication field contains a password that is transmitted as clear text. c.f., VRRP provides better security. Network Security

VRRP Virtual Router Redundancy Protocol RFC 2338, RFC 3768 (4/04): ftp://ftp.rfc-editor.org/in-notes/rfc3768.txt Non-proprietary (unlike HSRP) an election protocol that dynamically assigns responsibility for a virtual router to one of the VRRP routers on a LAN (the master router) The election process provides dynamic fail over in the forwarding responsibility should the Master become unavailable. allows any of the virtual router IP addresses on the LAN to be used as the default first hop router by end-hosts. Network Security

VRRP When is the master router considered down? The election process: The master router periodically sends out an advertisement message that contains an advertisement interval. Each backup router uses a timer to decide when the master router is down. The election process: When a backup router detects that the master router is down, it sends an advertisement message with its own priority value in it. The backup router with the highest priority value becomes the new master router. Network Security

VRRP Question: How if an attacker injects a fake VRRP advertisement message (possibly with very high priority value) into the network? Would it then be elected to be the new master router? The answer: VRRP security features Three authentication methods No authentication Simple clear-text passwords Strong authentication (using IP authentication with MD5 HMAC) Q: What’s the Implication? Shared key A mechanism that protects against VRRP packets being injected from a remote network sets TTL = 255 Network Security

VRRP RFC2338 (4/1998), obsoleted by RFC3768 (R. Hinden, Ed; April 2004) ftp://ftp.rfc-editor.org/in-notes/rfc3768.txt Network Security

Failover Protocol Cisco PIX firewall The functionality of a failed firewall is taken over by a standby firewall. See chapter 8 for details Network Security

Security of major devices Next: Router security Firewall security Network Security