© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.

Slides:



Advertisements
Similar presentations
Denial of Service, Firewalls, and Intrusion Detection
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
1 Reading Log Files. 2 Segment Format
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Firewalls and Intrusion Detection Systems
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Sales Kickoff - ARCserve
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
Web Application Firewall (WAF) RSA ® Conference 2013.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—15-1 Chapter 15 Blocking Configuration.
Module 7: Advanced Application and Web Filtering.
PIX Firewall An example of a stateful packet filter. Can also work on higher layers of protocols (FTP, RealAudio, etc.) Runs on its own OS.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
© 2002, Cisco Systems, Inc. CSPFA 2.1—3-1 PIX Firewall.
Configuring the PIX Firewall Presented by Drew Spesard.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-1 Lesson 7 Access Control Lists and Content Filtering.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—8-1 Lesson 8 Object Grouping.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—6-1 Lesson 6 Translations and Connections.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—13-1 Lesson 13 Switching and Routing.
Lesson 4 © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—4-1 Understanding Translations and Connections.
© 2002, Cisco Systems, Inc. All rights reserved..
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
© 2001, Cisco Systems, Inc. CSPFA 2.0—6-1 Chapter 6 Configuring Multiple Interfaces.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—9-1 Lesson 9 Advanced Protocol Handling.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 2: Configure Network Intrusion Detection and Prevention.
PIX Firewall An example of a stateful packet filter.
Only Two Ways through the PIX Firewall
Access Control Configuration and Content Filtering
Cisco IOS Firewall Context-Based Access Control Configuration
Firewalls.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
* Essential Network Security Book Slides.
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Purpose of a Firewall Characteristic of a firewall
POOJA Programmer, CSE Department
PIX Firewall An example of a stateful packet filter.
Firewalls Chapter 8.
Presentation transcript:

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-2 Objectives

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-3 Objectives Upon completion of this lesson, you will be able to perform the following tasks: Name, describe, and configure the attack guards in the PIX Firewall. Define intrusion detection. Describe signatures. Name and identify signature classes supported by the PIX Firewall. Configure the PIX Firewall to use IDS signatures. Configure the PIX Firewall to shun.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-4 Attack Guards

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-5 Mail Guard fixup protocol smtp port [-port] pixfirewall (config)# pixfirewall(config)# fixup protocol smtp 2525 Allows only seven minimum commands: HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT (RFC 821). Defines ports on which to activate Mail Guard (default = 25) If disabled, all SMTP commands are allowed through the firewall— potential mail server vulnerabilities are exposed. Internet Inside SMTP RFC 821 commands only Mail gateway

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-6 Client Server Src IP Dst IP Src Pt Dst Pt Src IP Dst IP Src Pt Dst Pt DNS Guard DNS Guard is always on. After the client does a DNS request, a dynamic pin hole allows UDP packets to return from the DNS server. The default UDP timer expires in two minutes. The DNS server response is recognized by the firewall, which closes the dynamic UDP pin hole immediately. The PIX Firewall does not wait for the UDP timer to expire.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-7 FragGuard and Virtual Reassembly The FragGuard and Virtual Reassembly feature has the following characteristics: Is on by default. Verifies each fragment set for integrity and completeness. Tags each fragment in a fragment set with the transport header. Performs full reassembly of all ICMP error messages and virtual reassembly of the remaining IP fragments that are routed through the PIX Firewall. Uses Syslog to log fragment overlapping and small fragment offset anomalies.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-8 fragment Command Sets the maximum number of packets in the fragment database. fragment size database-limit [interface] pixfirewall (config)# pixfirewall(config)# fragment size 1 pixfirewall(config)# fragment chain 1 fragment chain chain-limit [interface] fragment timeout seconds [interface] pixfirewall (config)# Specifies the maximum number of packets into which a full IP packet can be fragmented. Specifies the maximum number of seconds that the PIX Firewall waits before discarding a packet that is waiting to be reassembled.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-9 AAA Flood Guard floodguard {enable | disable} pixfirewall (config)# pixfirewall(config)# floodguard enable Reclaims attacked or overused AAA resources to help prevent DoS attacks on AAA services (default = enabled).

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-10 DoS Protection PIX Firewall can mitigate TCP SYN flooding attacks: Release 5.2 introduced TCP Intercept: proxying of TCP sessions by the PIX Firewall Release 6.2 introduced TCP SYN cookies: more CPU friendly

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-11 TCP Three-Way Handshake Target Spoofed host SYN, SRC: , DST: SYN/ACK ACK SYN, SRC: , DST: Target DoS attack SYN, SRC: , DST: Normal Embryonic Connection ? Internet SYN/ACK ? ?

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-12 TCP Intercept Internet Embryonic connection count = 3 SYN SYN/ACK ACK SYN DoS Attack SYN Normal TCP Intercept SYN SYN/ACK ACK

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-13 SYN Cookies Internet SYN SYN/ACK (cookie) ACK (cookie) Normal TCP Intercept SYN SYN/ACK ACK PIX Firewall responds to the SYN itself, which includes a cookie in the TCP header of the SYN/ACK. The PIX Firewall keeps no state information. The cookie is a hash of parts of the TCP header and a secret key. A legitimate client completes the handshake by sending the ACK back with the cookie. If the cookie is authentic, the PIX Firewall proxies the TCP session.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-14 Embryonic Connection Limit Setting the embryonic connections (em) limit enables TCP proxying using either TCP Intercept or SYN cookies. –A value of 0 disables protection (default). –When embryonic connection limit is exceeded, all connections are proxied. pixfirewall(config)# nat (inside) pixfirewall(config)# static (inside,outside) static [(internal_if_name, external_if_name)] {global_ip | interface} local_ip [dns][max_conns] [emb_limit]] pixfirewall (config)# nat (if-name) id address [max_conns] [em_limit] pixfirewall (config)#

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-15 Intrusion Detection

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-16 Intrusion Detection Ability to detect attacks against networks Three types of network attacks: –Reconnaissance –Access –Denial of service

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-17 Signatures A signature is a set of rules pertaining to typical intrusion activity that, when matched, generates a unique response. The following signature classes are supported by the PIX Firewall: Informational—Triggers on normal network activity that in itself is not considered to be malicious, but can be used to determine the validity of an attack or for forensic purposes. Attack—Triggers on an activity known to be, or that could lead to, unauthorized data retrieval, system access, or privilege escalation.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-18 Intrusion Detection in the PIX Firewall C:\>nslookup Default server: server1.domain.com Address: ls -d domain.com DNS server (server1) Syslog server The intruder attempts a zone transfer from the DNS server on dmz. The PIX Firewall detects an attack. domain.com The PIX Firewall drops the connection and logs an IDS message to Internet 2 1

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-19 Configure IDS pixfirewall(config)# ip audit name ATTACKPOLICY attack action alarm reset pixfirewall(config)# ip audit interface outside ATTACKPOLICY pixfirewall(config)# ip audit name audit_name info [action [alarm] [drop] [reset]] Creates a policy for informational signatures. pixfirewall(config)# ip audit name audit_name attack [action [alarm] [drop] [reset]] Creates a policy for attack signatures. ip audit interface if_name audit_name pixfirewall(config)# Applies a policy to an interface. When the PIX Firewall detects an attack signature on its outside interface, it reports an event to all configured Syslog servers, drops the offending packet, and closes the connection if it is part of an active connection.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-20 Specify Default Actions for Signatures pixfirewall(config)# ip audit attack [action [alarm] [drop] [reset]] ip audit info [action [alarm] [drop] [reset]] Specifies the default actions for attack signatures. Specifies the default actions for informational signatures. pixfirewall(config)# ip audit info action alarm drop When the PIX Firewall detects an info signature, it reports an event to all configured Syslog servers and drops the offending packet.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-21 pixfirewall(config)# ip audit signature signature_number disable pixfirewall(config)# ip audit signature 6102 disable Disable Intrusion Detection Signatures Excludes a signature from auditing. Disables signature 6102.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-22 Shunning

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-23 shun Command Applies a blocking function to an interface under attack. pixfirewall(config)# shun src_ip [dst_ip sport dport [protocol]] pixfirewall(config)# shun No further traffic from is allowed.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-24 Shunning an Attacker pixfirewall(config)# shun Attacker Target X SRC: :4000, DST: :53 Port 4000 Port 53 Internet

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-25 Summary

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-26 Summary The PIX Firewall has the following attack guards to help protect systems from malicious attacks: Mail Guard, DNS Guard, FragGuard and Virtual Reassembly, AAA Flood Guard, and SYN Flood Guard. Cisco PIX Firewall Software Version 5.2 and higher support intrusion detection. Intrusion detection is the ability to detect attacks against a network, including reconnaissance, access, and DoS attacks. The PIX Firewall supports signature-based intrusion detection.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-27 Summary (Cont.) Each signature can generate a unique alarm and response. Informational signatures collect information to help determine the validity of an attack, or for forensics. Attack signatures trigger on an activity known to be, or that could lead to, unauthorized data retrieval, system access, or privileged escalation. The PIX Firewall can be configured to shun source address of attacking hosts.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-28 Lab Exercise

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2— Q P.0 Lab Visual Objective.2.1 Student PC Syslog server PIX Firewall PIX Firewall.1 Local: 10.0.P.11 Local: 10.0.Q P Q.0 RTS.100 RTS.100 Pods 1–5 Pods 6– Web FTP RBB.2 Bastion host: Web FTP P Q.0 Bastion host: Web FTP.1 Student PC Syslog server