Presentation is loading. Please wait.

Presentation is loading. Please wait.

11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.

Similar presentations


Presentation on theme: "11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure."— Presentation transcript:

1 11 SECURING YOUR NETWORK PERIMETER Chapter 10

2 Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure network perimeters.  Implement firewalls.  Establish secure topologies.  Secure network perimeters.  Implement firewalls.

3 Chapter 10: SECURING YOUR NETWORK PERIMETER3 SECURING YOUR NETWORK PERIMETER  Secure the network perimeter, not just individual components.  Secure connections between components.  Use security zones.  Manage network traffic between security zones.  The most important zone or boundary is the Internet.  Firewalls are boundary control devices.  Secure the network perimeter, not just individual components.  Secure connections between components.  Use security zones.  Manage network traffic between security zones.  The most important zone or boundary is the Internet.  Firewalls are boundary control devices.

4 Chapter 10: SECURING YOUR NETWORK PERIMETER4 ESTABLISHING SECURE TOPOLOGIES  Secure topology is a network design.  Group devices in security zones.  Segregate network traffic.  Control the information flow.  Secure topology is a network design.  Group devices in security zones.  Segregate network traffic.  Control the information flow.

5 Chapter 10: SECURING YOUR NETWORK PERIMETER5 SECURITY ZONES  Security zones group assets with similar security requirements.  They segregate mission critical systems.  Access control mechanisms define what access is allowed between zones.  Security zones reduce the attack surface of network resources.  Security zones focus your attention on possible threats and vulnerabilities.  Security zones group assets with similar security requirements.  They segregate mission critical systems.  Access control mechanisms define what access is allowed between zones.  Security zones reduce the attack surface of network resources.  Security zones focus your attention on possible threats and vulnerabilities.

6 Chapter 10: SECURING YOUR NETWORK PERIMETER6 VIRTUAL LOCAL AREA NETWORKS (VLANS)  Used to segment a network into smaller subnetworks  Used to create security zones  Are virtual subnets  Are created by using switches  Are supported by routers  Used to segment a network into smaller subnetworks  Used to create security zones  Are virtual subnets  Are created by using switches  Are supported by routers

7 Chapter 10: SECURING YOUR NETWORK PERIMETER7 VIRTUAL LOCAL AREA NETWORKS (VLANS) (CONT.)  Restrict broadcast traffic  Are flexible and scalable  Hide the physical configuration of network  Need secure and physically protected switches  Restrict broadcast traffic  Are flexible and scalable  Hide the physical configuration of network  Need secure and physically protected switches

8 Chapter 10: SECURING YOUR NETWORK PERIMETER8 SECURING NETWORK PERIMETERS  Establish boundaries between security zones.  Separate the private network from the Internet.  Define allowed traffic that can cross the perimeter.  Use routers and firewalls to control perimeter traffic.  Filter for malicious code.  Monitor for intrusion activities.  Establish boundaries between security zones.  Separate the private network from the Internet.  Define allowed traffic that can cross the perimeter.  Use routers and firewalls to control perimeter traffic.  Filter for malicious code.  Monitor for intrusion activities.

9 Chapter 10: SECURING YOUR NETWORK PERIMETER9 ESTABLISHING NETWORK SECURITY ZONES  Place firewalls between internal and external networks.  Use multiple firewalls if you need to create multiple layers of protection.  Put Internet-accessible resources in separate network segments.  The segment between firewalls is called a perimeter network, demilitarized zone (DMZ), or screened subnet  Place firewalls between internal and external networks.  Use multiple firewalls if you need to create multiple layers of protection.  Put Internet-accessible resources in separate network segments.  The segment between firewalls is called a perimeter network, demilitarized zone (DMZ), or screened subnet

10 Chapter 10: SECURING YOUR NETWORK PERIMETER10 COMMON SECURITY ZONES  Intranet  Perimeter network  Extranet  Internet  Intranet  Perimeter network  Extranet  Internet

11 Chapter 10: SECURING YOUR NETWORK PERIMETER11 CONFIGURATION OF SECURITY ZONES

12 Chapter 10: SECURING YOUR NETWORK PERIMETER12 INTRANET  Is the primary and most sensitive security zone of an organization  Is also known as an internal network, private network, or LAN  Contains all private internal resources  Is considered a trusted network  Is vulnerable to internal attackers  Is the primary and most sensitive security zone of an organization  Is also known as an internal network, private network, or LAN  Contains all private internal resources  Is considered a trusted network  Is vulnerable to internal attackers

13 Chapter 10: SECURING YOUR NETWORK PERIMETER13 SECURING AN INTRANET  Deploy firewalls against all other networks.  Install and update antivirus solutions.  Audit and monitor online activity.  Secure systems hosting confidential data.  Manage the security of the physical infrastructure.  Deploy firewalls against all other networks.  Install and update antivirus solutions.  Audit and monitor online activity.  Secure systems hosting confidential data.  Manage the security of the physical infrastructure.

14 Chapter 10: SECURING YOUR NETWORK PERIMETER14 SECURING AN INTRANET (CONT.)  Check for unauthorized devices.  Restrict access to critical systems.  Control physical access.  Remove all unnecessary services from server systems.  Check for unauthorized devices.  Restrict access to critical systems.  Control physical access.  Remove all unnecessary services from server systems.

15 Chapter 10: SECURING YOUR NETWORK PERIMETER15 PERIMETER NETWORK  Grant controlled access to public resources  Prevent external traffic from entering intranet  Are also called DMZs or screened subnets  Are used to provide a buffer between the private trusted network and the Internet or untrusted network segments  Grant controlled access to public resources  Prevent external traffic from entering intranet  Are also called DMZs or screened subnets  Are used to provide a buffer between the private trusted network and the Internet or untrusted network segments

16 Chapter 10: SECURING YOUR NETWORK PERIMETER16 SECURING A PERIMETER NETWORK  Use firewalls to provide protection from external untrusted networks.  Remove all unnecessary services.  Audit all online activity.  Separate name resolution services.  Remove or restrict remote management services.  Carefully document and audit all physical and logical configurations.  Frequently back up data and configurations.  Use firewalls to provide protection from external untrusted networks.  Remove all unnecessary services.  Audit all online activity.  Separate name resolution services.  Remove or restrict remote management services.  Carefully document and audit all physical and logical configurations.  Frequently back up data and configurations.

17 Chapter 10: SECURING YOUR NETWORK PERIMETER17 EXTRANET  Is used for partner access to controlled resources  Is used to share information between members of multiple organizations  Requires authenticated external connections  Is often directly accessible from the Internet  Might use virtual private networks (VPNs)  Is used for partner access to controlled resources  Is used to share information between members of multiple organizations  Requires authenticated external connections  Is often directly accessible from the Internet  Might use virtual private networks (VPNs)

18 Chapter 10: SECURING YOUR NETWORK PERIMETER18 METHODS OF EXTRANET ACCESS

19 Chapter 10: SECURING YOUR NETWORK PERIMETER19 SECURING AN EXTRANET  Use firewalls to provide protection from the external network.  Authenticate all access.  Remove all unnecessary services.  Audit all network and service access.  Use firewalls to provide protection from the external network.  Authenticate all access.  Remove all unnecessary services.  Audit all network and service access.

20 Chapter 10: SECURING YOUR NETWORK PERIMETER20 PERIMETER NETWORK TYPES  Perimeter networks are established by means of firewalls.  Firewalls manage traffic across the boundaries of different security zones.  There are two common perimeter networks designs:  Three-pronged design  Back-to-back design  Perimeter networks are established by means of firewalls.  Firewalls manage traffic across the boundaries of different security zones.  There are two common perimeter networks designs:  Three-pronged design  Back-to-back design

21 Chapter 10: SECURING YOUR NETWORK PERIMETER21 THREE-PRONGED PERIMETER NETWORK DESIGN  Uses a single firewall  Connects the Internet, an intranet, and a perimeter network  Can be a single point of failure  Uses a single firewall  Connects the Internet, an intranet, and a perimeter network  Can be a single point of failure

22 Chapter 10: SECURING YOUR NETWORK PERIMETER22 THREE-PRONGED PERIMETER NETWORK

23 Chapter 10: SECURING YOUR NETWORK PERIMETER23 BACK-TO-BACK PERIMETER NETWORK DESIGN  Uses two firewalls  Is also called buffer network or screened subnet  Has no single point of failure  Supports more restrictive security rules  Increases the security of the intranet  Provides defense-in-depth protection  Uses two firewalls  Is also called buffer network or screened subnet  Has no single point of failure  Supports more restrictive security rules  Increases the security of the intranet  Provides defense-in-depth protection

24 Chapter 10: SECURING YOUR NETWORK PERIMETER24 BACK-TO-BACK PERIMETER NETWORK

25 Chapter 10: SECURING YOUR NETWORK PERIMETER25 USING AN N-TIER ARCHITECTURE  An n-tier architecture provides multiple tiers of security zones.  Each tier supports a portion of a business operation.  Traffic is controlled between each tier.  Compromise of one tier does not imply complete failure.  An n-tier architecture provides multiple tiers of security zones.  Each tier supports a portion of a business operation.  Traffic is controlled between each tier.  Compromise of one tier does not imply complete failure.

26 Chapter 10: SECURING YOUR NETWORK PERIMETER26 A 3-TIER NETWORK DESIGN

27 Chapter 10: SECURING YOUR NETWORK PERIMETER27 BASTION HOSTS  A bastion host is a single host that provides all externally accessible services.  A single firewall routes external traffic to the bastion host.  All access is tightly controlled and monitored.  This is the least secure network design.  A bastion host is a single host that provides all externally accessible services.  A single firewall routes external traffic to the bastion host.  All access is tightly controlled and monitored.  This is the least secure network design.

28 Chapter 10: SECURING YOUR NETWORK PERIMETER28 A BASTION HOST DESIGN

29 Chapter 10: SECURING YOUR NETWORK PERIMETER29 NETWORK PERIMETER SECURITY AND TRAFFIC CONTROL  Block all traffic by default.  Define exceptions for authorized traffic.  Allow only required network traffic.  Don't trust all outgoing traffic by default.  Inspect blocked traffic and track down the source.  Block all traffic by default.  Define exceptions for authorized traffic.  Allow only required network traffic.  Don't trust all outgoing traffic by default.  Inspect blocked traffic and track down the source.

30 Chapter 10: SECURING YOUR NETWORK PERIMETER30 FIREWALL FUNCTIONS  Protect a network from malicious hackers and software  Block external threats  Filter inbound and outbound traffic  Separate private networks from the Internet  Separate subnets or individual systems  Protect a network from malicious hackers and software  Block external threats  Filter inbound and outbound traffic  Separate private networks from the Internet  Separate subnets or individual systems

31 Chapter 10: SECURING YOUR NETWORK PERIMETER31 FIREWALL TYPES  Packet filtering  Application filtering  Circuit-level inspection  Stateful inspection  Content inspection  Proxy server functionality  Packet filtering  Application filtering  Circuit-level inspection  Stateful inspection  Content inspection  Proxy server functionality

32 Chapter 10: SECURING YOUR NETWORK PERIMETER32 USING PACKET FILTERING  A packet filtering firewall inspects the header of each packet.  The firewall forwards or drops each packet based on rules.  Packet filter rules focus on inbound or outbound packets.  Packet filter rules judge source or destination address, other header field content, or packet size.  Most firewalls and routers can perform packet filtering.  A packet filtering firewall inspects the header of each packet.  The firewall forwards or drops each packet based on rules.  Packet filter rules focus on inbound or outbound packets.  Packet filter rules judge source or destination address, other header field content, or packet size.  Most firewalls and routers can perform packet filtering.

33 Chapter 10: SECURING YOUR NETWORK PERIMETER33 COMMON FILTER-FOCUSED HEADER FIELDS  Source IP Address  Destination IP Address  IP Protocol ID  Source TCP or UDP Port Number  Destination TCP or UDP Port Number  Source IP Address  Destination IP Address  IP Protocol ID  Source TCP or UDP Port Number  Destination TCP or UDP Port Number

34 Chapter 10: SECURING YOUR NETWORK PERIMETER34 COMMON FILTER-FOCUSED HEADER FIELDS (CONT.)  Protocol and Port Numbers  ICMP Message Type  Fragmentation Flags  IP Options  Protocol and Port Numbers  ICMP Message Type  Fragmentation Flags  IP Options

35 Chapter 10: SECURING YOUR NETWORK PERIMETER35 A PACKET FILTERING FIREWALL

36 Chapter 10: SECURING YOUR NETWORK PERIMETER36 CIRCUIT-LEVEL INSPECTION  This type of inspection does not examine each packet.  Circuit-level inspection monitors connection establishment.  If a connection is allowed, no further restrictions are imposed.  Circuit-level inspection is more efficient than packet-filtering.  Many firewalls can perform circuit-level inspection.  This type of inspection does not examine each packet.  Circuit-level inspection monitors connection establishment.  If a connection is allowed, no further restrictions are imposed.  Circuit-level inspection is more efficient than packet-filtering.  Many firewalls can perform circuit-level inspection.

37 Chapter 10: SECURING YOUR NETWORK PERIMETER37 STATEFUL INSPECTION  Combines features of packet-filtering and circuit- level firewalls  First, restricts connections only to authorized users  Second, inspects subsequent packets to restrict traffic based on context  Combines features of packet-filtering and circuit- level firewalls  First, restricts connections only to authorized users  Second, inspects subsequent packets to restrict traffic based on context

38 Chapter 10: SECURING YOUR NETWORK PERIMETER38 APPLICATION LAYER FILTERING  Examines the content or payload of packets  Inspects packets based on the application used  Requires complex rules  Can detect a wide range of attacks and malicious code  Has slower performance than other methods  Examines the content or payload of packets  Inspects packets based on the application used  Requires complex rules  Can detect a wide range of attacks and malicious code  Has slower performance than other methods

39 Chapter 10: SECURING YOUR NETWORK PERIMETER39 TUNNELING  Tunneling is a technique used to bypass a firewall’s inspection mechanisms.  Tunneling encapsulates network packets in allowed network traffic.  Encryption is a common tunneling option.  If content inspection is not possible, an intrusion detection system (IDS) might be needed.  Tunneling is a technique used to bypass a firewall’s inspection mechanisms.  Tunneling encapsulates network packets in allowed network traffic.  Encryption is a common tunneling option.  If content inspection is not possible, an intrusion detection system (IDS) might be needed.

40 Chapter 10: SECURING YOUR NETWORK PERIMETER40 PROXY SERVERS  Is a circuit-level or application layer operation  Accepts connections from clients  Establishes a distinct connection to external servers  Has no direct connection between client and server  Supports content checking and resource caching  Is a circuit-level or application layer operation  Accepts connections from clients  Establishes a distinct connection to external servers  Has no direct connection between client and server  Supports content checking and resource caching

41 Chapter 10: SECURING YOUR NETWORK PERIMETER41 A PROXY SERVER

42 Chapter 10: SECURING YOUR NETWORK PERIMETER42 NETWORK ADDRESS TRANSLATION (NAT)  Allows multiple internal clients to access the Internet over a few public leased addresses  Converts and manages traffic through translation of IP addresses and port numbers  Allows use of the private IP addresses (10.x.x.x, 172.16.x.x–172.31.x.x, and 192.168.x.x)  Hides the internal network structure and address scheme  Prevents external entities from directly accessing internal clients  Allows multiple internal clients to access the Internet over a few public leased addresses  Converts and manages traffic through translation of IP addresses and port numbers  Allows use of the private IP addresses (10.x.x.x, 172.16.x.x–172.31.x.x, and 192.168.x.x)  Hides the internal network structure and address scheme  Prevents external entities from directly accessing internal clients

43 Chapter 10: SECURING YOUR NETWORK PERIMETER43 NAT VARIATIONS  Static NAT  Dynamic NAT  Port address translation (PAT)  Static NAT  Dynamic NAT  Port address translation (PAT)

44 Chapter 10: SECURING YOUR NETWORK PERIMETER44 FIREWALL ISSUES  Misconfiguration is a common cause of firewall failure.  Avoid default-allow and a default-deny rules.  Manage the rule execution order.  Keep firewalls patched and updated.  Misconfiguration is a common cause of firewall failure.  Avoid default-allow and a default-deny rules.  Manage the rule execution order.  Keep firewalls patched and updated.

45 Chapter 10: SECURING YOUR NETWORK PERIMETER45 FIREWALL VULNERABILITIES  Compromising the firewall management console or password  Circumventing the firewall  Physically tampering with the firewall  Creating outbound connections  Compromising the firewall management console or password  Circumventing the firewall  Physically tampering with the firewall  Creating outbound connections

46 Chapter 10: SECURING YOUR NETWORK PERIMETER46 SECURING FIREWALLS  Keep current on vendor-released information on your firewall.  Keep the firewall patched and updated.  Keep virus scanners updated.  Maintain physical access control.  Document the firewall configuration.  Keep current on vendor-released information on your firewall.  Keep the firewall patched and updated.  Keep virus scanners updated.  Maintain physical access control.  Document the firewall configuration.

47 Chapter 10: SECURING YOUR NETWORK PERIMETER47 SECURING FIREWALLS (CONT.)  Restrict management access.  Use complex passwords.  Test the firewall's filters and rules.  Look for bypasses or circumventions of the firewall's security.  Restrict management access.  Use complex passwords.  Test the firewall's filters and rules.  Look for bypasses or circumventions of the firewall's security.

48 Chapter 10: SECURING YOUR NETWORK PERIMETER48 SUMMARY  Security zones divide parts of the network that have different security requirements.  VLANs are a method for dividing a single physical network into separate broadcast domains.  Typical security zones are intranets, extranets, perimeter networks, and the Internet. Firewalls are often used to control traffic between these security zones.  Security zones divide parts of the network that have different security requirements.  VLANs are a method for dividing a single physical network into separate broadcast domains.  Typical security zones are intranets, extranets, perimeter networks, and the Internet. Firewalls are often used to control traffic between these security zones.

49 Chapter 10: SECURING YOUR NETWORK PERIMETER49 SUMMARY (CONT.)  The two most commonly used firewall topologies are the back-to-back design and the three-pronged design. A back- to-back design provides multiple layers of protection. The bastion host design provides the lowest level of security.  Firewalls differ in the features that they provide. Common features are packet filtering, circuit-level inspection, stateful inspection, application layer filtering, and proxy server functionality.  NAT allows multiple computers to communicate with the Internet by using a single routable IP address or a range of IP addresses. The main security benefit of NAT is that it hides hosts from the Internet.  The two most commonly used firewall topologies are the back-to-back design and the three-pronged design. A back- to-back design provides multiple layers of protection. The bastion host design provides the lowest level of security.  Firewalls differ in the features that they provide. Common features are packet filtering, circuit-level inspection, stateful inspection, application layer filtering, and proxy server functionality.  NAT allows multiple computers to communicate with the Internet by using a single routable IP address or a range of IP addresses. The main security benefit of NAT is that it hides hosts from the Internet.


Download ppt "11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure."

Similar presentations


Ads by Google