CISCO NETWORK FOUNDATION PROTECTION

Size: px
Start display at page:

Download "CISCO NETWORK FOUNDATION PROTECTION"

Transcription

1 CISCO NETWORK FOUNDATION PROTECTION Enterprise System Engineer Cisco Systems (Thailand) Ltd. 1

2 Agenda Introduction Configuring Cisco NFP Control Plane Protection Management Plane Protection Data Plane Protection Summary and References Q & A 2

3 Introduction 2005, Cisco Systems, Inc. All rights reserved. 3

4 Risk Landscape Denial of Service (DoS) attacks target the network infrastructure by generating IP traffic streams to the control plane at very high rates The control plane is forced to spend an inordinate amount of time, processing this malicious traffic Results in excessive CPU utilization and CPU resource hijacking by the hackers Examples of such attacks include: TCP SYN floods IP Fragments Internet Control Message Protocol (ICMP) Echo Requests Fraggle Attacks 4

5 Risk Landscape (Cont.) Attacks can devastate a network by causing: High route processor CPU utilization (near 100%) Loss of protocol keepalives and routing protocol updates Route flaps and major network transitions Slow or unresponsive interactive sessions via the CLI Route Processor resource exhaustion Resources such as memory and buffers are unavailable for legitimate IP data packets Indiscriminate packet drops for all incoming packets 5

6 Secure Network = Available Network Ability to Route Network Availability Ability to Manage Network Cisco NFP Foundation Protection, Messaging, 1/05 1/ , Cisco Systems, Inc. All rights reserved. Ability to Forward Data 6

7 Securing the Router Plane by Plane Ability to Route Secure Control Plane Network Availability Ability to Manage Secure Management Plane Ability to Forward Data Secure Data Plane Think Divide and Conquer : Methodical Approach to Protect Three Planes 7

8 Cisco NFP Protection Alcazar Program Secure Networks Must Be Built on a Secure Foundation Control Plane Protection Management Protection Lock down services and routing protocols Secure Access for Management and Instrumentation Data Plane Protection Protect Data forwarding through the device 8

9 Cisco NFP Three Planes Definitions Cisco Protection (NFP) is a Cisco IOS Technology suite that protects network devices, routing and forwarding of control information, and management of traffic bounded to the network devices Data Mgmt Control Control Plane Protection protects the control plane traffic responsible for traffic forwarding AutoSecure with rollback functionality Control Plane Protection CPU / Memory Threshold Management Plane Protection protects the management plane from unauthorized management access and polling Secure Shell (SSH) only access VTY Access Control List (ACL) Cisco IOS Software login enhancement Command Line Interface (CLI) views Data Plane Protection protects the data plane from malicious traffic Unicast RPF for anti-spoofing Control Plane Protection for Data traffic Committed Access Rate (CAR) 9

10 Cisco NFP: Features and Benefits Feature Benefits Control Plane Protection Control Plane Protection AutoSecure Routing protocol protection CPU/Memory Thresholding Reduces the success of a DDoS attack by policing the incoming rate of traffic to the control plane Quickly locks down devices based on industry recognized best practices (NSA guidelines) Validates routing peers and source/destination of routing updates, filtering of prefixes Router remains operational under high loads caused by attacks throug reserving CPU/memory Management Plane Protection Secure Access Image Verification Role Based CLI Views Network Telemetry SNMPv3, TACACS+, VTY ACLs, SSH Verifies the Cisco IOS Software images that the router boots from Allows for granular control of CLI with AAA user crential checking Cisco IOS NetFlow for traffic and DDoS analysis 10

11 Cisco NFP: Features and Benefits (Cont.) Feature Benefits Data Plane Protection Unicast RPF Anti Spoofing for source IP address Access Control Lists ACLs - filter traffic through a device Infrastructure ACL and CAR Remove possibility for illegitimate users to send any traffic to link addresses 11

12 Control Plane Protection 2005, Cisco Systems, Inc. All rights reserved. 12

13 Introduction Control Plane Protection Policing CONTROL PLANE Management SNMP, Telnet ICMP IPv6 Routing Updates Management SSH, SSL.. INPUT to the Control Plane OUTPUT from the Control Plane CONTROL PLANE POLICING (Alleviating DoS Attack) SILENT MODE (Reconnaissance Prevention) Processor Switched Packets PACKET BUFFER OUTPUT PACKET BUFFER INCOMING PACKETS Locally Switched Packets CEF/FIB LOOKUP 13

14 Introduction What CPU Rate Limiters Are Available? CEF Receive CEF Glean CEF No Route IP Errors ICMP Redirect ICMP No Route ICMP ACL Drop RPF Failure L3 Security ACL Input ACL Output VACL Logging IP Options Capture Unicast Rate Limiters Traffic destined to the Router ARP packets Packets with not route in the FIB Packets with IP checksum or length errors Packets that require ICMP redirects ICMP unreachables for unroutable packets ICMP uncreachables for admin deny packets Packets that fail urpf check CBAC, Auth-Proxy, and IPSEC traffic NAT, TCP Int, Reflexive ACLs, Log on ACLs NAT, TCP Int, Reflexive ACLs, Log on ACLs CLI notification of VACL denied packets Unicast traffic with IP Options set Used with Optimized ACL Logging B/BXL Unicast Rate Limiters Multicast FIB-Miss Packets with no mroute in the FIB IGMP IGMP packets Partial Shortcut Partial shortcut entries Directly Connected Local multicast on connected interface IP Options Multicast traffic with IP Options set B/BXL V6 Directly Connect Packets with no mroute in the FIB V6*, G M Bridge IGMP Packets V6*, G Bridge Partial shortcut entries V6 S, G Bridge Partial shortcut entries V6 Route Control Partial shortcut entries V6 Default Route Multicast traffic with IP Options set V6 Second Drop Mulicast traffic with IP Options set Shared across the 10 hardware Revocation Lists. Layer 2 Rate Limiters General Rate Limiters L2PT L2PT encapsulation/decapsulation MTU Failure Packets requiring fragmentation PDU Layer 2 PDUs TTL Failure Packets with TTL<=1 14

15 Configuring Control Plane Protection Policing Four Step Process Define a packet classification criteria router(config)# router(config)# class-map class-map <traffic_class_name> router(config-cmap)# match match <access-group> <access-group> Define a service policy router(config-pmap)# policy-map<service_policy_name> router(config-pmap)# class class <traffic_class_name> router(config-pmap)# police police <rate> <rate> conform-action conform-action transmit transmit exceed-action exceed-action drop drop Enter control-plane configuration mode router(config)# router(config)# control-plane control-plane router(config-cp)# router(config-cp)# Apply QoS Policy router(config-cp)# router(config-cp)# service-policy service-policy input input <service_policy_name service_policy_name> 15

16 Control Plane Policing Configuration Must enable QoS globally! (mls qos) Otherwise, CoPP is performed in software only Define ACLs to match traffic Permit means traffic will belong to class; deny means will fall through Define class-maps (class-map <name>) Use match statements to identify traffic associated with the class match {access-group ip {precedence dscp}} Define policy-map (policy-map <name>) and associate classes and actions to it Policing is the only supported action Usual Cisco Catalyst 6500 Series Switch policing syntax Tie the policy-map to the control-plane interface mls qos ip access-list extended CPP-MANAGEMENT remark Remote management permit tcp any any eq SSH permit tcp any eq 23 any permit tcp any any eq 23 class-map match-all CPP-MANAGEMENT description Important traffic, eg management match access-group name CPP-MANAGEMENT policy-map copp description Control plane policing policy class CPP-MANAGEMENT police conform-action transmit exceed-action drop control-plane service-policy input copp 16

17 Control Plane Policy Template class-map match-all cpp-bgp - BGP class-map match-all cpp-igp - EIGRP, OSPF, etc... class-map match-all cpp-management - SNMP, NTP, SSH, TACACS, TFTP, etc class-map match-all cpp-reporting - Echo, echo-reply with DSCP marking per class class-map match-all cpp-monitoring - ICMP, traceroute, etc class-map match-all cpp-critical-applications - HSRP, DLSw, SIP/VoIP, etc class-map match-all cpp-layer-2-protocols - ARP class-map match-all cpp-default - Non-specifically marked traffic class-map match-any cpp-deny - Classified attack traffic 17

18 Configuring CPU Rate Limiter Apply a CPU Rate Limiter at at a specific rate Router(config)# mls mlsrate-limit <all <all unicast multicast layer layer 2> 2> <special_case_rate_limiter> <packets_per_second> Example: Rate Limit traffic with TTL=1 to to 1000pps Router(config)# mls mlsrate-limit all all ttl-failure

19 Test Setup Mitigation of Multiple Attacks CPP configuration policy-map CoPP class cpp-bgp police conform-action transmit exceed-action transmit class cpp-igp police conform-action transmit exceed-action transmit class cpp-managment police conform-action transmit exceed-action transmit class cpp-monitoring police conform-action transmit exceed-action drop class cpp-critical police conform-action transmit exceed-action transmit class cpp-undesirable police conform-action drop exceed-action drop class cpp-default police conform-action transmit exceed-action drop CPU Rate Limiter configuration mls rate-limit multicast ipv4 partial mls rate-limit unicast ip options mls rate-limit all ttl-failure

20 AutoSecure 2005, Cisco Systems, Inc. All rights reserved. 20

21 Protecting routers: Autosecure AutoSecure command in 12.3(1), 12.2(18)S Cisco.com/en/US/products/sw/iosswrel/ps5187/products_feat ure_guide09186a008017d101.html One Touch Device Lockdown Simplify securing an IOS router and networks attached to an IOS router. Built from security audit scripts and security whitepapers that Cisco and others provide. Large networks uses these to lock down their network. Core Target is the CPE Routers on the edge of the Internet. 800/1800/2800/3700/3800 platforms, but applicable in large extent to all IOS platforms 21

22 AutoSecure : Global Services Global Services turned off Finger, PAD, Small Servers, Bootp, HTTP service, Identification Service, CDP, NTP, Source Routing Global Services turned on password-encryption service Tuning of scheduler interval/allocation tcp synwait-time tcp-keepalives-in and tcp-kepalives-out SPD configuration no ip unreachables for NULL0 22

23 AutoSecure : Services & Logging Services Disabled Per Interface ICMP Proxy-Arp Directed Broadcast - disables MOP service. disable icmp unreachables disable icmp mask reply messages. Provide Logging for security Enable sequence numbers & timestamp Provide a console log Set log buffered size Provide an interactive dialogue to configure the logging Log debug traffic 23

24 AutoSecure : Lockdown accessibility Secure Access to the router Check for a banner and provide facility to add text to Automatically Configure: login, password transport input & output exec-timeout local AAA ssh timeout and ssh authentication-retries to minimum enable only SSH, SCP for access and file transfer to/from the router. disables SNMP (if not being used.) 24

25 AutoSecure : Forwarding Plane Securing the Forwarding Plane Enables Cisco Express Forwarding (CEF) or Distributed Cisco Express Forwarding (DCEF) Anti-Spoofing Block all IANA reserved ip address blocks more information on this in Securing Routing part of the Techtorial Block private address blocks if customer desires If not using a default route, install a default route to NULL 0. If tcp intercept feature is available and user interested configure TCP intercept for connection-timeout. If router is being used as firewall, start interactive configuration for CBAC on interfaces facing internet. Enable netflow on software forwarding platforms. Password Security. 25

26 CPU and Memory Threshold Notification 2005, Cisco Systems, Inc. All rights reserved. 26

27 Reference slide CPU and Memory Threshold Notification CPU threshold notification 12.0(26)S, 12.3(4)T Generates an SNMP trap message when a predefined threshold of CPU usage is crossed process cpu threshold type total rising 80 interval 5 falling 70 interval 5 snmp-server host traps public cpu Memory threshold notification (26)S and 12.2(18)S If available free processor or I/O memory falls below the specified thresholds, the router will log an event; network operations staff can investigate, and if necessary take action, before router performance is impacted or free memory becomes so low that the router is in danger of crashing memory free low-watermark processor memory free low-watermark io memory reserve critical

28 CPU Thresholding snmp-server enable traps cpu threshold process cpu threshold type total rising 80 interval 5 falling 70 interval Rising SNMP Trap TIME 5 Falling SNMP Trap CPU 28

29 Memory Thresholding memory free low-watermark processor (KB) Memory (Mb) : *Aug 12 22:31:19.559: %SYS-4-FREEMEMLOW: Free Memory has dropped below 20000k Pool: Processor Free: freemem_lwm: : *Aug 12 22:33:29.411: %SYS-5-FREEMEMRECOVER: Free Memory has recovered 20000k Pool: Processor Free: freemem_lwm: 0 memory reserved critical TIME Rising Memory will trigger at 5% Above low watermark Memory Free 29

30 Management Plane Protection 2005, Cisco Systems, Inc. All rights reserved. 30

31 Access to the Router Console, VTY Telnet (not recommended, use SSH!) SSHv2 end-to-end security Local passwords Username based on the router Username XXX secret YYYY External AAA TACACS+, RADIUS, Kerberos One-Time Passwords (OTP) Use enable secret 31

32 VTY Security Reference slide Access to VTYs should be controlled ACL used to filter incoming data Logging can be used to provide more information access-list 3 permit access-list 3 deny any line vty 0 4 access-class 3 in transport input ssh transport output none Only accept SSH, no telnet! 32

33 Reference slide What Ports Are Open on the Router? It may be useful to see what sockets/ports are open on the router Show ip sockets show some of the UDP ports opened IOSRouter#show ip sockets Proto Remote Port Local Port In Out Stat TTY listen

34 Reference slide What Ports Are Open on the Router? Two steps required for TCP ports: show tcp brief all show tcp tcb c1711#sh tcp brief all TCB Local Address Foreign Address (state) 86F5C ESTAB 82A72B0C *.443 *.* LISTEN C *.80 *.* LISTEN 827AB9EC *.1723 *.* LISTEN 34

35 Reference slide What Ports Are Open on the Router? c1711#sh tcp tcb 86F5C210 Connection state is ESTAB, I/O status: 1, unread input bytes: 0 Connection is ECN Disabled Local host: , Local port: 22 Foreign host: , Foreign port: 4807 Enqueued packets for retransmit: 1, input: 0 mis-ordered: 0 (0 bytes) Event Timers (current time is 0x6A77C230): Timer Starts Wakeups Next Retrans x6A77C8B4 TimeWait 0 0 0x0 AckHold x0 SendWnd 0 0 0x0 KeepAlive x6A78AC8C GiveUp 0 0 0x0 PmtuAger 0 0 0x0 DeadWait 0 0 0x0 iss: snduna: sndnxt: sndwnd: irs: rcvnxt: rcvwnd: 4028 delrcvwnd:

36 Network Time Protocol Reference slide Synchronize time across all devices When security event occurs, data must have consistent timestamps From external time source Upstream ISP, Internet, GPS, atomic clock From internal time source Router can act as stratum 1 time source ntp source loopback0 ntp server source loopback0 Secure NTP! ntp authentication-key 10 md5 keystring ntp authenticate ntp trusted-key 10 36

37 Configuring Syslog on a Router Syslog data is invaluable Attack forensics Day to day events and debugging To log messages to a syslog server host, use the logging global configuration command logging host logging trap level To log to internal buffer use: logging buffered size Ensure timestamps service timestamps log Do not log to console! It can cause overruns and high CPU loads 37

38 SNMP Version 1 sends cleartext community strings and has no policy reference Version 2 addresses some of the known security weaknesses of SNMPv1 Version 3 provides authentication, encryption Not yet widely deployed In IOX today (CRS-1) Confirm NMS application support RFC-2570 Introduction to Version 3 of the Internet-Standard Network Management Framework Recommended 38

39 Config Change Notification and Logging Allows the tracking of configuration changes entered on a per-session and per-user basis by implementing a configuration log Tracks each configuration command that is applied, who applied the command, the parser return code for that command, and the time that the command was applied Adds a notification mechanism that sends asynchronous notifications to registered applications whenever the configuration log changes Available 12.3(4)T on 1800, 2800, 3800, 7200, 7500, AS5xxx 207/products_feature_guide09186a00801d1e81.html Also Contextual Configuration Diff utility 207/products_feature_guide09186a00801d1dc2.html 39

40 ICMP Unreachable Overload Packets that cannot be delivered due to: Null0 next-hops (in some cases) No route in table Risk high number of unreachables overloading CPU no ip unreachables In certain situations we might want ICMP unreachables enabled, but need to limit the generation in order to protect the router: ICMP Unreachable Rate-Limiting Command: ip icmp rate-limit unreachable [DF] < milliseconds> no ip icmp rate-limit unreachable [df] 40

41 New Feature IOS Login Enhancements Login enhancements password retry delay Adds new flexibility to lock-out unwanted attempts to access the device Introduces a delay between successive failed Login attempts to alleviate dictionary attacks New global command login delay Generation of syslog messages for login detection Available from 12.3(4)T ps5207/products_feature_guide09186a00801d1cb3.html 41

42 Limit Authority: Authorize Commands Differentiate staff authority on the router Help desk Operations Second level/third level support Use privilege levels (0 15) System Administrator Level 2: show, debug, ping Network Engineer Level 15: all commands Router 42

43 New Feature Role-Based CLI Access New feature: Role-based CLI, aka CLI views Defines CLI access based on administrative roles Security Enhances the security of the device by defining the set of CLI commands that are accessible to a particular user Availability Avoids unintentional execution of CLI commands by unauthorized personnel Operational efficiency Prohibits users from viewing CLI commands that are inaccessible to them, greatly improving usability Available from 12.3(7)T /products_feature_guide09186a00801ee18d.html 43

44 NetFlow 2005, Cisco Systems, Inc. All rights reserved. 44

45 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network changes and services Improve network usage and application performance Reduce IP service and application costs Optimize network costs Detect and classify security incidents 1. Characterize Flows & understand traffic behaviour 2. Export Flow information 3. Traffic Analysis Network Planning Security Analysis Reports Enable NetFlow 45

46 Flow is Defined by Seven Unique Keys Source IP address Destination IP address Source port Destination port Layer 3 protocol type Type of Service (ToS) byte (Differentiated Services Code Point (DSCP)) Input logical interface (ifindex) Enable NetFlow NetFlow Export Packets Traffic Traditional Export & Collector New SNMP MIB Interface SNMP Poller GUI 46

47 NetFlow Cache Example 1. Create and update flows in NetFlow cache Srclf SrclPadd Dstlf DstlPadd Protocol TOS Flgs Pkts Src Port Src Msk Src AS Dst Port Dst Msk Dst AS NextHop Bytes/ Pkt Active Idle Fa1/ Fa0/ A2 / A 2 / Fa1/ Fa0/ / / Fa1/ Fa0/ A1 / A 1 / Fa1/ Fa0/ / / Expiration Inactive timer is expired (15 sec is default) Active timer is expired (30 min (1800 sec) is default) NetFlow cache is full (oldest flows are expired) RST or FIN TCP Flag Srclf SrclPadd Dstlf DstlPadd Protocol TOS Flgs Pkts Src Port Src Msk Src AS Dst Port Dst Msk Dst AS NextHop Bytes/ Pkt Active Idle Fa1/ Fa0/ A2 / A2 / Aggregation 4. Export version 5. Transport protocol No Non-Aggregated Flows Export Version 5 or 9 Export Packet Header Payload (Flows) Yes e.g. Protocol-Port Aggregation Scheme Becomes Protocol 11 Pkts SrcPort 00A2 DstPort 00A2 Bytes/Pkt 1528 Aggregated Flows Export Version 8 or 9 47

48 How Does a DoS Attack Look Like? Potential DoS attack (33 flows) on router1 Estimated: 660 pkt/s Mbps ASxxx is: ASddd is: Real data deleted in this presentation src_ip dst_ip in out src dest pkts bytes prot src_as dst_as int int port port 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 192.xx.xxx yyy.yyy xxx ddd 48

49 Tracing Back with Netflow Routers need Netflow to be enabled Victim router1#sh ip cache flow include <destination> Se1 <source> Et0 <destination> (lots more flows to the same destination) The flows come from serial 1 router1#sh ip cef se1 Prefix Next Hop Interface / Serial /30 attached Serial1 Find the upstream router on serial 1 Continue on this router 49

50 show ip cache flow router_a#sh ip cache flow IP packet size distribution (85435 total packets): IP Flow Switching Cache, bytes 2728 active, 1368 inactive, added ager polls, 0 flow alloc failures Active flows timeout in 30 minutes Source Interface Flow info summary Inactive flows timeout in 15 seconds last clearing of statistics never Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec) Flows /Sec /Flow /Pkt /Sec /Flow /Flow TCP-X TCP-other SrcIf Total: Et0/0 SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts Et0/0 Et0/ Se0/ AEE Et0/ Se0/ D Et0/0 Et0/ Se0/ CB Flow details 50

51 show ip cache verbose flow router_a#sh ip cache verbose flow IP packet size distribution (23597 total packets): IP Flow Switching Cache, bytes 1323 active, 2773 inactive, added ager polls, 0 flow alloc failures Active flows timeout in 30 minutes Inactive flows timeout in 15 seconds last clearing of statistics never Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec) Flows /Sec /Flow /Pkt /Sec /Flow /Flow TCP-other Total: SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts Port Msk AS Port Msk AS NextHop B/Pk Active Et0/ Se0/ FA7 / / Et0/ Se0/ Port Msk AS Port Msk AS NextHop B/Pk Active 51

52 NetFlow MIB Currently available in Cisco IOS Software Releases 12.3(7)T NetFlow information is available: When using SNMP Without NetFlow export Administration of Netflow using the MIB interface NetFlow MIB cannot be used to retrieve all Flow information, but is very useful for security monitoring and locations where export is not possible Packet size distribution Number of bytes exported per second Number of NetFlow MIB flows with Export of Top N talkers Top N Talkers Top N Flows are based on various NetFlow field values (AS Number, destination, ports) MIB and CLI support Releases 12.2(25)S and 12.3(11)T 52

53 NetFlow Security Enhancement Release 12.4(2nd)T Q4 05 New show commands to understand and parse NetFlow data show flows on port X to destination Y: show ip flow top <N> <aggregate-field> <sort-criteria> <matchcriteria> show ip flow top 10 destination-address packets interface ser0 port-range 100 to

54 Network Based Application Recognition (NBAR) 2005, Cisco Systems, Inc. All rights reserved. 54

55 Overview of NetFlow and Network Based Application Recognition NetFlow Pioneering IP accounting technology Invented and patented by Cisco IETF export standard Network-Based Application Recognition (NBAR) Intelligent application recognition Analyzes and identifies application traffic in real time Classification based on deep packet inspection; NBAR can look deeper into the packet to identify applications HTTP traffic by URL, host name, header fields or MIME type using regular expressions (*,?, [ ]), Citrix ICA traffic, RTP payload type classification Currently supports 90 protocols/applications 55

56 NetFlow and NBAR Differentiation Link layer header IP header TCP/UDP header Data packet Interface TOS Protocol Source IP address Destination IP address Source port Destination port Deep packet (payload) inspection NetFlow NBAR NetFlow and NBAR both leverage Layer 3 and 4 header information NetFlow Monitors data in Layers 2 through 4 Determines applications by port Utilizes a 7-tuple for flow NBAR Examines data from Layers 3 through 7 Uses Layers 3 and 4 plus packet inspection for classification Stateful inspection of dynamicport traffic 56

57 NetFlow and NBAR Benefit Footprints Enterprise backbone Enterprise premise edge Service Provider aggregation edge Service Provider core NetFlow Cisco Catalyst 4500, 5000, 6500, 7600 Series ASIC Cisco Catalyst 5000, 6500 Series HW Acceleration Cisco Catalyst 4500 Series ASIC Cisco 7100, 7200, 7300, Series Cisco AS5300,AS5400, AS5800 Series Cisco 830, 1400, 1700, 1800, 2600XM, 2800, 3700, 3800 Series Cisco Catalyst 4500, 5000, 6500 Series; Cisco 7600 Series ASIC Cisco 7100, 7200, 7300, Series Cisco AS5300 and AS5800 Series Cisco MGX8000 Series Cisco and Series Internet Routers ASIC Cisco Catalyst 5000 and 6500 Series; Cisco 7600 Series ASIC Cisco 7500 Series NBAR Cisco Catalyst 6500 and 7600 Series MSFC Planned Network ASIC Foundation Cisco Catalyst 6500 and 7600 Series FlexWAN, MWAM Planned ASIC Cisco 7100, 7200, and 7500 Series Cisco 830, 1700, XM, 2800,3700 and 3800 Series Cisco Catalyst 6500 and 7600 Series FlexWAN, MWAM Planned ASIC Cisco 7100, 7200, and 7500 Series Cisco Catalyst 6500 and 7600 Series FlexWAN, MWAM Planned ASIC Cisco 7500 Series 57

58 Network Based Application Recognition IP packet Stateful and dynamic inspection TCP/UDP packet Data packet ToS Protocol Source IP addr Dest IP addr Src port Dst port Sub-port/deep inspection egp exchange kerberos secure-nntp smtp gre finger l2tp notes snmp icmp ftp ldap novadigm socks ipinip secure-ftp secure-ldap ntp sqlnet ipsec gopher netshow pcanywhere ssh eigrp http pptp pop3 streamwork bgp secure-http sqlserver secure-pop3 syslog cuseeme imap netbios printer telnet dhcp irc nfs realaudio secure-telent dns secure-irc nntp rcmd tftp H.323 SIP MGCP Fasttrack Cisco IOS Software Release 12.4(2)T: NBAR and Distributed Network-Based Application Recognition citrix Edonkey napster BitTorrent vdolive xwindows 58

59 Packet Description Language Modules Packet Description Language Modules (PDLMs) define applications recognized by NBAR New applications supported by adding new PDLMs No Cisco IOS Software upgrade or reboot required to add new PDLMs New Cisco IOS Software required only when enhanced NBAR infrastructure is required for new PDLM functionality New PDLMs are incorporated natively into subsequent Cisco IOS Software releases Only new/updated PDLMs are loaded Must be produced by Cisco engineers 59

60 NBAR User-Defined Custom Application Classification IP packet TCP/UDP packet Data packet ToS Protocol Source IP Addr Dest IP Addr Src Port Dst Port FFFF0000MoonbeamFFFF Name Name the match criteria up to 24 characters lunar_light Offset Specify the beginning byte of string or value to be matched in the data packet, counting from zero for the first byte Skip first 8 bytes Format Define the format of the match criteria ASCII, hex or decimal ascii Value The value to match in the packet If ASCII, up to 16 characters Moonbeam [Source or destination port] Optionally restrict the direction of packet inspection; defaults to both directions if not specified [source destination] TCP or UDP Indicate the protocol encapsulated in the IP packet tcp Range or selected port number(s) range with start and end port numbers, up to to 16 individual port numbers range ip nbar custom lunar_light 8 ascii Moonbeam tcp range class-map solar_system match protocol lunar_light policy-map astronomy class solar_system set ip dscp AF21 interface <> Example service-policy output astronomy 60

61 NBAR HTTP Classification Extended Inspection: NBAR looks for an HTTP-specific signature in ports beyond well-known TCP port 80 HTTP GET request contains host/url string HTTP GET request HTTP Clients Router X Responses to HTTP GET Optionally, HTTP responses may be further classified by MIME-type Router Y router(config-cmap)#match protocol http? host host-name-string -- Match Host Name url url-string -- Match URL String mime MIME-type -- Match MIME Type c-header-field -- Client general header field s-header-field -- Server general header field HTTP server Match protocol http: 61

62 NBAR Protocol Discovery MIB Provides statistics per application, per interface via SNMP Enable or disable protocol discovery per interface Display protocol discovery statistics Configure and view multiple top-n tables listing protocols by bandwidth usage Configure thresholds: report breaches and send notifications when these thresholds are crossed Supported by Cisco QoS partners Concord Communications InfoVista: traffic monitoring; DoS attack mitigation NBAR Protocol Discovery MIB apter09186a htmlcisco-nbar-protocol-discovery-mib Cisco NBAR Protocol Discovery MIB 62

63 Unicast Reverse Path Forward (urpf) 2005, Cisco Systems, Inc. All rights reserved. 63

64 Unicast RPF Overview Cisco Express Forwarding is required Checks to determine whether any packet that is received at a router interface arrives on one of the best return paths to the source of the packet Performs a reverse lookup in the Cisco Express Forwarding table - if urpf does not find a reverse path for the packet, urpf can drop the packet Two types of urpf: Strict mode urpf requires that the source IP address of an incoming packet has a FIB path to the SAME interface as that on which the packet arrived Loose mode urpf requires that the source IP address of an incoming packet has a FIB path to ANY interface on the device, except null 64

65 Unicast RPF Benefits Operationally simple to maintain urpf path validation criteria is based upon the dynamically updated IP routing tables Network address and routing changes are automatically taken into account, with no static entries to maintain Implementation introduces minimal performance impact on the router or switch 65

66 urpf Strict Mode router(config-if)# ip verify unicast reverse-path or: ip verify unicast source reachable-via rx allow-default int 2 int 2 int 1 int 3 int 1 int 3 S x D data S x D data S y D data FIB FIB Sy D data Dest Path S x int 1 S y int 2 S z null0 Dest Path Sx int 1 S y int 2 S z null0 sourceip=rx int? sourceip=rx int? IP verify unicast source reachable via rx 66

67 urpf Loose Mode router(config-if)# ip verify unicast source reachable-via any int 2 int 2 int 1 int 3 int 1 int 3 S y D data S y D data S z D data Sz D data FIB Dest Path S x int 1 S y int 2 S z null0 sourceip=any int? FIB Dest Path Sx int 1 S y int 2 S z null0 sourceip=any int? IP verify unicast source reachable via any 67

68 Integrated Switch Security 2005, Cisco Systems, Inc. All rights reserved. 68

69 Port Security MAC Port A 1 B 2 C 3 MAC B Port 2 MAC A Port 1 Port 3 X C->A X -> A Port Security allows 1 Mac ONLY Blocks 2nd Mac Address MAC C 69

70 Enabling Port Security Enabling Port Security Interface < Interface ID > switchport port-security Defines Maximum Number of MAC address Interface < Interface ID > switchport port-security maximum N Defines Violation Actions Interface < Interface ID > switchport port-security violation {restrict shutdown} Binds Static MAC Address Interface < Interface ID > switchport port-security mac-addressmac_address 70

71 Man in the Middle Attack Exploiting DHCP Services Pool1 Pool 2 Pool3 Pool4 Accepts Binding (Which Ever Come First) IP Addr DNS/WINS Gateway DHCP Offer DHCP Req DHCP Offer Allocates Legitimate IP Address Valid DNS It Self As GateWay 71

72 Enabling DHCP Snooping Trust/Untrust Enabling IP DHCP Snooping ip dhcp snooping Enabling IP DHCP Snooping on Specific VLAN ip dhcp snoop vlan X Enabling DHCP Rate Limiting interface < Interface ID > ip dhcp snooping trust // Server 72

73 Preventing Eavedropping : Dynamic ARP Inspection DHCP Server Learns IP-MAC bindings via DHCP Req/Offer. Allows Packets with matching IP : MAC X User uses Static IP Address X User uses DHCP Allocated IP Address User uses someone s IP Address 73

74 Enabling Dynamic ARP Inspection Enabling IP DHCP Snooping ip dhcp snooping Enabling IP DHCP Snooping on Specific VLAN ip dhcp snoop vlan X Enabling Dynamic Arp Inspection ip arp inspection vlan X 74

75 Summary and References 2005, Cisco Systems, Inc. All rights reserved. 75

76 Cisco Worm Protection in Action System Under Attack Si Si Si Infected Sources Core Protect End Systems the End Overloaded Systems Cisco High Security CPU Applications AgentImpacted System Crashes Access Distribution Police the Links Network Telemetry Traffic Rate Limiting Prefix filtering Protect Network the Network Links Overloaded Devices Loss Auto of Availability Secure Control High Plane Packet Protection Loss CPU/Memory Latency Threshold Role Applications based CLI Impacted Access Secure Management Access Network Prevent Devices the Overloaded Attack Anti Compromised: Spoofing Black Ability Holing to Route DDoS Ability Routing to be Protocol managed Ability Authentication to Forward Data Attacks Protect targeted and to Police end systems your business cause collateral with a secure damage and across available the network infrastructure 76

77 Hardware Support Hardware Cisco 7600 Series Router Cisco Catalyst 6500 Series Switch Cisco 7200 Series Router Cisco 7500 Series Router Cisco Series Internet Router Cisco 1751 Series Router Cisco 2600-XM Series Cisco 3700 Series Router Cisco 7200 Series Router Availability Cisco IOS Software Release 12.2(18)SXD1 Cisco IOS Software Release 12.2(18)S Cisco IOS Software Release 12.0(29)S Cisco IOS Software Release 12.3(4)T 77

78 References Cisco IOS Security Infrastructure Cisco IOS Software Release 12.2(18)SXD Deploying Control Plane Protection - Policing r09186a f39.shtml Control Plane Protection Policing Feature Guide de09186a00801afad4.html QoS Command Reference Guide reference_book09186a00801a7ec7.html 78

79 Resources Cisco NFP Cisco IOS Software Release 12.3T: New Security Features and Hardware, Product Bulletin No a00801d7229.html Control Plane Protection Documentation ture_guide09186a00801afad4.html 79

80 Glossary Acronym Description CoPP Control Plane Policing RTBH Remote Triggered Black Hole RTRL Remote Triggered Rate Limiting racl iacl urpf Receive ACL Infrastructure ACL Unicast Reverse Path Forwarding 80

81 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and services that enable users to secure their foundation 81

82 Q and A 82

83 2005, Cisco Systems, Inc. All rights reserved. 83

CISCO IOS NETFLOW AND SECURITY

CISCO IOS NETFLOW AND SECURITY CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network

More information

Configuring Denial of Service Protection

Configuring Denial of Service Protection 24 CHAPTER This chapter contains information on how to protect your system against Denial of Service (DoS) attacks. The information covered in this chapter is unique to the Catalyst 6500 series switches,

More information

LAB II: Securing The Data Path and Routing Infrastructure

LAB II: Securing The Data Path and Routing Infrastructure LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything

More information

Configuring Control Plane Policing

Configuring Control Plane Policing CHAPTER 53 This chapter describes how to configure control plane policing (CoPP) with Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see

More information

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top Output Interpreter You have chosen to display errors warnings general information, and helpful references. Headings are displayed for all supported commands that you submitted. SHOW RUNNING-CONFIG SECURITY

More information

Security Audit CHAPTER21. Perform Security Audit

Security Audit CHAPTER21. Perform Security Audit CHAPTER21 Perform is a feature that examines your existing router configurations and then updates your router in order to make your router and network more secure. is based on the Cisco IOS AutoSecure

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

Lab 3.3 Configuring QoS with SDM

Lab 3.3 Configuring QoS with SDM Lab 3.3 Configuring QoS with SDM Learning Objectives Configure Quality of Service tools with the SDM QoS wizard Monitor traffic patterns using the SDM QoS interface Topology Diagram Scenario Cisco Security

More information

Network security includes the detection and prevention of unauthorized access to both the network elements and those devices attached to the network.

Network security includes the detection and prevention of unauthorized access to both the network elements and those devices attached to the network. By: Ziad Zubidah CCNP Security IT Security Officer National Information Technology Center Network security includes the detection and prevention of unauthorized access to both the network elements and

More information

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to

More information

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including

More information

Introduction to Cisco IOS Flexible NetFlow

Introduction to Cisco IOS Flexible NetFlow Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity

More information

Netflow Overview. PacNOG 6 Nadi, Fiji

Netflow Overview. PacNOG 6 Nadi, Fiji Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export

Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export Last Updated: November 28, 2011 This module contains the minimum amount of information about and instructions necessary for configuring

More information

Network Core Infrastructure Protection: Best Practices

Network Core Infrastructure Protection: Best Practices Network Core Infrastructure Protection: Best Practices Roland Dobbins Solutions Architect +66-83-266-6344 BKK mobile +65-8396-3230 SIN mobile Arbor Public Agenda Infrastructure Protection

More information

Unicast Reverse Path Forwarding

Unicast Reverse Path Forwarding Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing

More information

Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.

Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.2: Configure an access-list to block all networks addresses that is commonly used to hack SP networks. Task 20.3:

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Cisco Performance Monitor Commands

Cisco Performance Monitor Commands 1 action (policy react and policy inline react) Cisco Performance Monitor Commands action (policy react and policy inline react) To configure which applications which will receive an alarm or notification,

More information

Configuring Denial of Service Protection

Configuring Denial of Service Protection CHAPTER 52 This chapter contains information on how to protect your switch against Denial of Service (DoS) attacks. The information covered in this chapter is unique to Cisco IOS Release 12.2SX, and it

More information

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,

More information

Lab 4.1.2 Characterizing Network Applications

Lab 4.1.2 Characterizing Network Applications Lab 4.1.2 Characterizing Network Applications Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not

More information

Virtual Fragmentation Reassembly

Virtual Fragmentation Reassembly Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments

More information

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides

More information

Configuring Flexible NetFlow

Configuring Flexible NetFlow CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

Appendix A Remote Network Monitoring

Appendix A Remote Network Monitoring Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

NetFlow v9 Export Format

NetFlow v9 Export Format NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Internet Infrastructure Security Technology Details. Merike Kaeo [email protected]

Internet Infrastructure Security Technology Details. Merike Kaeo merike@doubleshotsecurity.com Internet Infrastructure Security Technology Details Merike Kaeo [email protected] Securing The Device Agenda Item Think of ALL Devices The following problem was reported last year and affects

More information

Cisco ASA, PIX, and FWSM Firewall Handbook

Cisco ASA, PIX, and FWSM Firewall Handbook Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall

More information

Cisco Network Foundation Protection Overview

Cisco Network Foundation Protection Overview Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and

More information

Application Aware Traffic Engineering and Monitoring

Application Aware Traffic Engineering and Monitoring Course Number Presentation_ID 2000, 1999, 2000, Cisco Cisco Systems, Systems, Inc. Inc. 1 Application Aware Traffic Engineering and Monitoring Session 2000, Cisco Systems, Inc. 2 Agenda Challenges, Metrics,

More information

http://www.cisco.com/en/us/products//hw/switches/ps4324/index.html http://www.cisco.com/en/us/products/ps6350/index.html

http://www.cisco.com/en/us/products//hw/switches/ps4324/index.html http://www.cisco.com/en/us/products/ps6350/index.html CHAPTER 54 Supervisor Engine 6-E and Catalyst 4900M chassis do not support Netflow; it is only supported on Supervisor Engine IV, Supervisor Engine V, Supervisor Engine V-10GE, or WS-F4531. This chapter

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

Network-Based Application Recognition

Network-Based Application Recognition Network-Based Application Recognition Last Updated: March 2009 Cisco Content Networking delivers the network agility required by the enterprise to deploy new Internet business applications critical to

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Table of Contents. Configuring IP Access Lists

Table of Contents. Configuring IP Access Lists Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message

More information

How To Protect Your Network From Attack From A Router (Ip) On A Network (Ip-Net) On An Ip-Net (Ipnet) (Ip Ip) (Net) And Ip-Lan (Ipip) (Lan) (

How To Protect Your Network From Attack From A Router (Ip) On A Network (Ip-Net) On An Ip-Net (Ipnet) (Ip Ip) (Net) And Ip-Lan (Ipip) (Lan) ( SERVICE PROVIDER INFRASTRUCTURE SECURITY BEST PRACTICES Yusuf Bhaiji Cisco Systems 1 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Enabling and Monitoring NetFlow on Subinterfaces

Enabling and Monitoring NetFlow on Subinterfaces Enabling and Monitoring NetFlow on Subinterfaces This module contains instructions for enabling and monitoring NetFlow on a router subinterface or a Versatile Interface Processor (VIP) controller interface.

More information

Configuring Network Address Translation

Configuring Network Address Translation CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections

More information

Campus LAN at NKN Member Institutions

Campus LAN at NKN Member Institutions Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and

More information

Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER

Configuring NetFlow. Information About NetFlow. Send document comments to nexus1k-docfeedback@cisco.com. CHAPTER CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter

More information

- QoS Classification and Marking -

- QoS Classification and Marking - 1 - QoS Classification and Marking - Classifying and Marking Traffic Conceptually, DiffServ QoS involves three steps: Traffic must be identified and then classified into groups. Traffic must be marked

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection

More information

Strategies to Protect Against Distributed Denial of Service (DD

Strategies to Protect Against Distributed Denial of Service (DD Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics

More information

Flow Monitor for WhatsUp Gold v16.2 User Guide

Flow Monitor for WhatsUp Gold v16.2 User Guide Flow Monitor for WhatsUp Gold v16.2 User Guide Contents Table of Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System

More information

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control

More information

Net-flow. PacNOG 6 Nadi, Fiji

Net-flow. PacNOG 6 Nadi, Fiji Net-flow PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools etc

More information

8 steps to protect your Cisco router

8 steps to protect your Cisco router 8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention

More information

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram

More information

OBJECTIVES This paper examines how NetFlow is implemented on logical interfaces. Logical interfaces can be divided into two groups:

OBJECTIVES This paper examines how NetFlow is implemented on logical interfaces. Logical interfaces can be divided into two groups: Configuration Guide NetFlow on Logical Interfaces: Frame Relay, Asynchronous Transfer Mode, Inter-Switch Link, 802.1q, Multilink Point to Point Protocol, General Routing Encapsulation, Layer 2 Tunneling

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless

More information

Chapter 11 Network Address Translation

Chapter 11 Network Address Translation Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Brocade NetIron Denial of Service Prevention

Brocade NetIron Denial of Service Prevention White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron

More information

C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1

C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1 CHAPTER 9 The primary goal of the management module is to facilitate the secure management of all devices and hosts within the enterprise network architecture. The management module is key for any network

More information

Enabling Remote Access to the ACE

Enabling Remote Access to the ACE CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Firewall Authentication Proxy for FTP and Telnet Sessions

Firewall Authentication Proxy for FTP and Telnet Sessions Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions

More information

Network Security Knowledge is Everything! Network Operations

Network Security Knowledge is Everything! Network Operations Network Security Knowledge is Everything Network Operations Warrick Mitchell - Network Engineer [email protected] Agenda What is Network Security General Configuration Security Logging and

More information

Chapter 4 Firewall Protection and Content Filtering

Chapter 4 Firewall Protection and Content Filtering Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside

More information

Flow Monitor for WhatsUp Gold v16.1 User Guide

Flow Monitor for WhatsUp Gold v16.1 User Guide Flow Monitor for WhatsUp Gold v16.1 User Guide Contents Table of Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System

More information

Configuring Class Maps and Policy Maps

Configuring Class Maps and Policy Maps CHAPTER 4 Configuring Class Maps and Policy Maps This chapter describes how to configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

IPv6 Diagnostic and Troubleshooting

IPv6 Diagnostic and Troubleshooting 8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................

More information

7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01*

7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01* 7450 ESS OS System Management Guide Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01* This document is protected by copyright. Except as specifically

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Configuring the Firewall Management Interface

Configuring the Firewall Management Interface Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management

More information

Leased Line PPP Connections Between IOS and HP Routers

Leased Line PPP Connections Between IOS and HP Routers Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Lab Configuring Syslog and NTP (Instructor Version)

Lab Configuring Syslog and NTP (Instructor Version) (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask

More information

Cisco IOS Flexible NetFlow Command Reference

Cisco IOS Flexible NetFlow Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module 25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

NetFlow Subinterface Support

NetFlow Subinterface Support NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the

More information

Center for Internet Security Gold Standard Benchmark for Cisco IOS

Center for Internet Security Gold Standard Benchmark for Cisco IOS Center for Internet Security Gold Standard Benchmark for Cisco IOS Level 1 and 2 Benchmarks Version 2.1 http://www.cisecurity.org [email protected] September 2, 2003 Abstract This document defines

More information

Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls

Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A S1 FA0/5

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Network Monitoring and Management NetFlow Overview

Network Monitoring and Management NetFlow Overview Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

WhatsUpGold. v15.0. Flow Monitor User Guide

WhatsUpGold. v15.0. Flow Monitor User Guide WhatsUpGold v15.0 Flow Monitor User Guide Contents CHAPTER 1 Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System requirements...

More information

Chapter 4 Rate Limiting

Chapter 4 Rate Limiting Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER CHAPTER 19 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 19-1 Licensing Requirements

More information

Configuring NetFlow Switching

Configuring NetFlow Switching Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter

More information