HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014
|
|
|
- Meredith Parker
- 10 years ago
- Views:
Transcription
1 HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD BSides Asheville 2014 aul Coggin Internetwork Consulting Solutions V## Goes Here 1
2 BG Hijacking in the News 2008 akistan Telecom accidentally hijacks 2011 Chinanet accidentally hijacks In 2010 China Telecom accidentally hijacked 50,000 blocks of I addresses 20 minutes Renesys reported a major BG hijacking in Belaruse and Iceland IS s possibly compromised - A software bug blamed
3 AS 5 Hijack I subnet /24 BG I refix and AS Hijacking Route Reflector AS 1 Route Reflector AS 6 IBG AS 7 EBG EBG EBG L2 Cross Connect AS 2 AS 3 AS 4 Hijack AS 4 & I subnet /24 The Longest I refix Wins 3
4 BG Hijacking in the News 2008 akistan Telecom accidentally hijacks 2011 Chinanet accidentally hijacks In 2010 China Telecom accidentally hijacked 50,000 blocks of I addresses 20 minutes Renesys reported a major BG hijacking in Belaruse and Iceland IS s possibly compromised - A software bug blamed
5 Virtual rivate Networks Virtual Networks Virtual rivate Networks Virtual Dialup Networks Virtual LANs Overlay VN eer-to-eer VN Layer-2 VN Layer-3 VN Access lists (Shared router) Split routing (Dedicated router) MLS/VN X.25 F/R ATM GRE ISec MLS VN is not encrypted unless encrypted separately 5
6 MLS and the OSI and TC/I Model OSI Model MLS Label Stack TC/I Model 7 Application 6 resentation Application 5 4 Session Transport Own the Label Transport 3 Network OSI 2.5 VN Label LD Label Internet 2 1 Data Link hysical TE Label Frame Header Network Interface 6
7 MLS Label CA 32-bit MLS Label Format Label : 20-bit EX : 3-bit Bottom-of-Stack : 1-bit TTL : 8-bit Source: 7
8 MLS Architecture Overview VN_A VN_B VN_A VN_B ibg sessions VN_A VN_A VN_B Routers (LSRs) are in the Core of the MLS Cloud Routers (Edge LSRs or LERs) Use MLS with the Core and lain I with Routers and Routers Use the Same IG Routing rotocol Routers are M-iBG Fully-meshed Service provider may accidentally or intentionally misconfigure VN s Utilize ISEC VN over MLS VN to insure security 8
9 CLI - VRF configuration ip vrf cust_a rd 200:1 route-target export 200:1 route-target import 200:1 ip vrf cust_2 rd 200:2 route-target export 200:2 route-target import 200:2 Interface Serial2/0 ip vrf forwarding cust_a Interface Serial2/1 ip vrf forwarding cust_b 1" M-BG! " OSF \ ISIS and LD 2" ip vrf cust_a rd 200:1 route-target export 200:1 route-target import 200:1 ip vrf cust_b rd 200:2 route-target export 200:2 route-target import 200:2 Interface Serial2/0 ip vrf forwarding cust_a Interface Serial2/1 ip vrf forwarding cust_b Static, BG, OSF, EIGR, RI Cust_1! Cust-2! Cust-1! Cust-2! MLS Trust Relationship Customer Trusts Service roviders 9
10 MLS Routing Table Global Routing Table Cust_A MLS VN Routing Table Cust_B MLS VN Routing Table 3 Routing Tables on 1 Router Separated by MLS VRF 10
11 MLS M-BG VN 11
12 MLS Network Attack Vectors Transport Network Infrastructure Network and System Architecture - Centralized, Distributed, Redundant - hysical and Logical - Transport Network (RF, Fiber, Copper) Attack Tree Network Infrastructure Attack Vectors Network rotocols - RouBng, Switching, Redundancy - Apps, Client/Server HW, SW, Apps, RDBMS - Open Source - Commercial Trust Rela@onships Internet, BSS, OSS, NMS, Net - Network Management and Network Devices - Billing, Middleware, rovisioning - Vendor remote access - (VT) - Tech staff remote access - Self rovisioning - hysical access - Trusted Insider - Cross connect - in- band management - hysical access to configurabon seqngs SNM Community String Dictionary Attack with Spoofing to Download Router\ Switch Configuration Build New Router Configuration File to enable further privilege escation Upload New Configuration File Using Comprimised SNM RW String Own Network Infrastructure Telnet\SSH Dictionary Attack Router\Switches\ NetMgt Server Build New Router Configuration File to enable further privilege escation Own Network Infrastructure Exploit ACL Trust Relationship Attack SNM\Telnet\SSH UNIX NetMgt Server Running NIS v1 Ypcat -d <domain> <server I> passwd Grab shadow file hashes Crack asswords Access Server Directly Discover Backup HW Configs Crack asswords Own Network Infrastructure Find NetMgt passwords and SNM config files MITM AR oisoning Sniffing Capture SNM Community Strings and Unencrypted Login\asswords, rotocol asswords Inject New Routes Or Bogus rotocol ackets Configure Device for Further rivilege Escalation Own Network Infrastructure Network Mgt Application Attempt to Login Using Default Login\assword Reconfigure Router or Switch Own Network Infrastructure Execute OS CMDs from Oracle L/SQL Attack Network from DB Further Enumerate Oracle SID s to Identify Default DBA System Level Accts\asswords H OpenView Server Enumerate Oracle TNS Listener to Identify Default SID s Login to Oracle DB with Discovered DBA rivilege Account Run Oracle SQL CMDs Execute OS CMDs Find NetMgt asswords, SNM info, OS password files Crack asswords Own Network Infrastructure Further Enumerate Oracle SID s to Identify User Accts. erform Dictionary Attack Run Oracle SQL CMDs Execute OS CMDs Add New rivileged OS Account Use New rivileged OS account to Escalate rivileged Access to Network 12
13 Service rovider MLS Network Global Internet Central Office/ O Label I Internet & MLS VN VN Label Data I Data I Data MLS VN Static, BG Internet & MLS VN MLS VN Central Office/ O Insider Threat - Add VN router - Layer 2 attacks - L2Tv3 - ERSAN - Lawful Intercept - GRE tunnel - Co-location cross connect Evil Cloud 13
14 Network Management Architecture for a Service rovider Remote VN NetMgt User \ Vendor AAA NOC Reports Database OSS rovisioning SQL OSS Internet Network Operations - Target - Leverage Intel from exploited - Exploit trust relationship to NOC - ivot NOC to,,, VN s - ivot to Internal, ITV, VoI, Internet\BG, Vendors,Transport Cust -1 Cust-2 Cust-1 Cust-2 SNM Agent Alarms, Traps, Reports, Backup I DWDM MLS CORE NMS, EMS, MOM Servers TL1 Gateway (TL1 to/from SNM) TL1 Configuration rovisioning, Control, Software Download OSS Cust-2 Cust-1 Cust-1 hysical Access - In-band Mgt - assword recovery - Trust Relationships - SNM, ACL s, Accts - rotocols - AAA, NetMgt I s 14
15 Transit Between MLS-VN backbones acket Capture Inject routes into VN Denial of Service Join VN MITM Cross-connect Inject labeled packets Traffic Engineering Disable I TTL Carrier Backbone 2 running IG and LD -1 Label Label 1 I M-iBG for VN-Iv4 OSF or ISIS LD Data -2 MLS Label\refix Recon - ERSAN - Lawful Intercept Attacker Network Monitoring Infrastructure Carrier Backbone 1 running IG and LD -1 OSF or ISIS LD Label I 1 L2 IX Data M-eBG for VN-Iv4 M-eBG for VN-Iv4 OSF or ISIS LD Label I 2 Carrier Backbone 3 running IG and LD Data L2 IX M-iBG for VN-Iv4 -ASBR1 -ASBR2 M-iBG for VN-Iv4-2 I Data I Data -1 If BG is being hijacked why not MLS? BG Transport ath Redirected Using MLS TE? -2 15
16 BG Route Monitoring Monitor Your I refixes Monitor Your Business artner I refixes Monitor Industry eers for Intel to redict Future Attack 16
17 MLS Security Recommendations Monitor for New Unexpected Route Advertisements Know Your Network! Utilize Encryption over MLS VN Links; S - ISEC Whitelist the Network Trust Relationships including Routing rotocols Whitelist Trusted Information Flows in Monitoring Utilize Separate VRF for In-band Management Dedicated Out-of-band Network Management with Un-attributable Internet I for VN AAA with separation of roles and responsibilities for operations and security monitoring Configuration Management and Monitoring Log all changes!! 2 Factor Authentication! 17
18 References Internet Routing Architectures, Halabi, Cisco ress MLS VN Security, Michael H. Behringer, Monique J. Morrow, Cisco ress IS Essentials, Barry Raveendran Greene, hilip Smith, Cisco ress Router Security Strategies Securing I Network Traffic lanes, Gregg Schudel, David J. Smith, Cisco ress MLS and VN Architectures, Jim Guichard, Ivan apelnjak, Cisco ress MLS Configuration on Cisco IOS Software, Lancy Lobo, Umesh Lakshman, Cisco ress Traffic Engineering with MLS, Eric Osborne, Ajay Simha, Cisco ress LAN Switch Security What Hackers Know About Your Switches, Eric Vyncke, Christopher aggen, Cisco ress RFC 2547 RFC 2547bis RFC 2917 RFC 4364 Attack Trees, Bruce Schneier, hrp:// hrp:// hijacking- belarus- iceland/ hrp:// ar- customers- your- facebook- data- went- to- china- and- korea- this- morning/ hrp:// hijacks- youtube- 1/ hrp:// 2011/sample- pcap- files 18
19 19
Defending the Enterprise Against Network Infrastructure Threats. DefCamp 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin
Defending the Enterprise Against Network Infrastructure Threats DefCamp 2015 Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin www.dynetics.com V## Goes Here 1 SNMP Blow Defeat SNMP w/ ACL
MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems [email protected]
Intelligent Information Network MLS VN Security Klaudia Bakšová Systems Engineer, Cisco Systems [email protected] Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS
APNIC elearning: Introduction to MPLS
2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security DNS/DNSSEC
Keep it Simple with BGP/MPLS Virtual Private Networks
White aper Keep it Simple with BG/MLS Virtual rivate Networks Joël Repiquet May 2002 www.lambdanet.net [email protected] Contents 1. Introduction... 3 2. VN Models... 4 2.1. Overlay vs. eer VNs... 4 2.2.
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
Why Is MPLS VPN Security Important?
MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :
BSides Nashville 2014
Bending and Twisting Networks BSides Nashville 2014 Paul Coggin Internetwork Consulting Solutions Architect @PaulCoggin www.dynetics.com V## Goes Here 1 SNMP Blow Defeat SNMP w/ ACL $ snmpblow.pl -s
Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin
Exploiting First Hop Protocols to Own the Network Rocket City TakeDownCon 2015 Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin www.dynetics.com V## Goes Here 1 OSI and TCP/IP Model OSI
BGP Configuration Guide
Configuration Guide 5991-3730 August 2005 BG Configuration Guide Configuring BG for Access to rivate I Services (BG/MLS VN Networks) This Configuration Guide provides an overview of rivate I Services (BG/MLS
IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager [email protected]
I over MLS Course Number resentation_id 2001, Cisco Systems, Inc. All rights reserved. atrick Grossetete Cisco Systems Cisco IOS I roduct Manager [email protected] 1 Agenda I Migration Approaches enabled
An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks
An ADTRAN White aper rivate I Service BG/MLS VN Networks rivate I Service BG/MLS VN Networks U ntil the advent of business communications over the Internet, a clear distinction between private and public
MPLS Security Considerations
MPLS Security Considerations Monique J. Morrow, Cisco Systems [email protected] November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer
Managing MPLS Networks. Oleg Kupershmidt and Joel Kaufman
Managing MLS Networks Oleg Kupershmidt and Joel Kaufman Terms of This resentation This presentation was based on current information and resource allocations as of October 2009 and is subject to change
HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet.
HughesNet and MLS This white paper addresses how it is possible to seamlessly integrate MLS and HughesNet. The first sections contain a basic introduction to MLS and the required scenarios in which the
RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: [email protected]
RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: [email protected] Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical
MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow
MPLS VPN Security in Service Provider Networks Peter Tomsu Michael Behringer Monique Morrow 1 About this Presentation Advanced level advanced MPLS concepts and architectures. Target Audience: Service provider!!
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
MPLS VPN Security BRKSEC-2145
MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
the about MPLS security
uth 22 the about truth MPLS security 11 MPLS is private. MPLS is a shared service! We use a private network is often stated as the reason for not protecting data as it travels over 3rd party networks.
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Introduction to Carrier Ethernet VPNs: Understanding the Alternatives
WHITE AR Introduction to Carrier Ethernet VNs: Understanding the Alternatives Copyright 2009, Juniper Networks, Inc. WHITE AR - Introduction to Carrier Ethernet VNs: Understanding the Alternatives Table
MPLS VPN Security in Service Provider Networks
MPLS VPN Security in Service Provider Networks Michael H. Behringer 1 HOUSEKEEPING We value your feedback, don t forget to complete your online session evaluations after each session and complete the Overall
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
DRO-210i LOAD BALANCING ROUTER. Review Package Contents
DRO-210i LOAD BALANCING ROUTER Review Package Contents Make sure that the package contains the following items. DRO-210i Load Balancing Router 2 Straight Ethernet Cables 1 Cross Over Ethernet Cable 1 Power
Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW)
Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW) Course Number: 642 825 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP
Opengear Technical Note
- Solutions for Avaya Installations Opengear Technical Note Jared Mallett - Product Marketing Manager Opengear solutions deliver cost-effective universal access to Avaya equipment and converged devices
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
Cisco Router and Security Device Manager (SDM)
Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and
MPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
MPLS Virtual Private Network (VPN) Security
MPLS Virtual Private Network () Security An MFA Forum Sponsored Tutorial Monique Morrow MFA Forum Ambassador CTO Consulting Engineer Cisco Systems Slide 1 MPLS Security - Agenda Analysis of the Architecture
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
CCNP: Implementing Secure Converged Wide-area Networks
CCNP: Implementing Secure Converged Wide-area Networks Cisco Networking Academy Version 5.0 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Cloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Networking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
PRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013)
PRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013) 1. Call Recording Architecture Overview PRI Call recording solution consists of two major components: Passive T1/E1 Tap Adapter and server
Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15
Cain & Abel v 2.5 Password Cracking Via ARP Cache Poisoning Attacks v.1 2004 Page 1 of 15 Objective: At the end of this lab students will be able to use the password auditing and ARP Poison Routing (APR)
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
Top-Down Network Design
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Third Party Network Management Standard Best practice
Third Party Network Management Standard Best practice Issue 1.0 Date: 27/04/2016 Author: BT Security, 3rd Party Security Team SEC/STD/BP003 Contents 1 Introduction... 3 1.1 General... 3 1.2 Objectives...
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
www.pwc.com Network Security Auditing April 2015
www.pwc.com Network Security Auditing Agenda Objectives Concepts Definitions Key Review Areas Architecture Assessment Types Nipper Overview Firewall Configuration Review Case Study AlgoSec Overview Firewall
CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security (640-554)
CCNA Security Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNA Security network'ün temellerini anlamış olan katılımcılara network güvenliği hakkında temel bilgi sağlamaya yönelik hazırlanmış
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Hijacking the Cloud: Systematic Risk in Datacenter Management Networks
Hijacking the Cloud: Systematic Risk in Datacenter Management Networks SESSION ID: CSV-W04A Michael Cotton Chief Security Architect Digital Defense Inc. @mcotton256 Out of Band Vectors Renewed Focus in
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
