Testing Network Security Using OPNET
|
|
|
- Cecily Jacobs
- 10 years ago
- Views:
Transcription
1 Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, Barcelona Tlf: , Fax: {guiomar, zaballos,isards, jaumea}@salleurl.edu Abstract Network security nowadays has become a major priority for both network design and implementation. Due to this fact, the interest in making network communications secure has increased at the same rate as the accessibility to Internet services. Although security is a critical issue in e-business, it is often impossible to measure its effectiveness in real life because of the network administrators fears or prejudice. In order to find a solution to this particular issue, once more simulation opens the path to solving problems that are hard to fix in real life. Introduction As the development of network communications increases, the importance of making them secure has become a common priority. In order to improve and support network security development it is important to consider the help that OPNET can provide in testing security performance before its deployment. The main goal of our study is to give an overall view of all the devices and techniques available within the OPNET Modeler related to security. To make the network security test more realistic, we have taken as a reference the proposal for secure network implementation called Cisco SAFE [1], which has been developed by Cisco Systems. This proposal offers a global security comprehension as well as an approach to real network implementation. Once we had the environment in which the corresponding test was to be done, we performed these tests for all the devices and techniques that are available with OPNET. In order to have a reference in security testing, we referred the tests to the Open Source Security Testing Methodology Manual (OSSTMM) [6]. This manual outlines a global comprehension of the many security issues to be checked in order to perform a valid security test. Finally, we took the previous studies that had been done in security testing using OPNET, and we made a new proposal for continuing the development of network security devices and techniques. Actually, our proposals are focused on building an Intrusion Detection System device in order to detect different traffic patterns identified as attacks. On the same subject, we have started a new project for developing an attack traffic database, capable of performing denial of service attacks in a simulated environment. Network security environment In order to focus our study in a real life scenario, we researched on a proposal that gave us a comprehensive knowledge about network devices placement and configuration. The proposal had to fulfill several requirements, which should lead to an overall security environment. The Cisco Systems SAFE proposal was well explained and took into account details such as device configuration, which led us to take it as the reference point [1,2]. The follo wing network topology is an approach to the mentioned manufacturers proposal. As its architecture and device performance are revealed, the content of the proposal will be briefly explained in this paper. Figure 1: Network security testing scenario As can be seen in Figure 1, the network has been divided into modules; each of them has a specific role and provides part of the global security implementation. From left to right we will describe each module and its network security contribution. First of all, there is the Building module, which represents the internal part of the corporate business and holds the department computers, the server farm and the interconnection devices such as switches and routers [1]. This module deploys virtual local area networks for internal use. This VLAN technique is performed by switches and has the ability to separate broadcast domains, as well as dividing the network logically, which is useful to separate department traffic flows. This traffic division is considered part of the security implementation due to its internal separation of traffic, and the goal is the following: the fewer people have access to resources, the better it is. It is also important to keep in mind that internal security depends on physical access to resources and for this reason it is always good to have an internal security policy. [1] The next part is called the Distribution module. It basically performs high-speed network interconnection. This module 1
2 separates the internal facilities from the public access services. The devices that can be found here are mainly switches, but it can also hold routers. Switches perform the high-speed interconnection and routers keep on the connections coming from the outside at the same time as they permit the outgoing connections. It is important to keep in mind that security in these modules is based on access control lists, because it is important to keep fast connections. The next module is responsible for the on-line business and provides public access to corporate services. From the security point of view, this module is essential because it is a main target of hacker attacks. Denial of service attacks and database server intrusion are the main attractions for hackers. It is important that the network administrator performs a consistent configuration of all the devices involved in this module because a router misconfiguration could lead to damage in business and to a probably loss of client confidence. The devices that are part of this module are many and varied: routers, switches, firewalls and intrusion detection systems. Security in this module depends not only on access control lists, but also on proxy firewalls and intrusion detection systems logs and alerts. Due to the abovementioned reasons, it is very important to protect on-line business resources in order to maintain client confidence and also save money. The next module refers to the Internet service provider. Security issues cannot be managed from the corporate module, but it is important to keep in mind the policies that are applied to directly connected routers, in order to apply the appropriated traffic filtering. The contract with the Internet service provider should specify what policy is going to be applied and who is responsible in case an attack occurs. Once the contract is established, corporate policies should be made in correspondence to the responsibilities that have been assumed. Finally, there are three more modules: the Internet, the Hacker and the remote branch office. The Internet module represented by a cloud includes four wide area network routers. The main goal is to simulate Internet behavior by controlling traffic flow through a routing protocol that handles each connection. The connections can be initiated either by the Hacker or the remote branch office. The Hacker node has been attached directly to the Internet cloud, but technically this node also could be connected through a dialup technology. This node is capable of performing a remote login connection to the remote login server in the corporate server farm. In addition the remote office has been configured to have access to the internal corporate resources, which means that it has full access to all available services. Basically, the information used for our study is related to ports and services, protocols and packets. Ports are memory address spaces used to hold TCP and UDP services. Each service expects a request to follow a specific procedure of interaction called a protocol. In this procedure the requests are delivered to the service in the form of packets. Finally the parts that we focused on were TCP, UDP and ICMP protocol, packet structure and connections as well as flags used in the connections, expected responses and tricks that can be used to by-pass normal performance. Although not all the mentioned tests could be performed, it is als o important to be aware of what can be done to perform a security test. Testing network security The scenario described above was implemented using OPNET to perform our network security study. Devices used for the tests included routers, firewalls and switches. Routers for the implementation of access control lists and virtual private network support, firewalls for access control lists and proxy services, and finally switches to test virtual local area network performance. With these devices and techniques we were able to achieve a considerable degree of likeness to our proposal. The first scenario was designed to test the packet filtering technique using access control lists (ACL). ACLs are rules defined at the routers configuration in order to discard nonauthorized packets. These rules are widely applied in networking to manage traffic flow accurately. It is important to define a consistent and global network policy in order to use the access control lists that filter unauthorized traffic and permit authorized connections. In this scenario, the Hacker node attempts to initiate a remote login connection to the remote login server inside the corporate server farm. This connection is dropped by the upper branch firewall due to an ACL definition that denies all traffic coming from the Hacker IP address. In an additional scenario, we have configured the firewall node to refuse all network connection to remote login service by configuring an access control list that denies all packets with destination port number 23, which corresponds to the remote access. Security testing reference The following section will brief the main issues exposed in the OSSTMM document. This manual explains how TCP, UDP, ICMP, IP, and various application level protocols like FTP, DNS, TFTP, HTTP, HTTPS, etc work and how to test them [4]. In our case of study, we only looked for network and transport protocols, but it is always important to keep in mind how these protocols are related to application level protocols. Figure 2: Packet filtering using ACLs 2
3 Figure 2 shows the packet filtering technique used at the upper branch firewall of the network topology, in order to filter the Hacker remote login connections. It can be seen that the firewall drops every single packet the Hacker send. The next scenario was designed to test a second technique, which corresponds to proxy filtering. This technique can be used in firewalls, and it allows them to filter traffic flow, depending on its characteristics. For instance, FTP traffic can be filtered via proxy in a firewall causing all the connections to the FTP service to be refused. In our scenario, once again the firewall node was configured to hold this technique. The result of this test was that none of the connections that the remote site tried to initiate were successful. The following scenario used the technique called virtual local area network (VLAN). This technique consists of configuring a switch to perform logical traffic divis ion. In fact, the switch performs a port-based virtual network separation that permits corporate internal traffic to be divided logically. In our study we configured two VLAN. The first one was composed of the HTTP and FTP local clients and servers, and the second one was composed of the remote login and custom application client and server respectively. The main goal of this technique is to separate internal traffic to follow the rule mentioned before: the fewer the people that have access to a resource, the better it is. Figure 4: Traffic analysis PING trace through a VPN tunnel After testing all security devices and techniques provided by OPNET, we decided to go a little further. We studied another device that has been used in our scenario, the packet analyzer, which provides traffic sniffing properties. The traffic captured by this node can be viewed using the Application Characterization module that OPNET provides. The ACE module allows packet content to be examined carefully [5]. The following figure shows data packet information presented with ACE. In fact, the data shown in the picture corresponds to remote access traffic from the Hacker node to the corporate server. Figure 3: VLAN scenario configuration Finally, the last technique was based on the performance of virtual private networks (VPN). VPN are configured at routers and permit safe communication through an unsafe environment. VPN creates what is called a tunnel (a logical group of routers that establish a safe path to destination). The tunnel is defined within the Internet and allows private traffic to be sent through the public path [3]. In our scenario, the tunnel was established betwe en the corporate and the remote office that is, in fact, a common configuration. Figure 5: Remote access traffic pres ented with ACE Packet analyzer is a powerful tool included in OPNET Modeler that enables the capture of data packets from traffic flow. This can be done by either capturing every single packet or filtering only the relevant traffic. Captured traffic can be exported to an external file, which can be viewed by other programs. The above-mentioned capabilities, gave us the idea of developing a viability study in order to build an Intrusion detection System with the packet analyzer as a basis. 3
4 Intrusion Detection System viability development Once the security tests using OPNET devices and techniques were completed, the next step was to create a proposal for developing an Intrusion Detection System. The goal was to seize the Packet Analyzer node and rebuild it with the ability to alert when illegal traffic patterns are detected. However, as easy as it seems, the Packet Analyzer has to be rebuilt with an internal structure capable of matching traffic patterns with captured packets. In order to improve our understanding of an IDS architecture we studied an existing IDS software called SNORT, which is open source [4]. This software defines three phases regarding an IDS performance. The first phase, known as the sniffing phase, is responsible for capturing and analyzing data packets. In the first place, data packets have to be copied and saved into memory in order to allow further examination. In second place, packets are decoded according to their type. Once this is done, packet information is extracted and saved in the appropriated structure. The second phase, known as IDS, is responsible for processing matching rules for every single packet captured in the previous phase. SNORT implementation is handled by a two -part function: rule translator and detection engine. The first module is responsible for keeping rules or signatures in structures to perform a quick identification of a matching attack pattern. The second module is responsible for traffic filtering and will save attack patterns to match every packet as they arrive. Figure 6: Data packet decoding process Figure 6 shows the data packet-decoding process inside SNORT architecture. Once the data packet is captured, information contained inside is decoded at different levels in a hierarchical manner. Afterwards, pattern rules are applied to incoming packets. When an attack is detected, a log file and an alert are generated. Finally, the last and also the most important phase is the log file and alert generation. This phase will be responsible for warning the user of any traffic pattern match that occurs during the process. When speaking of an IDS rule matching, the concepts of false positive and false negative always arise. The first concept, refers to a rule matching that has been bogusly detected, meanwhile the false negative is an alert that should have been generated but was not. Modeling network attacks The second proposal we make, currently under study, is the capture of real traffic attacks. Our aim is to import this traffic to OPNET via the Application Characterization module. The next step will be to continue performing security tests using OPNET, but now with real traffic. In combination with the traffic captures, our goal is to test the IDS device explained above by using traffic attacks against it. To perform this task it will also be important to keep on track with the OSTTMM document, as it can provide a real security test. This manual will also help to better comprehend how attack traffic can affect the victim system. In addition, it will help to find out what the chances are that the deployed IDS node detects the attack. Conclusions Since network security has become a high priority and real security testing is not always easy to perform, our study gives an overall guide to security testing using OPNET. Our goal was to perform a security test as complete as possible in order to be used as a reference in network security testing. The results of our study were very successful and we aim to continue with further tests and the development of new devices and techniques. To bring the test closer to reality we took as a reference the proposal for secure network implementation called Cisco SAFE, developed by Cisco Systems. The proposal gave us a global security comprehension as well as a closer look to reality. This document was very useful because it made the case study more realistic. It also provided a very well suited understanding of every device and technique performance as well as their location in a network topology. In order to maintain the study closer to reality, we referred to the OSSTMM for a global comprehension of the many security issues needed to check the performance of the tested devices and techniques in OPNET. This manual also gave us a new area of study: an IDS development and the real traffic attacks captures and importation to OPNET. Finally, we took the previous studies in network security testing environment and made two new proposals. The first one is based on the Packet Analyzer. Its aim is to turn the Packet Analyzer into an IDS node capable of detecting traffic pattern attacks. The second one is concerning the real traffic attack generation. Its target is to perform real attacks to network systems and capture them in order to, afterwards, import the traffic to OPNET via the ACE module. 4
5 References [1] SAFE: A Security Blueprint for Enterprise Networks security/safe.html [2] SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks ns128/networking_solutions_package.html [3] SAFE VPN: IPSec Virtual Private Networks in Depth ns128/networking_solutions_white_papers_list.html [4] Snort Protocol Flow Analyzer [5] OPNET Documentation [6] OSSTMM Documentation 5
Security Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Deploying ACLs to Manage Network Security
PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Configure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Internet Security Firewalls
Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Firewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
Internet Security Firewalls
Internet Security Firewalls Ozalp Babaoglu ALMA MATER STUDIORUM UNIVERSITA DI BOLOGNA Overview Exo-structures Firewalls Virtual Private Networks Cryptography-based technologies IPSec Secure Socket Layer
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge
shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically
- Introduction to PIX/ASA Firewalls -
1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
allow all such packets? While outgoing communications request information from a
FIREWALL RULES Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator,
Chapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Firewall 1 Basic firewall concept Roadmap Filtering firewall Proxy firewall Network Address Translation
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
Firewalls & Intrusion Detection
Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion
IP Filter/Firewall Setup
IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with Web content filtering options such as Block Sites and Keyword Blocking. Parents and network administrators
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Chapter 8 Network Security
[Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
What would you like to protect?
Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
How To Pass The Information And Network Security Certificate
Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
How To Understand A Firewall
Module II. Internet Security Chapter 6 Firewall Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 6.1 Introduction to Firewall What Is a Firewall Types of Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Security and Access Control Lists (ACLs)
Security and Access Control Lists (ACLs) Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Security Threats Access Control List Fundamentals Access
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT
Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of
Source-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 [email protected] This document is designed to assist IT/Network
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
