Securing the Transition Mechanisms
|
|
|
- Rudolph Joseph
- 10 years ago
- Views:
Transcription
1 Securing the Transition Mechanisms CRC/ITU/APNIC IPv6 Security Workshop 29 th June 1 st July 2015 Ulaanbaatar Last updated 13 July
2 Where did we leave off? p We ve just covered the current strategies for making the transition to IPv6. p Now we look at some of the security risks associated with these strategies as well as some we haven t covered. 2
3 Strategies available for Service Providers p p p Do nothing n n Wait and see what competitors do Business not growing, so don t care what happens Extend life of IPv4 n n Force customers to NAT Buy IPv4 address space on the marketplace Deploy IPv6 n n n n n Dual-stack infrastructure IPv6 and NATed IPv4 for customers 6rd (Rapid Deploy) with native or NATed IPv4 for customers DS-Lite or 464XLAT with native IPv6 and NATed IPv4 for customers Or other combinations of IPv6, IPv4 and NAT 3
4 Strategy One Do Nothing 4
5 IPv4 only p The common thinking about securing IPv4 only is just to apple Best Current Operational Practice for IPv4 network security. p BUT p Even if you decide to do nothing, that doesn t mean that the world won t change around you. p IPv6 Transition technologies can be deployed without your knowledge or control. 5
6 The ones we didn t talk about p There were a number of transition technologies which we didn t cover in the previous section. p Primarily because they are deprecated, or industry doesn t consider them a viable long term option. p The problem is they are still around and can have a significant security impact. 6
7 ISATAP p Like most non-encrypted, nonauthenticated tunneling mechanism ISATAP is vulnerable to traffic injection and unauthorised use. p Some protection using Unicast RPF 7
8 ISATAP p Some dual stack machines are preconfigured to use isatap.<domainname> to contact an isatap tunnel server. p If you belong to the example.com domain this means the machines will attempt to contact isatap.example.com as an isatap tunnel server. 8
9 ISATAP p p p p p The attacker poisons the DNS cache of the victim Attacker changes the DNS name isatap.example.com to the attacker s IPv4 address. All communication from the victim to any IPv6-only or dualstack hosts will be directed through the ISATAP tunnel terminated at the attackers host This host could be be located outside the organisation s perimeter firewall if the firewall permits protocol 41 packets. This is a classic man-in-the-middle insertion, and the malicious user can then sniff all the data or drop packets. 9
10 ISATAP Risk mitigation strategies p Associate the DNS isatap.example.com name with the IPv4 loopback address p Use an IPv4 VLAN ACL to block IP protocol 41. p Deploy a native IPv6 network n Because this allows network managers to monitor and secure the IPv6 traffic with a firewall and an intrusion prevention system (IPS). 10
11 Teredo p Designed to build dynamic tunnels from within a private network, through a NAT or firewall device. p What could go wrong? p Who ever though that was a good idea? 11
12 12
13 Teredo p Named after Teredo navalis p Burrows holes in the hulls of ships 13
14 Teredo p Some Windows versions have Teredo enabled by default. p Ships partly configured. p Installing some third party applications can inadvertently complete the configuration. p Installing one of these applications on a device can provide a non-firewalled IPv6 tunnel to the Internet. p To you firewall this will look like IPv4 UDP packets. 14
15 Teredo p Once this tunnel is configured an attacker can use the same mechanism to connect back to the device, bypassing IPv4 firewalls and NIDSs 15
16 Teredo Improvements over time p Teredo is now disabled on Windows systems unless a personal firewall is enabled p Teredo is restricted to connect to IPv6 only end nodes. n If a remote server has an IPv4 and IPv6 address, Teredo is never used. p Teredo is disabled on machines which are part of an Active Directory domain n Means that a lot of enterprise environments are not vulnerable. 16
17 Teredo Risk mitigation strategies p Deploy a native IPv6 network n Teredo is only used when there is no native IPv6 network available. p Block all UDP packets at the network perimeter n With the exception of well-known ports such as DNS and NTP (maybe) p Explicitly block Teredo UDP packets n Hard because while port 3544 is the default, this can be set to any UDP port by the user. 17
18 IPv6 Latent Threats Against IPv4 Networks p If IPv6 is enabled by default on devices then IPv6 defences must be in place even on IPv4 only networks. 18
19 IPv6 Latent Threats Against IPv4 Networks p Even if a network is IPv4 only a device could: n Roam to an IPv6-enabled wireless hotspot n Receive a forged RA message n Use a routable IPv4 address and enable 6to4 tunneling n Detect a DNS name for isatap.example.org and use ISATAP n Toredo tunnel to connect to an IPv6-only node 19
20 Latent IPv6 Threat Risk Mitigation Strategies p Be aware of IPv6 Security p Configure existing host security products for IPv6 p Replace legacy host security products without IPv6 p Make a conscious network decision whether to deploy native IPv6 p Disable the IPv6 protocol stack in hosts (or at least on all interfaces) p Attempt to block IPv6 traffic 20
21 Lesson: p Just because you didn t decide to run a protocol, doesn t mean that your users (or operating system vendor) won t think it s a good idea. p Be prepared. 21
22 Strategy Two Extend IPv4 22
23 Strategy Two Extend IPv4 p SP NAT in IPv4 only Network p IPv4 Subnet Trading 23
24 SP NAT in IPv4 only Network p As we ve seen in the previous section, the majority of the transition technologies use some form of NAT p NAT44 p NAT64 p NAT46 p Etc p They all suffer from much the same issues 24
25 Security Issues with SP NAT p Tracking association of port/address and subscriber, not to mention Lawful Intercept issues, are still under study p State is dangerous DDoS p IP Fragments you drop them you lose, you keep them you lose. p GeoIP Breaks p Myth that you have security behind NAT n NAT Pinning Browser exploits 25
26 SP-NAT Logging Tracking the 5-tuple p Source IP Address p Destination IP Address p Source port p Destination port p Protocol p All of these need to be associated with the NAT address in use at the time. 26
27 The burden/obligation of LSN logging p slides/slides-87-behave-6.pdf 27
28 28
29 Another illustration In lab testing by CableLabs, it was found that a typical CGN log message was approximately 150 bytes long. A typical household in the US was found to have an average of 33,000 sessions per day. For an ISP with one million subscribers, this will generate approximately 150 terabytes of log data per month or 1.8 petabytes per year (1,800,000,000,000,000 bytes). The logging would require approximately 23 Mbps of bandwidth between the CGN devices and the logging servers. In our conversations with one provider, the ISP indicated that it was impractical to trace back sessions to subscribers. They indicated that they had no intention of trying. 29
30 The weight of NAT p Are you going to be able to keep that much information around? p What is the cost of that much storage, and the network to carry it around? p Providers are now viewing IPv6 as a way to save them from having to further invest in SP-NAT. p For every ounce of IPv6 you can deploy, you save yourself having to deploy a ton of SP-NAT 30
31 State is dangerous p Keeping state takes resources. p Whenever a device in your network needs to keep state about connections. p You can cause that device to fail by giving it too many connections p Thus causing it to keep too much state. 31
32 State is dangerous DDoS p Presentation - default/files/ausnog-05/presentations/ausnog-05- d02p05-roland-dobbins-arbor.pdf p Video
33 IP Fragments you drop them you lose, you keep them you lose. p If you keep fragments around (state) waiting for the rest to turn up then you will be open to being DDoSed p If you drop fragments, large parts of the Internet will stop working. p Feel like this is a no win situation? p You re right 33
34 GeoIP Breaks p Where are you today? p Some organisations believe that your IP address has something to do with where you re sitting? p What if ALL one million of your customers appeared to come from one location. 34
35 Myth that you have security behind NAT p Because you have private addresses (RFC-1918 or otherwise) inside the NAT box you are safe p Attackers are not able to initiate connections back into your network p Right? 35
36 NAT Pinning Browser exploits 1. Attacker lures victim to a website 2. Victim clicks on the URL and opens the page. 3. The page has a hidden form connecting to attacker.com:6667 (IRC port). 4. The client (victim) submits the form without knowing. An HTTP connection is created to the (fake) IRC server. 5. The form also has a hidden value that sends: OPEN DCC CHAT PORT 6. Your router, doing you a favour, sees an "IRC connection" opens a port back through the NAT. 7. The attacker now has a way back into your network. This could also have used the FTP NAT helper instead of IRC 36
37 SP-NAT Risk Mitigation Strategies p Use less SP-NAT n Ensure that you are doing everything you can to minimise the amount of NAT that you use over time. n Using migration strategies which have a roadmap to native dual-stack helps here n The more IPv6 sessions you have, typically the less IPv4 sessions you need to NAT p Try and ensure that your network is laid out in such a way that your NAT box is not the first box which will come under a 37 DDoS attack.
38 IPv4 Subnet Trading 38
39 IPv4 Subnet Trading p It s not cheap p Who had the space before you? p Why are they selling it? 39
40 What have people been using this space for? Cheap Investment Property!!!!!!! 6 weeks ago the bedroom was being used to manufacture methamphetamine 40
41 IP address block reputation checking p 41
42 Why are they selling it? 42
43 Traffic to /24 43
44 Traffic log for /24 44
45 IPv4 Subnet Trading Risk Mitigation Strategies p Need Less IPv4 n Aggressive movement to native Dual-Stack will ensure that p Before you purchase IPv4 address space, make sure you know the history and current reputation of the address block. n Good IP Address Brokers can help here. 45
46 Strategy Three IPv4/v6 Coexistence/Transition techniques 46
47 Dual Stack p Double the network Double the fun. p This is the end goal we want, but it doesn t come without risk. p IPv6 Latent Threats p Attacks against Dual Stack hosts 47
48 Exploiting Dual-Stack Environment p IPv6 is enabled by default p Administrators might not know what the configuration is. p The IPv6 environment can be far less protected than the IPv4 environment n E.g. IPv4 only NIDS 48
49 Dual Stack Your IPv4 Security 49
50 Dual Stack Your IPv6 Security 50
51 Protecting Dual-Stack Hosts p Host-based IPv6 Firewall n Ensure that your hosts have working IPv6 protection and that it is configured with a similar policy to the one protecting IPv4 p Microsoft Group Policy Objects (GPO) n For domain joined machines IPv6 can be disabled on interfaces it is not being used on. p Block all IPv6 traffic on switches n Blocking Ethernet frames with 0x86dd will stop IPv6 at Layer2 p Deploy native IPv6 51
52 Tunnels p A lot of the transition technologies use Tunnels of one sort or another. p These are not always deployed with security in mind. 52
53 Hacking the Tunnels p Tunnel Injection n Attacker can inject traffic into the tunnel n Spoofing the external IPv4 and internal IPv6 address n Can also be used as a reflection attack 53
54 Tunnels p Keep control and visability p Ensure that you control the tunnel endpoints 54
55 Securing Static Tunnels p Check the IPv4 source address. n Reject any tunnel packets where the source address does not match. n Attacker now has to discover two endpoint addresses. n Not a very high bar p Use antispoofing techniques n Reject IPv6 packets coming from the wrong tunnel n Unicast RPF n Helps to prevent reflection attacks. p Use IPSec 55
56 Securing Dynamic Tunnels (6to4) p Ensure Neighbour Discovery is blocked p ICMP redirect is denied p Link-local and site-local addresses are not permitted p 6to4 addresses based on RFC1918 addresses are dropped p Destination IPv6 address is checked. 56
57 6to4 p RFC 3964, Security Considerations for 6to4 p Unicast RPF to prevent spoofing within a tunnel. p Apply a ACL on the traffic coming out of the tunnel. 57
58 Today s Preferred Transition Technologies p 6rd p 464xlat p Dual Stack Lite 58
59 6rd IPv4 IPv6 IPv6 host Customer Router Tunnel Dual-Stack SP Network 6rd BR IPv6 Internet IPv4+IPv6 host IPv4 Internet IPv4 host IPv4-only SP Network SP NAT Subscriber Network Internet p 6rd (Rapid Deploy) used where ISP infrastructure to customer is not IPv6 capable (eg IPv4-only BRAS) n Customer has IPv4 Internet access either natively or via NAT n Customer IPv6 address space based on ISP IPv4 block 59
60 464XLAT IPv4 IPv6 IPv6 host Customer Router IPv6 Internet IPv4+IPv6 host SIIT encaps SP NAT Sharing IPv4 address(es) IPv4 Internet IPv4 host Subscriber Network IPv6-only SP Network Internet p Service Provider deploys IPv6-only infrastructure: n n IPv6 being available all the way to the consumer IPv4 is transported through IPv6 core to Internet via SIIT on 60 customer router, and NAT64 on SP NAT device
61 Dual-Stack Lite IPv4 IPv6 IPv6 host Customer Router IPv6 Internet IPv4+IPv6 host Tunnel SP NAT Sharing IPv4 address(es) IPv4 Internet IPv4 host p Subscriber Network IPv6-only SP Network Internet Service Provider deploys IPv6-only infrastructure: n n IPv6 being available all the way to the consumer IPv4 is tunnelled through IPv6 core to Internet via SP NAT device 61
62 What they have in common? p IPv4 Normal SP-NAT issues p Customer CPE Normal Dual-Stack issues 62
63 Today s Transition Technologies Risk Mitigation Strategies p Minimise the need for SP-NAT n The more IPv6 sessions you can encourage, the less reliance you will have on SP-NAT and all the security issues associated with that. p Look for a transition plan which uses native IPv6 n 464XLAT and DS-Lite p Pay careful attention to the Dual Stack operation of the CPE. n You need to deploy IPv4 and IPv6 protections on the CPE, not just IPv4 63
64 Securing the Transition Mechanisms CRC/ITU/APNIC IPv6 Security Workshop 29 th June 1 st July 2015 Ulaanbaatar 64
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
IPv6 Security Best Practices. Eric Vyncke [email protected] Distinguished System Engineer
IPv6 Best Practices Eric Vyncke [email protected] Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1 Agenda Shared Issues by IPv4 and IPv6 Specific Issues
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
IPv4/IPv6 Transition Mechanisms. Luka Koršič, Matjaž Straus Istenič
IPv4/IPv6 Transition Mechanisms Luka Koršič, Matjaž Straus Istenič IPv4/IPv6 Migration Both versions exist today simultaneously Dual-stack IPv4 and IPv6 protocol stack Address translation NAT44, LSN, NAT64
Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks
Real World IPv6 Migration Solutions Asoka De Saram Sr. Director of Systems Engineering, A10 Networks 1 Agenda Choosing the right solutions Design considerations IPv4 to IPv6 migration road map Consumer
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team
DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Building a Systems Infrastructure to Support e- Business
Building a Systems Infrastructure to Support e- Business NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject
Vulnerabili3es and A7acks
IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Security implications of the Internet transition to IPv6
Security implications of the Internet transition to IPv6 Eric VYNCKE Cisco Session ID: ASEC-209 Session Classification: Intermediate Agenda There is no place for doubts: IPv6 is there Impact in the Data
Packet Sniffing on Layer 2 Switched Local Area Networks
Packet Sniffing on Layer 2 Switched Local Area Networks Ryan Spangler [email protected] Packetwatch Research http://www.packetwatch.net December 2003 Abstract Packet sniffing is a technique of monitoring
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
464XLAT in mobile networks
STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address
Strategies for Getting Started with IPv6
Strategies for Getting Started with IPv6 IPv6 Transition Acceleration Options for Web Applications and Services By Scott Hogg GTRI - Director of Technology Solutions CCIE #5133, CISSP #4610 IPv6 Transition
IPv6 deployment status & Migration Strategy
IPv6 deployment status & Migration Strategy Sify Technologies Ltd Mohamed Asraf Ali Head Network Engineering [email protected] TEC IPv6 Workshop Migration from IPv4 to IPv6 in India Sify - Who are
Basic IPv6 WAN and LAN Configuration
Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration
EXPEDITING ACCESS TO V6 SERVICES: GETTING WEB CONTENT AVAILABLE OVER IPV6 QUICKLY AND AT LOW COST
EXPEDITING ACCESS TO V6 SERVICES: GETTING WEB CONTENT AVAILABLE OVER IPV6 QUICKLY AND AT LOW COST Tim LeMaster [email protected] IPV6 REALITY CHECK: THE IPV4 LONG TAIL Post IPv4 allocation completion:
IPv6 for AT&T Broadband
IPv6 for AT&T Broadband Chris Chase, AT&T Labs Sept 15, 2011 AT&T Broadband ~15 million subscribers Legacy DSL, PPP subscribers, ATM aggregation Not many CPE IPv6 capable Customer owned, unmanaged CPE
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Step-by-Step Guide for Setting Up IPv6 in a Test Lab
Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
IPv6 Hardening Guide for Windows Servers
IPv6 Hardening Guide for Windows Servers How to Securely Configure Windows Servers to Prevent IPv6-related Attacks Version: 1.0 Date: 22/12/2014 Classification: Public Author(s): Antonios Atlasis TABLE
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Carrier Grade NAT. Requirements and Challenges in the Real World. Amir Tabdili Cypress Consulting [email protected]
Carrier Grade NAT Requirements and Challenges in the Real World Amir Tabdili Cypress Consulting [email protected] Agenda 1 NAT, CG-NAT: Functionality Highlights 2 CPE NAT vs. CG-NAT 3 CGN Requirements
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Chapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
GregSowell.com. Mikrotik Basics
Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied
IPv6 Fundamentals: A Straightforward Approach
IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
TR-296 IPv6 Transition Mechanisms Test Plan
Technical Report TR-296 IPv6 Transition Mechanisms Test Plan Issue:1 Issue Date: November 2013 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
The Truth about IPv6 Security
The Truth about IPv6 Security Fernando Gont UTN/FRH FutureNet: MPLS, Ethernet and Beyond Boston, MA, USA, May 10-13, 2010 Agenda Brief comparision of IPv4 and IPv6 A few myths about IPv6 security Transition
IPv6 The Big Picture. Rob Evans, Janet [email protected]
IPv6 The Big Picture Rob Evans, Janet [email protected] Where are we? IPv4 32 bit addresses 4,294,967,296 possible addresses In practice much less than this. History of large allocations /8s Inefficiency
464XLAT: Breaking Free of IPv4. [email protected] APRICOT 2014
464XLAT: Breaking Free of IPv4 [email protected] APRICOT 2014 1 Background T-Mobile US is a GSM / UMTS / LTE provider in the USA with 45+ Million subscribers In 2008, T-Mobile launched the first
ICSA Labs Network Protection Devices Test Specification Version 1.3
Network Protection Devices Test Specification Version 1.3 August 19, 2011 www.icsalabs.com Change Log Version 1.3 August 19, 2011 added general configuration note to default configuration in Firewall section
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
464XLAT: Breaking Free of IPv4. Cameron.Byrne @ T-Mobile.com NANOG 61 June 2014
464XLAT: Breaking Free of IPv4 Cameron.Byrne @ T-Mobile.com NANOG 61 June 2014 1 Goals of Talk 1. Declare victory for IPv6 2. Explain IPv6-only approach at T-Mobile US 3. Discuss risks related to IPv4-only
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
I've applied for a goipv6 account and received my password via email but I cannot log into my account. What should I do?
goipv6 FAQ goipv6 Account I've applied for a goipv6 account and received my password via email but I cannot log into my account. What should I do? I would like to change my current password. What should
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
1. Introduction to DirectAccess. 2. Technical Introduction. 3. Technical Details within Demo. 4. Summary
1. Introduction to DirectAccess 2. Technical Introduction 3. Technical Details within Demo 4. Summary Section 2: Technical Introduction Solution Overview Compliant Client Compliant Client Internet
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Residential IPv6 IPv6 a t at S wisscom Swisscom a, n an overview overview Martin Gysi
Residential IPv6 at Swisscom, an overview Martin Gysi What is Required for an IPv6 Internet Access Service? ADSL L2 platform, IPv6 not required VDSL Complex Infrastructure is Barrier to Cost-efficient
Actuality of SMBRelay in Modern Windows Networks
Actuality of SMBRelay in Modern Windows Networks Ares, April 2012 [email protected] http://sniff.su Intro I first came across SMBRelay in the middle of 2000s and the experience was unsatisfying..
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
SIIT-DC: Stateless IP/ICMP Translation for IPv6 Data Centre Environments & SIIT-DC: Dual Translation Mode
SIIT-DC: Stateless IP/ICMP Translation for IPv6 Data Centre Environments & SIIT-DC: Dual Translation Mode Tore Anderson Redpill Linpro AS RIPE 91, Honolulu, November 2014 An IPv6 data centre The IPv6 Internet
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
IPv6 Tunneling Over IPV4
www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
WHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access
WHITE PAPER Best Practices for Deploying IPv6 over Broadband Access www.ixiacom.com 915-0123-01 Rev. C, December 2013 2 Table of Contents Udi cusciamenis minctorpos... 4 Toreptur aut dolo cone verum aute
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Personal Firewall Default Rules and Components
Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
