How To Protect Your Network From Attack From A Router (Ip) On A Network (Ip-Net) On An Ip-Net (Ipnet) (Ip Ip) (Net) And Ip-Lan (Ipip) (Lan) (
|
|
|
- Thomas Weaver
- 5 years ago
- Views:
Transcription
1 SERVICE PROVIDER INFRASTRUCTURE SECURITY BEST PRACTICES Yusuf Bhaiji Cisco Systems 1
2 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques Conclusions 2
3 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques Conclusions 3
4 The Security Trinity Availability Confidentiality Integrity Confidentiality Integrity Availability 4
5 Network Availability: Protect the Infrastructure We have a multitude of end device security products and technologies but the core is critical Remember: availability Protecting the infrastructure is the most fundamental security requirement Infrastructure protection should be included in all disaster recovery and high availability designs Part of network design Without an available core, no services (e.g. voice) can be delivered 5
6 DDoS Vulnerabilities Multiple Threats and Targets Attack ombies: Use valid protocols Spoof source IP Massively distributed Variety of attacks Provider Infrastructure: DNS, routers, and links Access Line Entire Data Center: Servers, security devices, routers Ecommerce, web, DNS, , 6
7 Denial of Service Trends Multi-path Truly distributed Routeservers, large botnets Multi-vector SYN AND UDP AND Increased use state Looks like valid traffic (e.g. http get) Can consume resources at various levels of the network Financial incentive SPAM, DoS-for-hire Large, thriving business Forces us to reassess the risk profile 7
8 Infrastructure Attacks The infrastructure is no longer a black box Sites with Cisco documents and presentations on routing protocols (and I don t mean Cisco.com) Marked increase in presentations about routers, routing and Cisco IOS vulnerabilities at conferences like Blackhat, Defcon and Hivercon Router attack tools and training are being published Why mount high-traffic DDOS attacks when you can take out your target's gateway routers? Hijacked routers are valuable in the spam world, which has a profit driver Router compromise (0wn3d) due to weak password 8
9 From Bad to Worms Old worms never die! Millions of CodeRed(!) and Slammer packets still captured daily Most worms are intended to compromise hosts Worm propagation is dependant on network availability Worms and DoS can be closely related Secondary worm effects can lead to denial of service Worms enable DoS by compromising hosts BOTnets Perimeters are crumbling under the worm onslaught (VPN/mobile workers, partners, etc.) Don t neglect virii! 9
10 Worms and the Infrastructure Worms typically infect end-stations To date, worms have not targeted infrastructure BUT secondary effects have wreaked havoc Increased traffic Random scanning for destination Destination address is multicast Header variances At the core SP level, the aggregate affects of a worm can be substantial 10
11 The Old World: Network Edge telnet snmp outside Core outside Core routers individually secured Every router accessible from outside 11
12 The New World: Network Edge telnet snmp outside Core outside Core routers individually secured PLUS Infrastructure protection Routers generally NOT accessible from outside 12
13 The Old World: Router Perspective untrusted telnet, snmp Attacks, junk Router CPU Policy enforced at process level (VTY ACL, SNMP ACL, etc.) Some early features such as ingress ACL used when possible 13
14 The New World: Router Perspective untrusted telnet, snmp Attacks, junk Protection Router CPU Central policy enforcement, prior to process level Granular protection schemes On high-end platforms, hardware implementations 14
15 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques Conclusions 15
16 Preparing the Network This is a whole topic onto itself Best practices can help prevent infection Attack mitigation is rarely effective without best practice deployment I want to stop the DoS but I haven t implemented XYZ yet or I don t know who to contact Best practices can be tough to deploy, but the benefits are immeasurable 16
17 Preparing the Network Limit attack vectors Traffic filtering both incoming AND outgoing connections Source address validation (ACL and/or urpf) RFC2827 filtering where applicable BGP policy enforcement Identify/detect attacks Develop network baseline, including traffic analysis Logging and log analysis IDS at strategic locations 17
18 Preparing the Network Periodic security scans of internal network to identify policy violations Ongoing security vulnerability awareness Routine security auditing Event monitoring and correlation for firewalls, IDS, network devices and servers 18
19 Infrastructure Specific Protection Techniques Protect the infrastructure itself from attack From the inside users/customers From the outside peers/upstreams Methodology: Erect an edge barrier (infrastructure ACLs) Focus on the device specific configuration (receive ACL and control plane policing) Understand the platform architecture and how it impacts security 19
20 Device Hardening Turn off unused services no service udp-small-servers no service tcp-small-servers Use secret passwords service password encryption is reversible enable secret MySecurePassword Use secure device access aaa new-model aaa authentication login default group tacacs+ local Don't forget authorization and accounting! Use authenticated routing protocols NTP: time is critical for security correlation Use the data! MRTG, perl-foo, etc. 20
21 Infrastructure Best Practices Harden Routers and Switches Develop and deploy standard configs that reflect security policy Leverage configuration tools like RANCID Understand the technology (e.g. VLAN security principles) Understand the architecture, performance characteristics and features of the devices 21
22 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques Conclusions 22
23 Routers and Planes A network device typically handles traffic in the data/forwarding plane, the control plane, and the management plane Traffic in the data/forwarding plane is always destined through the device, and is: Implemented in hardware on high end platforms CEF switched (in the interrupt) in software switched platforms Traffic to the control/management plane is always destined to the device and is handled at process level ultimately: In hardware switched platforms, control/management plane traffic is sent to the RP/MFSC and then sent to the process level for processing In software switched platforms, it is sent directly to the process level for processing Some data plane traffic also reaches the control plane Packets that are not routable reach to control plane so that ICMP unreachable messages can be generated Packets that have IP options set are also handled by the processor 23
24 ASIC-Based Platform: Main Components Ingress Packets Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards RAW Queue(s) Also Called CPU Queue(s) and Punt Queue(s) Punted Packets Packets Bound for the LC CPU or RP ASIC s Supporting CPU Receive Path Packets Route Processor CPU 24
25 Data Plane Data Plane Ingress Packets Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards Data Plane All Packets Forwarded Through the Platform Punted Packets ASIC s Supporting CPU Receive Path Packets Route Processor CPU 25
26 Control Plane Ingress Packets Control Plane Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards Control Plane ARP, BGP, OSPF, and Other Protocols that Glue the Network Together Punted Packets Most Control Plane Packets Go to the RP ASIC s Supporting CPU Receive Path Packets Route Processor CPU 26
27 Management Plane Ingress Packets Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards Management Plane Management Plane Telnet, SSH, TFTP, SNMP, FTP, NTP, and Other Protocols Used to Manage the Device Punted Packets All Management Plane Traffic Goes to the RP ASIC s Supporting CPU Receive Path Packets Route Processor CPU 27
28 Receive Path Ingress Packets Control Plane Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards Management Plane Receive Path The Control Plane and Management Plane Together Punted Packets ASIC s Supporting CPU Receive Path Packets Route Processor CPU 28
29 Feature Punt Data Plane Ingress Packets Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards Punted Packets Packets that Cannot Be Processed in the Forwarding ASIC get Punted to the ASIC s Supporting CPU (e.g. IP Options) Punted Packets ASIC s Supporting CPU Receive Path Packets Route Processor CPU 29
30 Sampled Feature Data Plane Ingress Packets Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards Sampled Packets Some Features Are Sampled to the ASIC s Supporting CPU for Processing (e.g. NetFlow) Punted Packets ASIC s Supporting CPU Receive Path Packets Route Processor CPU 30
31 Receive Path Attack Vectors Data Plane Ingress Packets Control Plane Forwarding/Feature ASIC Cluster Forwarded Packets To Fab to Other Line Cards Management Plane Saturate the Raw Punt Queue Punted Packets Packets Bound for the LC CPU or RP Saturate the Input Buffers on the RP Saturate the Supporting ASIC CPU ASIC s Supporting CPU Receive Path Packets Route Processor CPU Fabric Interconnect 31
32 Router Risk Assessment Direct router attacks usually target: Bandwidth saturation (data plane) Control and/or management plane (receive path traffic on the control and management plane) Saturate the punt path out of the forwarding/feature ASIC by abusing the TCP/IP standards (data plane traffic that is punted from the forwarding/feature ASIC) High level of control plane activity can cause various side effects High route processor CPU utilization (near 100%) Loss of keep-alives and routing protocol updates Route flaps and major network transitions Indiscriminate packet drops of incoming packets when memory and buffers are unavailable for legitimate IP data packets Slow or unresponsive interactive sessions via Command Line Interface (CLI) Attacks can be intentional or unintentional 32
33 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques Conclusions 33
34 Taking a Measured Approach The techniques we will be discussing are extremely useful, but they must be applied in an architecturally-sound, situationally-appropriate, and operationally-feasible manner Don t try to do all this at once pick a technique with which you are comfortable and which you think will benefit you the most, and start there Pilot your chosen technique in a controlled manner, in a designated portion of your network Take the lessons learned from the pilot and work them into your general deployment plan and operational guidelines 34
35 Control Plane Protection Evolution Infrastructure ACLs (iacls) Create policies (ACLs or MQC) for control plane traffic to block all unwanted IP traffic destined to the core Applied to ALL ingress port affects ALL traffic (control and data plane) Receive Path ACLs (racls) Create ACLs to block all all unwanted IP traffic destined to the core Global (single) configuration affects all receive path packets Only affects control plane traffic Control Plane Policing (CoPP) Extends racls by adding Modular QoS CLI (MQC) policing Widespread platform support 35
36 INFRASTRUCTURE ACLS (iacl) SEC-2T _05_2004_c Cisco Systems, Inc. All rights reserved. 36
37 Infrastructure ACLs (iacl) Basic premise: filter traffic destined TO your core routers Do your core routers really need to process all kinds of garbage? Develop list of required protocols that are sourced from outside your AS and access core routers Example: ebgp peering, GRE, IPSec, etc. Use classification ACL as required Identify core address block(s) This is the protected address space Summarization is critical simpler and shorter ACLs 37
38 Infrastructure ACLs (iacl) Infrastructure ACL will permit only required protocols and deny ALL others to infrastructure space ACL should also provide anti-spoof filtering Deny your space from external sources Deny RFC1918 space Deny multicast sources addresses (224/4) RFC3330 defines special use IPv4 addressing 38
39 Infrastructure ACLs (iacl) Infrastructure ACL must permit transit traffic Traffic passing through routers must be allowed via permit IP any any ACL is applied inbound on ingress interfaces Fragments destined to the core can be filtered via fragments keyword 39
40 Infrastructure ACL in Action SRC: DST: Any ACL in PR1 ACL in PR2 SRC: Valid DST: Rx (Any R) R1 R2 R3 SRC: ebgp Peer DST: CR1 ebgp CR1 ACL in R4 R5 CR2 ACL in SRC: Valid DST: External to AS (e.g. Customer) 40
41 IP Fragments and Security Fragmented Packets can cause problems... Fragmented packets can be used as an attack vector to bypass ACLs Fragments can increase the effectiveness of some attacks by making the recipient consume more resources (CPU and memory) due to fragmentation reassembly 41
42 iacls and Fragments Fragments can be denied via an iacl Denies fragments and classifies fragment by protocol: access-list 110 deny tcp any core_cidr fragments access-list 110 deny udp any core_cidr fragments access-list 110 deny icmp any core_cidr fragments 42
43 IP Options Provide control functions that may be required in some situations but unnecessary for most common IP communications IP Options not switched in hardware Complete list and description of IP Options in RFC 791 Drop and ignore reduce load on the route processor (RP) Caution: some protocols/application require options to function: For example: strict/loose source routing, resource reservation protocols (RSVP) and others ip access-list extended drop-ip-option deny ip any any option any-options permit ip any any ip options drop ip options ignore router ignores options Best practice when router doesn t need to process options ignore not available on all routing platforms Available in 12.0(22)S, 12.3(4)T and 12.2(25)S 43
44 Using Classification ACL to build iacl Iterative Deployment Typically a very limited subset of protocols needs access to infrastructure equipment Even fewer are sourced from outside your AS Identify required protocols via classification ACL Deploy and test your ACLs 44
45 Step 1: Classification Traffic destined to the core must be classified NetFlow can be used to classify traffic Need to export and review Classification ACL can be used to identify required protocols Series of permit statements that provide insight into required protocols Initially, many protocols can be permitted, only required ones permitted in next step Log keyword can be used for additional detail; hits to ACL entry with log will increase CPU utilization: impact varies by platform Regardless of method, unexpected results should be carefully analyzed do not permit protocols that you can t explain! 45
46 Step 2: Begin to Filter Permit protocols identified in step 1 to infrastructure only address blocks Deny all other to addresses blocks Watch access control entry (ACE) counters Log keyword can help identify protocols that have been denied but are needed Last line: permit ip any any permit transit traffic The ACL now provides basic protection and can be used to ensure that the correct suite of protocols has been permitted 46
47 Steps 3 and 4: Restrict Source Addresses Step 3: ACL is providing basic protection Required protocols permitted, all other denied Identify source addresses and permit only those sources for requires protocols e.g., external BGP peers, tunnel end points Step 4: Increase security: deploy destination address filters if possible Example - Protecting Your Core: Infrastructure Protection Access Control Lists: hite_paper09186a00801a1a55.shtml 47
48 Example: Infrastructure ACL! Deny our internal space as a source of external packets access-list 101 deny ip our_cidr_block any! Deny src addresses of and 127/8 access-list 101 deny ip host any access-list 101 deny ip any! Deny RFC1918 space from entering AS access-list 101 deny ip any access-list 101 deny ip any access-list 101 deny ip any 48
49 Example: Infrastructure ACL! The only protocol that require infrastructure access is ebgp. WE have defined both src and dst addresses access-list 101 permit tcp host peera host peerb eq 179 access-list 101 permit tcp host peera eq 179 host peerb! Deny all other access to infrastructure access-list 101 deny ip any core_cidr_block! Permit all data plane traffic access-list 101 permit ip any any 49
50 Infrastructure ACLs outside telnet Core snmp outside Edge shield in place Not perfect, but a very effective first round of defense Can you apply iacls everywhere? What about packets that you cannot filter with iacls? Hardware limitations Next step: secure the control/management planes per box 50
51 RECEIVE ACCESS-CONTROL LIST (racl) SEC-2T _05_2004_c Cisco Systems, Inc. All rights reserved. 51
52 Receive ACLs (racls) Receive ACLs filter traffic destined to the RP via receive adjacencies racls explicitly permit or deny traffic destined to the RP racls do NOT affect transit traffic Traffic is filtering on the ingress line card (LC), prior to route processor (RP) processing racls enforce security policy by filtering who/what can access the router 52
53 Receive ACL Command Introduced in 12.0(21)S2/12.0(22)S ip receive access-list [number] Standard, extended or compiled ACL As with other ACL types, show access-list provide ACE hit counts Log keyword can be used for more detail Example IP Receive ACL oducts_feature_guide09186a00805e9255.html 53
54 Receive Adjacencies CEF entries for traffic destined to router, not through it Real interface IP addresses Loopback IP addresses #sh ip cef Prefix Next Hop Interface / GigabitEthernet3/ / GigabitEthernet3/ /32 receive ( is an interface IP address) Packets with next hop receive are sent to the router for processing Some are handled directly by the LC Others must be sent to the RP (GRP or PRP) Traffic usually routing protocols, management, multicast control traffic 54
55 Receive ACL Traffic Flow Router(config)# [no] ip receive access-list <num> GRP Note: The racl Is Never Examined for Transit Traffic i/f Line Card Line Card i/f IN IN Receive-ACL Receive-ACL OUT OUT Switch Packets to the Router Packets Through the Router 55
56 riacls and Fragments Fragments can be denied via an racl Denies fragments and classify fragment by protocol: access-list 110 deny tcp any any fragments access-list 110 deny udp any any fragments access-list 110 deny icmp any any fragments 56
57 Using Classification ACL to build racl Iterative Deployment Develop list of required protocols Develop address requirements Determine interface on router Does the protocol access 1 interface? Many interfaces? Loopback or real? Deployment is an iterative process Start with relatively open lists tighten as needed 57
58 racl: Iterative Deployment Step 1: Identify required protocols via classification ACL Permit any any for various protocols Get an understanding of what protocols communicate with the router Logging can be used for more detailed analysis Step 2: Review identified packets, begin to filter access to the GRP Using list developed in step 1, permit only those protocols Deny any any at the end basic protection AND identify missed protocols 58
59 racl: Iterative Deployment Step 3: Limit source address block Only permit your CIDR block in the source field ebgp peers are the exception: they will fall outside CIDR block Step 4: Narrow the racl permit statements: authorized source addresses Increasingly limit the source addresses to known sources: management stations, NTP peers, etc 59
60 racl: Iterative Deployment Step 5: Limit the destination addresses on the racl Filter what interfaces are accessible to specific protocols Does the protocol access loopbacks only? Real interfaces? 60
61 racl: Sample Entries ip receive access-list 110 Fragments access-list 110 deny any any fragments OSPF access-list 110 permit ospf host ospf_neighbour host ! DR multicast address, if needed access-list 110 permit ospf host ospf_neighbour host access-list 110 permit ospf host ospf_neighbour host local_ip BGP access-list 110 permit tcp host bgp_peer host loopback eq bgp EIGRP access-list 110 permit eigrp host eigrp_neighbour host access-list 110 permit eigrp host eigrp_neighbour host local_ip 61
62 racl: Sample Entries SSH/Telnet SNMP access-list 110 permit tcp management_addresses host loopback eq 22 access-list 110 permit tcp management_addresses host loopback eq telnet access-list 110 permit udp host NMS_stations host loopback eq snmp Traceroute (router originated)!each hop returns a ttl exceeded (type 11, code 3) message and the final destination returns an ICMP port unreachable (type 3, code 0) access-list 110 permit icmp any routers_interfaces ttl-exceeded access-list 110 permit icmp any routers_interfaces port-unreachable Deny Any access-list 110 deny ip any any 62
63 Receive ACLs untrusted telnet, snmp Attacks, junk Contain the attack: compartmentalize Protect the RP! Widely deployed and highly effective If you have platforms that support racls, start planning a deployment racl deployments can easily be migrated to control plane policing (next topic) Limited platform support Lack of granularity racl Router CPU 63
64 CONTROL PLANE POLICING (CoPP) SEC-2T _05_2004_c Cisco Systems, Inc. All rights reserved. 64
65 Control Plane Policing (CoPP) racls are great but Limited platform availability Limited granularity permit/deny only Need to protect all platforms To achieve protection today, need to apply ACL to all interfaces Some platform implementation specifics Some packets need to be permitted but at limited rate Think ping :-) 65
66 Control Plane Policing (CoPP) CoPP uses the Modular QoS CLI (MQC) for QoS policy definition Consistent approach on all boxes Dedicated control-plane interface Single point of application Highly flexible: permit, deny, rate limit Extensible protection Changes to MQC (e.g. ACL keywords) are applicable to CoPP 66
67 Control Plane Policing Feature CONTROL PLANE CONTROL PLANE POLICING (Alleviating DoS Attack) INCOMING PACKETS Management SNMP, Telnet PACKET BUFFER ICMP IPv6 Routing Updates INPUT to the Control Plane Processor Switched Packets OUTPUT from the Control Plane Locally Switched Packets Management SSH, SSL SILENT MODE (Reconnaissance Prevention) OUTPUT PACKET BUFFER CEF/FIB LOOKUP 67
68 Configuring CoPP CoPP policy is applied to the control-plane itself Router(config)# control-plane Router(config-cp)# service-policy input controlplane-policy Three required steps: Class-map Setup class of traffic Policy-map Define the actual QoS policy: rate limiting and actions Apply CoPP policy to control plane interface 68
69 Deploying CoPP Do you know what rate of TCP/179 traffic is normal or acceptable? racl are relatively simple to deploy I know that I need BGP/OSPF/etc., deny all else To get the most value from CoPP, detailed planning is required Depends on how you plan to deploy it bps vs. pps in vs. out 69
70 Deploying CoPP One option: mimic racl behavior Apply racl to a single class in CoPP Same limitations as with racl: permit/deny only Recommendation: develop multiple classes of control plane traffic Apply appropriate rate to each Appropriate will vary based on network, risk tolerance, risk assessment Flexible class definition allows extension of model Fragments, TOS, ARP 70
71 Step 1: Classification Identity traffic destined to routers Some is easy (BGP, OSPF, etc.) What else? NetFlow can be used to classify traffic Need to export and review Classification ACL can be used to identify required protocols Series of permit statements that provide insight into required protocols Initially, many protocols can be permitted, only required ones permitted in next step Regardless of method, unexpected results should be carefully analyzed do not permit protocols that you can t explain! 71
72 Step 2: Policy Creation Define classification policy Group IP traffic types identified in step 1 into different classes Critical traffic crucial to the operation of the network Important traffic necessary for day-to-day operations Normal traffic expected but not essential for network operations Undesirable explicitly bad or malicious traffic to be denied access to the RP Default all remaining traffic destined to RP that has not been identified Create ACLs to define traffic Use ACLs with unique numbers to represent each class defined above Create class maps to collect access-lists Associate the traffic separation ACLs developed above with class-maps with descriptive names Use the simple match access-group <acl-number> format Add the match protocol format as necessary (e.g. ARP) Use class-default to identify all unclassified packets 72
73 Step 2: Policy Creation Packet Classification The Router IP Address for Control/Management Traffic Is Critical ACL 120 Important ACL 121 Normal ACL 122 Undesirable ACL 123 Default no ACL required! CRITICAL -- Defined as routing protocols access-list 120 permit tcp host eq bgp host gt 1024 access-list 120 permit tcp host gt 1024 host eq bgp access-list 120 permit tcp host eq bgp host gt 1024 access-list 120 permit tcp host gt 1024 host eq bgp access-list 120 permit ospf any host access-list 120 permit ospf any host access-list 120 permit ospf any any! IMPORTANT -- Defined as traffic required to access and manage the router access-list 121 permit tcp host host established access-list 121 permit tcp host range 22 telnet access-list 121 permit tcp host host eq 443 access-list 121 permit udp host host eq snmp access-list 121 permit udp host host eq ntp 73
74 Step 2: Policy Creation Packet Classification (Cont.) Critical ACL 120 Important ACL 121 Normal ACL 122 Undesirable ACL 123 Default No ACL required! NORMAL -- Defined as other traffic destined to the router to track and limit access-list 122 permit icmp any any ttl-exceeded access-list 122 permit icmp any any port-unreachable access-list 122 permit icmp any any echo-reply access-list 122 permit icmp any any echo access-list 122 permit icmp any any packet-too-big Allows router originated traceroute! UNDESIRABLE -- Defined as traffic explicitly blocked (known malicious) access-list 123 permit udp any any eq 1434 access-list 123 permit ip any any fragments Use permit Here because the police action will be drop/drop for conform/exceed-actions 74
75 Step 2: Classification Policy Create class-maps to complete the traffic-classification process Use the access-lists defined on the previous slides to specify which IP packets belong win which classes Class-maps permit multiple match criteria, and nested class-maps match-any requires that packets meet only one match criteria to be considered in the class match-all requires that packets meet all of the match criteria to be considered in the class A match-all classification scheme with a simple, single-match criteria will satisfy initial deployments Traffic destined to the undesirable class should follow a matchany classification scheme! Define a class for each type of traffic and associate the appropriate ACL class-map match-all CoPP-critical match access-group 120 class-map match-all CoPP-important match access-group 121 class-map match-all CoPP-normal match access-group 122 class-map match-any CoPP-undesirable match access-group
76 Step 3: Policing Policy Class-maps Defined in Step 2 Need to Be Enforced by Using a Policy- Map to Specify Appropriate Service Policies for Each Traffic Class For example: For critical traffic, no policy is specified critical traffic has unrestricted access to the route processor For undesirable traffic types, all actions are unconditionally drop regardless of rate For important and normal traffic types, all actions are transmit to start out For default traffic, rate-limit the amount of traffic permitted above a certain bps Note: all traffic that fails to meet the matching criteria belongs to the default traffic class, which is user configurable, but cannot be deleted! Example Baseline service policy for each traffic classification policy-map CoPP class CoPP-critical police conform-action transmit exceed-action transmit class CoPP-undesirable police conform-action drop exceed-action drop <or simply> drop class CoPP-important police conform-action transmit exceed-action transmit class CoPP-normal police conform-action transmit exceed-action transmit class class-default police conform-action transmit exceed-action drop 76
77 Step 4: Apply Policy to Interface Apply the Policy-Map Created in Step 3 to the Control Plane The new global configuration CLI control-plane command is used to enter controlplane configuration mode Once in control-plane configuration mode, attach the service policy to the control plane in either the input or output direction Input applies the specified service policy to packets that are entering the control plane Output applies the specified service policy to packets that are exiting the control plane A service policy may be applied to the control plane in one or both directions (two separate statements) Centralized CoPP: Router(config)# control-plane Router(config-cp)# service-policy [input output] <policy-map-name> Distributed CoPP (DCoPP): Router(config)#control-plane slot <n> Router(config-cp)#service-policy input control-plane-in <policy-mapname>! Example! This applies the policy-map to the Control Plane control-plane service-policy input CoPP-In 77
78 Show Policy-map Command Router#show policy-map control-plane input Control Plane Service-policy input: CoPP Class-map: Classify (match-all) 16 packets, 2138 bytes 5 minute offered rate 0 bps, drop rate 0 bps Match: access-group 120 police: cir bps, bc 1500 bytes conformed 16 packets, 2138 bytes; actions: transmit exceeded 0 packets, 0 bytes; actions: transmit conformed 0 bps, exceed 0 bps Service Policy Map name and direction Class-map name and criteria Number of packets/bytes matched ACL name/number police action Class-map: class-default (match-any) 250 packets, bytes 5 minute offered rate 0 bps, drop rate 0 bps Match: any police: cir 8000 bps, bc 1500 bytes conformed 41 packets, 5232 bytes; actions: transmit exceeded 0 packets, 0 bytes; actions: drop conformed 0 bps, exceed 0 bps Router# Default class police action 78
79 Control Plane Policing untrusted telnet, snmp Attacks, junk CoPP Superset of racl: start planning your migrations Provides a cross-platform methodology for protecting the control plane Consistent show command and MIB support Granular: permit, deny and rate-limit Default-class provides flexibility Platform specifics details: centralized vs. distributed vs. hardware Router CPU 79
80 Agenda Infrastructure Security Overview Preparing the Network Router Security: A Plane Perspective Tools and Techniques Conclusions 80
81 Summary Understand the risk Take infrastructure protection into account in network design Want to deploy voice? Want to deploy video? Want to deploy xyz? All services deployment depend on an available infrastructure Understand the techniques/features and apply them appropriately Edge filters: iacls Control plane traffic filtering: racl Next-phase of control plane filtering (including policing): CoPP Each feature has pros/cons Ultimately, mix and match as needed: remember defense in depth 81
82 Summary Review your current protection schemes Identify gaps and areas of exposure Develop a plan for protection Next steps: 1. Begin to classify network traffic 2. Use classification data and platform mix to determine appropriate protection schemes Start planning your deployments! Can be difficult but certainly worthwhile! Many customers have widespread deployments and have seen the benefits 82
83 Interesting Links iacl deployment guide 6a00801a1a55.shtml racl deployment guide guide09186a00805e9255.html#wp CoPP deployment guide ture_guide09186a b.html Cisco Network Foundation Protection (NFP) roup_home.html SP security archive ftp://ftp-eng.cisco.com/cons/isp/security/ NANOG
Network Core Infrastructure Protection: Best Practices
Network Core Infrastructure Protection: Best Practices Roland Dobbins Solutions Architect +66-83-266-6344 BKK mobile +65-8396-3230 SIN mobile Arbor Public Agenda Infrastructure Protection
Configuring Control Plane Policing
CHAPTER 53 This chapter describes how to configure control plane policing (CoPP) with Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see
Configuring Denial of Service Protection
24 CHAPTER This chapter contains information on how to protect your system against Denial of Service (DoS) attacks. The information covered in this chapter is unique to the Catalyst 6500 series switches,
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
LAB II: Securing The Data Path and Routing Infrastructure
LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything
Brocade NetIron Denial of Service Prevention
White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron
Firewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.
Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1. Task 20.2: Configure an access-list to block all networks addresses that is commonly used to hack SP networks. Task 20.3:
Chapter 4 Rate Limiting
Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Cisco Performance Monitor Commands
1 action (policy react and policy inline react) Cisco Performance Monitor Commands action (policy react and policy inline react) To configure which applications which will receive an alarm or notification,
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Network security includes the detection and prevention of unauthorized access to both the network elements and those devices attached to the network.
By: Ziad Zubidah CCNP Security IT Security Officer National Information Technology Center Network security includes the detection and prevention of unauthorized access to both the network elements and
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1
CHAPTER 9 The primary goal of the management module is to facilitate the secure management of all devices and hosts within the enterprise network architecture. The management module is key for any network
IP Network Traffic Plane Security Concepts
C H A P T E R 3 IP Network Traffic Plane Security Concepts IP traffic plane concepts provide the mechanisms from which comprehensive IP network security strategies can be implemented. Before discussing
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Configuring Class Maps and Policy Maps
CHAPTER 4 Configuring Class Maps and Policy Maps This chapter describes how to configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
- QoS and Queuing - Queuing Overview
1 Queuing Overview - QoS and Queuing - A queue is used to store traffic until it can be processed or serialized. Both switch and router interfaces have ingress (inbound) queues and egress (outbound) queues.
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Internet Infrastructure Security Technology Details. Merike Kaeo [email protected]
Internet Infrastructure Security Technology Details Merike Kaeo [email protected] Securing The Device Agenda Item Think of ALL Devices The following problem was reported last year and affects
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Configuring Network Address Translation
CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections
Table of Contents. Configuring IP Access Lists
Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message
Network Worm/DoS. ([email protected]) System Engineer. Cisco Systems Korea
Network Worm/DoS ([email protected]) System Engineer Cisco Systems Korea Blaster Worm Router Switch Switch Security Service Module Epilogue Blaster Worm Router Switch Switch Security Service Module Epilogue
Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top
Output Interpreter You have chosen to display errors warnings general information, and helpful references. Headings are displayed for all supported commands that you submitted. SHOW RUNNING-CONFIG SECURITY
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
QoS: Color-Aware Policer
QoS: Color-Aware Policer First Published: August 26, 2003 Last Updated: February 28, 2006 The QoS: Color-Aware Policer enables a color-aware method of traffic policing. This feature allows you to police
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
Configuring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
Cisco Quality of Service and DDOS
Cisco Quality of Service and DDOS Engineering Issues for Adaptive Defense Network MITRE 7/25/2001 Contents 1. INTRODUCTION...1 2. TESTBED SETUP...1 3. QUALITY OF SERVICE (QOS) TESTS...3 3.1. FIRST IN,
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Configuring Denial of Service Protection
CHAPTER 52 This chapter contains information on how to protect your switch against Denial of Service (DoS) attacks. The information covered in this chapter is unique to Cisco IOS Release 12.2SX, and it
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
- QoS Classification and Marking -
1 - QoS Classification and Marking - Classifying and Marking Traffic Conceptually, DiffServ QoS involves three steps: Traffic must be identified and then classified into groups. Traffic must be marked
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)
Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS) Internet (In)Security Exposed Prof. Dr. Bernhard Plattner With some contributions by Stephan Neuhaus Thanks to Thomas Dübendorfer, Stefan
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 4 Implementing Firewall Technologies 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe numbered, named, standard and extended IP ACLs. Configure
Internetwork Expert s CCNA Security Bootcamp. IOS Firewall Feature Set. Firewall Design Overview
Internetwork Expert s CCNA Security Bootcamp IOS Firewall Feature Set http:// Firewall Design Overview Firewall defines traffic interaction between zones or trust levels e.g. ASA security-level Common
INTERNET SERVICE PROVIDER SECURITY BEST PRACTICES
INTERNET SERVICE PROVIDER SECURITY BEST PRACTICES SESSION 1 Agenda A Brief Review Management Plane/Device Security Control Plane Data Plane Summary/Next Steps 2.scr A BRIEF REVIEW 3 Denial of Service and
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Deploying ACLs to Manage Network Security
PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system
2. Are explicit proxy connections also affected by the ARM config?
Achieving rapid success with WCCP and Web Security Gateway October 2011 Webinar Q/A 1. What if you are already using WCCP for Cisco waas on the same routers that you need to use WCCP for websense? Using
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
Configuring Quality of Service
CHAPTER 33 This chapter describes how to configure quality of service (QoS) with either automatic QoS (auto-qos) commands or standard QoS commands on a switch running Supervisor Engine 7-E. It describes
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Flow Monitor for WhatsUp Gold v16.2 User Guide
Flow Monitor for WhatsUp Gold v16.2 User Guide Contents Table of Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System
Ethernet Overhead Accounting
The feature enables the router to account for downstream Ethernet frame headers when applying shaping to packets. Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2
Chapter 3 Using Access Control Lists (ACLs)
Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol
DS3 Performance Scaling on ISRs
This document provides guidelines on scaling the performance of DS3 interface (NM-1T3/E3) for the Cisco 2811/2821/2851/3825/3845 Integrated Services Routers. The analysis provides following test results;
Lab 8: Confi guring QoS
Lab 8: Objective Implement QoS, mark traffi c, and display and interpret QoS output. Lab Topology For this lab, your network design will include two pods of devices. You will be responsible for confi guring
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Routing. Static Routing. Fairness. Adaptive Routing. Shortest Path First. Flooding, Flow routing. Distance Vector
CSPP 57130 Routing Static Routing Fairness Adaptive Routing Shortest Path First Flooding, Flow routing Distance Vector RIP Distance Vector Sometimes called Bellman-FOrd Original Arpanet, DECNet, Novell,
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Firewalls. Pehr Söderman KTH-CSC [email protected]
Firewalls Pehr Söderman KTH-CSC [email protected] 1 Definition A firewall is a network device that separates two parts of a network, enforcing a policy for all traversing traffic. 2 Fundamental requirements
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
Configuring Server Load Balancing
CHAPTER 6 This chapter describes how to configure server load balancing (SLB) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About Server
CHAPTER 3 STATIC ROUTING
CHAPTER 3 STATIC ROUTING This chapter addresses the end-to-end delivery service of IP and explains how IP routers and hosts handle IP datagrams. The first section discusses how datagrams are forwarded
Lab 8.3.13 Configure Cisco IOS Firewall CBAC
Lab 8.3.13 Configure Cisco IOS Firewall CBAC Objective Scenario Topology In this lab, the students will complete the following tasks: Configure a simple firewall including CBAC using the Security Device
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,
Securing Networks with Juniper Networks
Securing Networks with Juniper Networks Juniper Security Features Jean-Marc Uzé Liaison Research, Education and Government Networks and Institutions, EMEA [email protected] TF-CSIRT Meeting, 26/09/02 Agenda
CISCO IOS FIREWALL DESIGN GUIDE
CISCO IOS FIREWALL DESIGN GUIDE http://www.cisco.com/en/us/prod/collateral/vpndevc/ps5708/ps5710/ps1018/product_implement ation_design_guide09186a00800fd670.html I'm going to go through this document now..i'll
Introduction to Firewalls
Introduction to Firewalls Today s Topics: Types of firewalls Packet Filtering Firewalls Application Level Firewalls Firewall Hardware/Software IPChains/IPFilter/Cisco Router ACLs Firewall Security Enumeration
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Configuring Quality of Service
CHAPTER 37 QoS functionality on Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 49M, and Catalyst 4948E are equivalent. This chapter describes how to configure quality of service (QoS) by using
