IPv6 Workshop: Location Date Security Trainer Name



Similar documents
Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security

Linux Firewalls (Ubuntu IPTables) II

+ iptables. packet filtering && firewall

Lab Objectives & Turn In

FIREWALLS & CBAC. philip.heimer@hh.se

TP : Configuration de routeurs CISCO

Firewalls. Pehr Söderman KTH-CSC

Building a Home Gateway/Firewall with Linux (aka Firewalling and NAT with iptables )

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Linux Firewall Wizardry. By Nemus

How to Secure RHEL 6.2 Part 2

Packet filtering with Linux

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

LAB II: Securing The Data Path and Routing Infrastructure

Firewall Technologies. Access Lists Firewalls

Linux Firewall. Linux workshop #2.

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Linux Routers and Community Networks

Firewall implementation and testing

Firewall Firewall August, 2003

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Brest. Backup : copy flash:ppe_brest1 running-config

Linux: 20 Iptables Examples For New SysAdmins

CS Computer and Network Security: Firewalls

Assignment 3 Firewalls

CSC574 - Computer and Network Security Module: Firewalls

CS Computer and Network Security: Firewalls

IP Address: the per-network unique identifier used to find you on a network

Firewalls. Chien-Chung Shen

Configuring NetFlow Secure Event Logging (NSEL)

ipta iptables Log Analyzer Anders Sikvall ichimusai.org

Linux MDS Firewall Supplement

Linux Home Networking II Websites At Home

Linux Networking: IP Packet Filter Firewalling

How to protect your home/office network?

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

CIS 433/533 - Computer and Network Security Firewalls

Netfilter / IPtables

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Configuring NetFlow Secure Event Logging (NSEL)

ip6tables testing ip6tables Oliver Eggert (Universität Potsdam) ft6: firewall tester for IPv6 Folie 1 von 12

Firewall Examples. Using a firewall to control traffic in networks

Stateful Firewalls. Hank and Foo

Virtual Fragmentation Reassembly

Manuale Turtle Firewall

CSE543 - Computer and Network Security Module: Firewalls

OpenBSD in the wild...a personal journey

Network Security Management

Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Chapter 7. Firewalls

Securing Networks with PIX and ASA

Matthew Rossmiller 11/25/03

How To Understand A Firewall

Personnalisez votre intérieur avec les revêtements imprimés ALYOS design

Linux Cluster Security Neil Gorsuch NCSA, University of Illinois, Urbana, Illinois.

IPv6 Network Security.

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

ipchains and iptables for Firewalling and Routing

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Protecting and controlling Virtual LANs by Linux router-firewall

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara

Intro to Linux Kernel Firewall

Lab Exercise Configure the PIX Firewall and a Cisco Router

How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

8 steps to protect your Cisco router

Load Balancing Smoothwall Secure Web Gateway

Internetwork Expert s CCNA Security Bootcamp. IOS Firewall Feature Set. Firewall Design Overview

Linux Networking Basics

Lab Configure Cisco IOS Firewall CBAC

CCNA Access List Sim

Firewalls (IPTABLES)

Workshop. Avril 2015 Benoit Buonassera

Lab Configure IOS Firewall IDS

Load Balancing Sophos Web Gateway. Deployment Guide

Focus on Security. Keeping the bad guys out

Load Balancing Trend Micro InterScan Web Gateway

Linux Network Security

Installing and Configuring Websense Content Gateway

Install and configure a Debian based UniFi controller

How to Create, Setup, and Configure an Ubuntu Router with a Transparent Proxy.

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.

Worksheet 9. Linux as a router, packet filtering, traffic shaping

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Manage a Firewall Using your Plesk Control Panel Contents

How to Turn a Unix Computer into a Router and Firewall Using IPTables

Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.

IPv6.marceln.org.

GregSowell.com. Mikrotik Security

Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Network Security 2. Module 2 Configure Network Intrusion Detection and Prevention

Parallels Plesk Panel

Adding an Extended Access List

Transcription:

: Location Date Trainer Name 1/6

Securing the servers 1 ) Boot on linux, check that the IPv6 connectivity is fine. 2 ) From application hands-on, a web server should be running on your host. Add filters to make sure that your server filters incoming IPv6 packets except TCP 80 packets that access the server (help: Appendix A) 3 ) Ask other students to check that rules are properly working. 4 ) Now configure the filter to allow TCP port 80 to be accessed for IPv6 except from certain groups of the room 5 ) Again ask other students to check that rules are properly working. Securing the network Laboratory information Refer to the routing laboratories for getting access parameters. Access list configuration 1 ) Take an IPv4 access-list that you have configured in your network. Build a similar accesslist for IPv6 and configure it on the lab router you manage. Don't apply it on an interface to avoid causing access damage to the router (Help: Appendix B). 2/6

Appendix A Example (provided by IPv6 ADIRE project: https://ipv6.ustrasbg.fr/doku.php) #/bin/bash # reserved ports dw_ports="0:1023" # ports hauts up_ports="1024:65535" start_fw() { # Vidage des règles pour toutes les tables** ip6tables -F # permet l effacement de toutes les chaînes qui ne sont pas par défaut dans la # table filter notamment LOG_ACCEPT ip6tables -X # Ajout d une nouvelle chaîne qui a pour fonction de logguer # dans syslog ce qui est accepté ip6tables -N LOG_ACCEPT ip6tables -A LOG_ACCEPT -j LOG -m limit --limit 500/hour --log-level 6 - log-prefix "[ip6tables-accept]" ip6tables -A LOG_ACCEPT -j ACCEPT # Mise en oeuvre des politiques de sécurité positionnées à DROP : par # défaut tout est refusé ip6tables -P INPUT DROP ip6tables -P OUTPUT DROP ip6tables -P FORWARD DROP # La machine est saine et les processus locaux peuvent communiquer # entre eux via l'interface locale : ip6tables -A INPUT -i lo -j ACCEPT ip6tables -A OUTPUT -o lo -j ACCEPT # Nos règles d'usage local # Accès SSH depuis la zone de confiance et log ip6tables -A OUTPUT -p tcp --sport ssh -d X:X:X:X::/64 --dport $up_ports! syn -j LOG_ACCEPT ip6tables -A INPUT -p tcp --dport ssh --sport $up_ports -s X:X:X:X::/64 -j LOG_ACCEPT #Autorisation accès DNS udp 53 vers 53 ip6tables -A OUTPUT -p udp --dport domain --sport domain -j ACCEPT ip6tables -A INPUT -p udp --sport domain --dport domain -j ACCEPT #Autorisation acces DNS udp 53 et tcp 53 (requetes longues) ip6tables -A OUTPUT -p udp --dport domain --sport $up_ports -j ACCEPT ip6tables -A INPUT -p udp --sport domain --dport $up_ports -j ACCEPT ip6tables -A OUTPUT -p tcp --dport domain --sport $up_ports -j ACCEPT ip6tables -A INPUT -p tcp --sport domain --dport $up_ports -j ACCEPT # Autorisation serveur DNS udp 53 et tcp 53 (requêtes longues) ip6tables -A INPUT -p udp --dport domain --sport $up_ports -j ACCEPT 3/6

ip6tables -A OUTPUT -p udp --sport domain --dport $up_ports -j ACCEPT ip6tables -A INPUT -p tcp --dport domain --sport $up_ports -j ACCEPT ip6tables -A OUTPUT -p tcp --sport domain --dport $up_ports -j ACCEPT #Autorisation ftp pour la zone de confiance ip6tables -A OUTPUT -p tcp --dport 21 --sport $up_ports -d X:X:X:X::/64 -m state --state NEW,ESTABLISHED -j ACCEPT ip6tables -A INPUT -p tcp --sport 21 --dport $up_ports -s X:X:X:X::/64 -m state --state ESTABLISHED -j ACCEPT # Accès http et https ip6tables -A INPUT -p tcp --sport http --dport $up_ports -m state --state ESTABLISHED,RELATED -j ACCEPT ip6tables -A OUTPUT -p tcp --dport http --sport $up_ports -j ACCEPT ip6tables -A INPUT -p tcp --sport https --dport $up_ports -m state --state ESTABLISHED,RELATED -j ACCEPT ip6tables -A OUTPUT -p tcp --dport https --sport $up_ports -j ACCEPT # Autorisations icmpv6 ip6tables -A INPUT -p icmpv6 icmpv6-type echo request -j ACCEPT ip6tables -A OUTPUT -p icmpv6 -j ACCEPT # Log des paquets rejetés dans syslog ip6tables -A INPUT -j LOG -m limit --limit 500/hour --log-level 6 --logprefix "[ip6tables-in-reject]" ip6tables -A OUTPUT -j LOG -m limit --limit 500/hour --log-level 6 --logprefix "[ip6tables-out-reject]" } load_modules() { echo -en " Loading modules : " echo -en "ip_tables, " ; /sbin/modprobe ip_tables echo -en "ip_conntrack, " ; /sbin/modprobe ip_conntrack echo -en "ip_conntrack_ftp, " ;/sbin/modprobe ip_conntrack_ftp echo "ipt_limit" ; /sbin/modprobe ipt_limit } stop_fw() { # Vidage des règles pour toutes les tables : ip6tables -F # permet l effacement de toutes les chaînes qui ne sont pas par défaut dans la # table filter notamment LOG_ACCEPT ip6tables -X # On remet la politique par défaut à ACCEPT dans les trois tables par défaut ip6tables -P INPUT ACCEPT ip6tables -P OUTPUT ACCEPT ip6tables -P FORWARD ACCEPT } case "$1" in 4/6

start) load_modules start_fw echo "firewall started" stop) stop_fw echo "firewall stopped" restart) stop_fw echo "firewall stopped" load_modules start_fw echo "firewall restarted" *) echo "usage: $0 [start stop restart]" >&2 ;; esac 5/6

Appendix B Configure Access-lists Router1# configure terminal Router1(config)# ipv6 access-list v6test Router1(config-ipv6-acl)# permit ipv6 host 2001:DB8:CAFE:3::1 any Router1(config-ipv6-acl)# permit ipv6 host 2001:DB8:CAFE:13::3 any Router1(config-ipv6-acl)# permit ipv6 host 2001:DB8:CAFE:34::3 any Router1(config-ipv6-acl)# exit Applying Access Lists to your interfaces In IPv4 the command to apply an access-list to an interface was ip access-group <access-list_number_or_name> <in out>. In IPv6 the command is ipv6 traffic filter. Router1(config)# interface FastEthernet1 Router1(config-if)# ipv6 traffic-filter v6test in If you notice, you don t peer with any neighbors now. The reason is that the updates are sent via link local addresses. You have to permit these packets to your router. Router1(config)# ipv6 access-list v6test Router1(config-ipv6-acl)# permit ipv6 FE80::/16 any Checking your Access-lists To explicitly deny any IPv6 ICMP configure: Router1(config)# ipv6 access-list v6test Router1#(config-ipv6-acl)# deny icmp any any To check the access-list counters do: Router1# show ipv6 access-list v6test IPv6 access list v6test permit ipv6 host 2001:DB8:CAFE:3::1 any sequence 10 permit ipv6 host 2001:DB8:CAFE:13::3 any (7 matches) sequence 20 permit ipv6 host 2001:DB8:CAFE:34::3 any sequence 30 permit ipv6 FE00::/8 any (10 matches) sequence 40 deny icmp any any (5 matches) sequence 50 6/6