Campus Firewall. Bruce Campbell, IST Trevor Grove, CSCF



Similar documents
WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

Standard: Network Security

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Deploy Remote Desktop Gateway on the AWS Cloud

Achieving PCI-Compliance through Cyberoam

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

Chapter 11 Cloud Application Development

PCI Compliance Report

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

UCIT INFORMATION SECURITY STANDARDS

VPN Configuration Guide. Dealing with Identical Local and Remote Network Addresses

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

FIREWALL POLICY DOCUMENT

SSL VPN A look at UCD through the tunnel

Security Technology: Firewalls and VPNs

R4: Configuring Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

A Model Design of Network Security for Private and Public Data Transmission

FACCUS MINUTES - SEPT

Campus Network Best Practices: Core and Edge Networks

Firewall Strategies June 2003 (Updated May 2009)

CANHEIT Building the Digital University

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewall and Router Policy

Configuring Network Address Translation (NAT)

Configuring PA Firewalls for a Layer 3 Deployment

ACL Compliance Director FAQ

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls. Chapter 3

Overview. Firewall Security. Perimeter Security Devices. Routers

Voice Over IP and Firewalls

74% 96 Action Items. Compliance

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Information Technology Security Guideline. Network Security Zoning

blueprint IL3 CONNECTIVITY FROM SECURE END-USER DEVICES

M2M Series Routers. Port Forwarding / DMZ Setup

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Setting Up Scan to SMB on TaskALFA series MFP s.

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Computer Security DD2395

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

SonicWALL PCI 1.1 Implementation Guide

HP Service Manager Architecture and Security HP Software-as-a-Service

Polycom. RealPresence Ready Firewall Traversal Tips

IT Security Standard: Network Device Configuration and Management

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

1B1 SECURITY RESPONSIBILITY

Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0

FIREWALL ARCHITECTURES

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Cisco AnyConnect Secure Mobility Solution Guide

Configuring Windows Server 2008 Network Infrastructure

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Designing and Implementing a Server Infrastructure MOC 20413

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer

FIREWALL POLICY November 2006 TNS POL - 008

Best Practices for PCI DSS V3.0 Network Security Compliance

Network Security Topologies. Chapter 11

The Wingu guide to creating your first cloud server.

Lab Configuring Access Policies and DMZ Settings

Creating a VPN with overlapping subnets

Juniper NetScreen 5GT

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Introduction of Intrusion Detection Systems

Firewalls P+S Linux Router & Firewall 2013

Network Security Guidelines. e-governance

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

U06 IT Infrastructure Policy

Networking Security IP packet security

Redesigning automation network security

March

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Windows Remote Access

University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Integrating Juniper Netscreen (ScreenOS)

What would you like to protect?

Lab Developing ACLs to Implement Firewall Rule Sets

Automating Server Firewalls

Network Virtualization Network Admission Control Deployment Guide

Transcription:

Campus Firewall Bruce Campbell, IST Trevor Grove, CSCF

2012 Information Security Architecture Review Part of 2012 Audit Plan as approved by (Board) Audit Committee Information Security Architecture Review University wide scope 26 recommendations assigned a D First recommendation is Implement an enterprise firewall solution to protect the campus network from the Internet and other untrusted zones (e.g. wireless and resident networks).

Management Comments and Action Plan A project to deploy a firewall to protect the general campus network will be initiated. The deployment of a campus firewall will require broad consultation with the campus community as it will have significant consequences to the way network services are offered, and involve a considerable culture change.

Project Overview Campus Firewall Project initiated Objectives: deploy a campus perimeter firewall which blocks new inbound connections (by default) from untrusted zones (off campus, residence, wireless) develop a mechanism and approval process to permit certain hosts (e.g. Servers) to be exempted from the default inbound deny firewall policy. December 2013 completion

Project Team Project Leader Project Team Bruce Campbell, IST Steve Bourque, IST Hari Chotara, Math Brent Clerk, AHS Trevor Grove, CS Dave Hinton, IST Mike Patterson, IST Bernie Rutter, ENV Sean Speers, Arts Ray White, Engineering

Stateful Packet Filter The perimeter firewall will have no impact that originates from the trusted zone (on campus). (e.g. Any activity that originates from your desktop computer or a campus server, web browsing, skype, youtube, ssh, updates, etc). A stateful firewall supports this by maintaining a state table of traffic that originates from the trusted side (protocol,source/dest ip,source/dest port) and allowing return traffic from source ip/port in the state table.

Stateful Packet Filter

Pre Firewall Topology

Post Firewall Topology

Existing Firewalls IST Machine Room (Juniper SRX 3600) Wireless (NATed) (Juniper SRX 3600). CSCF (Netscreen) Civil (Sonicwall) Numerous smaller firewalls Router based Access Control Lists (ACLs) (non stateful) also used widely.

Firewalls Elsewhere Educause Survey indicates 75% of higher education institutions in Canada 86% of higher education institutions in the US have deployed firewalls at the border between their internal networks and the Internet. Safe to assume almost all commercial and home networks have a firewall (or NAT device)

Staged Deployment The topology and equipment will allow faculty/departmental/building routers to be migrated to behind the firewall in a staged manner. We will start with Academic Support areas, these areas already have router based client only ACLs applied, and should be more straightforward to migrate.

Communications http://ist.uwaterloo.ca/ns/firewall/ October Daily Bulletin item September 2012 UCIST update November 2012 UCIST update Project page

Implementation strategies The implementation challenges: Balancing security versus usability Provide security without impacting the mission of the institution Organizing networks to be firewall ready Protecting client workstation is a different problem from protecting public-facing servers And then there s instructional labs and publicfacing workstations

Organizing for firewalls Organizing networks by system function helps in firewall deployment Client systems like desktops generally need outbound traffic only; do not offer services Remote access the typical exception (rdp, ssh) Servers usually provide public-facing services: web, email, application-specific Firewall rules are subnet-based, so separating function is required

Case study: CS networks CS deployed a departmental firewall in 2003 and reorganized its networks into several firewall zones: Client networks (graduate student workstations, admin staff) Server networks (CS web, email, file-server, Unix/Linux general-purpose computing) Undergraduate teaching labs

CS firewall subnets The existing CS subnet organization makes a clear distinction between system function and should make transition easier Campus network Non-firewalled networks Client networks (outbound only) Research server networks (restricted; allow custom rules) Undergraduate teaching (client + on-campus restrictions CSCF staff network

What if a system changes? In CS we adopted a hard line on the placement of systems onto networks In our research environment, it is commonplace for a client workstation to want to run a server Must move (re-address) the system to the appropriate network

Custom rules and exceptions Whatever the rules, there are inevitably requests for exceptions and customization Creating firewall exceptions Takes effort to manage Creates complexity and can create performance issues diminishing returns from security perspective (e.g.10,000 unique exceptions is pointless)

So how do I get around it? As noted: default deny to inbound from untrusted We ve had a limited set of such restrictions for years, e.g. SMB, X, and RDP more recently But what do we do if we need to get to systems on campus? In nearly all cases: use the VPN

Use the VPN to access on-campus systems Use the VPN to build an authenticated connection from the untrusted zone: From off-campus From wireless and resnet Who can use the VPN? Faculty, staff, grad, undergrad, vpn-users ; pretty much everyone New/coming soon: NetID for externals

What about exceptions? There will need to be networks that permit common public-facing services But what is common? In CS, research community considers many protocols standard (notably ssh) And research (CS and elsewhere) depends on being able to use arbitrary ports

No really: will there be custom exceptions? At this moment, it s a definite maybe Current investigations show over 9,000 systems with open ports offering services Many don t need to be, eg printers Managing 9,000 exceptions is not feasible If this can be reduced to e.g. 1,000 maybe Research needs must be accommodated

Accountability for exceptions One of the motivations for the firewall is risk management, particularly for information security (Policy 8) Information stewards/custodians need to understand the risk of exempted systems Systems containing only research data may be lower risk Exempted systems should not host > public

Summary A campus perimeter firewall is to be deployed by December 2013 It will be default deny for inbound traffic, with the need for exception mechanisms recognised (and to be determined) The VPN will be the standard technique for individuals to gain access

Contact Bruce Campbell, bruce@uwaterloo.ca x38323 Trevor Grove, trg@uwaterloo.ca, x34679