Securizarea Calculatoarelor și a Rețelelor 15. Implementarea Zone Based Firewall



Similar documents
Zone-Based Firewalls. IDS/IPS. November 11, 2014

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Introduction of Intrusion Detection Systems

Securing Cisco Network Devices (SND)

Architecture Overview

Network Defense Tools

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

FIREWALLS & CBAC. philip.heimer@hh.se

Network Security Using Cisco IOS IPS

INTRODUCTION TO FIREWALL SECURITY

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Chapter 9 Firewalls and Intrusion Prevention Systems

INTRUSION DETECTION SYSTEMS and Network Security

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

On-Premises DDoS Mitigation for the Enterprise

Network- vs. Host-based Intrusion Detection

Lab Configure IOS Firewall IDS

CISCO IOS NETWORK SECURITY (IINS)

Taxonomy of Intrusion Detection System

Security and Access Control Lists (ACLs)

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Networking for Caribbean Development

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Cisco IPS Tuning Overview

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Securing Networks with PIX and ASA

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

- Introduction to PIX/ASA Firewalls -

Training Course on Network Administration

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

TABLE OF CONTENTS NETWORK SECURITY 2...1

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Network Instruments white paper

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Intrusion Detection Systems

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls, Tunnels, and Network Intrusion Detection

IDS / IPS. James E. Thiel S.W.A.T.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Name. Description. Rationale

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Cisco ASA 5500 Series IPS Solution

PROFESSIONAL SECURITY SYSTEMS

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

How To Prevent Hacker Attacks With Network Behavior Analysis

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Achieving PCI-Compliance through Cyberoam

FISMA / NIST REVISION 3 COMPLIANCE

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

DDoS Protection Technology White Paper

Implementing Secure Converged Wide Area Networks (ISCW)

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers

ACL Compliance Director FAQ

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Cisco Certified Security Professional (CCSP)

Ovation Security Center Data Sheet

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

CaptIO Policy-Based Security Device

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Cisco PIX vs. Checkpoint Firewall

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

SANS Top 20 Critical Controls for Effective Cyber Defense

Intrusion Detection Systems

CTS2134 Introduction to Networking. Module Network Security

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Tk20 Network Infrastructure

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Der Weg, wie die Verantwortung getragen werden kann!

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

- Basic Router Security -

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

Intrusion Detection System (IDS)

CS5008: Internet Computing

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Building A Secure Microsoft Exchange Continuity Appliance

Host/Platform Security. Module 11

co Characterizing and Tracing Packet Floods Using Cisco R

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Critical Security Controls

Transcription:

Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 15. Implementarea Zone Based Firewall

IDS & IPS Feel the beat 2

Network intrusions VPN Remote Worker Zero-day exploit attacking the network Firewall MARS ACS VPN VPN Remote Branch Iron Port LAN Servers 3

Zero-day A zero-day attack/threat/exploit attacks vulnerabilities unknown (yet) to the software vendor. During the time it takes the software vendor to develop and release a patch, all networks are vulnerable to this exploit. A firewall can only protect against known and welldocumented threats and anomalies. Defending against these kind of attacks requires a different perspective. 4

How to detect attacks? One approach: pay someone to look through your logs 24/7. Not scalable Time-consuming (and boring) Slow (by the time the logs get read, the attack was completed a long time ago) Expensive 5

Sorry, we re not hiring Another approach: use a machine Copy (or mirror ) the traffic stream from your network Send it to a device Let the device analyze it in real time Trust the device to let you know when something seems fishy An IDS works this way It is considered a passive device (it only listens) Runs in promiscuous mode (reveices all traffic) DOES NOT analyze the actual forwarded packets Only copies of them What does this mean? It can ONLY DETECT, NOT PREVENT attacks! 6

IDS behaviour 1: An attack is launched from outside the network. Traffic si mirrored and sent to the sensor, too. 2: The IDS sensor matches the traffic with a signature and sends the switch a command to deny further similar traffic. The IDS experiences the same attack as the hosts in the network. Sensor 2 1 Switch 3 3: The IDS sensor sends a log message to a management console. 7 Management Console Target

IPS, this time An IPS device does mainly what an IDS does, too. Except it is located elsewhere: An IPS is located inline with the traffic flow. The IPS can block traffic by itself. It applies deep inspection algorithms to all packets. The IPS responds immediately to a threat, by blocking traffic. The IDS cannot block traffic The IDS only barks, but does not bite 8

IPS behaviour 1: An attack is launched from outside the network. Traffic goes directly to the sensor. 1 2: The IPS sensor analyzes the packets. If a signature matches, traffic is stopped immediately. Sensor 2 4 3: The IPS sensor notifies a management console of the event. Bit Bucket 4: Further traffic in violation of certain policies can be dropped immediately. 3 9 Management Console Target

IPS & IDS characteristics A sensor can be implemented as: A router configured with Cisco IOS IPS software A dedicated device that provides IPS/IDS services A network module installed in an ASA, switch or router. They both rely on signatures to detect potential harmful traffic patterns. Patterns detected can be: Atomic single packets identified as attacks Composite sequences of packets that form an attack More on patterns and signatures later. 10

IDS advantages and disadvantages Zero impact on normal network performance. No impact on network performance if the sensor fails. No impact on network performance if the sensor is overloaded. Cannot stop attacks. Fast response time required. More vulnerable to network evasion techniques. 11

IPS advantages and disadvantages Can stop malicious traffic. Can apply stream normalization techniques. Abnormal streams can be used to confuse an IDS/IPS. And IPS can track TCP streams and accept only valid data. Single point of failure Sensor issues affect network traffic (failures of overloading) Fine-tuned policy required to avoid false positives. Some impact on network performance 12

Deployment methods: NIPS and HIPS NIPS Network-based IPS implementation Analyze network-wide activity Located between trusted and untrusted networks Deployed using ASA, routers and switches HIPS Host-based IPS implementation Installed on individual computers as a software agent Supervise network activity, file systems, OS resources 13 Detects using signatures and anomalies Acts like a network/application firewall+antivirus software Example: Cisco Security Agent (CSA)

NIPS deployment example VPN Remote Worker Firewall IPS MARS ACS VPN VPN Remote Branch Iron Port LAN Servers 14

NIPS NIPS implemented as a dedicated hardware device requires: A NIC (Network Interface Card) adequate to the network medium (FastEthernet, Gigabit, etc) Processor: real-time pattern matching between traffic and signatures require processing power Memory: intrusion detection analysis is memory-intensive. The device is transparent to the network and its users Is not dependent on network operating systems More cost-effective Cannot examine encrypted traffic Does not know whether an attack was successful or not 15

HIPS deployment example VPN Remote Worker Firewall MARS ACS VPN VPN Remote Branch Iron Port LAN Servers 16

HIPS A software application running on top of the OS Can query the user for specific actions Requires complete administrative access to the system Must be run on every system on the network Each decision affects only the local system Can immediately determine the success or failure of an attack. Traffic received by HIPS is unencrypted. Operating system dependent. Hosts are visible to the attackers. Cannot detect lower level network events. Runs with limited resources (one host) 17

Cisco Security Agent components Security agents Firewall Untrusted Network Security agents Management center Servers Security agents Management center: installed on central server, managed by system administrator. Security agents: installed on all host systems Constant monitoring activity 18

IPS signatures To stop an attack, you must be able to identify it. How to tell apart an attack from regular network traffic? Signatures A set of rules used by IPS and IDS to detect typical intrusive activities They describe attacks such as: Viruses, worms DoS attacks Flooding attacks Spoofing attacks Known exploits 19

Signature types Atomic Single packet or event Does not require state information tracking Ex: spoofed, malformed packet Composite Stateful signature tracks an entire connection Time to track a connection: event horizon The event horizon must be limited: hardware resources Components of a signature: 20 Type (classification) Trigger (what kind of traffic triggers the signature action) Action (the action taken with the specific traffic)

IPS signature characteristics Signatures are stored in signature files. These files are uploaded to IPS devices periodically. SME (Signature Micro-Engines) are compiled groups of signatures Used by Cisco IOS to improve scanning speed by seaching for multiple signatures at once. Signature files can be published weekly or even hours after an attack identification. Each incremental update includes all previous signatures Example: IOS-S361-CLI.pkg after IOS-S360-CLI-pkg 21

IPS signature alarms The alarm triggers the signature s response. It is comprised of certain packet parameters or a packet sequence that indicates a known attack. Cisco IPS and IDS sensors can use four types of signature triggers: Pattern-based detection Anomaly-based detection Policy-based detection Honeypot-based detection All types can be applied to both atomic and composite signatures. 22

Pattern-based detection Simplest detection mechanism. Searches for a predefined pattern. Network traffic is cross-referenced with a database of known attacks and triggers. Atomic example: Detecting an ARP request with the FF:FF:FF:FF:FF:FF source address. Composite example: 23 Searching for a character string in a sequence of TCP Telnet packets.

Anomaly-based detection Requires defining a profile that is considered normal Regarding traffic amount, protocol types, session initiation frequency, etc. The network must be free of attacks when being initially inspected. Can detect new and unpublished attacks. Can also generate many false positives. As the network evolves, the definition of normal must be constantly updated. Harder to track down the specific attack 24 Only indicates that abnormal traffic patterns were detected.

Policy-based detection Similar to pattern-based detection Includes patterns that define suspicious traffic based on historical analysis. Filters certain applications or types of traffic that have previously caused problems within the network. Example: a client trying to access a server without proper authentication credentials. 25

Honeypot-based detection Uses a dummy server to attract attacks. From the outside, the server looks like a vulnerable host, ready to be compromised. The server concentrates and logs all attacks. The logs can be analyzed to create new types of signatures. 26

IPS signature actions Generate an alert Store locally or send an event through the network. Log the activity Log attacker, victim or both types of packets. Drop or prevent activity Temporarily or permanently deny further traffic. Drop on a per-packet basis or forcefully close TCP connection. Block future activity A request to a switch or router can be sent to deny a certain type of traffic. Allow traffic 27

28 Configuring Cisco IOS IPS

Steps for implementing IOS IPS 1: Download the IOS IPS file 2: Create an IOS IPS configuration directory in Flash 3: Configure an IOS IPS crypto key 4: Enable IOS IPS 5: Load the IOS IPS signature package into the router 29

Downloading the IOS IPS file: Cisco.com IOS-Sxxx-CLI.pkg the signature package realm-cisco-pub-key.txt the public crypto key used by IOS IPS 30

Create a configuration directory in Flash Create a directory in Flash to store the signature files and configurations: R1#mkdir ips Create directory filename [ips]? Created dir flash:ips R1#dir flash: Directory of flash:/ 2 -rw- 1652 Aug 13 2009 11:59:54 +00:00 pre_autosec.cfg 3 -rw- 1015 Nov 6 2009 16:30:22 +00:00 srs_ac.cfg 5 drw- 0 Nov 7 2009 16:28:16 +00:00 ips 4 -rw- 30588892 Nov 10 2007 16:13:02 +00:00 c2801- advipservicesk9-mz.124-9.t.bin 64016384 bytes total (33415168 bytes free) 31

Configure an IOS IPS crypto key Copy the public key file s contents and paste it into global configuration mode. Removing a key: no crypto key pubkey-chain rsa no named-key realm-cisco.pub signature 32

Enabling IOS IPS - rules Create an IPS rule names IOSIPS: R(config)#ip ips name IOSIPS Optionally, specify an ACL to filter traffic: R(config)#ip ips name IOSIPS2 list ACL Specify the location of the IPS file: R(config)#ip ips config location flash:ips 33

Enabling IOS IPS - logging SDEE (Security Device Event Exchange) is a protocol running between IPS clients and servers. Relies on HTTP/HTTPS protocols. R(config)#ip http server R(config)#ip ips notify sdee R(config)#ip ips notify log IPS can also notify via syslog (for configured syslog destinations). 34

Enabling IOS IPS: signature categories Signatures are grouped into hierarchical categories. Common categories: all, basic, advanced. A category can be: 35 Retired: not compiled by IOS, unused Not retired: compiled and used to scan traffic R(config)#ip ips signature-category R(config-ips-category)#category all R(config-ips-category-action)#retired true R(config-ips-category-action)#exit R(config-ips-category)#category ios_ips_basic R(config-ips-category-action)#retired false R(config-ips-category-action)#exit R(config-ips-category)#exit Do you want to accept these changes? [confirm] y R(config)#

Enabling IOS IPS: assign the rule to an interface Applying the IOS IPS rule to an interface: R3(config-if)#interface FastEthernet0/0 R3(config-if)#ip ips IOSIPS in The rule can be applied inbound, as well as outbound, on the same interface: R3(config-if)#interface Serial0/1/1 R3(config-if)#ip ips IOSIPS in R3(config-if)#ip ips IOSIPS out 36

Altering individual signatures Retiring an individual signature with id 6130 and subsignature id 10: R1(config)# ip ips signature-definition R1(config-sigdef)# signature 6130 10 R1(config-sigdef-sig)# status R1(config-sigdef-sig-status)# retired true R1(config-sigdef-sig-status)# exit R1(config-sigdef-sig)# exit R1(config-sigdef)# exit Do you want to accept these changes? [confirm] y R1(config)# 37

Altering categories Unretire an entire category: R1(config)# ip ips signature-category R1(config-ips-category)# category ios_ips basic R1(config-ips-category-action)# retired false R1(config-ips-category-action)# exit R1(config-ips-category)# exit Do you want to accept these changes? [confirm] y R1(config)# 38

Changing a signature s action R1(config)# ip ips signature-definition R1(config-sigdef)# signature 6130 10 R1(config-sigdef-sig)# engine R1(config-sigdef-sig-engine)# event-action produce-alert R1(config-sigdef-sig-engine)# event-action deny-packet-inline R1(config-sigdef-sig-engine)# event-action reset-tcp-connection R1(config-sigdef-sig-engine)# exit R1(config-sigdef-sig)# exit R1(config-sigdef)# exit Do you want to accept these changes? [confirm] y R1(config)# The alert states that signature 6130 with subsignature 10 will generate an alert, drop packets and close the TCP connection when triggered. 39

Verifying configuration The show ip ips privileged EXEC command can be used with several other parameters to provide specific IPS information. The show ip ips all command displays all IPS configuration data. The show ip ips configuration command displays additional configuration data that is not displayed with the show runningconfig command. The show ip ips interface command displays interface configuration data. The output from this command shows inbound and outbound rules applied to specific interfaces. 40

Expecting the world to treat you fairly because you are a good person is a little like expecting a bull not to attack you because you are a vegetarian. Dennis Wholey 41

42 Goodbye detected!