Advanced Network Security Testing. Michael Jack



Similar documents
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Access Security. Lesson 10

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Securing IP Networks with Implementation of IPv6

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Site to Site Virtual Private Networks (VPNs):

Spirent Avalanche AVALANCHE LOAD TESTING APPLIANCE

IP Security. Ola Flygt Växjö University, Sweden

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

Case Study for Layer 3 Authentication and Encryption

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

Lecture 17 - Network Security

Cisco IOS Advanced Firewall

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Security Engineering Part III Network Security. Security Protocols (II): IPsec

CCNA Security 1.1 Instructional Resource

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Network Security. Lecture 3

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Virtual Privacy vs. Real Security

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

INTRODUCTION TO FIREWALL SECURITY

BlackRidge Technology Transport Access Control: Overview

z/os Firewall Technology Overview

(d-5273) CCIE Security v3.0 Written Exam Topics

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

The BANDIT Products in Virtual Private Networks

Chapter 9 Firewalls and Intrusion Prevention Systems

Cisco Advanced Services for Network Security

Virtual Private Networks

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Secure Network Design: Designing a DMZ & VPN

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Gigabit SSL VPN Security Router

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Astaro Gateway Software Applications

Lecture 10: Communications Security

Cisco IOS Firewall. Scenarios

SSL VPN Technical Primer

Gateway Security at Stateful Inspection/Application Proxy

Networking for Caribbean Development

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

Steelcape Product Overview and Functional Description

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Cisco Application Networking for IBM WebSphere

8. Firewall Design & Implementation

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

TrustNet Group Encryption

TLS and SRTP for Skype Connect. Technical Datasheet

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Cisco Which VPN Solution is Right for You?

Introduction to Security and PIX Firewall

Securing Cisco Network Devices (SND)

This section provides a summary of using network location profiles to identify network connection types. Details include:

IxLoad TM : Data HTTP, SSL, and FTP

Software. Quidview 56 CAMS 57. XLog NTAS 58

VPN. VPN For BIPAC 741/743GE

Technical papers Virtual private networks

Using IPSec in Windows 2000 and XP, Part 2

LinkProof And VPN Load Balancing

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Cisco Integrated Services Routers Performance Overview

CS 4803 Computer and Network Security

Security vulnerabilities in the Internet and possible solutions

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Cornerstones of Security

Integrated Services Router with the "AIM-VPN/SSL" Module

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

SSL SSL VPN

Integrated Services Router with the "AIM-VPN/SSL" Module

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Virtual Private Networks

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

IxLoad-Attack: Network Security Testing

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Network Security Fundamentals

Transcription:

Advanced Network Security Testing Avalanche Unified Security Testing Michael Jack

Agenda The need for Defense In-depth Security Performance Issues Unified Testing Spirent User Quality of Experience Products Summary Page 2

Top IT Goals Improve availability Deliver 24x7x365 application availability Meet or exceed user performance requirements Increase security Device-level: firewall, IDP, router, server, switch, etc. End-to-end: user to application Save money Buy right: select the right devices for the network and traffic mix Reduce capital & operating costs: exact-size the network Availability AND Security AND Savings Page 3

Spirent s Testing Solutions Ensure Success of Top IT Projects 2 0 0 9 T O P I T P R O J E C T S Security VoIP Streaming Network Applications IDS/IPS deployment Firewall upgrade VPNs IP PBX bake-off VoIP deployment Online training Company Town Meeting MPLS rollout Datacenter consolidation High usage web site Equity Trading System Avalanche & ThreatEx Abacus & Avalanche Avalanche & SmartBits Avalanche & SmartBits Avalanche & TradeTest Spirent Global Services Spirent Global Services Spirent Global Services Spirent Global Services Spirent Global Services Page 4

Modern day Security Challenge Vulnerable code Hackers - > Exploits Increased Attack sophistication Attack automation Frequency of attacks Faster rate of vulnerability 0 day Telecommunication companies and service providers are at greater risk with the addition of application services Network Vulnerability Application Vulnerability Page 5

Hacker Profile HIGH Typical Hacker s intelligence Hacker tools ease of use LOW 1980 1990 2000 2009 Page 6

The Shift Towards Network Attacks End hosts and Servers are no longer the only targets! Network infrastructures being attacked Your e-commerce is disrupted or stopped Your business flow is disrupted or stopped Increased attacks on network entities: Backup software Router operating systems DB infrastructure Financial gain is often the goal! End-Hosts ` Server Farm Page 7

Network Attacks Are Costly Facts: 85% of Fortune 1000 companies annually experience network attacks The net average cost PER attack is $2M A spate of DDoS attacks against Amazon, Yahoo, ebay, and other major sites in February 2008 caused an estimated cumulative loss of US$1.2 billion Source Yankee Group Microsoft lost approximately US$500 million over the course of a few days from a DDoS attack on its site. Your customers have a very short acceptance of network vulnerabilities. They move elsewhere. How secure are you? Can you prove it? Page 8

Typical Perimeter Defense Tools Citrix VPN ITA ESM Corporate Backbone IDP SCM Internet SR IDP IDP VA IDP Web Proxy FTP Proxy Public facing Web Servers Page 9

Security Performance Issues

Security Performance issues impact user experience Security is merely a specialized application Often, security is the weak link in application processing Security devices are now in-line Nearly every end station runs its own security component Any security infrastructure change affects application performance E.g. added policies, IDP pattern matching, virus scanning, etc. Security processing can be considered a form of impairment Adds application latency May cause packet loss Applications that worked may time out when a configuration changes Customers may see longer delays if security is not carefully applied So, security must be deployed with minimum application impact Page 11

Key Security Questions End-to-end Security Is bad traffic stopped during an attack? Does layering of devices jeopardize overall security? Availability Is good traffic throughput sustained while under attack? Adaptability Is it easy to reconfigure and block new attacks? Accuracy Are attacks actually detected and blocked? False positives? Visibility Can you isolate device-level faults in an end-to-end network? Can you manage real-time threat identification, analysis and mitigation? Page 12

Action / Reaction What is the cost of access Are defense mechanism able to protect normailzed access Good-put Bandwidth Decreases Threats End Device Recovers Threats are introduced Avalanche Analyzer Page 13

Why Should We Test? Testing is an insurance policy Shows how applications perform before deployment Shows how applications, network and security interact Helps determine capacity and failure scenarios Testing should be performed before you deploy: New application software or software upgrade A new network device or device software upgrade Any network topology change or new service provider Plug and Pray, Where should you find your issues? Production or Test?? Page 14

Problem : Application & Network Infrastructure is Complex Capacity can be difficult to assess Firewall Load Balancer Router VPN SSL Terminator Web Server Application Server Database Server Page 15

A Better Approach - Unified Testing Unified Testing: Testing your applications, security and network infrastructure together Unified Testing enables testing the User Experience Enables you to correlate user experience to your own mix of applications, security and network infrastructure Enables device verification in a realistic environment Simulates actual users to show system-level operation Enables SLA success verification Interactive testing ensures success before deployment Security Infrastructure Network Infrastructure Applications Infrastructure Page 16

Why Test Layer 4 through Layer 7? L4-L7 testing is required to show: How L2-L3 devices operate in a production environment How the user experience and applications varies under load, impairment and attack Only actual payloads and protocols can test security and applications Integrity, Authentication & Confidentiality Stateful devices and proxies examine and act based on payload contents: Firewalls & IDS/IDP Devices Application Gateways (proxies) Secure Gateways & VPNs Unified Threat Management Authentication Server IDS Border Router Switch Proxy FW Policy Servers Page 17

System Test Problems Complexity Complex interactions under load Capacity Assessment requires stressing Scalability problems Unconfirmed vendor performance claims Failure prone Cost Hardware and software Administration Personnel Space Time Test setup and execution is time-consuming Page 18

Capacity Assessment requires simulating Clients and the Internet Latency Dropped Packets Internet Router Firewall SSL Scaler Load Balancer Databa se Server IP Address per Client Browser type HTTP aborts IPSec Tunnel Setup/Tear down Page 19

IPSec at 5000 feet IPSec Authentication Encryption Key Management AH ESP IKE IPSec Protocol = AH Algorithms = SHA, SHA-1 MD5 RIPEMD-160 Tiger IPSec Protocol = ESP Encryption Algorithms = All operate using CBC mode (Cipher Block Chaining) DES-CBC, 3DES-CBC Blowfish-CBC AES Authentication Algorithms = HMAC-MD5 HMAC-SHA IPSec Protocol IKE Diffie-Hellman Page 20

IPSec Unencrypted traffic: basic email Mega Corp's Dallas office Encrypted traffic: access to a Sales Database Mega Corporations Head Office in San Jose Page 21

How did that path (SA) get there? It had to be created first There are two types of SAs: IKE SAs IPSec SAs IKE SA IPSec SAs Page 22

IPSec Tunnel Mode protects the entire IP datagram: The communications endpoint is the encrypted inner IP header, and the cryptographic endpoints are contained in the unencrypted outer IP header What Happens when every one Original TCP/IP packet IP TCP User's data connects via an Tunnel mode IPSec Protected IP packet: IPSEC Tunnel? IPSec protocol IP TCP User's data Outer IP header Inner IP header Page 23

Avalanche Security offering IPSEC Quickly setup Brings Realism to IP Security testing Full stateful application support 1000 new HTTP, FTP, Telnet, Capture-Replay, Triple-play, SMTP and others Complete Performance assessment of IPSec Gateways Tunnel capacity, Tunnel set-up rate, Tunnel throughput, ReKey Support for both IPv4 and IPv6 tunnels per Use Avalanche for comprehensive IPSec VPN testing: second with full Branch office to corporate IPSec VPN gateway performance Large-scale remote-access to corporate IPSec VPN performance Multi-vendor remote-access client support transactions Router-to-router tunneling over IPSec Multi-scenario, real-life VPN traffic emulation Page 24

Avalanche Security / Web Apps / Triple Play Appliance Spirent TestCenter Hardware 2U 9U Think Millions of Internet users and/or application servers in a single box Line rate L4-7 testing performance up to 10G Load tests Network Security devices and the Application Servers they protect Supports all major web applications including, web surfing, email, streaming video, file downloads, VoIP and more HTTP, HTTPS, SOAP DNS, FTP, STMP, POP3, TELNET, STREAMING Unicast/Multicast, SIP, Capture and Replay, Radius, MM4, IPv4/IPv6 (DHCP,IPSEC/SSL VPN, PPPoE, 802.1x, VLAN), CIFS, RTMP, Video Quality Page 25

Avalanche Security offering SSL Supports all 3 versions of SSL: SSLv2, SSLv3, TLSv1 Client and Server Selectable cipher suites independently on Client and Server Enables testing for correct cipher negotiation Support for Unique Certificates Client and Server Loadable Client (User) and Server certificates Loadable Certificate Authority (CA) certificates Loadable Certificate Revocation List (CRL) Support for Session Id re-use *Under Development Page 26

Avalanche Security offering Integrated Threats Library of 3300+ threats Ability to send threats from the same port as good traffic Single GUI and Hardware for better Testing IDS/IPS appliances or Threat Mitigations Cisco Guard XT (DDoS Guard) Cisco Security Monitoring analysis and Response System (MARS) SAPEE Application Protocol Emulation Environment Advanced Playback engine to emulate complex P2P traffic like Bittorrent, Edonkey, Gnutella etc and other messenger traffic Support for Non-Native Protocols Playback your own protocols and captured traces. Great solution for testing IDS/IPS appliances Page 27

Spirent Professional Services Spirent Test Services provide customers with test data and expert analysis to make business decisions Spirent Professional Services test expertise comes from: Supporting all major network equipment manufacturers and operators with their product and service launches Attending and contributing to industry forums and standards bodies Supporting key industry test activities at Network World and Light Reading Page 28

Spirent Professional Services Test Services Equipment Rental Test equipment rental that is flexible based on technologies, features, number of ports, and timeframe required Test Engineers Qualified Test Engineers in Asia to support testing onsite based on technologies and networks being evaluated Test Planning Defining test requirements for individual devices, network design, and implementation according to service level requirements today and in the future Test Reporting Summarizing results using appropriate illustrations and graphs to show how devices and networks performed against requirements, highlighting any key points Page 29

Spirent Avalanche