Network Security Topologies. Chapter 11



Similar documents
Firewall Security. Presented by: Daminda Perera

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Proxy Server, Network Address Translator, Firewall. Proxy Server

INTRUSION DETECTION SYSTEMS and Network Security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Secure Network Design: Designing a DMZ & VPN

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

Security Technology: Firewalls and VPNs

Tutorial 3. June 8, 2015

Securing SIP Trunks APPLICATION NOTE.

Chapter 15. Firewalls, IDS and IPS

Firewalls and Virtual Private Networks

Figure 41-1 IP Filter Rules

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewall Environments. Name

Cornerstones of Security

FIREWALL ARCHITECTURES

Security Awareness. Wireless Network Security

Owner of the content within this article is Written by Marc Grote

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Recommended IP Telephony Architecture

Firewall Architecture

Technical Support Information

Top-Down Network Design

Internet infrastructure. Prof. dr. ir. André Mariën

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

How To Protect Your Network From Attack

12. Firewalls Content

CMPT 471 Networking II

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Firewalls and Network Defence

UCIT INFORMATION SECURITY STANDARDS

SECTION 1: INTRODUCTION

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

DMZ Network Visibility with Wireshark June 15, 2010

A Model Design of Network Security for Private and Public Data Transmission

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Cisco Which VPN Solution is Right for You?

Firewalls. Chapter 3

Firewall VPN Router. Quick Installation Guide M73-APO09-380

8. Firewall Design & Implementation

Training Course on Network Administration

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May Far South Networks

Firewalls, IDS and IPS

FIREWALLS & CBAC. philip.heimer@hh.se

Overview. Firewall Security. Perimeter Security Devices. Routers

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

ICANWK406A Install, configure and test network security

Lab Configuring Access Policies and DMZ Settings

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Creating a VPN Using Windows 2003 Server and XP Professional

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

- Introduction to PIX/ASA Firewalls -

Chapter 3 Security and Firewall Protection

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

What would you like to protect?

Network Infrastructure Security Good Practice Guide. August 2009

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

Video Conferencing and Security

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Firewalls. CIT304 University of Sunderland Harry R. Erwin, PhD

Application Note. Onsight TeamLink And Firewall Detect v6.3

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

E-commerce Production Firewalls

VPN. Date: 4/15/2004 By: Heena Patel

- Introduction to Firewalls -

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

By David G. Holmberg, Ph.D., Member ASHRAE

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Application Note Secure Enterprise Guest Access August 2004

CTS2134 Introduction to Networking. Module Network Security

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Introduction to Firewalls

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Ranch Networks for Hosted Data Centers

Multi-Homing Dual WAN Firewall Router

This chapter covers the following topics:

Transcription:

Network Security Topologies Chapter 11

Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network Explain how network address translation is used to help secure networks Spell out the role of tunneling in network security Describe security features of virtual local area networks

Perimeter Security Topologies Put in place using firewalls and routers on network edge Permit secure communications between the organization and third parties Key enablers for many mission-critical network services Include demilitarized zones (DMZs) extranets, and intranets continued

Perimeter Security Topologies Selectively admit or deny data flows from other networks based on several criteria: Type (protocol) Source Destination Content

Three-tiered Architecture Outermost perimeter Internal perimeters Innermost perimeter

Outermost Perimeter Router used to separate network from ISP s network Identifies separation point between assets you control and those you do not Most insecure area of a network infrastructure Normally reserved for routers, firewalls, public Internet servers (HTTP, FTP, Gopher) Not for sensitive company information that is for internal use only

Internal Perimeters Represent additional boundaries where other security measures are in place

Network Classifications Trusted Semi-trusted Untrusted

Trusted Networks Inside network security perimeter The networks you are trying to protect

Semi-Trusted Networks Allow access to some database materials and email May include DNS, proxy, and modem servers Not for confidential or proprietary information Referred to as the demilitarized zone (DMZ)

Untrusted Networks Outside your security perimeter Outside your control

Creating and Developing Your Security Design Know your enemy Count the cost Identify assumptions Control secrets Know your weaknesses Limit the scope of access Understand your environment Limit your trust

DMZ Used by a company to host its own Internet services without sacrificing unauthorized access to its private network Sits between Internet and internal network s line of defense, usually some combination of firewalls and bastion hosts Traffic originating from it should be filtered continued

DMZ Typically contains devices accessible to Internet traffic Web (HTTP) servers FTP servers SMTP (e-mail) servers DNS servers Optional, more secure approach to a simple firewall; may include a proxy server

DMZ Design Goals Minimize scope of damage Protect sensitive data on the server Detect the compromise as soon as possible Minimize effect of the compromise on other organizations

Intranet Either a network topology or application (usually a Web portal) used as a single point of access to deliver services to employees Typically a collection of all LANs inside the firewall Shares company information and computing resources among employees continued

Intranet Allows access to public Internet through firewalls that screen communications in both directions to maintain company security Also called a campus network

Extranet Private network that uses Internet protocol and public telecommunication system to provide various levels of accessibility to outsiders Can be accessed only with a valid username and password Identity determines which parts of the extranet you can view continued

Extranet Requires security and privacy Firewall management Issuance and use of digital certificates or other user authentication Encryption of messages Use of VPNs that tunnel through the public network

Network Address Translation (NAT) Internet standard that enables a LAN to use one set of IP addresses for internal traffic and a second set for external traffic Able to translate addresses contained in an IP packet

Main Purposes of NAT Provide a type of firewall by hiding internal IP addresses Enable a company to use more internal IP addresses

NAT Most often used to map IPs from nonroutable private address spaces defined by RFC 1918 Static NAT and dynamic NAT Port Address Translation (PAT) Variation of dynamic NAT Allows many hosts to share a single IP address by multiplexing streams differentiated by TCP/UDP port numbers Commonly implemented on SOHO routers

Tunneling Enables a network to securely send its data through untrusted/shared network infrastructure Encrypts and encapsulates a network protocol within packets carried by second network Best-known example: virtual private networks Replacing WAN links because of security and low cost An option for most IP connectivity requirements

Example of a Tunnel

Virtual Local Area Networks (VLANs) Deployed using network switches Used throughout networks to segment different hosts from each other Often coupled with a trunk, which allows switches to share many VLANs over a single physical link

Benefits of VLANs Network flexibility Scalability Increased performance Some security features

Security Features of VLANs Can be configured to group together users in same group or team Offer some protection when sniffers are inserted into the network Protect unused switch ports Use an air gap to separate trusted from untrusted networks

Vulnerabilities of VLAN Trunks Trunk autonegotiation Prevention: Disable autonegotiation on all ports Trunk VLAN membership and pruning Prevention: Manually configure all trunk links with the VLANs that are permitted to traverse them

Chapter Summary Technologies used to create network topologies that secure data and networked resources Perimeter networks Network address translation (NAT) Virtual local area networks (VLANs)