Quản trị mạng - Chapter 4: Implementing firewall technologies

Zone-Based Policy Firewall (ZPF) , introduced in 2006, is the state of the art in modern firewalling. • ZPF operation centers around the creation of zones associated with various security levels. • Implementing ZPF with CLI is much more structured and easier to understand than CBAC . ZPF utilizes class maps and policy maps enabled by C3PL. • An SDM wizard for ZPF is avaiable. • Either CLI or SDM can be used to verify and troubleshoot ZPF

pdf132 trang | Chia sẻ: nguyenlam99 | Lượt xem: 950 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Quản trị mạng - Chapter 4: Implementing firewall technologies, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
Chapter 4 - Implementing Firewall Technologies CCNA Security Objectives • Describe numbered and named, standard and extended IP ACLs. • Configure IP ACLs with IOS CLI and CCP. • Describe TCP established ACL functionality. • Describe and configure reflexive ACLs. • Describe and configure dynamic ACLs. • Describe and configure time-based ACLs. • Describe attack mitigation with ACLs. • Describe the major types of firewalls. • Describe and configure CBAC (IOS Staful Packet Inspection) with CLI. • Describe and configure Zone-Based Policy Firewall with CLI and CCP Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com ACL Topology and Types Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com ACL Topology and Types • Refer to 4.1.1.1 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Standard Numbered IP ACLs • The first value specifies the ACL number • The second value specifies whether to permit or deny the configured source IP address traffic Router(config)# access-list {1-99} {permit | deny} source-addr [source-mask] • The third value is the source IP address that must be matched • The fourth value is the wildcard mask to be applied to the previously configured IP address to indicate the range • All ACLs assume an implicit deny statement at the end of the ACL • At least one permit statement should be included or all traffic will be dropped once that ACL is applied to an interface Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Extended Numbered IP ACLs • The first value specifies the ACL number • The second value specifies whether to permit or deny accordingly Router(config)# access-list {100-199} {permit | deny} protocol source-addr [source-mask] [operator operand] destination-addr [destination-mask] [operator operand] [established] • The third value indicates protocol type • The source IP address and wildcard mask determine where traffic originates. The destination IP address and wildcard mask are used to indicate the final destination of the network traffic • The command to apply the standard or extended numbered ACL: Router(config-if)# ip access-group number {in | out} Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Extended Numbered IP ACLs Router(config)# access-list {100-199} {permit | deny} protocol source-addr [source-mask] [operator operand] destination-addr [destination-mask] [operator operand] [established] Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com ??? Named IP ACLs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 4.1.1.3 Named IP ACLs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Apply ACL to the virtual access • An ACL can also be used to permit or deny specific IP addresses from gaining virtual access. • Standard ACLs allow restrictions to be enforced on the originator source IP address or IP address range. • An extended ACL does the same but can also enforce the access protocol such as port 23 (Telnet) or port 22 (SSH). The access-class extended ACL only supports the any (???) keyword as the destination. • The access list must be applied to the vty port. • Router(config-line)# access-class {access-list-name | access-list-number} {in | out} • Or http line • Router(config)# ip http access-class {access-list-name | access-list-number} The log Parameter • R1(config) # access-list 101 permit tcp 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255 eq 22 log *May 1 22:12:13.243: %SEC-6-IPACCESSLOGP: list ACL-IPv4-E0/0- IN permitted tcp 192.168.1.3(1024) -> 192.168.2.1(22), 1 packet *May 1 22:17:16.647: %SEC-6-IPACCESSLOGP: list ACL-IPv4-E0/0- IN permitted tcp 192.168.1.3(1024) -> 192.168.2.1(22), 9 packets There are several pieces of information logged: • The action—permit or deny • The protocol—TCP, UDP, or ICMP • The source and destination addresses • For TCP and UDP—the source and destination port numbers • For ICMP—the message types Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com ACL Configuration Guidelines 1. ACLs are created globally and then applied to interfaces 2. ACLs filter traffic going through the router, or traffic to and from the router, depending on how it is applied 3. Only one ACL per interface, per protocol, per direction 4. Standard or extended indicates the information that is used to filter packets 5. ACLs are process top-down. The most specific statements must go at the top of the list 6. All ACLs have an implicit “deny all” statement at the end, therefore every list must have at least one permit statement to allow any traffic to pass Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Using Standard IP ACLs • Use a standard ACL to block all traffic from 172.16.4.0/24 network, but allow all other traffic. r1(config)# access-list 1 deny 172.16.4.0 0.0.0.255 r1(config)# access-list 1 permit any r1(config)# interface ethernet 0 r1(config-if)# ip access-group 1 out Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Using Extended IP ACLs • Use an extended ACL to block all FTP traffic from 172.16.4.0/24 network, but allow all other traffic. access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit ip any any Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Other CLI Commands • To ensure that only traffic from a subnet is blocked and all other traffic is allowed: access-list 1 permit any • To place an ACL on the inbound E1 interface: interface ethernet 1 ip access-group 101 in • To check the intended effect of an ACL: show ip access-list Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Other CLI Commands Refer to 4.1.2.3 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Other CLI Commands Refer to 4.1.2.4 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Flow for Access Control Lists Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Flow for Access Control Lists Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Standard ACL placement Refer to 4.1.3.2 Standard ACLs should be placed as close to the destination as possible. Standard ACLs filter packets based on the source address only. If placed too close to the source, it can deny all traffic, including valid traffic. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Extended ACL placement Extended ACLs should be placed on routers as close as possible to the source that is being filtered. If placed too far from the source being filtered, there is inefficient use of network resources. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Using Nmap for Planning PC-A$ nmap --system-dns 192.168.20.0/24 Interesting ports on webserver.branch1.com (192.168.20.2): (The 1669 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE 110 open pop3 Refer to 4.1.3.3 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Flow for Access Control Lists Refer to 4.1.3.4 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com R1#terminal monitor // Copy debug output to the current terminal line R1#terminal no monitor // Disable monitor Configuring Standard and Extended ACLs with CCP Configure > Router > ACL Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 4.1.4.1 Configuring Access Rules • Choose Configure > Router > ACL > ACL Summary Rule types: • Access Rules • NAT Rules • Ipsec Rules • NAC Rules • Firewall Rules • QoS Rules • Unsupported Rules • Externally Defined Rules • Cisco CP Default Rules Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring Standard Rules Using SDM 1. Choose Configure > Router > ACL > ACL Editor 2. Click Add 3. Enter a name or number 4. Choose Standard Rule Optionally, enter a description 6. Choose Permit or Deny 7. Choose an address type 5. Click Add 8. Complete this field based on the choice made in #7 9. (Option) Enter an optional description 10. (Optional) Check the Log matches against this entry 11. Click OK 12. Continue adding or editing rules Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Applying a Rule to an Interface 2. Choose the interface 1. Click Associate 3. Choose a direction 4. An information box with options appears if a rule is already associated with that interface, that direction. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com The Deliver Configuration • Click the check box next to Save running config. to device's startup config. Then click the Deliver button. Viewing Commands R1# show running-config ! hostname R1 enable secret 5 $1$MJD8$.1LWYcJ6iUi133Yg7vGHG/ crypto pki trustpoint TP-self-signed- 1789018390 enrollment selfsigned subject-name cn=IOS-Self-Signed- interface FastEthernet0/1 ip address 192.168.1.1 255.255.255.0 ip access-group Outbound in ! interface Serial0/0/0 ip address 10.1.1.1 255.255.255.252 clock rate 128000 ! no ip http server ip http secure-server Certificate-1789018390 revocation-check none rsakeypair TP-self-signed-1789018390 ! crypto pki certificate chain TP-self- signed-1789018390 certificate self-signed 01 3082023A 308201A3 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 1BF29620 A084B701 5B92483D D934BE31 ECB7AB56 8FFDEA93 E2061F33 8356 quit ! ip access-list standard Outbound remark SDM_ACL Category=1 permit 192.168.1.3 ! access-list 100 remark SDM_ACL Category=16 access-list 100 deny tcp any host 192.168.1.3 eq telnet log access-list 100 permit ip any any ! ! Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Types of ACLs • Standard IP ACLs • Extended IP ACLs • Extended IP ACLs using TCP established • Reflexive IP ACLs • Dynamic ACLs • Time-Based ACLs • Context-based Access Control (CBAC) ACLs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring TCP Estblished and Reflexive ACLs The established keyword: • Forces a check by the routers to see if the ACK or RST TCP control Router(config)# access-list access-list-number {permit | deny} protocol source source-wildcard [operator port] destination destination-wildcard [operator port] [established] flags are set. If the ACK flag is set, the TCP traffic is allowed in. If not, it is assumed that the traffic is associated with a new connection initiated from the outside. • Does not implement a stateful firewall on a router • Hackers can take advantage of the open hole by using a packet generator or scanner, such as Nmap, to sneak TCP packets into a network by masquerading them as returning traffic. • Option does not apply to UDP or ICMP traffic Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring TCP Estblished and Reflexive ACLs Example Using TCP Established access-list 100 permit tcp any eq 443 192.168.1.0 0.0.0.255 established access-list 100 permit tcp any 192.168.1.3 eq 22 access-list 100 deny ip any any interface s0/0/0 ip access-group 100 in Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Reflexive ACLs • Provide a truer form of session filtering • Much harder to spoof • Allow an administrator to perform actual session filtering for any type of IP traffic • Work by using temporary access control entries (ACEs) • Using extended named IP access-list only Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring a Router to Use Reflexive ACLs 1. Create an internal ACL that looks for new outbound sessions and creates temporary reflexive ACEs 2. Create an external ACL that uses the reflexive ACLs to examine return traffic 3. Activate the named ACLs on the appropriate interfaces Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring a Router to Use Reflexive ACLs • Router(config)# ip access-list extended internal_ACL_name • Router(config-ext-nacl)# permit protocol source-addr [source-mask] [operator operand] destination-addr [destination-mask] [operator operand] [established] reflect reflexive_ACL_name [timeout seconds] • Example: • R1(config)# ip access-list extended internal_ACL • R1(config-ext-nacl)# permit tcp any any eq 80 reflect web- only-reflexive-ACL • R1(config-ext-nacl)# permit udp any any eq 53 reflect dns- only-reflexive-ACL timeout 10 Configuring a Router to Use Reflexive ACLs • Router(config)# ip access-list extended external_ACL_name • Router(config-ext-nacl)# evaluate reflexive_ACL_name • Example: • R1(config)# ip access-list extended external_ACL • R1(config-ext-nacl)# evaluate web-only-reflexive-ACL • R1(config-ext-nacl)# evaluate dns-only-reflexive-ACL • R1(config-ext-nacl)# deny ip any any • R1(config)# interface s0/0/0 • R1(config-if)# description connection to the ISP. • R1(config-if)# ip access-group internal_ACL out • R1(config-if)# ip access-group external_ACL in Setting a Global Timeout Value • The default value is 300s Example: Reflexive ACLs Học viện mạng Bach Khoa - Website: www.bkacad.com 40 Configuring Dynamic ACLs • Available for IP traffic only • Dependent on Telnet connectivity, authentication, and extended ACLs • Security benefits include: 1. Use of a challenge mechanism to authenticate users 2. Simplified management in large internetworks 3. Reduction of the amount of router processing that is required for ACLs 4. Reduction of the opportunity for network break-ins by network hackers 5. Creation of dynamic user access through a firewall without compromising other configured security restrictions Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Implementing a Dynamic ACL The router authenticates the connection Dynamic ACL entry added that grants Remote user opens a Telnet or SSH connection to the router. The router prompts the user for a username and password user access User can access the internal resources Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Setting up a Dynamic ACL Router(config)# access-list ACL_# dynamic dynamic_ACL_name [timeout minutes] {deny | permit} IP_protocol source_IP_address src_wildcard_mask destination_IP_address dst_wildcard_mask [established] [log] Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Setting up a Dynamic ACL Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Example: Dynamic ACLs Học viện mạng Bach Khoa - Website: www.bkacad.com 45 Configuring Time-Based ACLs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring Time-Based ACLs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Example Configuration Internet Perimeter(config)# time-range employee-time Perimeter(config-time)# periodic weekdays 12:00 to 13:00 Perimeter(config-time)# periodic weekdays 17:00 to 19:00 Perimeter(config-time)# exit Perimeter(config)# access-list 100 permit tcp any host 200.1.1.11 eq 25 Perimeter(config)# access-list 100 permit tcp any eq 25 host 200.1.1.11 established Perimeter(config)# access-list 100 permit udp any host 200.1.1.12 eq 53 Perimeter(config)# access-list 100 permit udp any eq 53 host 200.1.1.12 Perimeter(config)# access-list 100 permit tcp any 200.1.1.0 0.0.0.255 established time-range employee- 192.168.1.0/24 Serial 0/0/0 I can’t surf the web at 10:00 A.M. because of the time- based ACL! 10.1.1.1 R1 time Perimeter(config)# access-list 100 deny ip any any Perimeter(config)# interface ethernet 1 Perimeter(config-if)# ip access-group 100 in Perimeter(config-if)# exit Perimeter(config)# access-list 101 permit tcp host 200.1.1.11 eq 25 any Perimeter(config)# access-list 101 permit tcp host 200.1.1.11 any eq 25 Perimeter(config)# access-list 101 permit udp host 200.1.1.12 eq 53 any Perimeter(config)# access-list 101 permit udp host 200.1.1.12 any eq 53 Perimeter(config)# access-list 101 permit tcp 200.1.1.0 0.0.0.255 any time-range employee-time Perimeter(config)# access-list 100 deny ip any any Perimeter(config)# interface ethernet 1 Perimeter(config-if)# ip access-group 101 out Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Troubleshooting Complex ACL Implementation Router# show access-lists [access-list-number | access-list-name] Router# debug ip packet [access-list-number] [detail] Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Troubleshooting Complex ACL Implementation Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Troubleshooting Complex ACL Implementation Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Mitigating Attacks with ACLs 1. Mitigate IP address spoofing—inbound/outbound 2. Mitigate Denial of service (DoS) TCP synchronizes (SYN) attacks—blocking external attacks 3. Mitigate DoS TCP SYN attacks—using TCP intercept 4. Mitigate DoS smurf attacks 5. Filter Internet Control Message Protocol (ICMP) messages—inbound 6. Filter ICMP messages—outbound 7. Filter traceroute Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Mitigating Attacks with ACLs • Inbound R1(config)#access-list 150 deny ip 0.0.0.0 0.255.255.255 any R1(config)#access-list 150 deny ip 10.0.0.0 0.255.255.255 any R1(config)#access-list 150 deny ip 127.0.0.0 0.255.255.255 any R1(config)#access-list 150 deny ip 172.16.0.0 0.15.255.255 any R1(config)#access-list 150 deny ip 192.168.0.0 0.0.255.255 any R1(config)#access-list 150 deny ip 224.0.0.0 15.255.255.255 any R1(config)#access-list 150 deny ip host 255.255.255.255 any Outbound R1(config)#access-list 105 permit ip 192.168.1.0 0.0.0.255 any Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Allowing Common Services Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Controlling ICMP Messages Refer to 4.1.9.4 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Mitigating Attacks with ACLs IPv6 ACLs Refer to 4.1.10 • IPv4 was designed without a number of modern-day network requirements such as: – Security - IPsec – Device roaming - Mobile IP – Quality of service - RSVP – Address scarcity - DHCP, NAT, CIDR, VLSM IPv6 ACLs • Router(config-if)# ipv6 traffic-filter access-list-name {in | out} IPv6 ACLs Using Object Groups in ACEs Refer to 4.1.11 • In large networks, ACLs can be large (hundreds of lines) and difficult to configure and manage, especially if the ACLs frequently change. • Object group-based ACLs are smaller, more readable, and easier to configure and manage than conventional ACLs. Using Object Groups in ACEs Using Object Groups in ACEs • Network Object Groups • A network object group is a group of any of the following objects: – Hostnames, IP addresses, or subnets – Ranges of IP addresses – Existing network object groups • To create a network group, enter the following commands: • Router(config)# object-group network nw_grp_id • Router(config-network-group)# description description-text | host {host-address | host-name} | network-address {/prefix- length | network-mask} | range host- address1 host-address2 | any | group-object nested-object-group-name Using Object Groups in ACEs • Service Object Groups • A service object group is a group of any of the following objects: – Top-level protocols (such as TCP, UDP, or ESP) – Source and destination protocol ports (such as Telnet or SNMP) – ICMP types (such as echo, echo-reply, or host-unreachable) – Existing service object groups • To create a service group, enter the following commands: • Router(config)# object-group service svc_grp_id • Router(config-service-group)# protocol | [tcp | udp | tcp-udp [source {{[eq]| lt | gt} port1 | range port1 port2}] [{[eq]| lt | gt} port1 | range port1 port2]] | icmp icmp-type Using Object Groups in ACEs Using Object Groups in ACEs Refer to 4.1.11.4 Securing Networks withs Firewall • A firewall is a system that enforces an access control policy between network • Common properties of firewalls: 1. The firewall is resistant to attacks 2. The firewall is the only transit point between networks 3. The firewall enforces the access control policy Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Benefits of Firewalls • Firewalls prevent malicious data from being sent to servers and clients. • Properly configured firewalls make security policy enforcement simple, scalable, and robust. • A firewall reduces the complexity of security management by Refer: 4.2.1.2 • Prevents exposing sensitive hosts and applications to untrusted users • Prevent the exploitation of protocol flaws by sanitizing the protocol flow offloading most of the network access control to a couple of points in the network. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Benefits of Firewalls Refer: 4.2.1.2 Limitations of Firewalls • If misconfigured, a firewall can have serious consequences (single point of failure). • The data from many applications cannot be passed over firewalls securely. • Users might proactively search for ways around the firewall to receive blocked material, exposing the network to potential attack. • Network performance can slow down. • Unauthorized traffic can be tunneled or hidden as legitimate traffic through the firewall. Types of Firewalls Packet-filtering firewall —is typically a router that has the capability to filter on some of the contents of packets (examines Layer 3 and sometimes Layer 4 information) Refer: 4.2.2.1 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Types of Firewalls Stateful firewall —keeps track of the state of a connection: whether the connection is in an initiation, data transfer, or termination state Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Types of Firewalls Application gateway firewall (proxy firewall) —filters information at Layers 3, 4, 5, and 7. Most of the firewall control and filtering done in software. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Types of Firewalls Network Address Translation (NAT) firewall —expands the number of IP addresses available and hides network addressing design. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Types of Firewalls • Other methods of implementing firewalls include: • Host-based (server and personal) firewall —a PC or server with firewall software running on it. • Transparent firewall —filters IP traffic between a pair of bridged interfaces. • Hybrid firewalls —some combination of the above firewalls. For example, an application inspection firewall combines a stateful firewall with an application gateway firewall. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Packet-Filtering Firewall Advantages • Are based on simple permit or deny rule set • Have a low impact on network performance • Are easy to implement • Are supported by most routers • Afford an initial degree of security at a low network layer • Perform almost all tasks of what higher-end firewalls do, at a much lower cost Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Packet-Filtering Firewall Disadvantages • Packet filtering is susceptible to IP spoofing. • Packet filters do not filter fragmented packets well. • Complex ACLs are difficult to implement and maintain correctly. • Packet filters cannot dynamically filter certain services. • Packet filters are stateless. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Extra: Tiny Fragment Attack Học viện mạng Bách khoa - www.bkacad.com Stateful Firewall Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Stateful Firewalls Advantages/Disadvantages Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco Systems Firewall Solutions • IOS Firewall – Zone-based policy framework for intuitive management – Instant messenger and peer-to-peer application filtering – VoIP protocol firewalling – Virtual routing and forwarding (VRF) firewalling – Wireless integration – Stateful failover – Local URL whitelist and blacklist support – Application inspection for web and e-mail traffic • PIX 500 Series • ASA 5500 Series Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco Systems Firewall Solutions Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco Systems Firewall Solutions Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Firewall in Network Design Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Layered Defense Scenario Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Layered Defense Scenario • A network administrator must consider many factors when building a complete in-depth defense: • A significant number of intrusions come from hosts within the network. For example, firewalls often do little to protect against viruses that are downloaded through email. • Firewalls do not protect against rogue modem installations. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com • Firewalls do not replace backup and disaster recovery mechanisms resulting from attack or hardware failure. An in-depth defense also includes offsite storage and redundant hardware topologies. • Most importantly, firewalls are no substitute for informed administrators and users. Firewall Best Practices 1. Position firewalls at security boundaries. 2. Firewalls are the primary security device. It is unwise to rely exclusively on a firewall for security. 3. Deny all traffic by default. Permit only services that are needed. 4. Ensure that physical access to the firewall is controlled. 5. Regularly monitor firewall logs. 6. Practice change management for firewall configuration changes. 7. Remember that firewalls primarily protect from technical attacks originating from the outside. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Firewall in Network Design Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Context-Based Access Control Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Context-Based Access Control • Filters TCP and UDP packets based on Application Layer protocol session information • Provides stateful Application Layer filtering • Examine supported connections for embedded NAT and PAT information and perform the necessary address translations. • CBAC can block peer-to-peer (P2P) connections, such as those used by the Gnutella and KaZaA applications • Provides four main functions: 1.Traffic Filtering 2.Traffic Inspection 3.Intrusion Detection 4.Generation of Audits and Alerts Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC Capabilities 1. Monitors TCP Connection Setup 2. Examines TCP Sequence Numbers 3. Inspects DNS Queries and Replies 4. Inspects Common ICMP Message Types Refer to 4.3.1.2 5. Supports Applications with Multiple Channels, such as FTP and Multimedia 6. Inspects Embedded Addresses 7. Inspects Application Layer Information Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC Operation Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC Operation Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC TCP Handling Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC UDP Handling Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC Example Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC Operation • When an attack is detected, the firewall can take several actions: – Generate alert messages – Protect system resources that could impede performance – Block packets from suspected attackers • Cisco IOS Firewall provides three thresholds against TCP-based DoS attacks: – Total number of half-opened TCP sessions – Number of half-opened sessions in a time interval – Number of half-opened TCP sessions per host • If a threshold for the number of half-opened TCP sessions is exceeded, the firewall has two options: – It sends a reset message to the endpoints of the oldest half-opened session, making resources available to service newly arriving SYN packets. – It blocks all SYN packets temporarily for the duration that the threshold value is configured. When the router blocks a SYN packet, the TCP three-way handshake is never initiated, which prevents the router from using memory and processing resources that valid connections need. Configuring CBAC Four Steps to Configure • Step 1: Pick an Interface- internal or external • Step 2: Configure IP ACLs at the Interface • Step 3: Define Inspection Rules • Step 4: Apply an Inspection Rule to an Interface Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 1: Pick an Interface Two-Interface Three-Interface Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 2: Configure IP ACLs at the Interface Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 3: Define Inspection Rules – Router(config)# ip inspect name inspection_name protocol [alert {on | off}] [audit-trail {on | off}] [timeout seconds] Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 4: Apply an Inspection Rule to an Interface Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Verification and Troubleshooting of CBAC • Alerts and Audits • show ip inspect Parameters • debug ip inspect Parameters Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Alerts and Audits *note: Alerts are enabled by default and automatically display on the console line of the router. If alerts have been disabled using the ip inspect alert-off command, the no form of that command, as seen above, is required to re-enable alerts. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Alerts and Audits Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com show ip inspect Parameters Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com debug ip inspect Parameters Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Zone-Based Policy Firewall Characteristics Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Zone-Based Policy Firewall Characteristics • The zone-based policy firewall (ZPF or ZBF or ZFW) inspection interface supports previous firewall features, including stateful packet inspection, application inspection, URL filtering, and DoS mitigation. • Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Firewall policies are configured using the Cisco Common Classification Policy Language (C3PL), which uses a hierarchical structure to define network protocol inspection and allows hosts to be grouped under one inspection policy. Zone-Based Policy Firewall Characteristics • CBAC has these limitations: 1. Multiple inspection policies and ACLs on several interfaces on a router make it difficult to correlate the policies for traffic between multiple interfaces. 2. Policies cannot be tied to a host group or subnet with an ACL. All traffic through a given interface is subject to the same inspection. 3. The process relies too heavily on ACLs. Benefits Two Zones • Zone-based policy firewall is not dependent on ACLs • The router security posture is now “block unless explicitly allowed” • C3PL (Cisco Common Classification Policy Language) makes policies easy to read and troubleshoot • One policy affects any given traffic, instead of needing multiple ACLs and inspection actions. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CBAC or Zones ? • Important note: • Both configuration models can be enabled concurrently on a router. • The models cannot be combined on a single interface. • For example, an interface cannot be configured as a security zone member and configured for IP inspection simultaneously. The Design Process 1. Determine the Zones: – Internetworking infrastructure under consideration is split into well- documented separate zones with various security levels 2. Establish policies between zones: – For each pair of source-destination zones, the sessions that clients in source zones are allowed to open to servers in destination zones are defined. For traffic that is not based on the concept of sessions (for example, IPsec Encapsulating Security Payload [ESP]), the administrator must define unidirectional traffic flows from source to destination and vice versa. 3. Design the physical infrastructure: – The administrator must design the physical infrastructure, taking into account security and availability requirements. 4. Identify subset within zones and merge traffic requirements: – For each firewall device in the design, the administrator must identify zone subsets connected to its interfaces and merge the traffic requirements for those zones, resulting in a device-specific interzone policy. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Common Designs LAN-to-Internet Public Servers Redundant Firewalls Complex Firewall Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Zones Simplify Complex Firewall Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Actions when configured using CCP Inspect – This action configures Cisco IOS stateful packet inspection Drop – This action is analogous to deny in an ACL Pass – This action is analogous to permit in an ACL Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Rules for Application Traffic *zone-pair must have different zone as source and destination Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Rules for Router Traffic Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring a Zone-Based Policy Firewall with CLI 1. Create the zones for the firewall with the zone security command 2. Define traffic classes with the class-map type inspect command 3. Specify firewall policies with the policy-map type inspect command 4. Apply firewall policies to pairs of source and destination zones with zone-pair security 5. Assign router interfaces to zones using the zone-member security interface command Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 1: Create the Zones FW(config)# zone security Inside FW(config-sec-zone)# description Inside network FW(config)# zone security Outside FW(config-sec-zone)# description Outside network Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 2: Define Traffic Classes FW(config)# class-map type inspect FOREXAMPLE FW(config-cmap)# match access-group 101 FW(config-cmap)# match protocol tcp FW(config-cmap)# match protocol udp FW(config-cmap)# match protocol icmp FW(config-cmap)# exit FW(config)# access-list 101 permit ip 10.0.0.0 0.0.0.255 any Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 3: Define Firewall Policies FW(config)# policy-map type inspect InsideToOutside FW(config-pmap)# class type inspect FOREXAMPLE FW(config-pmap-c)# inspect Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Step 4: Assign Policy Maps to Zone Pairs and Assign Router Interfaces to Zones FW(config)# zone-pair security InsideToOutside source Inside destination Outside FW(config-sec-zone-pair)# description Internet Access FW(config-sec-zone-pair)# service-policy type inspect InsideToOutside FW(config-sec-zone-pair)# interface F0/0 FW(config-if)# zone-member security Inside FW(config-if)# interface S0/0/0.100 point-to-point FW(config-if)# zone-member security Outside Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Final ZPF Configuration • policy-map type inspect InsideToOutside class class-default inspect • ! • zone security Inside description Inside network • zone security Outside description Outside network • zone-pair security InsideToOutside source Inside destination Outside • service-policy type inspect InsideToOutside • ! • interface FastEthernet0/0 zone-member security Inside • ! • interface Serial0/0/0.100 point-to-point zone- member security Outside Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring a Zone-Based Policy Firewall with CCP Wizard • Refer to 4.4.4 Configuring a Zone-Based Policy Firewall Manually with CCP • Refer to 4.4.5 CLI Generated Output • class-map type inspect match-any iinsprotocols • match protocol http • match protocol smtp • match protocol ftp ! • policy-map type inspect iinspolicy • class type inspect iinsprotocols • inspect • ! • zone security private List of services defined in the firewall policy Apply action (inspect = stateful inspection) Zones created • zone security internet • ! • interface fastethernet 0/0 • zone-member security private • ! • interface serial 0/0/0 • zone-member security internet • ! • zone-pair security priv-to-internet source private destination internet • service-policy type inspect iinspolicy • ! Interfaces assigned to zones Inspection applied from private to public zones Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Troubleshooting Zone-Based Policy Firewall • Refer to 4.4.6 Troubleshooting Zone-Based Policy Firewall • Refer to 4.4.6 Summary • Standard and extended IP ACLs are the fundamental tools for basic network traffic filtering. • How standard and extended IP ACLs are created and applied depends on the type of traffic and where the source and destination of the traffic lies. • ACLs are linked to the flow of network traffic. The network topology determines how ACLs are cerated and applied • ACLs can be created and applied with SDM • The TCP established option and reflexive ACLs extend the function of ACLs to take into account the tow-way nature of the network traffic. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Summary • Firewalls provide perimeter security defining the inside and outside of a network. • There are many different types of firewall , with stateful firewall providing the greatest security. • Today, network design must take into account the selection of the type of firewall and its proper placement. • CBAC enables sophisticate stateful filtering of most forms of modern application traffic. • The operation of CBAC is quite complex, bulding and tearing down state entries for traffic flows. • CBAC configuration is very complex, relying on ACLs and inspection rules applied on appropriate interfaces. • CLI and SDM can be used to verify and troubleshoot CBAC Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Summary • Zone-Based Policy Firewall (ZPF) , introduced in 2006, is the state of the art in modern firewalling. • ZPF operation centers around the creation of zones associated with various security levels. • Implementing ZPF with CLI is much more structured and easier to understand than CBAC . ZPF utilizes class maps and policy maps enabled by C3PL. • An SDM wizard for ZPF is avaiable. • Either CLI or SDM can be used to verify and troubleshoot ZPF. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com

Các file đính kèm theo tài liệu này:

  • pdfccna_security_chapter_4_implementing_firewall_technologies_811_6857.pdf
Tài liệu liên quan