Học viện mạng Bach Khoa - Website: www.bkacad.comOpen Access Network • An open security model is the easiest to implement.. Common Security ThreatsHọc viện mạng Bach Khoa - Website: www.
Trang 1Chapter 4 – Network Security
CCNA Exploration 4.0
Trang 2Học viện mạng Bach Khoa - Website: www.bkacad.com
Why is Network Security Important?
Vote
Bank
Medicate Travel
Purchase
Trang 31990 1985
Password Guessing
Self Replicating Code
Password Cracking
Exploiting Known Vulnerabilities
Disabling Audits
Back Doors
Hijacking Sessions
Sweepers
Sniffers Stealth Diagnostics
Technical Knowledge Required
High
Low
Trang 4Think Like a Attacker
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 5Step 1: Footprint Analysis
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 6Step 2: Enumerate Information
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 7Step 3: Manipulate Users to Gain Access
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 8Step 4: Escalate Privilege
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 9Step 5: Gather Additional Password & Secrets
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 10Step 6: Install Back Doors and Port Redirections
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 11Step 7: Leverage the Compromised System
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 12100% Security
Học viện mạng Bach Khoa - Website: www.bkacad.com
“
”
The only system which is truly secure is
one which is switched off and unplugged, locked in a titanium lined safe, buried in a
concrete bunker, and
is surrounded by nerve gas and very highly
paid armed guards Even then,
I wouldn’t stake my life on it….
Trang 13Học viện mạng Bach Khoa - Website: www.bkacad.com
Open versus Closed Networks
Trang 14Học viện mạng Bach Khoa - Website: www.bkacad.com
Open Access Network
• An open security model is the easiest to implement
• Simple passwords and server security become the foundation of this model
• If encryption is used, it is implemented by individual users or on servers
Trang 15Học viện mạng Bach Khoa - Website: www.bkacad.com
Restrictive Access Network
A restrictive security model is more difficult to implement
Firewalls and identity servers become the foundation of this model
Trang 16Closed Access Networks
• A closed security model is most difficult to implement All available security measures are implemented in this design
• This model assumes that the protected assets are premium, all users are not trustworthy, and that threats are frequent
• Network security departments must clarify that they only implement the policy, which is designed, written, and approved by the corporation
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 17Học viện mạng Bach Khoa - Website: www.bkacad.com
Developing a Security Policy
• A security policy meets these goals:
1 Informs users, staff, and managers of their obligatory requirements for protecting technology and information assets
2 Specifies the mechanisms through which these requirements can be met
3 Provides a baseline from which to acquire, configure, and audit computer systems and networks for compliance with the policy
Trang 18Học viện mạng Bach Khoa - Website: www.bkacad.com
Developing a Security Policy
Trang 19Common Security Threats
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 20Common Security Threats
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 21Common Security Threats
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 22Threats to Physical Infrastructure
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 23Threats to Physical Infrastructure
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 24Threats to Physical Infrastructure
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 25Threats to Physical Infrastructure
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 26Học viện mạng Bach Khoa - Website: www.bkacad.com
Network Security Threats
Trang 27Học viện mạng Bach Khoa - Website: www.bkacad.com
Unstructured threats
Trang 28Học viện mạng Bach Khoa - Website: www.bkacad.com
Structured threats
Trang 29Học viện mạng Bach Khoa - Website: www.bkacad.com
External threats
Trang 30Học viện mạng Bach Khoa - Website: www.bkacad.com
Internal threats
Trang 31Social Engineering
Trang 32Types of Network Attacks
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 33Reconaissance Attacks
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 34Internet Information Queries
Học viện mạng Bach Khoa - Website: www.bkacad.com
Sample IP address query
Attackers can use Internet tools such
as “WHOIS” as weapons.
Trang 35Port Scans and Ping Sweeps
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 36Port Scan and Ping Sweep Attack Mitigation
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 37Packet Sniffers
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 38Packet Sniffer Mitigation
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 39Học viện mạng Bach Khoa - Website: www.bkacad.com
Access Attacks
Trang 40Password Attacks
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 41Password Attack Mitigation
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 42Học viện mạng Bach Khoa - Website: www.bkacad.com
Trust Exploitation
Trang 43Trust Exploitation Attack Mitigation
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 44Học viện mạng Bach Khoa - Website: www.bkacad.com
Port Redirection
Trang 45Học viện mạng Bach Khoa - Website: www.bkacad.com
Man-in-the-Middle Attacks & Mitigation
Trang 46Học viện mạng Bach Khoa - Website: www.bkacad.com
DoS Attacks
Trang 47Học viện mạng Bach Khoa - Website: www.bkacad.com
Ping of Death Attack
Trang 48Học viện mạng Bach Khoa - Website: www.bkacad.com
SYN Flood Attack
Trang 49Học viện mạng Bach Khoa - Website: www.bkacad.com
DDos Attacks
Trang 50DoS: Smurf Attack
Trang 51Học viện mạng Bach Khoa - Website: www.bkacad.com
Malicious Code Attacks
Trang 52Học viện mạng Bach Khoa - Website: www.bkacad.com
Anatomy of a Worm Attack
Trang 53Học viện mạng Bach Khoa - Website: www.bkacad.com
Mitigating Worm Attacks
Worm Attack Response Methodologies
Trang 54Học viện mạng Bach Khoa - Website: www.bkacad.com
Malicious Code Attacks
Trang 55Học viện mạng Bach Khoa - Website: www.bkacad.com
Malicious Code Attacks
Trang 56Học viện mạng Bach Khoa - Website: www.bkacad.com
General Mitigation Techniques
Trang 57Học viện mạng Bach Khoa - Website: www.bkacad.com
General Mitigation Techniques
Trang 58Học viện mạng Bach Khoa - Website: www.bkacad.com
General Mitigation Techniques
Trang 59Học viện mạng Bach Khoa - Website: www.bkacad.com
Intrusion Detection and Prevention
• Intrusion detection systems (IDS) detect attacks against a network and send logs to a management console
• Intrusion prevention systems (IPS) prevent attacks against the network and should provide the following active defense mechanisms in addition to detection:
– Prevention -Stops the detected attack from executing
– Reaction -Immunizes the system from future attacks from a malicious source
• Either technology can be implemented at a network level or host level, or both for maximum protection.
Trang 60Học viện mạng Bach Khoa - Website: www.bkacad.com
Host-based Intrusion Detection Systems
• Host-based intrusion is typically implemented as inline or passive technology, depending
on the vendor
1 Passive technology, which was the first generation technology, is called a
host-based intrusion detection system (HIDS) HIDS sends logs to a management
console after the attack has occurred and the damage is done
2 Inline technology, called a host-based intrusion prevention system (HIPS),
actually stops the attack, prevents damage, and blocks the propagation of worms and viruses.
• Cisco provides HIPS using the Cisco Security Agent software.
• HIPS software must be installed on each host, either the server or desktop, to monitor activity performed on and against the host
Trang 61Học viện mạng Bach Khoa - Website: www.bkacad.com
Common Security Appliances and Applications
Trang 62Học viện mạng Bach Khoa - Website: www.bkacad.com
The Network Security Wheel
Trang 63Secure Network
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 64Monitor Network
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 65Test Secure
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 66Improve Secure
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 67Học viện mạng Bach Khoa - Website: www.bkacad.com
What is a Security Policy?
Trang 68Học viện mạng Bach Khoa - Website: www.bkacad.com
Components of a Security Policy
Trang 69Học viện mạng Bach Khoa - Website: www.bkacad.com
Safeguard a Router
Trang 70Password-Protecting a Router
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 71Configure the Line-Level Password
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 72Enable Password
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 73Cisco-Proprietary Password Encryption
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 74Enhanced Username Password Security
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 75Hardening Login
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 76Hardening Login
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 77Học viện mạng Bach Khoa - Website: www.bkacad.com
Securing Administrative Access to Routers
Trang 78Học viện mạng Bach Khoa - Website: www.bkacad.com
Securing Administrative Access to Routers
Trang 79Học viện mạng Bach Khoa - Website: www.bkacad.com
Implementing SSH to Secure Remote Administrative Access
Trang 80Học viện mạng Bach Khoa - Website: www.bkacad.com
Configuring SSH Security
Trang 81Học viện mạng Bach Khoa - Website: www.bkacad.com
Configuring SSH Security
Trang 82Học viện mạng Bach Khoa - Website: www.bkacad.com
Configuring SSH Security
Trang 83Học viện mạng Bach Khoa - Website: www.bkacad.com
Configuring SSH Security
Trang 84Học viện mạng Bach Khoa - Website: www.bkacad.comLOGGING ROUTER ACTIVITY
Trang 85Why is Syslog Important?
• Logs allow you to verify that a router is working properly or
to determine whether the router has been compromised
• In some cases, a log can show what types of probes or
attacks are being attempted against the router or the
protected network.
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 86Log Output Destination
Trang 87Syslog System
Học viện mạng Bach Khoa - Website: www.bkacad.com
A syslog logging solution consists of two primary components:
syslog servers
syslog client s
Trang 88Syslog Severity Levels
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 89Syslog Severity Levels Examples
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 90Structure of a Syslog Message
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 91Configuring for Syslog
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 92Configuring for Syslog
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 93Configuring for Syslog
Học viện mạng Bach Khoa - Website: www.bkacad.com
Trang 94Học viện mạng Bach Khoa - Website: www.bkacad.com
SECURE ROUTER
NETWORK SERVICES
Trang 95Học viện mạng Bach Khoa - Website: www.bkacad.com
Vulnerable Router Services and Interfaces
Trang 96Học viện mạng Bach Khoa - Website: www.bkacad.com
Vulnerable Router Services and Interfaces
Trang 97Học viện mạng Bach Khoa - Website: www.bkacad.com
Cisco Auto Secure
Trang 98Học viện mạng Bach Khoa - Website: www.bkacad.com
Cisco Auto Secure
Trang 99Học viện mạng Bach Khoa - Website: www.bkacad.com
Routing Protocol Authentication Overview
Trang 100Học viện mạng Bach Khoa - Website: www.bkacad.com
Routing Protocol Authentication Overview
Trang 101Học viện mạng Bach Khoa - Website: www.bkacad.com
Routing Protocol Authentication Overview
Trang 102Học viện mạng Bach Khoa - Website: www.bkacad.com
Routing Protocol Authentication
Trang 103Học viện mạng Bach Khoa - Website: www.bkacad.com
Using Cisco SDM
Trang 104Học viện mạng Bach Khoa - Website: www.bkacad.com
What is Cisco SDM?
• The Cisco Router and Security Device Manager (SDM) is an easy-to-use, web-based device-
management tool designed for configuring LAN, WAN, and security features on Cisco IOS software-based routers
• The SDM files can be installed on the router, a
PC, or on both An advantage of installing SDM on the PC is that it saves router memory, and allows you to use SDM to manage other routers on the network
Trang 105Học viện mạng Bach Khoa - Website: www.bkacad.com
Cisco SDM Features
• Cisco SDM smart wizards can intelligently detect incorrect
configurations and propose fixes, such as allowing DHCP traffic
through a firewall if the WAN interface is DHCP-addressed
• Online help embedded within Cisco SDM contains appropriate
background information, in addition to step-by-step procedures to help users enter correct data in Cisco SDM.
Trang 106Học viện mạng Bach Khoa - Website: www.bkacad.com
Configuring Your Router to Support Cisco SDM
Trang 107Học viện mạng Bach Khoa - Website: www.bkacad.com
Starting Cisco SDM
Trang 108Học viện mạng Bach Khoa - Website: www.bkacad.com
Cisco SDM Home Page Overview
Trang 109Học viện mạng Bach Khoa - Website: www.bkacad.com
About Your Router Area
Trang 110Học viện mạng Bach Khoa - Website: www.bkacad.com
Configuration Overview Area
Interfaces and Connections
Firewall Policies
VPN
View Running Config
Trang 111Học viện mạng Bach Khoa - Website: www.bkacad.com
Cisco SDM Wizards
• Check http://www.cisco.com/go/sdm for the latest information about the Cisco SDM wizards and the interfaces they support.
Trang 112Học viện mạng Bach Khoa - Website: www.bkacad.com
http://www.cisco.com/cdc_content_elements/flash/sdm/demo.htm?NO_NAV
Trang 113Học viện mạng Bach Khoa - Website: www.bkacad.com
Locking Down a Router with Cisco SDM
• AutoSecure features that are implemented differently in Cisco SDM include
the following:
1 Disables SNMP, and does not configure SNMP version 3
2 Enables and configures SSH on crypto Cisco IOS images
3 Does not enable Service Control Point or disable other access and
file transfer services, such as FTP
Trang 114Học viện mạng Bach Khoa - Website: www.bkacad.com
Locking Down a Router with Cisco SDM
Refer to 4.4.6
Trang 115Học viện mạng Bach Khoa - Website: www.bkacad.com
Secure Router Management
Trang 116Học viện mạng Bach Khoa - Website: www.bkacad.com
Maintaining Cisco IOS Software Image
• An update replaces one release with another without upgrading the
feature set The software might be updated to fix a bug or to replace a release that is no longer supported Updates are free
• An upgrade replaces a release with one that has an upgraded feature
set The software might be upgraded to add new features or
technologies, or replace a release that is no longer supported
Upgrades are not free
Trang 117Học viện mạng Bach Khoa - Website: www.bkacad.com
Maintaining Cisco IOS Software Image
• Cisco recommends following a four-phase migration process to simplify
network operations and management
• When you follow a repeatable process, you can also benefit from reduced
costs in operations, management, and training
1 Plan -Set goals, identify resources, profile network hardware and
software, and create a preliminary schedule for migrating to new releases
2 Design -Choose new Cisco IOS releases and create a strategy for
migrating to the releases
3 Implement -Schedule and execute the migration
4 Operate -Monitor the migration progress and make backup copies of
images that are running on your network
Trang 118Học viện mạng Bach Khoa - Website: www.bkacad.com
Maintaining Cisco IOS Software Image
• There are a number of tools available on Cisco.com to aid in migrating Cisco IOS
software You can use the tools to get information about releases, feature sets,
platforms, and images The following tools do not require a Cisco.com login :
1 Cisco IOS Reference Guide -Covers the basics of the Cisco IOS software
family
2 Cisco IOS software technical documents -Documentation for each release
of Cisco IOS software
3 Software Center -Cisco IOS software downloads
4 Cisco IOS Software Selector -Finds required features for a given
technology
Trang 119Học viện mạng Bach Khoa - Website: www.bkacad.com
Maintaining Cisco IOS Software Image
• The following tools require valid Cisco.com login accounts :
1 Bug Toolkit -Searches for known software fixes based on software version,
feature set, and keywords
2 Cisco Feature Navigator -Finds releases that support a set of software
features and hardware, and compares releases
3 Software Advisor -Compares releases, matches Cisco IOS software and
Cisco Catalyst OS features to releases, and finds out which software release supports a given hardware device
4 Cisco IOS Upgrade Planner -Finds releases by hardware, release, and
feature set, and downloads images of Cisco IOS software