1. Trang chủ
  2. » Công Nghệ Thông Tin

cisco security professional's guide to secure intrusion detection systems

673 487 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Tác giả James Burton, Ido Dubrawsky, Vitaly Osipov, C. Tate Baumrucker, Michael Sweeney
Người hướng dẫn Technical Editor
Trường học Syngress Publishing, Inc.
Chuyên ngành Cybersecurity
Thể loại manual
Năm xuất bản 2003
Thành phố Rockland
Định dạng
Số trang 673
Dung lượng 15,19 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The Cisco 6500 Series IDS Services Module 47Understanding and Analyzing the Network 57Identifying the Critical Infrastructure and Services 58Placing Sensors Based on Network and Services

Trang 2

s o l u t i o n s @ s y n g r e s s c o m

With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Ciscostudy guides in print, we continue to look for ways we can better serve theinformation needs of our readers One way we do that is by listening

Readers like yourself have been telling us they want an Internet-based vice that would extend and enhance the value of our books Based onreader feedback and our own strategic plan, we have created a Web sitethat we hope will exceed your expectations

ser-Solutions@syngress.com is an interactive treasure trove of useful

infor-mation focusing on our book topics and related technologies The siteoffers the following features:

■ One-year warranty against content obsolescence due to vendorproduct upgrades You can access online updates for any affectedchapters

■ “Ask the Author” customer query forms that enable you to postquestions to our authors and editors

■ Exclusive monthly mailings in which our experts provide answers toreader queries and clear explanations of complex material

■ Regularly updated links to sites specially selected by our editors forreaders desiring additional reliable information on key topics

Best of all, the book you’re now holding is your key to this amazing site

Just go to www.syngress.com/solutions, and keep this book handy when

you register to verify your purchase

Thank you for giving us the opportunity to serve your needs And be sure

to let us know if there’s anything else we can do to help you get the maximum value from your investment We’re listening

www.syngress.com/solutions

Trang 4

Secure Intrusion Detection Systems

Cisco Security Professional’s

Trang 5

Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results

to be obtained from the Work.

There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work

is sold AS IS and WITHOUT WARRANTY You may have other legal rights, which vary from state

to state.

In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.

You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files.

Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc “Syngress: The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc Brands and product names mentioned in this book are trademarks or service marks of their respective companies.

KEY SERIAL NUMBER

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Copyright © 2003 by Syngress Publishing, Inc All rights reserved Printed in the United States of America Except as permitted under the Copyright Act of 1976, no part of this publication may be

Trang 6

We would like to acknowledge the following people for their kindness and support

in making this book possible

Ralph Troupe and the team at Callisma for their invaluable insight into the lenges of designing, deploying and supporting world-class enterprise networks

chal-Karen Cross, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, KentAnderson, Frida Yara, Jon Mayes, John Mesjak, Peg O’Donnell, Sandra Patterson,Betty Redmond, Roy Remer, Ron Shapiro, Patricia Kelly, Andrea Tetrick, JenniferPascal, Doug Reil, David Dahl, Janis Carpenter, and Susan Fryer of Publishers GroupWest for sharing their incredible marketing experience and expertise

The incredibly hard working team at Elsevier Science, including Jonathan Bunkell,AnnHelen Lindeholm, Duncan Enright, David Burton, Rosanna Ramacciotti,Robert Fairbrother, Miguel Sanchez, Klaus Beran, and Rosie Moss for making cer-tain that our vision remains worldwide in scope

David Buckland, Wendi Wong, Daniel Loh, Marie Chieng, Lucy Chong, Leslie Lim,Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm withwhich they receive our books

Kwon Sung June at Acorn Publishing for his support

Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, DarleneMorrow, Iolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associatesfor all their help and enthusiasm representing our product in Canada

Lois Fraser, Connie McMenemy, Shannon Russell, and the rest of the great folks atJaguar Book Group for their help with distribution of Syngress books in Canada.David Scott, Annette Scott, Delta Sams, Geoff Ebbs, Hedley Partis, and Tricia Herbert

of Woodslane for distributing our books throughout Australia, New Zealand, PapuaNew Guinea, Fiji Tonga, Solomon Islands, and the Cook Islands

Winston Lim of Global Publishing for his help and support with distribution ofSyngress books in the Philippines

Trang 8

Pieter J Bakhuijzen(CCIE #11033, CCDP, JNCIA-M, MCSE) is the owner ofiXio Networks, a Netherlands-based network security consulting and training com-pany He specializes in network and security implementation and design, based onCisco, Nokia, and Check Point products Before starting his own company heworked for companies in the service provider, financial and publishing industry, such

as Demon Internet,TeliaSonera, Kluwer Academic Publishers, and FormusCommunications Pieter Jan currently resides in the city of The Hague in TheNetherlands where he is preparing to take the CCIE Security Lab exam

C Tate Baumrucker (CISSP, CCNP, Sun Enterprise Engineer, MCSE) is sible for leading engineering teams in the design and implementation of complexand highly available systems infrastructures and networks.Tate is industry recognized

respon-as a subject matter expert in security and LAN/WAN support systems such respon-asHTTP, SMTP, DNS, and DHCP He has spent eight years providing technical con-sulting services in enterprise and service provider industries for companies includingAmerican Home Products, Blue Cross and Blue Shield of Alabama, Amtrak, Iridium,National Geographic, Geico, GTSI, Adelphia Communications, Digex, CambrianCommunications, and BroadBand Office

James D Burton(CISSP, CCNA, MCSE) is a Colorado Springs-based SystemsSecurity Engineer for Northrop Grumman Mission Systems He currently works atthe Joint National Integration Center performing information assurance functions.James has over eight years of security experience having started his career as aTerminal Area Security Officer with the United States Marine Corps His strengthsinclude Cisco PIX firewalls and IDSs, and freeware intrusion detection systems Jamesholds a Master’s degree from Colorado Technical University He is deeply appreciative

of his wife Melissa whose support of his information security career has helped keephim focused

Scott Dentler(CISSP, CCSE, CCSA, MCSE, CCNA) is an IT consultant who hasserved with companies such as Sprint and H&R Block, giving him exposure to largeenterprise networks and corporate environments He is currently providing systemssupport for a campus network at a medical center with national affiliations Scott’s

Trang 9

background includes a broad range of information technology facets, including Ciscorouters and switches, Microsoft NT/2000/XP, Check Point firewalls and VPNs, RedHat Linux, network analysis and enhancement, network design and architecture, andnetwork IP allocation and addressing He has also prepared risk assessments and usedthat information to prepare business continuity and disaster recovery plans for knowl-

edge-based systems Scott is a contributing author for Snort 2.0 Intrusion Detection

(Syngress Publishing, ISBN: 1-931836-74-4)

Ido Dubrawsky(CCNA, SCSA) has been working as a UNIX/Network

Administrator for over 10 years He has experience with a variety of UNIX ating systems including Solaris, Linux, BSD, HP-UX, AIX, and Ultrix He was previ-ously a member of Cisco’s Secure Consulting Service providing security postureassessments to Cisco customers and is currently a member of the SAFE architectureteam Ido has written articles and papers on topics in network security such as IDS,configuring Solaris virtual private networks, and wireless security Ido is a con-

oper-tributing author for Hack Proofing Sun Solaris 8 (Syngress Publishing, ISBN:

1-928994-44-X) and Hack Proofing Your Network, Second Edition (Syngress, ISBN:

1-928994-70-9) When not working on network security issues or traveling to ferences, Ido spends his free time with his wife and their children

con-Vitaly Osipov (CISSP, CCSA, CCSE) is a Security Specialist who has spent the lastfive years consulting various companies in Eastern, Central, and Western Europe oninformation security issues Last year Vitaly was busy with the development of man-aged security service for a data center in Dublin, Ireland He is a regular contributor

to various infosec-related mailing lists and Syngress publications, and recently

co-authored Check Point NG Certified Security Administrator Study Guide Vitaly has a

degree in mathematics He lives in Australia

Trang 10

Michael Sweeney(CCNA, CCDA, CCNP, MCSE) is the owner of the networkconsulting firm Packetattack.com His specialties are network design, network trou-bleshooting, wireless network design, security, and network analysis using NAI Snifferand Airmagnet for wireless network analysis Michael’s prior published works include

Cisco Security Specialist’s Guide to PIX Firewalls (Syngress Publishing, ISBN:

1-931836-63-9) Michael is a graduate of the University of California, Irvine, extension gram with a certificate in communications and network engineering Michael resides

pro-in Orange, California with his wife Jeanne and daughter Amanda

Technical Editor, Contributor and Technical Reviewer

Trang 12

Chapter 1 Introduction to Intrusion Detection Systems 1

Introduction 2

Secure 17

Encryption 18Authentication 18

Trang 13

Chapter 2 Cisco Intrusion Detection 39

Introduction 40What Is Cisco Intrusion Detection? 41

Trang 14

The Cisco 6500 Series IDS Services Module 47

Understanding and Analyzing the Network 57Identifying the Critical Infrastructure and Services 58Placing Sensors Based on Network and Services Function 59Case Study 1: Small IDS Deployment 60Case Study 2: Complex IDS Deployment 62Summary 69

Chapter 3 Initializing Sensor Appliances 75

Introduction 76

Trang 15

Downloading the Image 102

Upgrading a Sensor from 3.1 to 4.0 107

Initializing a Version 4.0 Sensor 109Summary 113

Chapter 4 Cisco IDS Management 119

Introduction 120

Using the Cisco Secure Policy Manager 123

Trang 16

Using the IDS Device Manager 160How to Configure IDS Device Manager 161

Configuring the IDS Device Manager 164

Using the Cisco Network Security Database 178Summary 180

Chapter 5 Configuring the Appliance Sensor 185

Introduction 186

Compatible Secure Shell Protocol Clients 200

BIOS Modifications for IDS 4210/4220/4230 Sensors 203

The BIOS Setup for the IDS-4220 and IDS-4230 Sensors 204Applying the Sensor Configuration 204Cisco Enabling and Disabling Sensing Interfaces 205Adding Interfaces to an Interface Group 207

Configuring Event Logging (IDS version 3.1) 208

Configuring Automatic IP Logging 211

Trang 17

Updating Sensor Software (IDS 4.0) from

Updating Sensor Software (IDS 4.0) with IDM 219Updating Sensor Software (IDS 4.0) Using the IDM 221Upgrading Cisco IDS Software from Version 4.0 to 4.1 222

How to Restore the Default Configuration 226Summary 227

Chapter 6 Configuring the Cisco IDSM Sensor 233

Introduction 234Understanding the Cisco IDSM Sensor 234Configuring the Cisco IDSM Sensor 236

Configuring Trunks to Manage Traffic Flow 246

Booting the IDSM Sensor from Partition 2 247

Verifying the IDSM Sensor Upgrade 254

Updating the IDSM Sensor Signatures and Service Packs 258

Trang 18

Signature Structure 275

Cisco IDS Signature Micro-Engines 277

Understanding Cisco IDS Signature Series 314Configuring the Sensing Parameters 315

Creating Custom Signatures Using IDM 324Creating Custom Signatures Using CSPM 326

Alarm Level 4 – Medium Severity 335

Trang 19

Alarm Level 3 – Low Severity 335

Identifying Traffic Oversubscription 337Summary 338

Chapter 8 Configuring Cisco IDS Blocking 347

Introduction 348Understanding the Blocking Process 349

General Considerations for Implementation 361Where Should I Put My Access Control Lists? 365

Configuring a Router for a Sensor Telnet Session 366

The Never Block IP Addresses Setup 370Using the Master Blocking Sensor 371Manually Blocking and Removing a Block 372Determining the Status of the Managed Device and

Summary 376

Trang 20

Configuring an IOS-Based Switch for RSPAN 403

Destination Switch Configuration 403Configuring a SET-Based Switch for RSPAN 404

Destination Switch Configuration 405

Capturing with One Sensor and a Single VLAN 415Capturing with One Sensor and Multiple VLANs 417Capturing with Multiple Sensors and Multiple VLANs 418Dealing with Encrypted Traffic and IPv6 419Summary 423

Chapter 10 Cisco Enterprise IDS Management 429

Introduction 430Understanding the Cisco IDS Management Center 431

Installing the Cisco IDS Management Center 435

CiscoWorks Architecture Overview 436

Trang 21

Setting Up Sensors and Sensor Groups 447

Adding Sensors to a Sensor Group 450Deleting Sensors from a Sensor Group 453

Configuring Signatures and Alarms 455

Configuring General Signatures 455

How to Generate, Approve, and Deploy IDS Sensor

The Sensor Version Import Report 465The Sensor Configuration Import Report 465The Sensor Configuration Deployment Report 465The Console Notification Report 465

Trang 22

Viewing a Database Rule 473

Updating Sensor Software and Signatures 474Defining the E-mail Server Settings 474Summary 475

Appendix A Cisco IDS Sensor Signatures 513

Cross Protocol Signature 6000 series 582

String Matching Signature 8000 Series 589Back Door signature Series 9000 Series 590Policy Violation Signature 10000 Series 595

IDS Signatures Grouped by Software Release Version 598

Trang 24

The Internet used to be a place of shared access and shared ideas In recent years,however, the Internet has taken on more of a Wild West personality, with generalusers, hackers, crackers, troublemakers, and information thieves using it for both busi-ness and pleasure.With such a mix of personalities online, it has become much moredifficult to sort out who is safe and who is a threat At the same time, the threats havebecome much more difficult to detect and protect against Like the old west, networkmanagers, administrators, and anyone else with a vested interest in protecting theirdata have built forts on the Internet to protect that data (now called “intellectualproperty”) People have finally awoken to the understanding that information ispower and a significant amount of monetary value is often attached to information.

So, in response to the threats, they have built walls that limit network access and haveimplemented gatekeepers in the form of firewalls But, the malcontents have alsobeen active.They have learned how to subvert the TCP/IP three-way handshake anduse TCP’s own rules against itself in the form of Denial-of-Service (DoS) attacks.They have also learned how to generate and send spoofed packets with bits set tocause the IP stack to fail and, in some cases, give the attacker access to the computer.Indeed, the barbarians have become stealthy and masquerade their attack by using anormal port such as port 80 to launch attacks against DNS servers, web servers, orSQL servers with Unicode attacks and SQL injection attacks And as one side raisesthe bar, the other side will match and raise the bar of network protection

How does one begin to protect their network against such a determined enemywho can sneak in past the firewall by using traffic that, by all accounts, looks to beperfectly acceptable according to the firewall? By using a Cisco Intrusion DetectionSensor, that’s how.The Cisco IDS looks at traffic more deeply than the firewall andoperates proactively by blocking or changing access-lists on the PIX firewall or Ciscorouters on the fly In order for the Cisco IDS sensor to do its job, the IDS sensor and

Foreword

Trang 25

striving to accomplish in this book—the correct way to install, configure, and use theCisco IDS sensor and management tools provided to you.

To this end, we have organized this book to take you from IDS basics to the figuration of your own custom IDS sensor signatures.The following contains anoverview of each chapter

con-■ Chapter 1: Introduction to Intrusion Detection Systems This

chapter explains intrusion detection as well as Cisco’s spin on the process

We cover basic threats and types of attacks and provide an overview of thevarious types of intrusion detection, such as Network-based and Host-basedIDSs.The basics of TCP connection theory and how an attack might evadethe IDS are also discussed

Chapter 2: Cisco Intrusion Detection This chapter explores the nutsand bolts behind a Cisco-based IDS system, covering both Cisco’s “ActiveDefense” and “Defense in Depth” methodologies Afterward, various plat-forms from Cisco are discussed, including how to use the Cisco Post OfficeProtocol and how to effectively deploy the IDS sensors in your network

Chapter 3: Installing Sensor Appliances Hands-on learning beginshere with instruction on how to install the Cisco IDS appliances on yournetwork Password recovery is discussed as well as various commands like

idsstatus and idsconns.

Chapter 4: Cisco IDS Management All the IDS sensors in the worldwon’t do you a bit of good if you can’t manage them effectively In thischapter, we start with a review of Cisco IDS management and show how toinstall the Cisco Secure Policy Manager (CSPM).Then we move on to thenew Web-based management tool set that handles the Cisco sensor.The IDSEvent Viewer is also covered, as well as Cisco’s Network Security Database

Trang 26

Chapter 6: Configuring the IDSM Sensor Along with the appliancesensor, there is the black box of Cisco IDS sensors, the IDSM module orblade, which resides on the Cisco Catalyst 6500 series switch.This powerfulbut relatively unknown IDS sensor is explained in this chapter.We explorethe installation, configuration, and management of the sensor when installed

in the Cisco 6500 series switch chassis

Chapter 7: IDS Signatures and Alarms All the sensors in the world arepretty but useless paperweights unless there is some way of distributing thealarms By the same token, if every alarm were dispatched, you would bequickly overwhelmed Chapter 7 therefore explains how the signatures workand how to tune the type of alarms they generate.We also explore Ciscosignatures in detail and explain the relevance of the various signaturesseries.You’ll learn how to configure signature parameters and how to build acustom signature Lastly, we’ll discuss how to tune the signatures to yournetwork and explain why the effort of tuning is so very important to yournetwork security and peace of mind

Chapter 8: Configuring Cisco Blocking This chapter explores Ciscoblocking, yet another way the Cisco IDS can help protect the network byproactively blocking threats to your network security in real time Along theway, the blocking process is explained, as well as how it works with CiscoIDS sensors and other Cisco products, such as the Cisco PIX Finally, weexplore how access-lists carry out blocking and how to configure the CiscoIDS sensor to perform the blocking actions

Chapter 9: Capturing Network Traffic In this chapter, we learn how toconfigure the switch to provide the mirrored traffic that the IDS sensorneeds to watch over the network.We show you the hows and whys ofswitching and explain how to sniff traffic in a switched network Specifically,

we demonstrate how to configure your Cisco switches to use SPAN orVACLs to get access to the traffic your IDS sensor needs to see.We alsoexplain why you might want to consider using network taps instead of justSPAN

Chapter 10: Cisco Enterprise IDS Management So, you have morethan a couple of sensors? You, my friend, are why we wrote this chapter.Weexplain what the Cisco IDS Management Center is all about and how toinstall the Management Center, as well as how to configure the Cisco IDS

Trang 27

sensors and add them to the Management Center so you can manage all ofthe sensors from a single source.You’ll learn how to configure reporting soyou can justify to the boss all the money spent on these expensive tools, andhow to administer the Cisco IDS Management Center server and keep ithappy with the proper care and feeding.

Chapter 11: Cisco Firewall/IDS IOS You say you don’t have a sensor?That you’re just a poor system administrator on a shoestring budget, but you

do have a Cisco router? You may be in luck! Cisco offers a version of IDSsoftware on the IOS router code, and in this chapter we teach you about theCisco IDS IOS and how to configure the Cisco IDS IOS code on therouter.You’ll learn how to configure the IDS signatures and find out thelimitations of the IOS-based version of IDS.We also show you how toverify that your IOS IDS installation actually works and how to get it to dowhat you want

Trang 28

Introduction to Intrusion Detection Systems

Solutions in this Chapter:

Understanding the AVVID Architecture

Understanding the SAFE Blueprint

Trang 29

The Internet can be a dangerous and costly place Since its inception, there hasbeen a consistent and steady rise in network and systems security incidents inevery existing business and government sector And, in a world where the

number of computers and networks attached to the Internet grows by the hour,the number of potential attack targets has grown proportionally, and now

includes a large concentration of home users who are experiencing “always on”broadband connectivity for the first time

At first glance, the numbers related to Internet security breaches can be gering, both in terms of sheer frequency and financial impact Market researcherTruSecure estimates that losses from computer crime in 2003 could total over 2.8billion.The Code Red worm in 2001 alone caused an estimated $2 billion indamages and cleanup costs Shortly thereafter, the Nimda worm was unleashed,with estimates of over $2.5 billion in damage

stag-In the eighth annual CSI/FBI Computer Crime and Security Survey, 251 of

530 companies surveyed reported combined losses of nearly $202 million, most

of which stemmed from proprietary information theft and Denial-of-Serviceattacks A bright spot in the 2003 CSI/FBI report indicated that reported losses

of the companies surveyed dropped for the first time since the initial 1995 survey.This drop in costs occurred even though the number of attempted attacks didnot diminish Could this savings be attributed to increased corporate vigilanceand attention to network security?

Perhaps most troubling of these figures, however, is the fact that many rity incidents go undetected and most go unreported Companies and govern-ments readily admit they don’t report incidents to avoid competitive disadvantageand negative publicity Furthermore, the CSI/FBI report also indicates that amajority of known attacks occur from within an organization, proving that it is

Trang 30

secu-are one step towards providing a more secure working and living network ronment.This book also exists as a guide for Security Administrators seeking topass the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100),which is associated with CCSP, Cisco IDS Specialist, and Cisco SecuritySpecialist 1 certifications.

envi-Cisco has developed two primary and dynamic components that form theirsecurity model, the Architecture for Voice, Video, and Integrated Data (AVVID)and the Secure Blueprint for Enterprise Networks (SAFE), that are intended astools for network and security architects to assist in the efficient, modular, andcomprehensive design of today’s modern networks

Along with AVVID and SAFE, Cisco has developed a Security Wheel to vide a roadmap for implementing enterprisewide security and a foundation foreffective and evolving security management Within these security models, Ciscohas identified four security threat categories and three attack categories

pro-Administrators should understand each of these categories to better protect theirnetwork and systems environments

In addition to Cisco security theory, there exist many different types of IDSfunctions such as Network-based intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) We’ll examine each of these and othertypes throughout this chapter and describe in detail how IDS actually function todetect potential security events

Finally, we’ll discuss the potential issues and shortcomings of an IDS so thatadministrators can understand the limitations of their security devices Hopefully,armed with this information, white hat security professionals can provide theirorganizations and governments proper, comprehensive, and forward-thinkingsecurity capabilities

Understanding the AVVID Architecture

Today’s networks transport an increasingly wide array of services such as voiceand video, and application traffic including critical e-business and communicationservices.To assist network architects in the proper design of capable networks,Cisco created the Architecture for Voice, Video, and Integrated Data (AVVID)

The AVVID architecture is based on an open, multiservice model and is posed of four interrelated, yet distinct layers as follows:

com-■ Network Infrastructure Layer

Trang 31

■ Application Intelligence Layer

■ Client LayerThe Cisco AVVID end-to-end architectural model is shown in Figure 1.1

The Network Infrastructure Layer provides the groundwork for the AVVIDarchitecture and is composed of switches, firewalls, IDS, VPN and security appli-ances, gateways, and routers These are the devices and services that provide thefoundational transport mechanisms for the network It is in the Network

Infrastructure Layer that intelligent logic is functionally applied, providing QoS,security, wire speed switching, and appropriate routing Specific examples in theNetwork Infrastructure Layer might include Cisco Catalyst 6500 switches, CiscoPIX firewalls, Cisco 4200 Series IDS, and Cisco 7500 Series routers

Figure 1.1The AVVID Architectural Model

Gateways

Routers Switches

QoS

Policy Security

Routing

Management

Wireless Devices

IP Phones

Client PCs Video

Devices

Telephony Application Servers

Trang 32

become increasingly sophisticated in recent years to fully leverage the growing list

of advanced applications that promote enhanced business functionality.Thissophistication places demands on the Network Infrastructure Layer for increasedthroughput, reduced latency, and more focused services For example, the net-work capabilities delivered to the IP Telephone switch port might be differentthan those provided to a typical desktop workstation switch port.This could beprovided by ingress port QoS classification and marking in the NetworkInfrastructure Layer and controlled via the Services Control Layer, which provesthe need for holistic and comprehensive AVVID design

The Application Layer provides the tools and logic that promote more cient and capable business processing.The Application Layer includes function-ality such as telephony application, messaging, video content distribution, ande-commerce services Each of these services relies on the proper implementation

effi-of the Network Infrastructure Layer An example effi-of an Application Layer nent is Cisco Call Manager.This application provides the functionality and logicbehind the IP phones within the enterprise It relies on other applications such asDirectory Services to provide authentication and unique services to each IPPhone user Along with the Client Layer IP Phones, it also relies on a well-builtand functional network over which it can provide services

compo-The overarching theme of the AVVID architecture is the use of a single verged IP network for voice, video, and data traffic Doing so facilitates gains inoperational and technical efficiency, and reduces total cost of ownership for thosemigrating from traditional separation of services across multiple infrastructures

con-AVVID also incorporates centralized control and management of the ture for increased administrative productivity

infrastruc-The benefits of AVVID are

Integration By using the Cisco AVVID architecture and applying thenetwork intelligence imbedded within IP, companies can develop com-prehensive tools to improve productivity

Intelligence AVVID promotes the prioritization of traffic and deliversintelligent network services to maximize network efficiency and performance

Innovation Cisco customers can adapt quickly to a changing businessenvironment

Interoperability Standards-based APIs enable integration with

Trang 33

third-With the increased dependence on the IP network infrastructure comesamplified requirements for network capacity, QoS, resiliency, and security, how-ever.These critical network attributes are imbedded throughout the Cisco

AVVID architecture For additional information regarding Cisco AVVID, go towww.cisco.com/go/avvid.To address the need for security, Cisco developed theSAFE blueprint, which augments the AVVID architecture

Understanding the SAFE Blueprint

Another powerful tool available from Cisco for security administrators is SAFE, asecurity blueprint for enterprise networks.The SAFE blueprint builds on theCisco AVVID architecture by incorporating best practices and comprehensivesecurity functionality throughout the infrastructure Fundamentally, the SAFEblueprint reinforces the absolute need for security in modern enterprise networksand details the management protocols and functions necessary to administer thesecurity infrastructure

The benefits of SAFE are

■ SAFE provides a detailed blueprint to securely compete in today’sInternet and interconnected economy

■ SAFE provides a solid foundation for migrating to a secure and effective network

cost-■ SAFE, by being modular in design, enables companies to stay withintheir budgets

■ SAFE provides protection at each access point to the network usingbest-in-class security products and services

SAFE is organized by network area as follows:

Trang 34

Each of these modules incorporates designs for maximum performance, yetensures security and integrity SAFE modules are designed to address several net-work attributes including, but not limited to, security and threat response, securemanagement, availability, scalability, QoS support, and voice support.

Additionally, Cisco has updated the SAFE blueprint with new modules thatincorporate Wireless LAN and IP Telephony security Both address small-,medium-, and enterprise-sized environments and include design topics similar tothose listed earlier

Let’s look as these areas in more detail

The Network Campus AreaThe SAFE blueprint includes security architectural information specific to thesize of the networks and includes details for small, medium, and enterprise-sizednetworks Regardless of size, however, the Campus Area includes security servicesdirected primarily to the internal, corporate user Common security infrastructure

Figure 1.2 The SAFE Blueprint

Network Campus Area

Small-Sized Network Campus Area

Network Edge Area Enterprise Network Edge Area Enterprise Network Campus Area

Edge Distribution Module

Building Module

Building Module (Users)

Server Module

Management Module

Medium-Sized Network Campus Area

Small Campus

Medium Campus

E-Commerce Module Corporate Internet Module

VPN/ Remote Access

Extranet Module

WAN Module

Small-Sized Edge Area

Medium-Sized Network Edge Area

WAN Module

Corporate Internet Module

Corporate Internet Module

Internet Service Provider Area ISP Area ISP Module

PSTN Module

Frame/ATM Module

Remote User Network Edge Area Remote User Network Module

Distribution

Network

Module Network Network Module

Trang 35

devices, virus scanning systems, intrusion detection, and security managementsolutions to name a few.

Let’s look a little closer at what each sized campus module provides withinthe SAFE blueprint

The Small Campus Module

The Small Campus Module provides security infrastructure sized appropriatelyfor budget-conscious and small organizations Included within the Small CampusModule are intrusion detection systems, virus scanning servers, proxy devices, andsecurity management systems Within the Small Campus Module design, users aretrusted more internally due to budget and size For example, internal firewalls toseparate Accounting from Engineering may not be practical based on cost

The Medium Campus Module

The Medium Campus Module is similar to the Small Campus Module, yetincludes more security infrastructure to provide protection for an increasednumber of people and services For instance, in addition to the security imple-mented in the Small Campus Module, the Medium Campus Module includesswitches capable of separating users via VLANs and filtering based on Layer 3and 4 attributes Critical services such as Call Management or Accounting Serversare separated by stateful inspection firewalls Intrusion detection systems are morecapable in the Medium Campus Module and can provide focused analysis inLayers 4 through 7 As in the Small Campus Module, the Medium CampusModule includes network management systems, virus scanning gateways, andproxy devices

The Enterprise Campus

Trang 36

the network and includes virus scanning software, personal firewalls, and separated user space.

VLAN-The Distribution Module

Within the SAFE blueprint, there are two types of Distribution Modules, aBuilding Distribution Module and an Edge Distribution Module As they bothcontain similar security infrastructure and largely provide the same type of net-work services, we’ll discuss both of them in this section

From the Building Module, the user traffic is directed through the BuildingDistribution Module.This module acts as a transport area to quickly provideaccess to the core networks Within the Building Distribution Module, securityfeatures include RFC 2827 filtering to prevent DoS attacks and address spoofingand continued VLAN separation Layer 3 separation may also exist if routingoccurs in the Building Distribution Module

The Edge Distribution Module serves as the security handoff to the NetworkEdge Area, which we’ll discuss in a moment Like the Building DistributionModule, the Edge Distribution Module also includes RFC 2827 filtering and,potentially, Layer 3 access control

The Core Module

As is traditional in core networks, very little security infrastructure is included so

as to not impede high-speed transport across the campus While the CoreModule does not call for security features, there are an increasing number ofsecurity devices, such as IDS and firewalls, that can potentially exist within theCore based on their high-speed performance

The Server Module

The Server Module specifically addresses the needs of server farm or other vice areas Many security capabilities are present in the Server Module to protectenterprise assets such as directory services, messaging servers, DHCP, VoIP CallManagement services, and the like Included within the Server Module arestateful inspection firewalls and packet-filtering devices, IDS in the form of HIDSand NIDS, and VLAN-capable switches

ser-The Management Module

The Management Module exists as the command and control module for the

Trang 37

ture resides.The Management Module can include the following services andcapabilities:

■ AAA services such as Cisco Secure ACS for network device access trol

con-■ SNMP-based network monitoring and control services, such asCiscoWorks

■ Syslog servers for comprehensive error and event data capture

■ Out-of-band (OOB) network access and infrastructure

■ Two-factor authentication systems such as SecurID servers

■ Device configuration management systems for revision control

■ VPN termination systems for remote, secure management

In addition to these services, the Management Module is itself protected byfocused Layer 4–7 IDS analysis, various traffic filtering mechanisms such as routerfilters and stateful inspection firewalls, and, as in other modules, VLAN-capableswitches for Layer 2 separation

The Network Edge Area

Similar to the Network Campus Area, the Network Edge Area consists of rity architectural information specific to the size of the networks that includesdetails for small-, medium-, and enterprise-sized networks.The Network EdgeArea also includes a Remote User Network Module focusing on home officeand remote access networks Furthermore, each specifically sized Network EdgeArea addresses security regarding the more publicly available services a companymay provide.This Area also includes the security features necessary to safeguard

Trang 38

secu-■ Software Access Option Users connect to the central office via VPNand authentication software installed on their computer workstation.

Users may have broadband connectivity, but most likely rely on dialupaccess for remote connectivity.This is the simplest option for remoteconnectivity

Remote Site Firewall Option A firewall device is used in this optionfor more permanent and robust secure remote connectivity.This optioninfers a broadband connection and provides stateful inspection and/orLayer 7 packet filtering VPN access and authentication services can belocated at the firewall or on the user’s computer workstations in thisoption

Hardware VPN Client Option Similar to the Remote Site FirewallOption, the Hardware VPN Client Option uses broadband networkconnectivity and provides VPN and authentication services on behalf ofthe user.This option relies on user workstation personal firewall softwarefor perimeter security, however

Remote Site Router Option Nearly identical to the Remote SiteFirewall Option, this option uses a router with firewall capabilities toprovide perimeter packet filtering and may include stateful inspectionand/or Layer 7 filtering capabilities

Regardless of the connectivity options, the Remote User Network EdgeModule includes security infrastructure typical of user network areas such as virusscanning systems, HIDS, and personal firewalls

The Small Network Edge The Small Network Edge combines economical and appropriate security mea-sures to protect smaller organizations.The Small Network Edge includes onemodule, the Corporate Internet Module

The Corporate Internet Module

The Small Network Corporate Internet Module acts as the demarcation betweenthe company’s assets and the ISP Area It also serves to protect the application systems that the company provides to the public, such as web, database, and mailservers

The security infrastructure present in the Small Network Corporate Internet

Trang 39

ties, and IDS in the form of NIDS and HIDS.The Small Network CorporateInternet Module also includes Remote Authentication services, VPN terminationdevices, and VLAN-capable switches.

The Medium Network Edge

The Medium Network Edge includes more advanced and comprehensive rity mechanisms to protect the larger asset and employee base of the medium-sized company It includes two modules, as discussed next

secu-The Corporate Internet Module

Like the Small Network Edge Corporate Internet Module, the Medium

Network Edge Corporate Internet Module includes perimeter stateful inspectionfirewalls and Layer 7 filtering capabilities.These serve to protect the corporateinternal networks and services.This module has more focused IDS capabilities,however, and also includes content inspection for mail services, more robust VPNtermination, and scalable authentication services

The WAN Edge Module

The Medium Network Edge has a second module to address WAN connectivityneeds.This module may include packet-filtering capabilities, but most likely itsimply provides reliable and secure transport to remote office locations

The Enterprise Network Edge

The Enterprise Network Edge Area within the SAFE blueprint is targeted atlarge organizations with various customer-focused, publicly available services inseveral locations.The Enterprise Network Edge necessitates the creation of sev-eral modules, each addressing specific security requirements within the Edge

Trang 40

capable switches provides server connectivity in the E-Commerce Module forfast, efficient server access.

The Corporate Internet Module

The Corporate Internet Module provides secure connectivity for internal rate users to the Internet It also offers logical space for inbound and outboundservices such as SMTP, web proxy, and content inspection servers.This businessfunctionality is protected with stateful inspection firewalls, Layer 7 filtering, spoofmitigation, and other basic filtering It also includes advanced and focused

corpo-Network IDS analysis and host-based detection systems

The VPN/Remote Access Module

Due to the potential size and scaling requirements of Enterprise-sized VPN tions, the Enterprise Network Edge Area includes a VPN/Remote Access

solu-module.This module contains the required encryption, VPN termination points,and authentication mechanisms for the Enterprise environment Included in thismodule are various IDS components that are placed at the encryption endpoint

to inspect inbound and outbound VPN traffic Stateful inspection firewalls arealso integrated into the VPN/Remote Access Module for perimeter securityfrom, and to, remote connections

The Extranet Module

The Extranet Module is similar to the E-Commerce Module in that it housesapplication and web-based services Extranets are typically intended to facilitateaccess by semi-trusted users such as partners or other remote entities Like the E-Commerce Module, the Extranet Module includes NIDS and HIDS, as well asstateful inspection firewalls It also includes authentication and VPN terminationservices for remote use

The WAN Module

The Enterprise Network Edge WAN Module includes sparse security features tofacilitate efficient network transport.The WAN Module may include Layer 3access control mechanisms for secure transport

The Internet Service Provider AreaThe Internet Service Provider Area as described by the SAFE blueprint provides

Ngày đăng: 25/03/2014, 11:09

TỪ KHÓA LIÊN QUAN