1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Tài Liệu CCNA - Blocking Configuration

32 151 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 32
Dung lượng 745 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

• Design a Cisco IDS solution using the blocking feature, including the ACL placement considerations, when deciding where to apply Sensor-generated ACLs... • Device management—The abil

Trang 1

Chapter 15Blocking Configuration

Trang 2

Upon completion of this chapter, you will be able

to complete the following tasks:

Describe the device management capability of the Sensor

and how it is used to perform blocking with a Cisco

device.

Design a Cisco IDS solution using the blocking feature,

including the ACL placement considerations, when

deciding where to apply Sensor-generated ACLs.

Configure a Sensor to perform blocking with a Cisco IDS device.

Configure a Sensor to perform blocking through a Master

Blocking Sensor.

Trang 3

Introduction

Trang 4

Blocking—A Cisco IDS Sensor feature.

Device management—The ability of a Sensor to interact

with a Cisco device and dynamically reconfigure the

Cisco device to stop an attack.

Managed device—The Cisco IDS device that is to block

the attack This is also referred to as a blocking device.

Blocking Sensor—The Cisco IDS Sensor configured to

control the managed device.

Interface/direction—The combination of a device interface

and a direction, in or out.

Managed interface—The interface on the managed device

where the Cisco IDS Sensor applies the ACL.

Active ACL—The ACL created and maintained by the

Sensor which is applied to the managed interfaces.

Trang 5

Blocking Devices

Trang 6

Blocking Guidelines

Implement anti-spoofing mechanisms.

Identify hosts that are to be excluded from

blocking.

Identify network entry points that will participate

in blocking.

Assign the block reaction to signatures that are

deemed as an immediate threat.

Determine the appropriate blocking duration.

Trang 7

NAC Block Actions

The following actions will initiate a block:

Response to an alert event generated from a

signature that is configured with a block action.

Manually initiated from a management interface.

Configured to initiate a permanent block action.

Trang 8

Blocking Process

The following explains the blocking process:

An event or action occurs that has a block

action associated with it

Sensor pushes a new set of configurations or

ACLs, one for each interface direction, to each controlled device

An alarm is sent to the Event Store at the same

time the Sensor initiates the block

When the block completes, all configurations or

ACLs are updated to remove the block

Trang 9

Blocking Scenario

Untrusted network

Protected network

Deny 172.26.26.1

1

Write the ACL 3

172.26.26.1 192.168.1.10

Detect the attack 2

Trang 10

ACL Considerations

Trang 11

Outbound ACL

Inbound ACL

Where to Apply ACLs

When the Sensor has full

control, no manually entered ACLs are allowed.

Apply an external

interface in an inbound direction.

Apply an internal interface

in an outbound direction.

Protected network

Trang 12

Applying ACLs on the

External vs Internal Interfaces

External interface in the

inbound direction

Denies the host before

it enters the router.

Provides the best

protection against an attacker.

Internal interface in the

outbound direction

Denies the host before

it enters the protected network.

The block does not apply to the router itself.

Trang 13

Using Existing ACLs

The Sensor takes full control of the managed interface

Existing ACL entries can be included before the

dynamically created ACL This is referred to as applying a Pre-block ACL.

Existing ACL entries can be added after the dynamically

created ACL This is referred to as applying a Post-block ACL.

The existing ACL must be an extended IP access list,

either named or numbered.

Trang 14

Blocking Sensor Configuration

Trang 15

Configuration Tasks

Complete the following tasks to configure a Sensor for blocking:

Assign the block reaction to a signature.

Assign the Sensor’s global blocking properties.

Define the managed device’s properties.

Assign the managed interface’s properties for

Trang 16

Assign Block Reaction

Trang 17

Sensor’s Blocking Properties

Choose Configuration>Settings>Blocking>Blocking Properties.

Trang 18

Managed Device—Cisco Router

Choose Configuration>Blocking>Blocking Devices and Select Add.

Trang 19

Managed Device—

Cisco Router (cont.)

Trang 20

Managed Device—PIX Firewall

Choose Configuration>Blocking>Blocking Devices and Select Add.

Trang 21

Managed Device—

Catalyst 6000 VACL

Trang 22

Managed Device—

Catalyst 6000 VACL (cont.)

Trang 23

Never Block Addresses

Choose Configuration>Settings>Blocking>Never Block Addresses and

Click Add.

Trang 24

Master Blocking Sensor

Configuration

Trang 25

Master Blocking Sensors

Protected network

Sensor B blocks

Sensor A commands Sensor B

to block

Router A

PIX Firewall B

Trang 26

Master Blocking Sensor

Characteristics

The following are the characteristics of a Master

Blocking Sensor:

blocking on a device on behalf of another Sensor

Master Blocking Sensors.

multiple Sensors

Sensors to control other devices.

Trang 27

Master Blocking Sensor Configuration

Master Blocking Sensor Configuration:

Add each FBS to the Allowed Hosts table.

Blocking Forwarding Sensor Configuration:

Specify the MBS; define RDEP communication parameters

RDEP parameters of MBS are auto-retrieved using IDS MC.

Manually configured using IDM/CLI.

Add MBS to TLS Trusted Host table, if TLS enabled

(default), using the “tls trusted-host ip-address”

command.

Trang 28

Configuring Master Blocking Sensors

Choose Configuration>Settings>Blocking>Master Blocking Sensors and

click Add.

Trang 29

Summary

Trang 30

Device management is the ability of a Sensor to

dynamically reconfigure a Cisco device to block the

source of an attack in real time.

Guidelines for designing an IDS solution with blocking

include the following:

Implement an anti-spoofing mechanism.

Identify critical hosts and network entry points.

Select applicable signatures.

Determine the blocking duration.

Sensors can serve as master blocking servers.

The ACLs may be applied on either the external or internal interface of the Cisco device, and may be configured for inbound or outbound traffic on either interface.

Trang 31

Lab Exercise

Trang 32

sensorP

.4 sensorQ

.100

172.30.Q.0 172.30.P.0

Lab Visual Objective

.50

WEB FTP

RBB

Ngày đăng: 23/10/2015, 18:07

TỪ KHÓA LIÊN QUAN

w