– Chapter 3 – Device Security (B)

Slides:



Advertisements
Similar presentations
Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Switched Networks Routing And Switching 2.0.
Securing the Router Chris Cunningham.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Switched Networks Routing and Switching.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Enterprise Network Security Accessing the WAN Lecture week 4.
COEN 252: Computer Forensics Router Investigation.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Device Security A device is a node helping to form the topology of the network. A compromised device may be used by the attacker as a jumping board. A.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 6 Router Configuration Sem 2V2. Configuration files can come from the console NVRAM TFTP server. The router has several modes:  privileged mode.
Configuring a network os
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
© 1999, Cisco Systems, Inc Chapter 10 Controlling Campus Device Access Chapter 11 Controlling Access to the Campus Network © 1999, Cisco Systems,
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
User Access to Router Securing Access.
Module 3 Configuring a Router.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Routers 1st semester
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
Chapter 2: Configure a Network Operating System
 Router Configurations part1 2 nd semester
Instructor Materials Chapter 8 Configuring Cisco Devices
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Configuring a Network Operating System –
Instructor Materials Chapter 6: Network Layer
Instructor Materials Chapter 5: Network Security and Monitoring
Instructor Materials Chapter 7: Access Control Lists
Instructor Materials Chapter 2: Configure a Network Operating System
Working at a Small-to-Medium Business or ISP – Chapter 8
Understanding Switch Security
– Chapter 5 – Secure LAN Switching
Chapter 5: Switch Configuration
IPSec VPN Chapter 13 of Malik.
Introduction to Networking
Chapter 6: Network Layer
Introduction to Networking
Chapter 2: Basic Switching Concepts and Configuration
Chapter 2: Introduction to Switched Networks
Switch Concepts and Configuration Part II
Chapter 5: Network Security and Monitoring
Chapter 4: Access Control Lists (ACLs)
Understanding Switch Security
Chapter 5: Switch Configuration
– Chapter 3 – Device Security (B)
Net 412 (Practical Part) LAB 3 - Telnet
* Essential Network Security Book Slides.
Understanding Cisco Router Security
Access Control Lists CCNA 2 v3 – Module 11
Goals Introduce the Windows Server 2003 family of operating systems
Chapter 5: Switch Configuration
Firewalls Chapter 8.
Introduction to Network Security
Review - week 4 Basic device access security
(DNS – Domain Name System)
Presentation transcript:

– Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device itself Routers Firewalls Switches Authentication servers wireless access points … Network Security

Steps to secure a router: Backup of configuration files and the router software Controlling access to the router (tty, vty ports) Securing access to the router (via SSH) Password management Logging events on the router Disabling unnecessary services Using loopback interfaces Controlling SNMP as a management protocol Controlling HTTP as a management protocol Using CEF as a switching mechanism Setting up the scheduler from a security perspective Using the Network Time Protocol (NTP) Login banners Capturing core dumps Using service nagle to improve Telnet access during high CPU events Network Security

2. Controlling access to the router A tty port is physically connected to a terminal or workstation for local administrative access to the router. An aux ports, similar to a tty port, is connected to a modem for remote out-of-band administrative access to the router. A vty (virtual tty) port is used to allow remote in-band connection sessions, via telnet, ssh, or rlogin. See http://www.netbook.cs.purdue.edu/othrpags/qanda272.htm for Q&A on “out-of-band” network management. Network Security

Vulnerabilities of tty or aux ports A tty or aux port may suffer reverse telnet attack, where the terminal server connected to the tty port or the modem connected to the aux port of the router is used by the attacker (as a remote client) to access the router. Reverse Telnet (as defined in Wikipedia) Check out this link to see an illustration of using ‘reverse telnet’ to remotely access a router. (diagrams below) Network Security

Normal telnet Network Security

Reverse Telnet Network Security

Reverse Telnet (cont.) Another example: What is Reverse Telnet and how do I configure it? Network Security

Vulnerabilities of tty or aux ports Solution? Disable the console port Line con0 transport input none Allow only SSH access to a router’s console port (a feature added to IOS v12.2 or higher) login authentication default rotary 1 transport input ssh ip ssh port 2001 rotary 1 Requirement: The router must be set up as a SSH server. Network Security

Controlling vty access Restricted access: Only allow the protocols that will be used by the network admin Since Cisco IOS v11.1, the default is none. Example: To allow only telnet and ssh connections line vty 0 4 transport input telnet ssh Only addresses in the ‘access list’ are allowed to connect: access-class, access-list (See example 3-6) Short timeouts: The default timeout value is 10 minutes. To set it to 5 min. 30 sec. exec-timeout 5 30 Authentication for vty access: either local or RADIUS authentication (preferred). Network Security

3. Securing access to the router using encryption IPsec VPN client (preferred; more details in Ch 13) Two cases: The VPN client access a back-end LAN (the destination) by building a tunnel between itself and a router (the IPsec gateway), behind which the LAN is located. The VPN client is used to remotely administer the router, which is both the gateway and the destination. SSH: Only SSH v1 is supported by Cisco IOS Example 3-11 Network Security

4. Password Management Passwords stored on the router should be properly encrypted. The default password-encryption is either type 0 (clear text passwords) or type 7 (weak encryption). Use the enable secret command to activate MD5 when encrypting passwords. Example 3-12 Network Security

5. Logging events Advantages: Allows auditing and tracking  forensics (in case of an attack) performance tuning (maintenance) Requirement: good time stamping  using NTP Example: 3-13 Network Security

6. Disable unnecessary services If a service is not being actively used on a device, it should be disabled. Otherwise it may be used as a back door for the attacker to gain access to the device. Sample services to be disabled: Table 3-1 TCP small servers, UDP small servers, Finger server, … Network Security

7. Using loopback interfaces Advantages: Enable a block of IP addresses to be assigned to be used by loopback. All routers can be forced to use these loopback IP addresses as source addresses when accessing the servers. The servers can then also be locked down to allow access only from this block of IP addresses. Accesses from addresses outside this block are denied. Example 3-14 Network Security

8. Controlling SNMP (as a management protocol) SNMP can be used in read-only and ‘read and write’ modes Unless necessary, use read-only mode on routers. The ‘read and write’ mode allows the admin to modify the router’s configurations via SNMP. Access into the network via SNMP should be blocked at the network’s boundary. Network Security

8. Controlling SNMP (as a management protocol) Security of SNMP: v1 and v2 use ‘community strings’ as the only authentication mechanism. (Not secure) v3 is more secure by providing MD5 or SHA for authentication, and DES for encryption. SNMP v3: threats vs protections (p.65) Network Security

9. Controlling HTTP (as a management protocol) Unless necessary, HTTP access to the router should be disabled. Admin access to the router via HTTP should be secured, by activating authentication. Example: 3-19 Network Security

10. Using CEF as a switching mechanism Cisco Express Forwarding Routers using the traditional switching mechanisms need to update routing caches when packets destined for new addresses arrive. SYN floods and DDoS attacks use a large number of random or pseudo-random IP addresses as ultimate targets. CEF replaces the normal routing cache with a data structure that mirrors the entire routing tables. It does away with the need to update the cache each time a new IP address needs to be routed to. Network Security

11. Using the scheduler scheduler allocate scheduler interval To prevent the router from becoming too busy responding to the interrupts on its interfaces due to the large number of packets arriving  large-scale network attack, esp. a DDoS attack Example 3-21 Network Security

12. Using NTP Network Time Protocol Critical for services requiring good time stamping: logging, AAA, Kerberos, … Challenge: authentication between devices exchanging NTP information Network Security

13. Login banners Sequence: Example: 3-25 Login banner login session MOTD banner EXEC banner (or incoming banner) Example: 3-25 Network Security

14. Capturing core dumps In the event of system crash, the core dump may provide useful info for tracking the attack(s). Example: 3-26 Network Security

15. Service nagle Nagle is an algorithm that can be enabled as a service on a Cisco router, to allow the router to pace the TCP connection for Telnet in a way that reduces the burden on the CPU and generally improves the performance of the Telnet session. service nagle (Example 3-27) Network Security

Security of other devices Firewalls, switches, … Similar procedure Check the default settings ‘Harden’ the device before placing it into use in the production network. Network Security