ITEC 275 Computer Networks – Switching, Routing, and WANs

67
ITEC 275 ITEC 275 Computer Networks – Computer Networks – Switching, Routing, and Switching, Routing, and WANs WANs Week 8 Week 8 Robert D’Andrea Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

description

ITEC 275 Computer Networks – Switching, Routing, and WANs. Week 8 Robert D’Andrea. Some slides provide by Priscilla Oppenheimer and used with permission. Agenda. Learning Activities Security Threats and Risks Security Policy Security Mechanisms Wireless Security SNMP. - PowerPoint PPT Presentation

Transcript of ITEC 275 Computer Networks – Switching, Routing, and WANs

Page 1: ITEC 275  Computer Networks – Switching, Routing, and WANs

ITEC 275ITEC 275 Computer Networks – Switching, Computer Networks – Switching,

Routing, and WANsRouting, and WANs

Week 8Week 8Robert D’AndreaRobert D’Andrea

Some slides provide by Priscilla Oppenheimer and used with permission

Page 2: ITEC 275  Computer Networks – Switching, Routing, and WANs

AgendaAgenda

• Learning Activities– Security– Threats and Risks– Security Policy– Security Mechanisms– Wireless Security– SNMP

Page 3: ITEC 275  Computer Networks – Switching, Routing, and WANs

Network Security DesignNetwork Security DesignThe 12 Step ProgramThe 12 Step Program

1. Identify network assets2. Analyze security risks3. Analyze security requirements and

tradeoffs4. Develop a security plan5. Define a security policy6. Develop procedures for applying security

policies

Page 4: ITEC 275  Computer Networks – Switching, Routing, and WANs

The 12 Step Program (continued)The 12 Step Program (continued)7. Develop a technical implementation strategy8. Achieve buy-in from users, managers, and

technical staff9. Train users, managers, and technical staff10. Implement the technical strategy and security

procedures11. Test the security and update it if any problems

are found12. Maintain security

Page 5: ITEC 275  Computer Networks – Switching, Routing, and WANs

Network AssetsNetwork AssetsObvious Network Assets•Hardware (Routers, internetworking devices, and switches)•Software(Operating systems, applications, and data)Less Obvious Network Assets•Intellectual property•Trade secrets•Company’s reputation

Page 6: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security RisksSecurity Risks• Hacked network devices

–Data can be intercepted, analyzed, altered, or deleted

–User passwords can be compromised

–Device configurations can be changed

• Reconnaissance attacks (are used to gather information about a target network or system. At first glance, seem harmless).

• Denial-of-service (DoS) attacks are increasing

Page 7: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security TradeoffsSecurity Tradeoffs• Tradeoffs must be made between security

goals and other goals:– Affordability– Usability– Performance– Availability– ManageabilityThe cost of protecting yourself against a threat

should be less than the cost of recovering if the threat were to strike you.

Page 8: ITEC 275  Computer Networks – Switching, Routing, and WANs

A Security PlanA Security Plan• High-level document that

proposes what an organization is going to do to meet security requirements

• Specifies time, people, and other resources that will be required to develop a security policy and achieve implementation of the policy

Page 9: ITEC 275  Computer Networks – Switching, Routing, and WANs

A Security PlanA Security Plan

• Should reference the network topology and include a list of network services that will be provided. The list should specify who provides the services, who has access to the services, how access is provided, and who administers the services.

Page 10: ITEC 275  Computer Networks – Switching, Routing, and WANs

A Security PolicyA Security Policy

• Informs users, managers, and technical staff of their obligations for protecting technology and information assets.

Page 11: ITEC 275  Computer Networks – Switching, Routing, and WANs

A Security PolicyA Security Policy

• Per RFC 2196, “The Site Security Handbook,” a security policy is a– “Formal statement of the rules by which people

who are given access to an organization’s technology and information assets must abide.”

• The policy should address– Access, accountability, authentication, privacy,

and computer technology purchasing guidelines

Page 12: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security MechanismsSecurity Mechanisms• Physical security ( Limited access to

resources )• Authentication (Who is requesting

network services)• Authorization (Who can access network

resources)• Accounting (Auditing – collecting data)• Data encryption (a process of scrambling

data to protect it’s integrity)

Page 13: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security MechanismsSecurity Mechanisms• Packet filters (can be set up on

routers, firewalls, and servers to accept or deny packets from

a particular address or service) • Firewalls (a device that enforces security policies at the boundary

between two or more networks).

Page 14: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security MechanismsSecurity Mechanisms• Intrusion Detection Systems (IDS) (detects malicious events and notifies an administrator using email, paging, or logging of the occurrences).• Intrusion Prevention Systems (IPS) (blocks traffic by adding rules to a firewall or by

being configured to inspect traffic as it enters a firewall).

Page 15: ITEC 275  Computer Networks – Switching, Routing, and WANs

Encryption for Confidentiality and Encryption for Confidentiality and IntegrityIntegrity

• Public/Private key encryption - asymmetric key system- All devices use the public key to encrypt data to send- Receiving devices decrypt the date using a private key

• Digital signature - Encrypt part of your document with a private

key- Receiver decrypts document using your public

key

Page 16: ITEC 275  Computer Networks – Switching, Routing, and WANs

Encryption for Confidentiality and Encryption for Confidentiality and IntegrityIntegrity

After encrypting your document with your private key, you can encrypt the document with another public key (IRS). The IRS decrypts the document twice.

Page 17: ITEC 275  Computer Networks – Switching, Routing, and WANs

Encryption for Confidentiality and Encryption for Confidentiality and IntegrityIntegrity

Figure 8-1. Public/Private Key System for Ensuring Data Confidentiality

Figure 8-2. Public/Private Key System for Sending a Digital Signature

Page 18: ITEC 275  Computer Networks – Switching, Routing, and WANs

Modularizing Security DesignModularizing Security Design• Cisco supports reputation filtering and

global correlation services so that an IPS can keep-up-to-date on global security trends and more accurately deny traffic from networks known to be currently associated with botnets, spam, and other malware..

Page 19: ITEC 275  Computer Networks – Switching, Routing, and WANs

Modularizing Security DesignModularizing Security Design• Security defense in depth– Network security should be multilayered with

many different techniques used to protect the network.

Page 20: ITEC 275  Computer Networks – Switching, Routing, and WANs

Modularizing Security DesignModularizing Security Design• Belt-and-suspenders approach

– Don’t get caught with your pants down. Each mechanism should have a backup mechanism.

The belt and suspender ensure security of the pants staying up. Use a dedicated firewall to limit access to resources and a packet-filtering router that adds another line of defense.

Page 21: ITEC 275  Computer Networks – Switching, Routing, and WANs

Modularizing Security DesignModularizing Security Design• Secure all components of a modular design:– Internet connections– Public servers and e-commerce servers– Remote access networks and VPNs– Network services and network management– Server farms– User services– Wireless networks

Page 22: ITEC 275  Computer Networks – Switching, Routing, and WANs

Cisco SAFECisco SAFE• Cisco SAFE Security Reference Model addresses

security in every module of a modular network architecture.

Page 23: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Internet ConnectionsSecuring Internet Connections• Physical security• Firewalls and packet filters• Audit logs, authentication, authorization• Well-defined exit and entry points• Routing protocols that support authenticationInternet routers should be backed up with additional

filters to prevent DoS and other attacks. In turn, these filters should be backed up additional filters placed on firewall devices. Monitor

Page 24: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Public ServersSecuring Public Servers• Place servers in a DMZ that is protected via

firewalls• Run a firewall on the server itself• Enable DoS protection– Limit the number of connections per timeframe

• Use reliable operating systems with the latest security patches

• Maintain modularity– Front-end Web server doesn’t also run other

services

Page 25: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security TopologiesSecurity Topologies

EnterpriseNetwork

DMZ

Web, File, DNS, Mail Servers

Internet

Page 26: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security TopologiesSecurity Topologies

Internet

Enterprise NetworkDMZ

Web, File, DNS, Mail Servers

Firewall

Page 27: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Remote-Access and Virtual Securing Remote-Access and Virtual Private NetworksPrivate Networks

• Physical security• Firewalls• Authentication, authorization, and auditing• Encryption• One-time passwords

Page 28: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Remote-Access and Virtual Securing Remote-Access and Virtual Private NetworksPrivate Networks

• Security protocols– Remote users and routers should authenticate with

CHAP

– Authentication, authorization, and accounting is RADIUS. The database includes authentication and configuration information. Specifies types of services a user is permitted to implement (PPP, FTP, Telnet).

– IPSec is an IETF standard that provides confidentiality, data integrity, and authentication between participating peers at the IP layer, Ipsec provides a secure path between remote users and a VPN concentrator, and between remote sites and a VPN site-to-site gateway.

Page 29: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Network ServicesSecuring Network Services• Treat each network device (routers, switches,

and so on) as a high-value host and harden it against possible intrusions

• Require login IDs and passwords for accessing devices– Require extra authorization for risky configuration

commands

• Use SSH (Secure Shell) rather than Telnet• Change the welcome banner to be less

welcoming

Page 30: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Network ServicesSecuring Network Services• Routing protocols should be selected that

support authentication, including RIPv2, OSPF, EIGRP, and BGP4.

• Static and default routes are good choices because they eliminate the need to accept routing updates.

• Execute minimal necessary services and establish trust in only authenticated partners.

Page 31: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Server FarmsSecuring Server Farms• Deploy network and host IDSs to monitor

server subnets and individual servers• Configure filters that limit connectivity from

the server in case the server is compromised• Fix known security bugs in server operating

systems• Require authentication and authorization for

server access and management• Limit root password to a few people• Avoid guest accounts

Page 32: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing User ServicesSecuring User Services• Specify which applications are allowed to run

on networked PCs in the security policy• Require personal firewalls and antivirus

software on networked PCs– Implement written procedures that specify how the

software is installed and kept current

• Encourage users to log out when leaving their desks

• Consider using 802.1X port-based security on switches

Page 33: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Wireless NetworksSecuring Wireless Networks• Place wireless LANs (WLANs) in their own

subnet or VLAN– Simplifies addressing and makes it easier to

configure packet filters

• Require all wireless (and wired) laptops to run personal firewall and antivirus software

• Disable beacons that broadcast the SSID, and require MAC address authentication– Except in cases where the WLAN is used by

visitors

Page 34: ITEC 275  Computer Networks – Switching, Routing, and WANs

Securing Wireless NetworksSecuring Wireless Networks• IEEE802.11 Specifies Two Forms of Authentication

- Open key the client is always authenticated. used for guest access.

- Shared key authentication, a WEP static key must be properly configured in both the client and the access point.

Man-in-the-middle is another form of eavesdropping

Page 35: ITEC 275  Computer Networks – Switching, Routing, and WANs

WLAN Security OptionsWLAN Security Options• Wired Equivalent Privacy (WEP) vulnerable to passive

attacks and inductive key derivations. If the key is determined, it must be changed on the access point and every client.

• IEEE 802.11i• Wi-Fi Protected Access (WPA)• IEEE 802.1X Extensible Authentication Protocol (EAP)

– Lightweight EAP or LEAP (Cisco)– Protected EAP (PEAP)

• Virtual Private Networks (VPNs)• Any other acronyms we can think of? :-)• Service Set Identifier (SSID)

Page 36: ITEC 275  Computer Networks – Switching, Routing, and WANs

Wired Equivalent Privacy (WEP)Wired Equivalent Privacy (WEP)• Defined by IEEE 802.11• Users must possess the appropriate WEP

key that is also configured on the access point– 64 or 128-bit key (or passphrase)

• WEP encrypts the data using the RC4 stream cipher method

• Infamous for being crackable

Page 37: ITEC 275  Computer Networks – Switching, Routing, and WANs

WEP AlternativesWEP Alternatives

• Vendor enhancements to WEP• Temporal Key Integrity Protocol (TKIP)– Every frame has a new and unique WEP key

• Advanced Encryption Standard (AES) • IEEE 802.11i• Wi-Fi Protected Access (WPA) from the Wi-

Fi Alliance

Page 38: ITEC 275  Computer Networks – Switching, Routing, and WANs

Extensible Authentication Protocol Extensible Authentication Protocol (EAP)(EAP)

• With 802.1X and EAP, devices take on one of three roles:– The supplicant resides on the wireless LAN client

– The authenticator resides on the access point

- An authentication server resides on a RADIUS server

EAP authenticates users.

802.11 authenticates device based (wireless LAN devices)

Page 39: ITEC 275  Computer Networks – Switching, Routing, and WANs

EAP (Continued)EAP (Continued)• An EAP supplicant on the client obtains

credentials from the user, which could be a user ID and password

• The credentials are passed by the authenticator to the server and a session key is developed

• Periodically the client must reauthenticate to maintain network connectivity

• Reauthentication generates a new, dynamic WEP key

Page 40: ITEC 275  Computer Networks – Switching, Routing, and WANs

Cisco’s Lightweight EAP (LEAP)Cisco’s Lightweight EAP (LEAP)• Standard EAP plus mutual authentication– The user and the access point must authenticate

• Used on Cisco and other vendors’ products

• Mutual authentication means the client authenticates the server and the server authenticates the client.

Page 41: ITEC 275  Computer Networks – Switching, Routing, and WANs

Other EAPsOther EAPs• EAP-Transport Layer Security (EAP-TLS) was developed by

Microsoft

– Requires certificates for clients and servers.

• Protected EAP (PEAP) is supported by Cisco, Microsoft, and RSA Security

– Uses a certificate for the client to authenticate the RADIUS server

– The server uses a username and password to authenticate the client

• EAP-MD5 has no key management features or dynamic key generation

– Uses challenge text like basic WEP authentication

– Authentication is handled by RADIUS server

Page 42: ITEC 275  Computer Networks – Switching, Routing, and WANs

VPN Software on Wireless ClientsVPN Software on Wireless Clients• Safest way to do wireless networking for

corporations• Wireless client requires VPN software• Connects to VPN concentrator at HQ• Creates a tunnel for sending all traffic• VPN security provides:– User authentication– Strong encryption of data– Data integrity

Page 43: ITEC 275  Computer Networks – Switching, Routing, and WANs

Network ManagementNetwork Management• Helps an organization achieve availability,

performance, and security goals • Helps an organization measure how well

design goals are being met and adjust network parameters if they are not being met

• Facilitates scalability– Helps an organization analyze current network

behavior, apply upgrades appropriately, and troubleshoot any problems with upgrades

Page 44: ITEC 275  Computer Networks – Switching, Routing, and WANs

Network Management DesignNetwork Management Design• Consider scalability, traffic patterns, data

formats, cost/benefit tradeoffs• Determine which resources should be

monitored• Determine metrics for measuring

performance• Determine which and how much data to

collect

Page 45: ITEC 275  Computer Networks – Switching, Routing, and WANs

Proactive Network ManagementProactive Network Management• Plan to check the health of the network

during normal operation, not just when there are problems

• Recognize potential problems as they develop

• Optimize performance• Plan upgrades appropriately

Page 46: ITEC 275  Computer Networks – Switching, Routing, and WANs

Network Management Processes Network Management Processes According to the ISOAccording to the ISO

• Fault management• Configuration management• Accounting management• Performance management• Security management

Page 47: ITEC 275  Computer Networks – Switching, Routing, and WANs

Fault ManagementFault Management• Detect, isolate, diagnose, and correct

problems• Report status to end users and managers• Track trends related to problems

Page 48: ITEC 275  Computer Networks – Switching, Routing, and WANs

Configuration ManagementConfiguration Management

• Keep track of network devices and their configurations

• Maintain an inventory of network assets• Log versions of operating systems and

applications

Page 49: ITEC 275  Computer Networks – Switching, Routing, and WANs

Accounting ManagementAccounting Management

• Keep track of network usage by departments or individuals

• Facilitate usage-based billing• Find users who use more resources than they

should

Page 50: ITEC 275  Computer Networks – Switching, Routing, and WANs

Performance ManagementPerformance Management

• Monitor end-to-end performance• Also monitor component performance

(individual links and devices)• Test reachability• Measure response times• Measure traffic flow and volume• Record route changes

Page 51: ITEC 275  Computer Networks – Switching, Routing, and WANs

Security ManagementSecurity Management• Maintain and distribute user names and

passwords• Generate, distribute, and store encryption

keys• Analyze router, switch, and server

configurations for compliance with security policies and procedures

• Collect, store, and examine security audit logs

Page 52: ITEC 275  Computer Networks – Switching, Routing, and WANs

Network Management ComponentsNetwork Management Components

• A managed device is a network node that collects and stores management information

• An agent is network-management software that resides in a managed device

• A network-management system (NMS) runs applications to display management data, monitor and control managed devices, and communicate with agents

Page 53: ITEC 275  Computer Networks – Switching, Routing, and WANs

Network Management ArchitectureNetwork Management ArchitectureNMS

Management Database

Agent

Management Database

Agent

Management Database

Agent

Managed Devices

Page 54: ITEC 275  Computer Networks – Switching, Routing, and WANs

Architecture ConcernsArchitecture Concerns

• In-band versus out-of-band monitoring– In-band is easier to develop, but results in

management data being impacted by network problems

• Centralized versus distributed monitoring– Centralized management is simpler to develop

and maintain, but may require huge amounts of information to travel back to a centralized network operations center (NOC)

Page 55: ITEC 275  Computer Networks – Switching, Routing, and WANs

Simple Network Management Protocol Simple Network Management Protocol (SNMP)(SNMP)

• Most popular network management protocol• SNMPv3 should gradually supplant versions 1

and 2 because it offers better authentication and better control of the set command.

• SNMP works with Management Information Bases (MIBs).

Page 56: ITEC 275  Computer Networks – Switching, Routing, and WANs

Simple Network Management Protocol Simple Network Management Protocol (SNMP)(SNMP)

• What is a MIB? 

A MIB (Management Information Base) is a text file which has been written using the ASN.1 (Abstract Syntax Notation) format. This text file is human readable but is special in that it can be compiled by a computer program called a MIB compiler, and then will result in creation of objects called OIDS (Object Identifiers), that can be understood by a network management station using the SNMP (Simple Network Management Protocol) method of communication.

Page 57: ITEC 275  Computer Networks – Switching, Routing, and WANs

Simple Network Management Protocol Simple Network Management Protocol (SNMP)(SNMP)

• Why is this important? 

SNMP MIBs are crucial in order to manage your network and understand the underlying objects which are being retrieved from SNMP Agents. 

Page 58: ITEC 275  Computer Networks – Switching, Routing, and WANs

Remote Monitoring (RMON)Remote Monitoring (RMON)• Developed by the IETF in the early 1990s

to address shortcomings in standard MIBs– Provides information on data link and physical

layer parameters– Nine groups of data for Ethernet– The statistics group tracks packets, octets,

packet-size distribution, broadcasts, collisions, dropped packets, fragments, CRC and alignment errors, jabbers, and undersized and oversized packets

Page 59: ITEC 275  Computer Networks – Switching, Routing, and WANs

Cisco ToolsCisco Tools• Cisco Discovery Protocol– With the show cdp neighbors detail command, you

can display detailed information about neighboring routers and switches, including which protocols are enabled, network addresses for enabled protocols, the number and types of interfaces, the type of platform and its capabilities, and the version of Cisco IOS Software running on the neighbor.

• NetFlow Accounting– An integral part of Cisco IOS Software that collects and

measures data as it enters router or switch interfaces

Page 60: ITEC 275  Computer Networks – Switching, Routing, and WANs

SummarySummary

• Use a top-down approach– Chapter 2 talks about identifying assets and risks and

developing security requirements– Chapter 5 talks about logical design for security

(secure topologies)– Chapter 8 talks about the security plan, policy, and

procedures– Chapter 8 also covers security mechanisms and

selecting the right mechanisms for the different components of a modular network design

Page 61: ITEC 275  Computer Networks – Switching, Routing, and WANs

SummarySummary

• Determine which resources to monitor, which data about these resources to collect, and how to interpret that data

• Develop processes that address performance, fault, configuration, security, and accounting management

• Develop a network management architecture• Select management protocols and tools

Page 62: ITEC 275  Computer Networks – Switching, Routing, and WANs

Review QuestionsReview Questions• How does a security plan differ from a security

policy?• Why is it important to achieve buy-in from users,

managers, and technical staff for the security policy?

• What are some methods for keeping hackers from viewing and changing router and switch configuration information?

• How can a network manager secure a wireless network?

Page 63: ITEC 275  Computer Networks – Switching, Routing, and WANs

Review QuestionsReview Questions• Why is network management design important? • Define the five types of network management

processes according to the ISO. • What are some advantages and disadvantages of

using in-band network management versus out-of-band network management?

• What are some advantages and disadvantages of using centralized network management versus distributed network management?

Page 64: ITEC 275  Computer Networks – Switching, Routing, and WANs

This Week’s OutcomesThis Week’s Outcomes

• Security• Threats and Risks• Security Policy• Security Mechanisms• Wireless Security• SNMP

Page 65: ITEC 275  Computer Networks – Switching, Routing, and WANs

Due this weekDue this week

• 4-2-2 – Cisco Networking Practical Experience– Basic Routing and LAN Switching Configuration

Page 66: ITEC 275  Computer Networks – Switching, Routing, and WANs

Next weekNext week

• Read Chapter 10 in Top-Down Network Design• 10-1 – Concept questions 7

Page 67: ITEC 275  Computer Networks – Switching, Routing, and WANs

Q & AQ & A

• Questions, comments, concerns?