net work management tasks
play

Net work Management Tasks Prot ect ing t he net work (e.g. int - PDF document

Net work Management Tasks Prot ect ing t he net work (e.g. int rusion 17: det ect ion) Net work Management and Det ect ing f ailed component s (int erf aces, links, host s, rout ers) Monit oring Monit oring t raf f ic pat t erns


  1. Net work Management Tasks � Prot ect ing t he net work (e.g. int rusion 17: det ect ion) Net work Management and � Det ect ing f ailed component s (int erf aces, links, host s, rout ers) Monit oring � Monit oring t raf f ic pat t erns (recommend needed upgrades, cap cert ain t ypes of t r af f ic) Last Modif ied: � Det ect abnormal t raf f ic (rapid changes in 4/ 21/ 2003 2:46:25 PM rout ing t ables, huge spikes in BW usage) 8: Net wor k Management 1 8: Net wor k Management 2 Snort Snort I DS � Snort consist s of t hree subsyst ems: packet decoder ( libpcap-based) � � Det ect ion/ logging of packet s mat ching f ilt er s/ r ule det ect ion engine � set s similar t o Et her eal capt ur e/ display f ilt er s � logging and aler t ing subsyst em � Det ect ion engine: � Thr ee pr imar y uses Rules f or m signat ur es � Modular det ect ion element s are combined t o f orm t hese � Packet snif f er � signat ur es � Packet logger � Anomalous act ivit y det ect ion is possible: st ealt h scans, OS f inger pr int ing, invalid I CMP codes, et c. � I nt r usion Det ect ion Syst em Rules syst em is very f lexible, and creat ion of new rules is � relat ively simple 8: Net wor k Management 3 8: Net wor k Management 4 Snort Rules Writ ing Snort Rules � Snort uses a simple rules language � Snor t r ules consist of t wo par t s � ht t p:/ / www.snort .org/ writ ing_snort _rules.ht m � Rule header � Specif ies src/ dst host and por t � Rule header consist s of � Alert t cp !128.119.0.0/ 16 any -> 128.119.166.5 � Rule Act ions � Alert , Log, Pass Dynamic, act ivat e, et c… any � Pr ot ocol � Not ice: negat ion, any in net wor k 128.119.0.0 � Tcp, udp, icmp, et c… � I P Addresses � Source, dest , CI DR mask � Rule opt ions � P ort numbers � Source, dest , r ange � Specif ies f lags, cont ent , out put message � Dir ect ion � (f lags: SFAPR; msg: “Xmas t r ee scan”) � Negat ion 8: Net wor k Management 8: Net wor k Management 5 6 1

  2. Simple examples P rewrit t en Ruleset s � Snor t comes packaged wit h a number of � log t cp any any -> $SMTP 23 (msg: “t elnet pr ewr it t en r uleset s t o t he mail server!”;) include bad-t r af f ic.r ules � � include exploit .r ules � alert t cp $HOME_NET 23 -> � include scan.r ules $EXTERNAL_NET any (msg: “TELNET � include f inger .r ules � include f t p.r ules login incorrect ”; cont ent : “Login incorrect ”; include t elnet .r ules � include smt p .r ul es � f lags: A+;) � include r pc.r ul es � include r ser vices .r ul es � alert icmp any any -> any any (msg:”I CMP � include dos.r ules � include ddos.r ules Source Quench”; it ype: 4; icode: 0;) include dns.r ul es � � include tf tp .r ules � include web -cgi.r ul es � include web -coldf usion.r ules � include web -f r ont page.r ul es … … … . � 8: Net wor k Management 7 8: Net wor k Management 8 Vulnerabilit y dat abases Firewalls � Rules correlat ed t o common dat abases � Gat eway machines t hrough which all t raf f ic passes � Bugt raq � Can *st op* rat her t han simply log t raf f ic � ht t p:/ / www.secur it yf ocus.com/ cgi-bin/ vulns.pl t hat mat ches rules/ f ilt ers � Ex. Bugt r aq id 2283: 23-01-2001: Lot us Domino Mail Ser ver ' Policy' Buf f er Over f low Vulner abilit y � Ar achNI DS � ht t p:/ / www.whit ehat s.com/ ids/ index.ht ml � Common Vulnerabilit ies and Exposures � ht t p:/ / cve.mit r e.or g 8: Net wor k Management 9 8: Net wor k Management 10 Types of f ir ewalls Packet Filt ering Firewall � P acket Filt ering f irewall � Operat e on t ransport and net work layers of t he TCP / I P � Operat e on t ransport and net work layers st ack of t he TCP / I P st ack External Internal Network Network � Decides what t o do wit h a packet Packet Filtering Firewall Proxy Client depending upon t he f ollowing crit eria: Proxy Firewall Actual Server � Tr anspor t pr ot ocol (TCP,UDP,I CMP), � Applicat ion Gat eways/ P roxies � Sour ce and dest inat ion I P addr ess � Operat e on t he applicat ion prot ocol level � The sour ce and dest inat ion por t s � I CMP message t ype/ code � Var ious TCP opt ions such as packet size, f r agment at ion et c � A lot like Et hereal capt ure/ display f ilt ers 8: Net wor k Management 8: Net wor k Management 11 12 2

  3. Packet Filt ering Packet Filt ering Firewall: Terminology � Example 1: block incoming and out going dat agrams wit h I P pr ot ocol f ield = 17 and wit h eit her sour ce � St at eless Fir ewall: The f ir ewall makes a decision or dest por t = 23. on a packet by packet basis. � All incoming and out going UDP f lows and t elnet connect ions are blocked. � St at ef ul Fir ewall : The f ir ewall keeps st at e � Example 2: Block inbound TCP segment s wit h inf or mat ion about t r ansact ions (connect ions). ACK=0 or wit h SYN bit set and ACK bit unset . � P revent s ext ernal client s f rom making TCP connect ions � NAT - Net wor k Addr ess t r anslat ion wit h int ernal client s, but allows int ernal client s t o connect t o out side. � Tr anslat es public I P addr ess(es) t o pr ivat e I P addr ess(es) on a pr ivat e LAN. � We looked at t his alr eady (must be st at ef ul) 8: Net wor k Management 13 8: Net wor k Management 14 Packet Filt ering Firewall: Funct ions Applicat ion Gat eway (Pr oxy Ser ver ) � Forward t he packet (s) on t o t he int ended dest inat ion � Operat e at t he applicat ion prot ocol level. (Telnet , FTP , HTTP ) � Rej ect t he packet (s) and not if y t he sender (I CMP dest unreach/ admin prohibit ed) � Drop t he packet (s) wit hout not if ying t he sender. � Filt ers packet s on applicat ion dat a as well as on I P / TCP / UDP f ields � Log accept ed and/ or denied packet inf ormat ion � NAT - Net work Address Translat ion � Applicat ion Gat eways “Underst and” t he prot ocol and can be conf igured t o allow or deny specif ic prot ocol operat ions. � Typically, proxy servers sit bet ween t he client and act ual service. Bot h t he client and server t alk t o t he proxy rat her t han direct ly wit h each ot her. 8: Net wor k Management 15 8: Net wor k Management 16 Applicat ion gat eways Firewall Hardware/ Sof t ware gat eway-to -r emot e host t elnet session host -to-gat eway t elnet session � Example: allow select � Dedicat ed har dwar e/ sof t war e applicat ion such as int er nal user s t o t elnet applicat ion rout er and f ilt er Cisco PI X Fir ewall which f ilt er s t r af f ic passing gat eway out side. t hr ough t he mult iple net wor k int er f aces. � A Unix or Windows based host wit h mult iple net wor k int er f aces, r unning a f ir ewall sof t war e package which f ilt er s incoming and out going t r af f ic acr oss t he int er f aces. 1. Require all t elnet users t o t elnet t hrough gat eway. � A Unix or Windows based host wit h a single 2. For aut horized users, gat eway set s up t elnet connect ion t o net wor k int er f ace, r unning a f ir ewall sof t war e dest host . Gat eway relays dat a bet ween 2 connect ions 3. Firewall f ilt er blocks all t elnet connect ions not originat ing package which f ilt er s t he incoming and out going f rom gat eway. t r af f ic t o t he individual int er f ace. 8: Net wor k Management 8: Net wor k Management 17 18 3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend