Designa Secure Network 10
Designa Secure Network 10
كليـــة الهندســـة
جامعـــة المنصـــورة
Supervisor
Dr. Mohammed M. Ashour
Eng. Haitham Abdelghany
Team
Ahmed Samir Mohamed Ahmed Adel Saif
Abstract
The security of computer networks plays a strategic role in modern
computer systems. In order to enforce high protection levels against
malicious attack a number of software tools have been currently
developed.so in our project we started with the basic concepts of network
security like implementing secure device access so when anyone want to
access a network device on the network should have username and
password that has been Encrypted by Algorithm-Type and also for remote
access and SSH and we have configured different Privilege levels for
different users and some sort of views and super views using Role-Based
CLI , Next we started to create usernames and password for users but now
on a AAA-Server to authenticate and authorize and account all access to
our network devices. Next, we start to secure layer 2 infrastructure like
configure port security, mitigate VLAN attacks, mitigate DHCP attacks,
mitigate ARP spoofing. Next, we start to implement Intrusion Detection
System that has recently become a heated research topic due to its
capability of detecting and preventing the attacks from malicious network
users. Next, we start to implement Firewall that is a hardware solution
implemented within the network infrastructure to enforce an
organization’s security policies by restricting access to specific network
resources. Next, we start to implement VPN Site-To-Site to allow the
connection between Headquarter and branches with encrypted data that no
one on the internet network can capture this data and make use of it to
force attack on our private network. Next and last, we used some sort of
help desk servers to allow our users to inform the administrators of the
network with any bugs or vulnerabilities they may meet.
Table of Contents
Abstract
Table of Contents
CHAPTER 1: Introduction
CHAPTER 2: Installations, preparing environment
- Install Gns3
Import CISCO Router 7200 & 3725
Import CISCO Switch L2 & L3
Import CISCO Firewall ASAs
- Install VMware Workstation & Configure Network Adapters
- Importing Gns3-VM & check connectivity
- Install Microsoft Windows 7 on VMware
Import Win7-VM1 in Gns3
Check Connectivity
- Install SecureCRT
CHAPTER 3: Securing Device Access
- Configure Enable Mode Password & Algorithm-Type & Min-Length
- Configure Remote Access using ( Line VTY )
- Permit Specific Network Through Quiet-Mode
- Enhancing the login process
- Steps For Configuring SSH
- Configuring Privilege Levels
- Configuring Role-Based CLI
CHAPTER 4: AAA
- Types of Authentication modes
Local AAA Authentication
Server-Based AAA Authentication
- Installing ACS on VMware Workstation
- Configure users on ACS Server
- Configure Cisco Router to use AAA Authentication (ACS)
CHAPTER 5: Securing Layer 2 Infrastructure
- Configure Port Security
- Mitigate VLan Attacks
- Mitigate DHCP Attacks
- Mitigate ARP Spoofing
- ASDM Configuration
Install ASDM on ASAv Firewall
Configure Basic Configuration using Startup Wizard
Create Access-list for Outside
Create PAT for inside Zone
Show all inspected Services and Protocols
CHAPTER 8: VPN Site-To-Site
- Setup the ISAKMP Policy ( IKE Phase 1 )
- Setup the IPSec Transform-set ( IKE Phase 2 )
- Define Interesting Traffic
- Setup Crypto-Map
- Assign Crypto-Map under Interface
- Verify
- Test Connectivity
- Apply Nat and Allow the VPN Connection Through it
- Configure VPN Site-To-Site on ASAv-Firewall using ASDM
Chapter 1: Introduction
What Is Network Security?
Network security is any activity designed to protect
the usability and integrity of your network and
data.
It includes both hardware and software
technologies
It targets a variety of threats
It stops them from entering or spreading
on your network
Effective network security manages access
to the network
Network security combines multiple layers of defenses at the edge and in the network. Each
network security layer implements policies and controls. Authorized users gain access to
network resources, but malicious actors are blocked from carrying out exploits and threats.
Digitization has transformed our world. How we live, work, play, and learn have all changed.
Every organization that wants to deliver the services that customers and employees demand
must protect its network. Network security also helps you protect proprietary information
from attack. Ultimately it protects your reputation
Access control
Not every user should have access to your network. To keep out potential attackers,
you need to recognize each user and each device. Then you can enforce your security
policies. You can block noncompliant endpoint devices or give them only limited
access. This process is network access control (NAC).
Behavioral analytics
To detect abnormal network behavior, you must know what normal behavior looks
like. Behavioral analytics tools automatically discern activities that deviate from the
norm. Your security team can then better identify indicators of compromise that pose
a potential problem and quickly remediate threats.
VPN
A virtual private network encrypts the connection from an endpoint to a network,
often over the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets
Layer to authenticate the communication between device and network.
Chapter 2: Installations
Installing Gns3
The first screen of the wizard shows a welcome message and a suggestion to
close other applications before starting the installation of GNS3. It’s only a
suggestion, not a requirement. You can install GNS3 while other applications
are running, but in this case, you must have to restart the system before you
can use it.
Depending on how you want to use GNS3, select the components that you
need.
When GNS3 starts the first time, it presents the Setup wizard. This wizard allows us to
run GNS3 in different modes. We choose the first choice.
Importing Gns3-VM
Check Connectivity
Install SecureCRT
Test Login
Chapter 4: AAA
(Authentication,Authorization,Accounting)
Local AAA Authentication
Configure Max-Fail
Check pubkey-chain
Connect to ips
Event Action
Signatures
Allow ICMP Signature on IPS
Chapter 7 : ASAv-Firewall
Basic Configuration
Configure ASA to work using Telnet ( SecureCRT )
ASDM Configuration
Install ASDM on ASAv-Firewall
Verify
Test Connectivity
https://127.0.0.1:8443/helpdesk/WebObjects/Helpdesk.woa/wo/9.0