Introduction To Network Security.: A. Vimal Babu
Introduction To Network Security.: A. Vimal Babu
Network Security.
A. Vimal Babu
• Introduction
• Threats & Attacks
• Security Policy – Introduction
• AAA
• VPN
• IPSEC
• Firewalls
HP 2
Network Security
Introduction
• Why security?
To prevent
HP 5
Network Security
• What is Vulnerability?
HP 6
Network Security
Sample Network
HP 7
Network Security
Threats and Attacks
Vulnerable points.
HP 9
Network Security – Threats & Attacks
Information Security Threats experienced
HP 10
Network Security – Threats & Attacks
Types of threats
•Structured Threats
Preplanned threats and focusing specific target.
•Unstructured threats
Random Threats looking for vulnerable targets.
These are most common threats
HP 11
Network Security – Threats & Attacks
Types of Attacks
•Reconnaissance attack
Not to gain immediate access. Search for vulnerabilities to exploit later.
Eg., DNS query, Ping sweep, Port scanning
•Access attacks
To gain access to a network or computer. Having gained unauthorized
access the data may be tampered using any of the following methods.
Interception -May able to read, write copy or move the confidential data.
Modification-Modify confidential data. Change file contents and the
authorization level
Fabrication-
Create false objects to mislead, inserting virus, worm or Trojan Horse which may
affect the network or the computer.
HP 12
Network Security – Threats & Attacks
HP 13
Network Security – Threats & Attacks
HP 14
Network Security – Threats & Attacks
Security Attack Description
Masquerade An unauthorized user pretends to be a valid user. For example,
a user assumes the IP address of a trusted system and uses it to
gain the access rights that are granted to the impersonated
device or system.
Replay attack The intruder records a network exchange between a user and a
server and plays it back at a later time to impersonate the user.
HP 16
Network Security
•Questions?
HP 17
Network Security
Security Policy
HP 19
Network Security
Security Policy
What is a security policy?
HP 20
Network Security – Security Policy
Analyze the threats based on the type of business and network access
needed.
Determine the organization's security requirements
Document the network infrastructure and identify potential security
breach points.
Identify
the devices that require protection and develop a security
implementation plan.
It must also include physical security policy.
HP 21
Network Security – Security Policy
Security Policy – Contd
Building a security policy is continuous process
HP 22
Network Security – Security Policy
Security Policy – Contd
Secure
The purpose here is to prevent the unauthorized access.
Implement the Network security design. This should
include securing the network systems by installing
firewalls, Intrusion Detection Devices and AAA servers.
Firewalls on the perimeter prevent unwanted traffic from
entering the network and allows only authorized traffic for
intranet users.
IDS/IPS devices identifies any attempt to breach the
network.
AAA - restricts the access to authorized users
HP 23
Network Security – Security Policy
• Secure – Contd
Security policy must contains
a) Minimum Password Length
b)Frequency of Password Change
c) Access of Devices
d)User Creation / Deletion Process
e) Standard Guidelines for devices protection (Ex: Telnet
prohibited, SSH mandatory)
HP 24
Network Security – Security Policy
Security Policy – Contd
Monitor
After securing the network, it should be monitored to detect
security incidents. Both internal and external traffic should
be monitored. Logs should be checked on firewalls,
authentication servers for any attacks.
Test
Test the effectiveness of the security design. Verify for
proper configuration of devices, use suitable tools to
identify the vulnerabilities and document the test results.
Improve
Use the data obtained from monitoring and testing the
network to improve the security. suitably modify the
procedures and policies and document the potential threats
and vulnerabilities.
HP 25
Network Security – Security Policy
•Questions?
HP 26
Network Security
AAA – Authentication
Authorization
Accounting
HP 28
Network Security - AAA
Authentication:
• Refers to confirmation that a user who is requesting a service is a
valid user.
• Accomplished via the presentation of an identity and credentials.
• Examples of credentials are passwords, one-time tokens, digital
certificates, and phone numbers (calling/called).
HP 29
Network Security - AAA
Authorization:
• Refers to the granting of specific types of service (including "no
service") to a user, based on their authentication.
• May be based on restrictions, for example time-of-day restrictions,
or physical location restrictions, or restrictions against multiple
logins by the same user.
• Examples of services - IP address filtering, address assignment,
route assignment, encryption, QoS/differential services,
bandwidth control/traffic management.
HP 30
Network Security - AAA
• Accounting:
• Refers to the tracking of the consumption of network resources by
users.
• Typical information that is gathered in accounting is the identity
of the user, the nature of the service delivered, when the service
began, and when it ended.
• May be used for management, planning, billing etc.
• AAA server provides all the above services to its clients.
HP 31
Network Security
AAA Protocols
HP 32
Network Security
TACACS+ :
HP 33
Network Security - AAA
RADIUS
Radius uses,
UDP – 1812 or 1645 for Authentication
UDP – 1813 or 1646 for Accounting
HP 34
Network Security
HP 35
Network Security
oTransactions between client and server are
authenticated through the use of a shared key
and this key is never sent over the network.
oPassword is encrypted before sending it over
network.
HP 36
Network Security - AAA
Flexible Authentication Mechanisms:
HP 37
Network Security
Radius Operations
HP 38
Network Security
•Questions?
HP 39
Network Security
VPN – Virtual Private Networks
HP 41
Network Security - VPN
• Types of VPN
• Overlay VPN
Layer 1 VPN
•Layer 2 VPN Peer to Peer VPN
•Layer 3 VPN
Dedicated Circuits
X.25
T1/n x DS 0 ACL’s
GRE
Frame Relay
E1/n x DS 0 Split Routing
ATM IPSEC
• MPLS VPN
Virtual Dial up
• VLANs
Virtual Networks
Network
HP 42
Network Security - VPN
Modes of Use
HP 43
Network Security - VPN
IntranetVPN
Intranet VPN
Lowcost,
cost,tunneled
tunneled •Home
Low
connectionswith
connections withrich
rich
VPNservices,
services,like
like Office
VPN
IPSecencryption
IPSec encryptionandand
QoStotoensure
QoS ensurereliable
reliable
throughput
throughput •Main
•POP Office
•Remote
•Office
•POP Remote
RemoteAccess
AccessVPN
VPN
Secure,
Secure,scalable,
scalable,
encrypted
encryptedtunnels
tunnelsacross
acrossaa
ExtranetVPN
VPN public
publicnetwork,
network,client
client
Extranet software
software
ExtendsWANs
Extends WANstoto •Business
businesspartners
business partners
•Partner •Mobile
•Worker
Network Security
• Advantages
A VPN can save an organization money in several situations:
HP 45
Network Security
Disadvantages
Itrequires detailed understanding of network security issues
and careful installation / configuration.
HP 46
Network Security - VPN
VPN Protocols
PPTP
L2TP
IPsec
HP 47
Network Security - VPN
PPTP
L2TP
Layer Two Tunneling Protocol (L2TP)
It is a tunneling protocol used to support virtual private networks
(VPNs). It does not provide any encryption or confidentiality by
itself; It relies on the encryption protocol. It was developed by
Cisco
HP 48
Network Security - VPN
IPSEC
Internet Protocol Security (IPsec)
It is a suite of protocols for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP
packet of a data stream.
HP 49
Network Security
IPSEC
HP 51
Network Security - IPSEC
Data Confidentiality (Optional)
Protect an identity or data from being read
Data Integrity
Protect data from being modified
Anti-Replay (Optional)
Ensures no packets are duplicated
HP 52
Network Security - IPSEC
IPSEC Protocols
Internet Key Exchange (IKE)
• Internet Key Exchange (IKE) is a framework for the negotiation and
exchange of security parameters and authentication keys.
HP 54
Network Security - IPSEC
IPSEC Modes
Tunnel Mode
• the entire original IP packet is protected including the IP header is protected.
Transport Mode
• packet contents are protected between the VPN endpoints
• Original IP packet is exposed and unprotected
• Data at transport and higher layer is protected
de L2 Header IP Header ESP or AH TCP/UDP Header Data
L2 ESP or TCP/UDP
Header IP Header AH Header Data
HP 55
Network Security - IPSEC
• IKE – Internet Key Exchange
Protocols
ISAKMP - Internet Security Association and Key Management Protocol
defines procedures on how to establish, negotiate, modify, and delete Sas
Does not involve in Key Exchanges, but performs peer authentication.
Oakley - Oakley protocol uses the Diffie-Hellman algorithm to manage key
exchanges across IPsec SAs. Diffie-Hellman is a cryptographic protocol that permits
two end points to exchange a shared secret over an insecure channel
HP 56
Network Security - IPSEC
• IKE Phases
• IKE Phase 1 –
A bidirectional SA is established between IPsec peers in phase 1.
Phase 1 may also perform peer authentication to validate the identity of the IPsec
endpoints
Two Modes to establish bidirectional SA's main mode and aggressive mode
IKE Phase 2
Implements unidirectional SAs between the IPsec endpoints using the parameters
agreed upon in Phase 1.
Phase 2 uses IKE quick mode to establish each of the unidirectional SAs.
Aggressive Mode
More condensed than Main mode
HP 58
Network Security - IPSEC
The initiator sends all data, including IPsec parameters, security policies, and Diffie-
Hellman public keys.
The responder authenticates the packet and sends the parameter proposal, key
material, and identification back.
The initiator authenticates the packet.
Quick Mode
Follows Main or Aggressive Mode
Used for IKE Phase 2
Quick mode negotiates the SAs used for data encryption across the IPsec connection.
It also manages the key exchange for those SAs
HP 59
Network Security - IPSEC
IKE Phase 1 Parameters
IKE encryption algorithm (DES, 3DES, or AES)
IKE authentication algorithm (MD5 or SHA-1)
IKE key (preshare, RSA signatures)
Diffie-Hellman version (1, 2, or 5)
IKE tunnel lifetime (time and/or byte count)
HP 60
Network Security
Firewalls
Provides ability to expose internet services in a limited ability to the outside world
via a DMZ.
Network Security - Firewalls
Firewall – Cotd
Firewall can have multiple interfaces and each interface can be used as an
independent network.
As a rule traffic will not traverse between these zones. Access lists should be
defined for allowing the specific traffic.
• Packet Filtering
• Stateful Inspection
Network Security - Firewalls
Packet Filtering
The Packet Filtering Firewall looks at each packet and determines what to do with It
based on a rule based defined.
They work by terminating the external connection at a special service within the
firewall.
The service acts as a proxy for the real server. It forms a connection to the internal
server, only passing on application protocol elements that pass it's rulebase.
In other words, imagine a giant spreadsheet. Every packet that is allowed through
the firewall is entered into that spreadsheet and kept there for a pre-determined
amount of time, creating a ‘Stateful Inspection Table.’
The benefits of this are excellent security, full application-layer awareness, high
performance and scalability.
Network Security
NAT – Network Address Translation.
• NAT works similar to stateful inspection technique, but with a twist that the Firewall
modifies the address part of all packets on the way through.
• NAT is a technique that hides an entire address space, usually consisting of private
network addresses, behind a single IP address in another, often public address space.
Network Security - Firewalls
Benefits of NAT
• It is a practical solution to the impending exhaustion of IPv4 address space.
• Networks that previously required a block of addresses can be connected to
the Internet with a single IP address.
• Internal networks can have private IP class ranges (Non routable) and these
can be mapped to a single public address (routable).
Drawbacks of NAT
• Hosts behind NAT-enabled devices cannot have end-to-end connectivity
Unless the the device makes a specific effort to support such protocols.
• Static NAT
One2one translation based on a STATIC table - (explained later)
• Dynamic NAT
Dynamically translate a source address to an address selected from a GLOBAL address
pool
Network Security
Types of NAT –Contd
• Source Static
• Source Hide
• Destination Static
• Destination Port Static.
Source Static:
• Well suited for hosts that require access to the Internet but should not be acc
essed from the Internet.
• Firewall changes the source TCP or UDP port of the packet so that it can keep
track of which host the connection belongs to (and, consequently, know wher
e to send reply packets).
• Most standard applications (e.g., Telnet, HTTP, FTP, HTTPS) work fine, but a
ny application that requires a connection initiated from the outside or require
s that a connection happen on a specific source port will not work in hide mo
de. An example of such is how Internet Key Exchange (IKE) is implemented i
n some VPN products.
Network Security
Destination Static:
• Return traffic, as necessary, is allowed back through without additional NAT rules.
However, if you need to initiate connectivity from either side of the firewall, a
corresponding Source Static NAT rule is needed.
Network Security - Firewalls
Destination Port Static
• Translates only the destination (or service) port number to a different port.
• Example; It allows you to transparently request going from port 8080 to port
80.
• It also allows you to make services on other machines accessible from the fir
ewall's IP address.
Network Security - Firewalls
Firewall – Types
Firewalls can be Hardware or Software based.
Hardware Firewall
•Comparatively faster as it has it’s own processor.
•Costly
Software Firewall
•Can be installed on any existing server or OS
•Less cost compared to hardware firewalls
•OS vulnerabilities also need to be taken care
Eg; Checkpoint, Linux based firewalls.
HP 77
Network Security - Firewalls
Questions?
HP 78
Security Starts with Every one.
HP 79