Network Audit For Wi-Fi and LAN Setup With Security Provisions For CC2 Building
Network Audit For Wi-Fi and LAN Setup With Security Provisions For CC2 Building
ICL2017001
ICL2017005
ICL2017012
Conducting Network Security Audit
in CC2 building
GW GW
CC1
LT
MS Lab MBA Lab
Internet Termination
• Leased Line (circuit termination)
– 50 Mbps from BSNL (over fiber)
– 1 MBPS from ERNET (over copper)
• MODEM & Media Converter (terminator)
• Router (CISCO 3600/1700 & DLink DI-2630)
• IP Range (210.212.48.1-62)
• DNS IP (210.212.48.30 & 210.212.48.62)
• Subnet Mask 255.255.255.192
• Gateway 210.212.48.1
• Round the clock Internet service at Campus LAN
Network Switches
• CISCO 4000 Back Bone Switch (Layer 3)
– Manageable for packet routing and forwarding
– 12 Fiber ports (Gigabit)
– 24 Ethernet ports (Gigabit)
– Configured for 12 Virtual LANs on each Fiber ports
– Routing enabled amongst VLANs
– VLAN Traffic monitoring and controlling
• CISCO 2950 Distribution Switch (Layer 2)
– Manageable for packet forwarding
– 2 Fiber ports (Gigabit)
– 24 Ethernet ports (Gigabits)
• DLink 1024R+ (Local switch)
– Unmanageable (auto management)
– 24 Ethernet ports (10/100 Mbps)
Virtual LANs
• Logical partitioning of LAN
• 172.16-31.n.n
– E.g. 172.18.1.2., 172.31.1.22
• 172.16-31.1.1 gateway to VLANs
• 172.16-31.1.2 gateway to building LAN
• IP Range – 172.16-31.n.11-55 (may vary)
• Netmask – 255.255.255.192
• DNS – 172.31.1.30 & 172.31.1.62
• Fly-over for Internet at CC1 and CC2
• Central Firewall at Server Room
Server Room
• Central - in Lecture Theater
– Internet/Intranet/Intercom termination (CLAN)
– Internet/Intranet service hosting
– Central firewall, authentication & file storage
– Traffic monitoring and bandwidth management
– Proxy authenticated Internet service
– Web sites and mail service
– Software repository
• Regional - Local at each building
– Building LAN (BLAN) termination
– Internet/Intranet service hosting
– Fly-over (Firewall+Gateway+Proxy) at CC1 & CC2
• Intercom service (Telephone exchange)
• Managed by STUDENTS (INDEM)
Network Configuration
• Computer Name (e.g. cc10210)
• Domain Name (iiita.ac.in)
• IP Address (must be in valid range)
• Subnet Mask (255.255.255.192)
• Gateway (172.n.1.1) (n = 16 to 31)
• Primary DNS (172.31.1.30 or 172.31.1.62)
• Secondary DNS (202.54.15.1)
• WINS (nothing)
• Computer name must be set
Basic Network Troubleshooting
• Status of NIC and patch cord
• Proxy setting
– Auto script (http://www.iiita.ac.in/proxy.pac)
– IP address and port number (172.31.1.4:8080)
• Gateway/DNS/host checking
– PING (ping 172.25.1.1)
– TRACEROUTE (tracert www.iiita.ac.in))
– NSLOOKUP (nslookup www.google.co.in)
– NET commands (net share)
• Status of switch port (green-100,orange-10Mbps)
• Enable/disable LAN connection
• Network utilization (using task manager)
Network Classes
# Of
Netw
ork
IP Total # Of First ID Number of # Of Host
Addr Bits For Octet Bits Usable # Of Possibl IDs
ess Networ of IP Used Network ID e Per
Clas k ID / Addre To Bits Network Netwo
s Host ID ss Ident IDs rk ID
ify
Clas
s
224-2 =
Class A 8 / 24 0xxx xxxx 1 8-1 = 7 27-2 = 126 16,277,
214
216-2 =
Class B 16 / 16 10xx xxxx 2 16-2 = 14 214 = 16,384
65,534
221 =
Class C 24 / 8 110x xxxx 3 24-3 = 21 28-2 = 254
2,097,152
OFC Routes
Network Connectivity
Back
Internet Termination
Back
Defining the Threats
The next step is to list potential threats to the security perimeter.
Common threats to include in this step would be:
•Malware – worms, Trojan horses, spyware and ransomware – the
most popular form of threats to any organization in the last few
years.
•Malicious Insiders – once onboarding has taken place- students,
staff members and guests – there is the risk of theft or misuse of
sensitive information.
•DDoS Attacks – Distributed Denial of Service attacks happen when
multiple systems flood a targeted system such as a web server,
overload it and destroy its functionality.
•BYOD – these devices tend to be somewhat easier to hack and
therefore must be completely visible on the network.
•Physical breaches, natural disasters – less common but extremely
harmful when they occur.
Prioritizing and Risk Scoring
There are many factors that go into creating the priorities and
risk scoring.
• Cyber security trends – working with a network access
control system in place that factors in the most common and
current threats along with the less frequent, could save you
and your CISOs a lot of time and cut costs, while at the same
time defending the organization in an optimal framework.
• Compliance – includes the kind of data that is to be handled,
whether the Institute stores/transmits sensitive financial or
personal information, who specifically has access to which
systems.
• Organization history – If the Institute has experienced a
data breach or cyber-attack in the past.
Assessing the Current Security Posture