home *** CD-ROM | disk | FTP | other *** search
- <HTML>
- <HEAD>
- </HEAD>
- <BODY>
- <!--$v=0-->Okay, let's turn this around for a little bit.
- <!--$v=3023-->How would you go about protecting an
- <!--$v=6321-->internal resource, like the SMTP
- <!--$v=9115-->host that's out there?
- <!--$v=12000-->We've got various ways of doing it. Let's take a
- <!--$v=14703-->look at using IOS, the PIX, the IOS
- <!--$v=17314-->Firewall feature set, and the Centri
- <!--$v=19879-->to protect that SMTP host.
- <!--$v=23314-->First we'll take a look at IOS with just
- <!--$v=26200-->an access list. We'll start down at the bottom of that configuration.
- <!--$v=29223-->Access-list 111 permit tcp
- <!--$v=32567-->any to host 172.16.1.1
- <!--$v=36048-->eq smtp.
- <!--$v=38613-->So if we apply
- <!--$v=41132-->that thing to the outside interface, that Ethernet
- <!--$v=44201-->01, we will allow packets
- <!--$v=47728-->that say there's two source, or two
- <!--$v=50889-->destination port number 25 to enter that
- <!--$v=53637-->thing and go through the router. Same thing
- <!--$v=56156-->with this other one, permit tcp
- <!--$v=59225-->any host 172.16.1.1
- <!--$v=61745-->established. What that's going to
- <!--$v=64126-->do is, if the internal
- <!--$v=66921-->machine that your SMTP host out there
- <!--$v=70356-->starts up a session going to the outside, you want to
- <!--$v=73929-->allow packets back in that have the acknowledgment
- <!--$v=76860-->bit set on them - also the thin bit set on
- <!--$v=79929-->those things. So you put that
- <!--$v=82311-->established in there, so now the packets can come back
- <!--$v=85563-->in. After that, we're
- <!--$v=88220-->going to go ahead and accept ICMP packets coming
- <!--$v=91151-->from the outside, so we have that third line. So now
- <!--$v=94312-->what's going to happen is the
- <!--$v=97885-->router will accept packets that are
- <!--$v=100908-->destined to SMTP through it
- <!--$v=103473-->from the outside to the in. It will also allow
- <!--$v=106084-->that mailhost to
- <!--$v=108878-->set up sessions outbound and allow the
- <!--$v=111626-->responses to come back in. Of course,
- <!--$v=114375-->an attacker will be able to craft a packet
- <!--$v=117718-->with the acknowledgment bit set on that thing and
- <!--$v=120925-->send it in by passing the access-lists.
- <!--$v=123536-->Okay, yes that can be done.
- <!--$v=126421-->If there is something better than that, why would
- <!--$v=129719-->you apply this to protect a resource? You
- <!--$v=133155-->do that in the case that you only want that resource
- <!--$v=136224-->to be used for only SMTP.
- <!--$v=138880-->In a moderately
- <!--$v=142453-->trusted external network, let's say you've got a
- <!--$v=145201-->bunch of people out there who not only want
- <!--$v=147675-->it to be used as a mailhost, but they want to be able to Telnet to
- <!--$v=150927-->it or FTP to it and store files on it,
- <!--$v=153904-->but your policy says, "No, don't allow that." This is a real
- <!--$v=157065-->good mechanism where you trust the people on the outside
- <!--$v=159859-->to not craft the packets to come in to
- <!--$v=162974-->attack it. This is a real good way to allow
- <!--$v=165997-->that router to enforce
- <!--$v=168653-->your policy. Okay, let's take
- <!--$v=171035-->a look at the same thing, same scenario,
- <!--$v=173463-->using the PIX now. Let's take a look again
- <!--$v=176853-->at this Version 4.0.7 configuration.
- <!--$v=179647-->The outside and inside interfaces, yes -
- <!--$v=182899-->the IP addresses, yes - we've got those.
- <!--$v=186380-->What we're looking at here are the bottom four
- <!--$v=189678-->configuration commands. The mailhost
- <!--$v=192151-->command - normally you would use a static command
- <!--$v=195541-->here. The mailhost command puts a little bit of
- <!--$v=198656-->extra security for SMTP
- <!--$v=201038-->on the interface there. So we're
- <!--$v=204565-->defining the external
- <!--$v=206946-->presentation of the SMTP host as 172.17.1.12.
- <!--$v=210336-->The internal -
- <!--$v=213863-->the real address of this device, the address that it knows itself
- <!--$v=217390-->by, is 10.1.1.2. The
- <!--$v=220734-->PIX can act as a network address translation
- <!--$v=224169-->to take care of this. The next couple
- <!--$v=226551-->of lines - first one, the conduit -
- <!--$v=229070-->this is starting to permit the port number
- <!--$v=232185-->25, which is SMTP, to go through
- <!--$v=235208-->the PIX to that internal host.
- <!--$v=237956-->And it's saying it can come from anything on the outside.
- <!--$v=240521-->Again, conduit for
- <!--$v=243728-->TCP port 110, the
- <!--$v=246522-->POP3 protocol - if you want to use
- <!--$v=249408-->this thing as a POP server in your network. And finally, the
- <!--$v=252935-->ident protocol - remember I told you that
- <!--$v=255454-->was nasty. But if you don't have it in a lot of these
- <!--$v=258202-->applications, it will wait and wait and
- <!--$v=261638-->wait to complete the SMTP
- <!--$v=264478-->or the POP3 session until that
- <!--$v=267317-->ident D has timed out. Normally you want to
- <!--$v=270478-->allow this, normally you'll see a lot of resets of that,
- <!--$v=273593-->as the PCs don't support the ident D
- <!--$v=277165-->protocol, or the auth protocol there.
- <!--$v=279822-->So what's going to happen with this? Outside
- <!--$v=283303-->devices are going to be able to set up SMTP
- <!--$v=286693-->sessions inbound to
- <!--$v=289166-->the mailhost. The mailhost
- <!--$v=291915-->command in the PIX is going to watch these sessions
- <!--$v=295442-->specifically and only allow the seven
- <!--$v=299014-->generally acceptable commands
- <!--$v=301580-->to come from the outside. It will not allow
- <!--$v=304328-->things like Wizard or any of the other
- <!--$v=307076-->attackable commands to come through
- <!--$v=310053-->it. The IOS
- <!--$v=312893-->Firewall feature set - we've got another talk
- <!--$v=316420-->here at Networkers that goes into a lot of details about
- <!--$v=319993-->this. Let me just say that a lot of stuff starts happening
- <!--$v=323429-->when you turn a router into - or
- <!--$v=326818-->when you add the IOS Firewall feature
- <!--$v=329337-->set. First thing that happens is that the
- <!--$v=331857-->IOS becomes stateful. Normally
- <!--$v=334330-->routers just try and push packets
- <!--$v=336987-->through as best they can and they're not looking at the state of the packets,
- <!--$v=340331-->the sequence numbers, the flags, the sequence and ack
- <!--$v=343674-->numbers, the flags in the thing or anything else,
- <!--$v=346972-->they're just trying to push it through. IOS
- <!--$v=349721-->Firewall feature set changes this. It becomes
- <!--$v=352331-->very stateful. It watches all the sessions going through the thing.
- <!--$v=355767-->It also looks at
- <!--$v=358469-->some timeout periods. It also maintains
- <!--$v=360989-->a log of all the sessions, and can send
- <!--$v=364470-->these things out to an external server as well. Let's
- <!--$v=368043-->go through this thing pretty quickly. Again, this is explained a lot
- <!--$v=371432-->better and more fully in some other Networkers talks.
- <!--$v=374684-->First thing, we're going to inspect the audit trail.
- <!--$v=377158-->We're going to limit the DNS timeout to only 10
- <!--$v=380639-->seconds. Why is this important? You don't want to
- <!--$v=383525-->send out a DNS query and then
- <!--$v=386273-->15 or 30 seconds later get a response back
- <!--$v=389754-->if you know, absolutely certain, that the response
- <!--$v=392182-->should come back in from the trusted DNS
- <!--$v=395068-->server in under 10 seconds.
- <!--$v=397770-->So it's going to clip that thing off. At the end of 10
- <!--$v=400335-->seconds, it's not going to allow any additional responses back
- <!--$v=403587-->in. The TCP idle time -
- <!--$v=406427-->60 seconds. It's a watchdog
- <!--$v=408855-->timer. If someone sets up a TCP session
- <!--$v=411970-->through the IOS, if it's -
- <!--$v=414809-->remains idle for 60 seconds, IOS is
- <!--$v=417970-->going to send resets in both directions and stop
- <!--$v=420856-->that session. Those were global commands. If
- <!--$v=423879-->we go down now and apply an inspection
- <!--$v=427085-->name and put these things in a little list here
- <!--$v=430292-->called myfw we can override
- <!--$v=432765-->the global commands where we apply this thing. First one is
- <!--$v=436292-->with SMTP. We change that
- <!--$v=438674-->timeout to 3600 seconds. That's one hour.
- <!--$v=441743-->That might seem a little bit outrageous in most circumstances
- <!--$v=445316-->there. Another one - the
- <!--$v=447789-->TCP timeout is again changed, for
- <!--$v=450995-->where this thing is implemented, to one
- <!--$v=453469-->hour as well. Going down through this thing, looking
- <!--$v=456950-->at the very bottom of this configuration, we've got some
- <!--$v=460019-->very similar rules
- <!--$v=462447-->as what we applied to the PIX. That's smtp,
- <!--$v=464874-->pop3, and ident. So what
- <!--$v=467256-->we're doing is allowing those things to come in
- <!--$v=469638-->from the outside and then
- <!--$v=472020-->IOS is going to maintain the state of these sessions
- <!--$v=474814-->and apply the timers and the watches on these things
- <!--$v=478387-->as well. The
- <!--$v=480952-->Centri, again, it's stateful.
- <!--$v=484021-->It will watch all the sessions and maintain state of these things,
- <!--$v=487273-->make sure the acks and the sequence -
- <!--$v=489701-->the sequence numbers and the acks are incrementing
- <!--$v=492724-->properly. It's going to limit the SMTP
- <!--$v=496022-->commands that come through. It will
- <!--$v=499045-->also limit the characters that are inside of
- <!--$v=502434-->the Receipt To or
- <!--$v=504954-->Mail From commands, so that you can't have too many
- <!--$v=507519-->@ signs or too many exclamation marks. A few other things as
- <!--$v=510771-->well - since the Centri
- <!--$v=513199-->has a graphical user interface and it's run on top of an
- <!--$v=515809-->NT server, it was very difficult to get any
- <!--$v=519291-->meaningful configuration snips for this thing. So
- <!--$v=522818-->please accept just the drawing here.
- <!--$v=526161-->We've got some additional mechanisms. These things are like -
- <!--$v=529734-->rather than just having one rope
- <!--$v=532574-->hold something aloft, you've now got
- <!--$v=535093-->two ropes. If one of them breaks, the other one
- <!--$v=537933-->goes into effect and takes over the entire load.
- <!--$v=541002-->Let's go through these things and take
- <!--$v=543751-->a look at some other mechanisms we have to enforce
- <!--$v=547186-->your policy, if your policy says you have to have some
- <!--$v=550530-->amount of uptime. And a lot of these things
- <!--$v=553370-->have been talked about in prior Networkers, and I'm sure a lot of people will go through
- <!--$v=556942-->these. And certainly talk to any Cisco
- <!--$v=560057-->person about getting more information about
- <!--$v=562439-->these. The first one is Lock and Key. This is -
- <!--$v=565829-->can be very effective in a low-risk
- <!--$v=568714-->environment. What's going to happen
- <!--$v=571554-->here. Someone Telnets to the router,
- <!--$v=573982-->the router's going to check the authentication
- <!--$v=576822-->by sending that on, in this case a TACACS or a
- <!--$v=579845-->CiscoSecure server out there. If the authentication
- <!--$v=582593-->is accepted, then a dynamic
- <!--$v=585570-->access list will be allocated to an interface
- <!--$v=588594-->to allow that person, knowing that
- <!--$v=591525-->IP address that the Telnet started from, to be able to
- <!--$v=594823-->access an internal resource. You can apply
- <!--$v=597709-->some timeouts to this, so that it'll be
- <!--$v=600091-->closed down after some amount as well.
- <!--$v=603618-->Hot Standby Router Protocol - you've got this
- <!--$v=606137-->wonderful resource out there. You don't want to
- <!--$v=609068-->burden it with running a dynamic routing protocol
- <!--$v=612321-->or anything else. You don't want it to ever
- <!--$v=614977-->know that the network has changed. You can run HSRP
- <!--$v=618229-->between a couple of routers out there. One of them
- <!--$v=621390-->dies, the other one automatically and dynamically takes over that
- <!--$v=624596-->load. Again,
- <!--$v=627116-->Spanning Tree Bridging - as you can
- <!--$v=629543-->tell here, the graphics group -
- <!--$v=631925-->seminars group sent me a very large file of
- <!--$v=635498-->all sorts of icons and they said,
- <!--$v=637880-->"Use these in your Networkers presentation." I'm
- <!--$v=640903-->trying my best, I'm using as many as I can.
- <!--$v=644063-->In this thing what we've got is our resource
- <!--$v=646995-->out here going to a switch. One of the
- <!--$v=650064-->paths is forwarding, of course, the other one is
- <!--$v=652537-->blocking. If the forwarding one dies, the
- <!--$v=656064-->spanning tree will automatically prune it and go to a backup
- <!--$v=659546-->link and turn it into forwarding. This can be very
- <!--$v=662614-->effective also for maintaining a network
- <!--$v=666187-->resource, making sure it's part - always part of your network.
- <!--$v=669760-->Local Director - this is
- <!--$v=672188-->distributing a resource or a service across
- <!--$v=675760-->multiple servers. Local Director
- <!--$v=678142-->can maintain contact with each of these things,
- <!--$v=681578-->make sure they're up. And if one of them goes out for
- <!--$v=683960-->service or something, it'll prune that and allow the
- <!--$v=687029-->others - all new sessions to go to the other servers
- <!--$v=690372-->to maintain that resource.
- <!--$v=693075-->Distributed Director pretty much works the same way except in a
- <!--$v=696648-->wide area environment. It'll allow
- <!--$v=699029-->people who are closest to the server
- <!--$v=701869-->to establish sessions to that server rather than having
- <!--$v=705351-->to traverse half the network to get to a
- <!--$v=708099-->remote server. Let's talk
- <!--$v=710710-->a little bit about switch port
- <!--$v=713321-->security here. If you go through the switch
- <!--$v=716802-->configuration and set up the port
- <!--$v=719596-->security - again, this is one of these very control-freakish
- <!--$v=722848-->kind of things - it can be effective certain places, but
- <!--$v=726283-->normally you don't apply it across your entire
- <!--$v=729078-->network. Port security on port number 3/1,
- <!--$v=732467-->enable, and then you give it a MAC address. On port
- <!--$v=736040-->3/2 you just say, "Enable." What that
- <!--$v=739155-->does, the first line, is it explicitly
- <!--$v=742178-->states what the MAC address is that can go
- <!--$v=745201-->for that port. The second line is going to put the
- <!--$v=748270-->switch port into learning mode. The first MAC
- <!--$v=751110-->address it sees is what is - was is going
- <!--$v=753675-->to be applied there. Looking at the show
- <!--$v=756560-->port 3, later on you can see that
- <!--$v=759767-->your security is set up this way. Down at the bottom
- <!--$v=763248-->of that thing, 3/1 is enabled. The
- <!--$v=766729-->secure source address is listed there and the last
- <!--$v=770119-->address seen is also listed there. In port 3/1
- <!--$v=773279-->they're the same, so has that port been shut down?
- <!--$v=775982-->No it hasn't. Port number 3/2 -
- <!--$v=778776-->you have that secure
- <!--$v=781845-->MAC address that it first learned about,
- <!--$v=785280-->then you have the last source
- <!--$v=788487-->address seen. That's different
- <!--$v=791372-->from the learned MAC address there, so
- <!--$v=794533-->what's going to happen? The switch is going to
- <!--$v=797006-->shut down that port until the administrator can come in
- <!--$v=800396-->and turn that thing back on. Perhaps someone
- <!--$v=803236-->legitimately changed out a NIC or something like
- <!--$v=806030-->that, perhaps not. This is for you to
- <!--$v=808687-->decide how well you really want to implement this.
- <!--$v=812214-->If you have a lot of moves, adds, and changes in your network, this is not
- <!--$v=815741-->for you. It would become an administrative nightmare very quickly.
- <!--$v=819084-->Okay. Switch
- <!--$v=822153-->access security - we've talked about this going to the
- <!--$v=825085-->IOS and the PIX. Here
- <!--$v=827558-->you're going to set up a list that you can permit devices
- <!--$v=830902-->to access some
- <!--$v=833604-->process on the switch itself. First
- <!--$v=836628-->line, set up - set IP permit and
- <!--$v=839742-->address. Second line, set up a network so that anything
- <!--$v=843132-->from the network can come in. Third line, set IP
- <!--$v=846705-->permit enable. Don't use that
- <!--$v=849545-->line first, because if you do that, the list
- <!--$v=852476-->is empty and, of course, you're not on the list, so your session
- <!--$v=855224-->will be terminated. Looking at this whole
- <!--$v=857744-->thing later on - show IP permit.
- <!--$v=860584-->First, it's going to give you back what you
- <!--$v=863011-->configured into it. At the bottom of that thing it's going to give you the
- <!--$v=866538-->list of bad boys out there that have been
- <!--$v=868920-->probing your network. The first one there, someone
- <!--$v=872218-->has tried to do an SNMP query on your
- <!--$v=875699-->machine, on your switch. The second one, someone tried
- <!--$v=879180-->to Telnet into it. Neither of these devices were in the
- <!--$v=882341-->acceptable permitted list, so it logged it
- <!--$v=885227-->and it killed those sessions. You might want to go back
- <!--$v=887654-->and look around, see who's been trying to probe your switch here.
- <!--$v=890815-->Changing for just a
- <!--$v=894159-->second here, let's think about what we've learned.
- <!--$v=897319-->The protection costs -
- <!--$v=900846-->what is it going to be to you if you lose
- <!--$v=903320-->a resource or if that resource becomes
- <!--$v=906526-->either accidentally or maliciously corrupted? How
- <!--$v=910053-->much effort do you need to put into this?
- <!--$v=913076-->Of course, these things are going to be defined
- <!--$v=916237-->by your business needs and by your
- <!--$v=918664-->policy that you establish. All of
- <!--$v=921092-->these have got to merge very well together. The final
- <!--$v=924482-->thought here is the ease of use. If
- <!--$v=927963-->you make your users jump through hoops before they can
- <!--$v=931444-->actually get to the network, they're going to
- <!--$v=934788-->rebel. They're going to find ways around your security mechanisms,
- <!--$v=938040-->conscientiously thinking that,
- <!--$v=940971-->hey, all they want to do is to do their job. Again,
- <!--$v=944544-->make sure everything works back to the
- <!--$v=948071-->business requirements and it's explicitly
- <!--$v=950865-->stated in your policy.
- <!--$v=953843-->Let's expand one more time here and get to the
- <!--$v=957003-->perimeter protection. We've got a
- <!--$v=959477-->picture of the castle here. The drawbridge
- <!--$v=962087-->is up, it's late at night, but you can see a
- <!--$v=964836-->window still has a light shining in it. Perhaps
- <!--$v=968317-->this is a shop that's inside of
- <!--$v=971111-->that castle. What impact
- <!--$v=973585-->is it if no one from the outside can actually get to that shop
- <!--$v=976608-->on the inside? Perhaps none - perhaps a great
- <!--$v=979722-->deal if actually the shop is a
- <!--$v=982883-->major source of revenue for that kingdom. How would you
- <!--$v=986181-->go about addressing this? Would you keep
- <!--$v=988975-->the drawbridge down and post guards to make sure that
- <!--$v=992319-->visitors only walked along the path and only walked
- <!--$v=995479-->into the shop? It doesn't seem to make too much sense.
- <!--$v=998457-->Could you move the shop actually outside the
- <!--$v=1001251-->perimeter there, keep the drawbridge up at night, and, you know,
- <!--$v=1004411-->if you see a horde of angry bandits coming, just
- <!--$v=1007526-->lower the drawbridge, and quick, move the shop back in? That's probably
- <!--$v=1011053-->not a real good idea either. Same thing
- <!--$v=1013572-->applies to your network.
- <!--$v=1016366-->What we have in this diagram is the
- <!--$v=1018977-->traditional time-honored design
- <!--$v=1022550-->for a firewall and how to
- <!--$v=1025207-->present services to untrusted
- <!--$v=1028138-->people, let's say across the Internet.
- <!--$v=1031207-->Walking through this thing - the green box is the
- <!--$v=1034230-->demilitarized zone, this is where you want to offer services.
- <!--$v=1037437-->You want to allow people from the outside
- <!--$v=1040597-->to come in through your ISP
- <!--$v=1043575-->link, through that top screening router,
- <!--$v=1046460-->where you put in some access lists and say, "I want
- <!--$v=1049941-->inbound sessions to only go to these devices.
- <!--$v=1052965-->Specifically, I want inbound sessions on port
- <!--$v=1056492-->80, HTTP, to only go to the Web server.
- <!--$v=1059423-->Inbound sessions on port 25 explicitly
- <!--$v=1062675-->only go to the mailserver." Then you've got
- <!--$v=1065515-->your firewall. Do you want any sessions inbound
- <!--$v=1068538-->on that thing? Most likely
- <!--$v=1070920-->not. There's some situations where you will. Most likely
- <!--$v=1074035-->you want that to enforce your policy for your people
- <!--$v=1076921-->going outbound.
- <!--$v=1079531-->Use your access lists on both your firewall, your screening router,
- <!--$v=1083013-->and make sure you have a switch in there, just in case someone
- <!--$v=1085761-->does compromise one of your resources
- <!--$v=1088326-->on your - in your DMZ, they will not be able
- <!--$v=1091487-->to put up some sniffer software and watch all
- <!--$v=1094510-->the other traffic go in between all your other devices. That's been
- <!--$v=1098037-->talked about quite some time now.
- <!--$v=1100785-->Let's talk about syn attacks coming from the
- <!--$v=1103808-->outside. What happens here, this guy -
- <!--$v=1107198-->you can tell he's a bad guy, he's wearing a black hat. He is
- <!--$v=1110541-->continually sending in - you know, the
- <!--$v=1113290-->TCP three-way handshake - he's continually
- <!--$v=1116175-->sending in syn packets that he's crafted
- <!--$v=1119565-->to this one target. The first one is from
- <!--$v=1121947-->1.1.1.1, the second one, 1.1.1.2,
- <!--$v=1124512-->and he just keeps on sending these things in.
- <!--$v=1127535-->The target has got to allocate
- <!--$v=1130054-->resources every time a syn
- <!--$v=1132482-->packet is received. It will then
- <!--$v=1134864-->send out the syn/ack packet and wait.
- <!--$v=1137750-->Typically it has to wait 75 seconds
- <!--$v=1141185-->for the acknowledgment to come back in before
- <!--$v=1144437-->it can tear down the resource. A lot of
- <!--$v=1146819-->people have had this problem and they've found very good
- <!--$v=1149338-->ways to harden the hosts so that
- <!--$v=1152041-->they don't have to wait that
- <!--$v=1154560-->amount of time, or so that they don't use up as
- <!--$v=1157079-->much resources on the server. If this
- <!--$v=1160286-->thing succeeds, a lot of these syn packets can
- <!--$v=1163813-->come in, actually set up too much
- <!--$v=1166561-->processing on that server, and the server
- <!--$v=1169080-->could fall over because it just doesn't have anymore resources to allocate.
- <!--$v=1172653-->How do we combat this? First,
- <!--$v=1175859-->let's look at it - the - just the IOS,
- <!--$v=1178333-->and this would be on your screening router out there.
- <!--$v=1181768-->The intercept process
- <!--$v=1184562-->on the router will watch for
- <!--$v=1187540-->syn packets coming in. And the way it works -
- <!--$v=1190059-->a syn packet comes in from the outside, the router
- <!--$v=1193494-->accepts it and sends back the syn/ack in
- <!--$v=1197067-->proxy of the actual resource out there.
- <!--$v=1200228-->When it gets the final acknowledgment back in, it turns
- <!--$v=1203571-->around and says, "Great, I've got this half session over
- <!--$v=1206091-->here. Let me take it over to this side now." I'm going to send
- <!--$v=1209160-->a syn packet into the actual resource, I'm going to get the
- <!--$v=1212412-->syn/ack back. I'm going to ack that thing, I'm going to take the
- <!--$v=1215801-->two half sessions and marry them together, and then get
- <!--$v=1219053-->out of the way. The router - the
- <!--$v=1222031-->configuration snip is the way to just turn this thing on.
- <!--$v=1225512-->You identify your protected resources with an
- <!--$v=1228718-->access list there. You don't want
- <!--$v=1231146-->to have this access list permit
- <!--$v=1233757-->everything because, of course, you don't
- <!--$v=1236459-->expect to initiate syn attacks on the outbound side,
- <!--$v=1239941-->so you want to protect your resources.
- <!--$v=1242414-->Some other
- <!--$v=1244887-->options with this - you can get the IOS to see
- <!--$v=1248185-->how many session requests have come out
- <!--$v=1250659-->in the last one-minute time period and also
- <!--$v=1253270-->how many incomplete sessions are there. If
- <!--$v=1256430-->the IOS watches these things and there's
- <!--$v=1259179-->a default high-water mark - if
- <!--$v=1262385-->these two values get above the high water mark - IOS will go
- <!--$v=1265683-->into aggressive mode and start shooting down some of these half
- <!--$v=1268981-->open sessions until it passes
- <!--$v=1271454-->below the low-water mark.
- <!--$v=1274752-->And a difference to this,
- <!--$v=1277501-->still within IOS, is going into watch mode. This is
- <!--$v=1280936-->pretty much the sa - a little bit different here. The syns
- <!--$v=1284188-->will come through - IOS is going to allow them to go all
- <!--$v=1287715-->the way through to the resource. The resource,
- <!--$v=1290692-->by itself, comes back with the syn/ack, and then
- <!--$v=1294082-->the ack should follow. If -
- <!--$v=1296739-->again, we're doing pretty much the same thing, watching
- <!--$v=1299395-->how many session requests have come through in the last one minute,
- <!--$v=1302419-->how many incomplete sessions are there, and how
- <!--$v=1305625-->long do I wait for that final acknowledgment to come back? If -
- <!--$v=1309152-->again, if these - if the high-water
- <!--$v=1311992-->mark is exceeded by these parameters, IOS will
- <!--$v=1315473-->go into aggressive mode and start shooting down some of the
- <!--$v=1318496-->incompleted sessions until it passes
- <!--$v=1320970-->below the low-water mark. You can change
- <!--$v=1323351-->these default values, start thinking about what
- <!--$v=1326833-->your resource can actually handle.
- <!--$v=1330405-->How do we do this in the PIX?
- <!--$v=1333383-->I've got two configuration snips here. The first one
- <!--$v=1336406-->is with the mailhost. Again, that's
- <!--$v=1338925-->watching for the SMTP commands. The second one
- <!--$v=1341765-->is just done with the static command. What we
- <!--$v=1344880-->have at the end of each of these commands is the
- <!--$v=1348407-->maximum connections and the embryonic
- <!--$v=1350834-->limit. Maximum connections - just what it sounds
- <!--$v=1354178-->like, you cannot have any more
- <!--$v=1356835-->sessions to that device than are specified in the
- <!--$v=1360270-->maximum connections - key word there. Embryonic
- <!--$v=1363751-->limit - this is going to say how many half-open sessions
- <!--$v=1366637-->you have. Once that limit is reached, no more
- <!--$v=1369981-->will be received through the PIX.
- <!--$v=1373279-->The IOS Firewall feature set - again,
- <!--$v=1376577-->this changes things quite a bit, changes the basic
- <!--$v=1380058-->characteristics of IOS.
- <!--$v=1382990-->This is going to be - the way it deals with syn attacks is
- <!--$v=1386562-->very similar to the way the
- <!--$v=1389723-->IOS does in watch mode.
- <!--$v=1393021-->It will watch the TCP syns
- <!--$v=1395861-->come through, it'll allow them all the way through to the
- <!--$v=1398380-->resource. The resource will send back
- <!--$v=1400991-->the syn/ack, and it should be followed up with the final ack
- <!--$v=1404014-->there. Again, it's watching to see if
- <!--$v=1407266-->these high-water thresholds are met.
- <!--$v=1410152-->How many session requests, incompleted -
- <!--$v=1413633-->how many incompleted sessions there are, and how long does
- <!--$v=1416519-->it wait for the final acknowledgment? If these things
- <!--$v=1419084-->pass above the high-water mark, it'll go
- <!--$v=1421970-->into aggressive mode and start shooting them down again.
- <!--$v=1425542-->Okay, moving to
- <!--$v=1428062-->something else - the Virtual Private Networking out there.
- <!--$v=1431497-->A lot of people are starting to get into this, so let's
- <!--$v=1434749-->address this. This
- <!--$v=1437360-->has not, in most
- <!--$v=1439742-->cases, withstood the test of time like
- <!--$v=1443315-->the firewall design. So we're getting some new
- <!--$v=1445971-->designs out there. We're getting a lot of new things
- <!--$v=1449224-->happening. Let's go through and take a look at the history
- <!--$v=1452247-->of these things first. Very, very
- <!--$v=1454766-->early on there were the value-added networks. And
- <!--$v=1457789-->these things have been great for a lot of companies. Right now
- <!--$v=1461224-->a lot of the value-added networks are migrating themselves to using
- <!--$v=1464751-->the Internet as a transport. It's still an
- <!--$v=1468095-->untrusted transport, so they've got to do some things to maintain
- <!--$v=1471347-->their confidentiality, integrity, and various other
- <!--$v=1474279-->aspects of the session across it. The alternative
- <!--$v=1477210-->is to use the private links, up at the top.
- <!--$v=1480188-->
- <!--$v=1482615-->Specifically looking at electronic commerce, we've got
- <!--$v=1485639-->an example here of what may be
- <!--$v=1488158-->a good way to do this. This is, in fact,
- <!--$v=1490814-->Cisco's CCO network. What
- <!--$v=1494250-->happens is a user from the outside,
- <!--$v=1497181-->across the Internet, establishes
- <!--$v=1499655-->a Web session to the internal Web server,
- <!--$v=1503044-->or the Web server that's on the DMZ there.
- <!--$v=1506617-->That gateway router is a screening router
- <!--$v=1509274-->and it's going to only allow traffic to go
- <!--$v=1512251-->specifically where you tell it, it can go.
- <!--$v=1515503-->And this means that no sessions, all the way
- <!--$v=1518343-->from the outside, can come all the way through and
- <!--$v=1521137-->hit that firewall. The only sessions that are
- <!--$v=1523840-->going to be allowed to go to the firewall and, hence,
- <!--$v=1527138-->into the network - into the internal network - are going
- <!--$v=1530711-->to be from the Web server. So, outside
- <!--$v=1533642-->client hits the Web server, kicks up some
- <!--$v=1536711-->processes, the processes on the Web server
- <!--$v=1539826-->come in and talk to the secure commerce servers
- <!--$v=1543261-->on the inside. There again the firewall is
- <!--$v=1546193-->watching these things and will only permit
- <!--$v=1548620-->sessions from the secure commerce servers to come back
- <!--$v=1552147-->through the firewall to the internal
- <!--$v=1555079-->enterprise servers. This
- <!--$v=1557598-->way it will be allowed to update
- <!--$v=1560804-->the processes in a
- <!--$v=1563232-->known fashion to get back whatever
- <!--$v=1565614-->that client is looking for on the outside, perhaps
- <!--$v=1568866-->delivery dates, perhaps some ordering information. At least
- <!--$v=1572347-->it's checkpointed at every case and we've got
- <!--$v=1575141-->some rules to say where traffic can and cannot
- <!--$v=1578256-->go to. Very, very
- <!--$v=1580638-->high level here - the VPN security
- <!--$v=1583615-->requirements. We've got a lot of other
- <!--$v=1586318-->VPN and VPDN sessions
- <!--$v=1589158-->at Networkers here. Very, very high levels - the
- <!--$v=1592089-->security requirements for these. Either
- <!--$v=1594975-->encrypt the session to provide the authentication,
- <!--$v=1598227-->the integrity, and the confidentiality, or
- <!--$v=1601800-->move it over to a private line to accomplish
- <!--$v=1604823-->the same goals.
- <!--$v=1607388-->Looking at the Virtual Private Dial Networks,
- <!--$v=1610045-->we're seeing a lot of people starting to work their way
- <!--$v=1613526-->into the L2TP, Layer 2 Tunneling
- <!--$v=1615908-->Protocol, and some people have actually used the Layer
- <!--$v=1619160-->2 Forwarding as well.
- <!--$v=1622641-->Here, this is what
- <!--$v=1625664-->we've come up with as the - possibly the best solution
- <!--$v=1629191-->for this. You're probably going to have some network address
- <!--$v=1632489-->translation problems coming from the Internet
- <!--$v=1635512-->out there, going through that gateway router -
- <!--$v=1638169-->the screening router again. You want to explicitly
- <!--$v=1641330-->say where traffic can and cannot
- <!--$v=1643941-->go to. Coming from the outside, if it is a
- <!--$v=1646964-->L2TP session, you only
- <!--$v=1649529-->want to allow it to go to the home gateway. If it's
- <!--$v=1652827-->an outbound session, you only want it - to
- <!--$v=1655804-->permit it to come from the firewall and head
- <!--$v=1658965-->back outwards as well.
- <!--$v=1662217-->Dial Access Protection - a lot of
- <!--$v=1664644-->people have asked, "Where should I place the network
- <!--$v=1667805-->access server?" Some people have actually
- <!--$v=1670462-->said, "It's an untrusted device.
- <!--$v=1672843-->Move it all the way out to the DMZ." I don't
- <!--$v=1675821-->think this is a good plan. Really, you want the NAS
- <!--$v=1679027-->to be inside your network, but
- <!--$v=1682234-->beyond a screening router. This is
- <!--$v=1684936-->probably the most secure and safest place for it. You don't have
- <!--$v=1687959-->to go and start poking holes through your
- <!--$v=1690478-->firewall to allow all these sessions coming from your
- <!--$v=1693639-->network access server back into your
- <!--$v=1696296-->trusted network. Now it's already in there, but you can set up
- <!--$v=1699731-->your screening router to make sure traffic only
- <!--$v=1702525-->comes and goes to where you want it to come and go to.
- <!--$v=1706098-->Okay, let's move on now. Think about
- <!--$v=1709442-->some network security sustainment. You've got
- <!--$v=1712282-->to have your network running in a secure mode, 24
- <!--$v=1715671-->hours a day, 7 days a week. How can
- <!--$v=1718648-->you go about doing that? First one, pretty
- <!--$v=1721946-->simple - use dynamic routing protocols and make sure
- <!--$v=1725061-->you have enough redundant paths throughout
- <!--$v=1727580-->your network. This way it'll route around
- <!--$v=1730604-->any failed node.
- <!--$v=1733810-->Let's take a look at specifically -
- <!--$v=1736329-->well, there's a known type of attack out there
- <!--$v=1739765-->that will - someone can craft a route update
- <!--$v=1743292-->packet to go in and
- <!--$v=1745765-->disrupt the routing tables and perhaps
- <!--$v=1748147-->actually bring your whole network down. The way
- <!--$v=1751216-->around this is with keyed hashing for authentication
- <!--$v=1753964-->and integrity. What
- <!--$v=1756346-->happens with this - you start out with a shared secret
- <!--$v=1759323-->key. Everyone who's in the pool here knows what
- <!--$v=1762850-->this secret key is. If you're not in the know,
- <!--$v=1765873-->then you'll never know what the secret key is. You take a
- <!--$v=1768897-->message - you take the secret key and
- <!--$v=1771553-->the message, put them together, either on
- <!--$v=1774302-->top or at the bottom or actually in both places,
- <!--$v=1777325-->run it through a hashing function - this is
- <!--$v=1780073-->MD5 or SHA1 - come out with
- <!--$v=1782684-->a signature. You can send that
- <!--$v=1785066-->along with the message to another device out there
- <!--$v=1788593-->who's going to do the same thing. They're going to get the message - they have the
- <!--$v=1791845-->shared key, so they're going to put it either at the top, the
- <!--$v=1794502-->bottom, or the top and the bottom, munch it all
- <!--$v=1796883-->together, run it through the same hash function. If the
- <!--$v=1800090-->shared - if the signature
- <!--$v=1802517-->coming in matches the signature that they
- <!--$v=1805632-->generated, then that message is authenticated
- <!--$v=1808793-->and it must be correct. How do we
- <!--$v=1811220-->apply this to the actual routing updates?
- <!--$v=1814427-->First, a router is going to take - it's going to
- <!--$v=1817496-->build the route update packet. It'll have
- <!--$v=1820885-->the IP header on the front of it and it'll have the key in a
- <!--$v=1824458-->certain location inside the payload. It'll
- <!--$v=1827619-->take that, run it through the hash function, usually MD5,
- <!--$v=1830596-->come out with a signature. That signature
- <!--$v=1833802-->has the exact same length as that
- <!--$v=1836321-->key. So it'll take the key, throw it away,
- <!--$v=1839803-->chunk in that signature in the packet, and then
- <!--$v=1843238-->ship that across the wire. First thing
- <!--$v=1845712-->another router does when it gets this, it takes
- <!--$v=1848918-->that - the signature out, puts
- <!--$v=1852170-->it to the side, inserts the key that it also
- <!--$v=1855193-->knows, runs that whole thing through the hash function,
- <!--$v=1858308-->and comes up with another signature, then
- <!--$v=1861056-->compares the two signatures. If they're identical, then you
- <!--$v=1864583-->know that you've got authentication and
- <!--$v=1867469-->integrity of that packet.
- <!--$v=1870217-->We can use this for, let's see,
- <!--$v=1872828-->it's quite a list now. It's BGP, OSPF, ISIS,
- <!--$v=1876355-->EIGRP, and RIP Version 2.
- <!--$v=1879561-->I don't think too many people are actually using
- <!--$v=1882356-->RIP Version 2 out there right now.
- <!--$v=1884875-->Route Filtering.
- <!--$v=1887257-->This is an additional mechanism that you can use. Let's take a
- <!--$v=1890738-->look at the configuration snip of this thing. If you
- <!--$v=1893990-->have router RIP running and you've got
- <!--$v=1896647-->network 10, you can apply distribute list number 1
- <!--$v=1900174-->inbound on this - on your routing
- <!--$v=1903014-->process. What this is going to do, it's going to look down for
- <!--$v=1906449-->access list number 1, which
- <!--$v=1908877-->says deny 0.0.0.0 network,
- <!--$v=1912404-->"Deny the default RIP network." So you don't
- <!--$v=1915014-->want someone to insert a default network
- <!--$v=1917946-->into your router. It will also permit only the
- <!--$v=1920969-->10 network to come into your
- <!--$v=1923717-->RIP process. This
- <!--$v=1926145-->is going to limit people who might
- <!--$v=1928527-->set up a new router and say, "Here is - here's the path
- <!--$v=1931642-->to the Internet." Well, those route-up dates will not
- <!--$v=1934207-->be accepted by this router. Also,
- <!--$v=1937276-->if someone makes a mistake and sets up network
- <!--$v=1940390-->11, this router will never be able to learn it. Looking
- <!--$v=1943917-->down in the router, sho ip proto, you're going to see
- <!--$v=1947399-->that the incoming update filter list for all
- <!--$v=1950376-->interfaces is set to 1. There's
- <!--$v=1953078-->various other ways you can apply this thing, you can also apply it to
- <!--$v=1956239-->an outbound
- <!--$v=1959262-->access for the route updates as well.
- <!--$v=1962514-->Overall on your entire network you've got
- <!--$v=1965904-->to go back and secure each of
- <!--$v=1968469-->the vital resources there. These are three
- <!--$v=1970897-->of them that should be given some special consideration. The
- <!--$v=1974469-->time service servers that are out
- <!--$v=1977401-->there - make sure no one can come in and change the times
- <!--$v=1980561-->throughout your entire network. Worst
- <!--$v=1983264-->case in a Kerberos network, nothing's
- <!--$v=1985737-->going to work again. This could be very detrimental.
- <!--$v=1989219-->The Domain Name Servers - again,
- <!--$v=1992104-->there are known attack methods. You can see these in the
- <!--$v=1994898-->Cert. Advisories all the time. People are poisoning the
- <!--$v=1998425-->DNS caches out there.
- <!--$v=2001311-->Spend some time, first
- <!--$v=2003739-->harden the machine itself, and then set up some protection in
- <!--$v=2007037-->front of that thing. Again, the new one that's coming out here are
- <!--$v=2010609-->the Certificate Authorities. If you're running an internal
- <!--$v=2013633-->intranet based upon Web
- <!--$v=2016060-->access so your people can access HR
- <!--$v=2019129-->records and things, you want to make sure that your Certificate
- <!--$v=2022152-->Authority is pretty rock hard, solid,
- <!--$v=2025221-->and no one can get into it and break in.
- <!--$v=2028015-->Periodically we get a lot of questions
- <!--$v=2031359-->about multilevel security, and this comes
- <!--$v=2033924-->from RFC-1108. It
- <!--$v=2037131-->goes through and defines things for
- <!--$v=2040612-->IPSO, the Internet Protocol Security Options, SIPSO,
- <!--$v=2044047-->AESO, DN6, Audit Trail, things
- <!--$v=2047528-->like that. In the military, in the
- <!--$v=2051009-->DOD networks -
- <!--$v=2053804-->vastly used. These things are set up to do
- <!--$v=2056506-->that all the time. They've got
- <!--$v=2059529-->the support people to make sure this is happening. What
- <!--$v=2063010-->happens here is that the - each
- <!--$v=2065804-->individual resource, be it a computer, a printer,
- <!--$v=2069286-->a file, and everything, is given a label. It's
- <!--$v=2072858-->given a security level and some additional
- <!--$v=2075240-->key words behind it. This
- <!--$v=2077897-->is so that anyone else, any
- <!--$v=2081103-->subject coming into this network - they're also
- <!--$v=2083531-->given a label and they can only access other
- <!--$v=2086783-->resources out there if the labels meet or
- <!--$v=2090081-->the subject is higher than the object
- <!--$v=2092646-->out there. It's really,
- <!--$v=2095028-->really difficult to implement inside
- <!--$v=2097731-->of an enterprise network,
- <!--$v=2100387-->you know, unless - like I said, unless you're the military or the
- <!--$v=2103685-->Department of Defense. I've
- <!--$v=2106113-->said a bunch of negative things about multilevel
- <!--$v=2108907-->security and the trusted computer security evaluation
- <!--$v=2111701-->criteria. That's the Redbook, Orangebook stuff.
- <!--$v=2114907-->What positive thing can I say
- <!--$v=2117793-->about this? Now let's talk
- <!--$v=2120267-->about session protection through encryption now. There's
- <!--$v=2123656-->three generally accepted ways of doing
- <!--$v=2126496-->this. Starting at the bottom of this diagram,
- <!--$v=2129061-->there's the link layer encryption. There are a
- <!--$v=2132451-->lot of link layer encryptors out there. They are
- <!--$v=2135382-->actually very good. They can take a stream coming in, usually
- <!--$v=2138955-->going across a serial link, but I've seen this also across
- <!--$v=2141749-->frame relays or Ethernet links, and
- <!--$v=2145185-->send it over to another link layer encryptor, which will decrypt it
- <!--$v=2148712-->and send it back up to the next higher, the network layer
- <!--$v=2151964-->device there. Also, looking at the top of this thing -
- <!--$v=2155353-->application layer encryption.
- <!--$v=2158880-->I guess the best example of this
- <!--$v=2161583-->would be Lotus Notes. When they
- <!--$v=2164972-->first came up with Lotus Notes, they
- <!--$v=2167583-->identified the security requirements for it and they put in
- <!--$v=2171156-->application layer encryption in this for both
- <!--$v=2174683-->client/server sessions and for
- <!--$v=2177660-->server-to-server database replications. It is -
- <!--$v=2180317-->the domestic version of this is
- <!--$v=2183248-->56-bit DES, fairly strong encryption for this.
- <!--$v=2186501-->So, within Lotus Notes,
- <!--$v=2189203-->Lotus can, in fact, encrypt its own session.
- <!--$v=2192776-->To be more generally available and come up with a
- <!--$v=2195341-->lot more solutions, everyone is working towards the network
- <!--$v=2198914-->layer encryption and this is going to apply to
- <!--$v=2202395-->the applica - or the - each of the
- <!--$v=2204823-->end nodes out there so that they'll be
- <!--$v=2207204-->able to take whatever application, run it through
- <!--$v=2210044-->their network layer encryption, and then
- <!--$v=2212793-->send it all the way across, peer-to-peer.
- <!--$v=2215312-->Or they can send it to a
- <!--$v=2218014-->security gateway, which will then decrypt the session
- <!--$v=2221404-->and send it in clear text for that last little bit, or in
- <!--$v=2224702-->fact, they can have it set up, clear text down to the
- <!--$v=2227588-->network layer device, encrypt it across the
- <!--$v=2230886-->network, come out to the other security gateway, decrypt
- <!--$v=2234413-->it back in clear text going towards the
- <!--$v=2236932-->server out there. A lot of this is going through
- <!--$v=2240276-->the IPSEC working
- <!--$v=2242658-->group within the IETF.
- <!--$v=2245039-->Basically how it works - there's first a secure
- <!--$v=2248292-->mechanism to exchange shared
- <!--$v=2250673-->keys and then the
- <!--$v=2253101-->session, whatever will be encrypted, with
- <!--$v=2256124-->those shared keys between the two devices.
- <!--$v=2259468-->We've got another talk here at Networkers that goes
- <!--$v=2262949-->into all the details about this and
- <!--$v=2265743-->specifically how it can work for you.
- <!--$v=2269041-->NetRanger is a new product we have at Cisco.
- <!--$v=2272568-->You can set up sensors throughout
- <!--$v=2275546-->your network to watch what's
- <!--$v=2278156-->going on. These things have the attack signatures
- <!--$v=2281180-->of a lot of different attacks out there
- <!--$v=2284203-->and it can identify these or some other problems.
- <!--$v=2287546-->And it can take some proactive steps to stop
- <!--$v=2290661-->them, including accessing
- <!--$v=2293043-->the router to install some dynamic access
- <!--$v=2296616-->lists for you. What I show here is
- <!--$v=2299547-->a single directory out there, but in
- <!--$v=2302204-->fact we've got - or the whole thing is set up so that it can be tiered.
- <!--$v=2305731-->There can be a workgroup director which is
- <!--$v=2309212-->watching this workgroup. Again, another director over here
- <!--$v=2312373-->watching this workgroup. These things
- <!--$v=2314846-->at the lowest tier going up a layer, an
- <!--$v=2318007-->area director. Several areas
- <!--$v=2320618-->are covered by a director by themselves, and then working
- <!--$v=2323687-->up to the top layer a - for example, a -
- <!--$v=2326847-->your enterprise-wide director. All of
- <!--$v=2330282-->these things watching what goes on, on your network
- <!--$v=2333809-->and taking care of a lot of the problems that could
- <!--$v=2336695-->creep into it, specifically, some attacks.
- <!--$v=2340268-->NetSonar is a new product that
- <!--$v=2343658-->also is going
- <!--$v=2346406-->to help you a lot enforce your security
- <!--$v=2349566-->policy. The first thing it's going to
- <!--$v=2351948-->do is go out and start mapping
- <!--$v=2354330-->your network. It'll go through and look,
- <!--$v=2356987-->and this not just a topology map or anything, it's going to
- <!--$v=2360422-->go through and actually find
- <!--$v=2362804-->what servers are out there, what devices are on your network,
- <!--$v=2366377-->and it's going to do some probes on it to find out specifically
- <!--$v=2369171-->what services are on these servers.
- <!--$v=2371782-->And then it will match that to
- <!--$v=2374255-->a database of known
- <!--$v=2377004-->attack points and see if
- <!--$v=2379752-->that server and service are vulnerable to
- <!--$v=2383141-->those attacks. It will then come up with a report that you can
- <!--$v=2386256-->look at and see, "Hey, I really need to go over here and
- <!--$v=2389829-->take care of this machine because it's open
- <!--$v=2392257-->to a known form of attack."
- <!--$v=2395142-->Okay, how do we go through and make sure that
- <!--$v=2398303-->everything,
- <!--$v=2401326-->not only is it working properly all the time, but we want
- <!--$v=2403983-->some assurances that it's really, really working
- <!--$v=2406410-->all the time? And again, this has got to go back to your
- <!--$v=2409937-->business needs. First thing, if
- <!--$v=2412915-->you're going through and doing some moves, adds, and changes in your network,
- <!--$v=2416487-->you want to model these changes. You want to make
- <!--$v=2418869-->sure that you're getting proper access lists
- <!--$v=2421892-->in all the routers, make sure they're consistent
- <!--$v=2425053-->across the routers, make sure you don't have any empty
- <!--$v=2427985-->access lists in any of the routers. An
- <!--$v=2431237-->empty access list is, like if you set up
- <!--$v=2433756-->an access list 101 and define
- <!--$v=2436917-->a bunch of things to it, and then go to the interface, and
- <!--$v=2439848-->say, "Access group 102, something or another." There is
- <!--$v=2443375-->no access group or access list 102 and you've
- <!--$v=2446810-->defined that to the interface. What
- <!--$v=2449788-->happens in that case, there is no implicit deny at the end of it.
- <!--$v=2453040-->Since it is empty, it allows all packets to go
- <!--$v=2456200-->through. NETSYS - the NETSYS modeling tool
- <!--$v=2459453-->can look for each of these things
- <!--$v=2462201-->and it can give you - it can let you do a
- <!--$v=2464949-->bunch of "what if" scenarios so that
- <!--$v=2467331-->you can go through and say, "If I add this to
- <!--$v=2470904-->the network, will I still
- <!--$v=2473606-->never be able to get to that vital resource?" If
- <!--$v=2477179-->that's your policy, you can do some "what if" scenarios
- <!--$v=2479744-->on it and make sure that that is - that can
- <!--$v=2482355-->be accomplished. And, in fact, the NETSYS will spit out all
- <!--$v=2485470-->the correct configurations for that.
- <!--$v=2489043-->Network management - again,
- <!--$v=2492386-->it's not just that box that sits on the side and
- <!--$v=2495272-->flashes the colors at you every now and then.
- <!--$v=2497837-->You should use this to make sure that you're
- <!--$v=2500906-->meeting your policy and your
- <!--$v=2503288-->business requirements. Figure out what you need
- <!--$v=2506448-->to monitor and what
- <!--$v=2508922-->you need to report on from your network management
- <!--$v=2511395-->station and come up with those
- <!--$v=2514281-->type of reports to say, "Yes, I am meeting my
- <!--$v=2517442-->business goals and here exactly is why."
- <!--$v=2521014-->Coming down to it, I'm sure you've all seen this old
- <!--$v=2524129-->poem. All it's saying
- <!--$v=2526511-->here is that the weakest link
- <!--$v=2528985-->in your network could be your downfall. It
- <!--$v=2532374-->could be an attack point. It could be exploited by either
- <!--$v=2535901-->an accident or someone maliciously trying to control
- <!--$v=2539153-->your network. Go back
- <!--$v=2541673-->and think about where your weak links
- <!--$v=2544421-->are in your network and see if you can't protect those
- <!--$v=2547765-->things. Keep in mind
- <!--$v=2550467-->that security is a foundation service
- <!--$v=2554040-->across all of your network. You've really got to
- <!--$v=2557200-->think of it that way. Start out by being
- <!--$v=2560269-->security conscious as you've designed this network.
- <!--$v=2563476-->And then, if you can enforce your policy
- <!--$v=2566636-->through your procedures and operations,
- <!--$v=2569751-->you should have smooth sailing.
- <!--$v=2572820-->Anyway, that concludes our talk. I hope that you all
- <!--$v=2576118-->have found some good subject matter
- <!--$v=2578912-->in here and I hope this helps you with your network. Thank
- <!--$v=2581798-->you very much.
- </BODY>
- </HTML>
-
-