secure network design: designing a secure local area network it352 | network security |najwa...

27
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security | Najwa AlGhamdi 1 Case Study http://

Upload: candice-lewis

Post on 23-Dec-2015

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 2: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Introduction

• In order to design and build a well-secured network many factors must be taken into consideration

1. Network topology and placement of hosts within the network

2. The selection of hardware and software technologies

3. The careful configuration of each component. 4. the issues in designing a secure Local Area Network

(LAN) and some of the best

Page 3: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Introduction

• Securing a LAN network should take care of 1. Securing the network topology which comprises the

physical and logical design of the network;2. securing the routers and switches which connect

segments and hosts to form the network

Page 4: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Secure LAN Design Challenges 1. Securing the network from Internet launched attacks2. Securing Internet facing web, DNS and mail servers3. Containing damage from compromised systems, and

preventing internally launched attacks4. Securing sensitive and mission critical internal

resources such financial records, customer databases, trade secrets, etc.

5. Building a framework for administrators to securely manage the network

6. Providing systems for logging and intrusion detection

Page 5: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

5

Case study

• we wish to secure a small to medium sized (under 500 hosts) TCP/IP based LAN which is connected to the Internet via broadband or other high speed connection.

• We need for a reasonable amount of security because of mission critical records or proprietary information.

Page 6: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

6

Topology and Architecture

• Topology is the physical and logical layout of the network.

• On the physical side, we will need to1. provide distribution to the offices or buildings

where the users are located.2. We will need to provide connectivity to the

servers which comprise our intranet, to the Internet, and possibly to other company locations or business partners, remote users connecting via telephone lines, etc.

Page 7: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

7

Topology and Architecture

• The logical topology :technologies in how data is transferred in physical topology such (VLANs) and (VPNs) . In laying out the logical topology we will need to

1. Decide what parts of the network are less trusted, and which are more?

2. Which groups of devices and users should be logically grouped together, and which should be separated?

Page 8: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Initial network design

Page 9: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Initial network design

• border router is a router that is usually deployed in front of the organization's main firewalls

• It performs some basic checks on network activity may be helpful in stopping some Internet-based worms from reaching the organization's firewall.

Page 10: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Initial network design • An extranet is a

computer network that allows controlled access from the outside, for specific business or educational purposes.

• its as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers, in isolation from all other Internet users.

Page 11: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Initial network design • A core router designed to

operate in the Internet backbone, or core.

• A Layer 3 switch is a high-performance device for network routing.

• Layer 3 switches actually differ very little from routers. It can support the same routing protocols as network routers do.

• Both inspect incoming packets and make dynamic routing decisions based on the source and destination addresses inside.

Page 12: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Initial Network Design

• The basic design illustrates connection to the Internet with a border router and firewall, and our public extranet servers which are connected to a third interface on the firewall.

• The firewall is one of four connections to a core router Or layer 3 switch.

• The remaining connections to core router are the floor or building switches which provide connectivity to the different departments and our intranet servers.

Page 13: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Initial Network Design

• This topology demonstrates how devices with similar functions and security profiles are grouped together – the public extranet servers, user workstations, and the intranet

servers.• By creating separate security zones, we will be able to enforce security

policy with the appropriate firewall rules and layer 3 access lists.• This design lacks is the infrastructure for managing network.• These servers will form the foundation of our network management and

security, a separate management VLAN which is isolated from the rest of the network by a firewall will be created.

• If this is not possible because of physical or other limitations, management should be encrypted via IPSEC.

Page 14: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

14

Initial Network Design

+

Management VLAN LAN

Page 15: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Securing Routers and Switches

• The design calls for segmenting the network into subnets based on function and, possibly, location.

Subnetting

• By implementing routing at the at the network core, our segments are isolated into individual broadcast domains.

• This improves performance and also improves security by preventing attackers from altering routing and man in the middle attack.

Page 16: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

16

Securing Routers and Switches

• Within each subnet the hosts are connected to an Ethernet switch.

• A switch provides high performance and enhances security by making sniffing attacks difficult.

• A hub is a less expensive alternative to a switch for layer 2 connectivity, though it is less desirable both from a performance and a security standpoint

Page 17: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

17

Layer3 Design and Access list

+

Management VLAN LAN

Page 18: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Layer 3 Design and Access Lists

• layer 3 design is quite simple, with a central core router connecting the different production and management networks.

• In core router , the access lists is implemented as a follows 1. For inbound traffic coming into a subnet, we will permit only

appropriate incoming packets coming from certin IP addresses.

2. For outbound traffic : traffic is filtered to eliminate spoofing and minimize any malicious or illegitimate activities.

Page 19: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Layer 3 Design and Access Lists

Page 20: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

20

Layer 3 Design and Access Lists

• Example : we will want to filter traffic leaving each subnet to prevent spoofing.

• The presence of incorrect source addresses could indicate either a misconfigured machine, or an attempt to launch a DOS or similar attacks.

Page 21: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

21

Layer2 Design

+

Management VLAN LAN

Page 22: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

22

Layer2 Secure Design

• Main goal : to maximize the security of the switch ports themselves.

• Since the switch ports are the gateway into our network, we will want to implement physical security when possible, by controlling access to switch ports, and disabling unused ports.

Page 23: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

23

Layer2 Secure Design • Spanning-Tree Protocol (STP) is used by switches and

bridges to establish their 1. MAC address forwarding tables (table of all MAC

addresses traversing the switch) 2. and establish a tree-like topology which forwards frames

via the fastest path and eliminates loops. • Bridge Port Data Units (BPDUs) are exchanged by switches

to share information about the topology.• If our switch supports STP, prevent random hosts is

prevented from either forwarding BPDUs or affecting the spanning tree.

Page 24: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

24

Advanced Technology

• Intrusion Detection Systems (IDS) • Many experts would include IDS as part of the

essential elements of securing any network.• Network IDS can alert the system administrator

to attacks on the network in real time by1. inspecting the traffic on the wire2. and generating alerts if suspicious activities

are identified

Page 25: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

25

Advanced Technology

• Intrusion Detection Systems (IDS) • NIDS can be a 1. Regular computer running IDS software2. Appliance type device running exclusive software3. or even a specialized card built in to a switch or

other• Once we have selected a NIDS for use in our

network, we will need to place the sensors logically within the topology.

Page 26: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

26

Advanced Technology

Page 27: Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

IT352 | Network Security |Najwa AlGhamdi

27

Advanced Technology

• Suggest a technology to enhance security here.