slides - ch. 10

29
1 INFO1200 – Hardening the Infrastructure Perimeter Network Design Design Principles Designing an Internet Access Network Designing Internet Application Networks Designing VPN & Remote Access Termination Networks

Upload: sandra4211

Post on 23-Jun-2015

183 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Slides - Ch. 10

1

INFO1200 – Hardening the Infrastructure

Perimeter Network Design

• Design Principles• Designing an Internet Access Network• Designing Internet Application Networks• Designing VPN & Remote Access Termination

Networks

Page 2: Slides - Ch. 10

2

INFO1200 – Hardening the Infrastructure

Design Principles• Overview• Selecting & Deploying Firewalls

• Placing Firewalls for Maximum Effect• Determining Right Type of Firewall for Perimeter Design

• Including IDSs & IPSs in Your Design• Creating Network Segments

• Securing Perimeter Network with VLANs & Routers using ACLs

• Segmenting using DMZ Networks & Service Networks

Page 3: Slides - Ch. 10

3

INFO1200 – Hardening the Infrastructure

Overview- Network design is usually a top-down design

three step approach

1.collect info to allow determination of requirements for capacity, functionality, performance, availability, scalability, affordability, manageability & security

2.create logical network design to encompass needs of app or users

3.create physical network design to include real network devices

- For perimeter networks top down design must put equal emphasis on designing for security & application requirements

Page 4: Slides - Ch. 10

4

INFO1200 – Hardening the Infrastructure

Selecting & Deploying Firewalls- meant to be points of control between 2 network security

zones through which all network traffic must flow

- two main functions

enforcing security policies – ie. decide whether to allow network connections

logging – to determine traffic patterns & for forensic analysis

- firewalls alone do not provide complete network protection – must be implemented in conjunction with IDSs & IPSs

Page 5: Slides - Ch. 10

5

INFO1200 – Hardening the Infrastructure

Placing Firewalls for Maximum Effect- good implementation is designed to keep out all network traffic

that is not specifically allowed

- firewalls in perimeter network responsible for maintaining security policies at all points of access

- should be placed at any access point to perimeter network as well as between any network segments within perimeter network

- multiple firewalls or multiple-interface firewalls should be used to create different security zones for different types of traffic requiring different security policies – ie. public zone segmented from higher level security zones like management network

Page 6: Slides - Ch. 10

6

INFO1200 – Hardening the Infrastructure

Page 7: Slides - Ch. 10

7

INFO1200 – Hardening the Infrastructure

Determining Right Type of Firewall for Perimeter Network- firewalls classified by

1. methods they use to enforce security

choices are - packet-filtering (including stateful firewalls)

- proxy-based firewalls- circuit gateway firewalls

2. how they handle network traffic

choices are - routing firewalls

- bridging mode firewalls3. the physical configuration of device

choices are - server-based firewalls

- firewall appliances

Page 8: Slides - Ch. 10

8

INFO1200 – Hardening the Infrastructure

Including IDSs & IPSs in Your Design- Two main systems for IDSs & IPSs to detect intrusions

knowledge-based system – compares network traffic to known attack or intrusion signatures

behaviour-based system – examines traffic patterns and compares them with historical trends

- optimal location for IDS/IPS depends on its features & functions

passive IDS should be behind perimeter firewall closest to data to be protected

IPS capable of stopping DoS and DDoS attacks should be placed on perimeter network between perimeter router & perimeter firewall

IPS capable of quickly matching traffic patterns should be deployed inline to all network traffic right behind perimeter firewalls

Page 9: Slides - Ch. 10

9

INFO1200 – Hardening the Infrastructure

Creating Network Segments- used to separate perimeter network into separate networks based

on content & use

- enables network security devices to be implemented at boundaries between network segments allowing more control over network traffic

- methods used to segment perimeter network include:

VLANs & Routers with Access Control Lists

- ways to separate perimeter network architecture include:

- segmenting network based on function and location of resources within each segment – ie. DMZ with web, mail servers

- segmenting network based on services resources within each segment provide

Page 10: Slides - Ch. 10

10

INFO1200 – Hardening the Infrastructure

Designing an Internet Access Network

• Considerations when Designing Internet Access Network

• Designing Logical & Physical Networks

Page 11: Slides - Ch. 10

11

INFO1200 – Hardening the Infrastructure

Considerations when Designing Internet Access Network- based on top-down network design - 1st collect requirements

- requirements generally broken down into two types – business & technical

- results are displayed in Table 10.1 of textbook

Page 12: Slides - Ch. 10

12

INFO1200 – Hardening the Infrastructure

Page 13: Slides - Ch. 10

13

INFO1200 – Hardening the Infrastructure

Page 14: Slides - Ch. 10

14

INFO1200 – Hardening the Infrastructure

Logical & Physical Network Design for Internet Access Network

- Logical design is displayed in Figure 10.2 in textbook

- Physical design is displayed in Figure 10.3 in textbook

Page 15: Slides - Ch. 10

15

INFO1200 – Hardening the Infrastructure

Page 16: Slides - Ch. 10

16

INFO1200 – Hardening the Infrastructure

Page 17: Slides - Ch. 10

17

INFO1200 – Hardening the Infrastructure

Designing Internet Application Networks

• Considerations when Designing Internet Application Networks

• Logical & Physical Network Design

Page 18: Slides - Ch. 10

18

INFO1200 – Hardening the Infrastructure

Considerations when Designing Internet Application Networks- similar top-down network design approach required as for Internet

Access Network

- results are displayed in Table 10.2 of textbook

Page 19: Slides - Ch. 10

19

INFO1200 – Hardening the Infrastructure

Page 20: Slides - Ch. 10

20

INFO1200 – Hardening the Infrastructure

Logical & Physical Network Design for Internet Application Network

- Logical design is displayed in Figure 10.4 in textbook

- Physical design is displayed in Figure 10.5 in textbook

Page 21: Slides - Ch. 10

21

INFO1200 – Hardening the Infrastructure

Page 22: Slides - Ch. 10

22

INFO1200 – Hardening the Infrastructure

Page 23: Slides - Ch. 10

23

INFO1200 – Hardening the Infrastructure

Designing VPN & Remote Access Termination Networks

• Considerations when Designing VPN & Remote Access Termination Networks

• Logical & Physical Network Design

Page 24: Slides - Ch. 10

24

INFO1200 – Hardening the Infrastructure

Considerations when Designing VPN & Remote Access Termination Networks- similar top-down network design approach required as for Internet

Access Network & Internet Application Network

- results are displayed in Table 10.3 of textbook

Page 25: Slides - Ch. 10

25

INFO1200 – Hardening the Infrastructure

Page 26: Slides - Ch. 10

26

INFO1200 – Hardening the Infrastructure

Logical & Physical Network Design for VPN & Remote Access Termination Network

- Logical design is displayed in Figure 10.6 in textbook

- Physical design is displayed in Figure 10.7 in textbook

Page 27: Slides - Ch. 10

27

INFO1200 – Hardening the Infrastructure

Page 28: Slides - Ch. 10

28

INFO1200 – Hardening the Infrastructure

Page 29: Slides - Ch. 10

29

INFO1200 – Hardening the Infrastructure