Module 11 Flashcards
Learning Unit 6 (45 cards)
Zero Trust & Defense in Depth
• Zero Trust Model o Nothing inside or outside the network is trusted o Every device, user, and connection must be verified o Internal threats treated as seriously as external threats • Defense in Depth Strategy o Multiple, redundant security layers o Protects against malware, intrusions, misconfigurations o Security implemented across all devices: routers, switches, servers, etc.
Access Control Lists (ACLs)
• Purpose o Filter traffic at routers, switches, and firewalls o Permit or deny packets based on defined criteria • Match Criteria o Network layer protocol (IP, ICMP) o Transport layer protocol (TCP, UDP) o Source/Destination IP address o TCP/UDP port number • ACL Structure o Consists of sequential “permit” or “deny” statements o Evaluated top to bottom o Implicit deny: packets not explicitly permitted are dropped by default o Each router interface needs a separate ACL o Can be applied to inbound or outbound traffic • Wildcard Masks (opposite of subnet masks) o 0 = match required o 1 = any value allowed o Example: 0.0.0.255 allows last octet to vary (match 10.1.1.X)
ACL Configuration (Cisco-style)
• Basic Commands o access-list <name/number> permit/deny <protocol> <src> <dest> [eq <port>] o Example: Allow all ICMP: access-list acl_2 permit icmp any any Deny all ICMP: access-list acl_2 deny icmp any any Allow TCP from host 2.2.2.2 to 5.5.5.5: access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5 Allow TCP to port 80: access-list acl_2 permit tcp host 2.2.2.2 host 3.3.3.3 eq www Allow TCP to network 10.1.1.X: access-list acl_2 permit tcp 10.1.1.0 0.0.0.255 • Key Notes o ACLs must be assigned to an interface to take effect o If no ACL is configured, all traffic is allowed o Long ACLs may slow router performance o Common misconfigurations: Incorrect rule order Wrong match criteria Syntax errors</port></dest></src></protocol>
Control Plane Policing (CoPP)
• Purpose o Protects the control plane (routing decisions, protocol mgmt) o Prevents overload during high traffic or attacks o Uses QoS-like filters to rate-limit traffic • General Steps 1. Create ACL to identify relevant traffic Permit or deny ICMP, IP, etc. Example: access-list 100 permit icmp any any access-list 100 deny icmp host 192.168.2.2 any 2. Create Class Map class-map <name> Match ACL: match access-group 100 3. Create Policy Map policy-map <name> Pair with class: class <class-name> Apply policing: police <bps> conform-action transmit exceed-action drop Example: police 8000 conform-action transmit exceed-action drop 4. Apply to Control Plane Enter control-plane mode: control-plane Apply policy: service-policy input <policy-name> • Test CoPP o Send large pings from trusted (not limited) and untrusted (limited) sources o Untrusted pings dropped if exceeding threshold</policy-name></bps></class-name></name></name>
Switch Security Features
• Certain features are common to both routers & switches (e.g., CoPP) • Others are switch-specific due to Layer 2 traffic handling • Key switch-specific features: o RA Guard o DHCP Snooping o Dynamic ARP Inspection (DAI)
RA Guard
• Protects IPv6 clients from malicious Router Advertisements (RA) • Prevents 2 major vulnerabilities: o Misconfiguration/hijack of network traffic via fake RAs o DoS attacks via RA flooding • Works by filtering RAs to allow only those from: o Specific switch interfaces o Specified MAC/IP addresses, router priorities, etc. • Configured via Cisco CLI: o raguard command o Create RA guard policies (e.g., HOSTS and ROUTERS): HOSTS: applied to client-facing ports, blocks all RAs ROUTERS: applied to router-facing ports, filters based on trust criteria
DHCP Snooping
• Prevents rogue DHCP servers from issuing malicious IP configs • Rogue DHCP can cause: o On-path attacks (attacker sets self as gateway/DNS) o Website spoofing or traffic redirection • When enabled: o Only trusted ports (e.g., uplinks to real DHCP server) can send DHCP offers o Switch listens to DHCP traffic, builds a DHCP snooping binding database with IP-MAC pairings • Cisco config command: o ip dhcp snooping • Binding table can be used by other security tools (e.g., DAI)
Dynamic ARP Inspection (DAI)
• Protects against ARP spoofing / poisoning • ARP attacks allow: o Redirection of traffic (like DNS spoofing) o On-path attacks o DoS via MAC flooding (fills switch MAC table with bogus MACs) • Switch vulnerabilities: o ARP lacks authentication; accepts any ARP reply • DAI operation: o Uses DHCP snooping binding table to verify ARP messages o Checks if source IP ↔ source MAC match DHCP records • Blocks ARP replies with mismatched MAC/IP • Works with DHCP snooping for full effectiveness • Can also mitigate MAC flooding alongside port security
Proxy Servers
• Acts as intermediary between internal and external networks • Works at Application Layer (OSI Layer 7) • Main Functions: o Screens all incoming/outgoing traffic o Hides internal IP addresses (identity protection) o Performs content filtering o Caches frequently accessed content o Repackages data with its own IP before sending • Does not encrypt traffic (unlike VPN) • NOT the same as NAT o NAT: IP address management o Proxy: Traffic mediation & security • Example Use Case (Outbound email): 1. Workstation sends data to proxy 2. Proxy replaces IP with its own 3. Sends to firewall 4. Firewall verifies & forwards to Internet • Software Examples: o Smartproxy o Luminati o Squid o WinGate (includes firewall features) • Reverse Proxy: o Protects internal servers from external clients o Provides application-layer firewall protection o Useful when multiple web servers use same public IP
Firewalls – General
• Filters/blocks traffic between networks • Can be: o Network-based (protects whole network) o Host-based (protects individual device) • Can be hardware or software • Located at network edge or internally • Often includes default security settings • Common filtering criteria: o Source/destination IP o Source/destination ports (TCP/UDP, FTP, ICMP, etc.) o TCP flags (SYN, ACK) o Protocol used (UDP, ICMP) o Packet position (first or subsequent) o Direction (inbound or outbound) • Port Blocking Example: o Block NetBIOS ports (137, 138, 139) for added security
Firewalls – Types and Features
• Packet-Filtering Firewall: o Examines packet headers o Uses ACL to allow/deny traffic o Stateless (evaluates packets individually) • Stateful Firewall: o Tracks connections (stateful inspection) o Evaluates packets in context • Application Layer Firewall: o Inspects application data/payloads o Can block based on: Website content Keywords Suspicious code o Supports zero trust (inspects even internal traffic) • Host-based vs. Network Firewall: o Host-based: device-specific, e.g., disallow port 22 on a local server o Network: covers multiple devices; more complex rules • Common Software: o iptables (Linux) o ZoneAlarm o Comodo Firewall o Windows Firewall (built-in) • Security Appliances (Enterprise): o Vendors: Cisco, Fortinet o Functions: Packet filtering Encryption Load balancing Intrusion Prevention (IPS)
Firewall Rule Considerations
• More granular than ACLs • Evaluate rules when message enters/exits/traverses firewall • Key features to look for in firewalls: o Encryption support o User authentication o Centralized management o Easy rule creation/modification o Logging/auditing (e.g., IDS/IPS support) o Internal IP masking o Stateful inspection o High-layer filtering (application inspection)
Intrusion Detection System (IDS)
• Definition: Monitors network traffic; generates alerts for suspicious activity • Deployment: o Stand-alone device, app, or feature on host/server/switch/router/firewall o Installed inside the network • Detection Methods: o Statistical anomaly detection – Compares traffic to baseline o Signature-based detection – Uses known attack patterns (requires signature management) • Signature Management: o Regular updates o Retire irrelevant signatures o Select relevant ones to optimize performance
IDS Types (HIDS vs NIDS)
• HIDS (Host-based IDS): o Monitors a single host o Detects logon attempts, insecure app usage o Includes FIM (File Integrity Monitoring) Uses checksums to track unauthorized file changes • NIDS (Network-based IDS): o Monitors network segments o Typically placed at edge or DMZ o Detects suspicious traffic like DoS o Traffic Duplication Techniques: Port mirroring / SPAN One switch port copies traffic to another for analysis Managed via Cisco’s monitoring session command TAP (Test Access Point) Inline hardware between devices Captures all traffic Can feed to multiple monitoring devices
IDS Alerts & Issues
• Alert Classifications: o True Positive – Real problem, correctly alerted o True Negative – No problem, no alert o False Positive – Alert for a non-issue (e.g., user forgets password) o False Negative – Missed alert for real issue • Drawbacks: o Too many false positives = alert fatigue • Best Practices: o Customize rules o Update signatures o Reevaluate rules regularly • Examples of IDS Software: o Snort (popular) o Suricata • Vendors with IDS Products: o Cisco, Juniper, Palo Alto
Intrusion Prevention System (IPS)
• Definition: Sits inline; actively blocks suspicious traffic • Function: o Detects and prevents threats from reaching host/network o Example: Blocks flood attack, quarantines sender IP o Still allows valid traffic • IPS vs IDS: o IDS = Detect only o IPS = Detect + Block o Firewalls now overlap with IPS functionality • Types: o NIPS (Network-based IPS) – Protects entire networks o HIPS (Host-based IPS) – Protects individual hosts
IPS Deployment & Strategy
• Placement Options: o Network perimeter o Inside private network o Within DMZ • Combined Use Example: o NIPS blocks attacker before reaching server o HIPS on server protects against direct host exploitation • Configuration: o Needs fine-tuning to reduce false alarms • Best Practice: o Use NIPS + HIPS for layered defense
Cloud Security Technologies – Overview
• Traditional network security tools can be virtualized for cloud use • Cloud platforms embed their own security features • Defense-in-depth strategy applies across cloud layers: o Platform o Network o Instances o Applications o Data
Cloud Security – Granularity
• Granular security appliances: secure individual resources o Similar to host-based firewall • AWS Security Group: o Filters traffic into/out of a single EC2 instance • AWS NACL (Network ACL): o Filters traffic for an entire VPC o Similar to a network-based firewall
Cloud Security – Awareness (Stateful vs Stateless)
• Stateless tools: o Do not track traffic session states • Stateful tools: o Maintain connection state awareness o Map related inbound/outbound traffic • Examples: o Google Cloud virtual firewall rules = stateful Allowing traffic one way allows return traffic o AWS NACLs = stateless
Cloud Security – Default Configuration
• Each tool has a default allow or deny behavior • Admins must understand defaults to configure securely • Examples: o AWS Security Groups: Default allow SSH over port 22 for Linux EC2 o Azure NSG (Network Security Group): Has 6 default rules Cannot delete/change, but can override with priority rules
Built-in Cloud Security Features
• Many defaults are secure by default • Example – AWS S3 Buckets: o Deny all internet access by default o Requires multiple configuration and confirmation steps to allow internet access
Cloud Security – Shared Responsibility Model
• Cloud security is shared between: o Cloud provider (infrastructure security) o Cloud customer (configuration & access control) • Responsibility varies by deployment model (IaaS, PaaS, SaaS)
AAA Framework – Overview
• AAA = Authentication, Authorization, Accounting (sometimes AAAA with Auditing) • Access control manages who can enter and what they can do on a network • Physical access control = badges, locks • Information access control = limits users/devices on data and resources