• Aucun résultat trouvé

Cisco SecurePIX Firewall Advanced

N/A
N/A
Protected

Academic year: 2022

Partager "Cisco SecurePIX Firewall Advanced"

Copied!
1033
0
0

Texte intégral

(1)

CSPFA

Cisco Secure

PIX Firewall Advanced

ͬ«¼»²¬ Guide Version 3.2

Cisco Systems, Inc.

170 West Tasman Drive San Jose, CA 95134-1706 USA

(2)

The products and specifications, configurations, and other technical information regarding the products in this manual are subject to change without notice. All statements, technical information, and recommendations in this manual are believed to be accurate but are presented without warranty of any kind, express or implied. You must take full responsibility for their application of any products specified in this manual.

LICENSE

PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE MANUAL, DOCUMENTATION, AND/OR SOFTWARE (“MATERIALS”). BY USING THE MATERIALS YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT AGREE WITH THE TERMS OF THIS LICENSE, PROMPTLY RETURN THE UNUSED MATERIALS (WITH PROOF OF PAYMENT) TO THE PLACE OF PURCHASE FOR A FULL REFUND.

Cisco Systems, Inc. (“Cisco”) and its suppliers grant to you (“You”) a nonexclusive and nontransferable license to use the Cisco Materials solely for Your own personal use. If the Materials include Cisco software (“Software”), Cisco grants to You a nonexclusive and nontransferable license to use the Software in object code form solely on a single central processing unit owned or leased by You or otherwise embedded in equipment provided by Cisco.

You may make one (1) archival copy of the Software provided You affix to such copy all copyright,

confidentiality, and proprietary notices that appear on the original. EXCEPT AS EXPRESSLY AUTHORIZED ABOVE, YOU SHALL NOT: COPY, IN WHOLE OR IN PART, MATERIALS; MODIFY THE SOFTWARE;

REVERSE COMPILE OR REVERSE ASSEMBLE ALL OR ANY PORTION OF THE SOFTWARE; OR RENT, LEASE, DISTRIBUTE, SELL, OR CREATE DERIVATIVE WORKS OF THE MATERIALS.

You agree that aspects of the licensed Materials, including the specific design and structure of individual programs, constitute trade secrets and/or copyrighted material of Cisco. You agree not to disclose, provide, or otherwise make available such trade secrets or copyrighted material in any form to any third party without the prior written consent of Cisco. You agree to implement reasonable security measures to protect such trade secrets and copyrighted Material. Title to the Materials shall remain solely with Cisco.

This License is effective until terminated. You may terminate this License at any time by destroying all copies of the Materials. This License will terminate immediately without notice from Cisco if You fail to comply with any provision of this License. Upon termination, You must destroy all copies of the Materials.

Software, including technical data, is subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries. You agree to comply strictly with all such regulations and acknowledge that it has the responsibility to obtain licenses to export, re-export, or import Software.

This License shall be governed by and construed in accordance with the laws of the State of California, United States of America, as if performed wholly within the state and without giving effect to the principles of conflict of law. If any portion hereof is found to be void or unenforceable, the remaining provisions of this License shall remain in full force and effect. This License constitutes the entire License between the parties with respect to the use of the Materials

Restricted Rights - Cisco’s software is provided to non-DOD agencies with RESTRICTED RIGHTS and its supporting documentation is provided with LIMITED RIGHTS. Use, duplication, or disclosure by the U.S.

Government is subject to the restrictions as set forth in subparagraph “C” of the Commercial Computer Software - Restricted Rights clause at FAR 52.227-19. In the event the sale is to a DOD agency, the U.S. Government’s rights in software, supporting documentation, and technical data are governed by the restrictions in the Technical Data Commercial Items clause at DFARS 252.227-7015 and DFARS 227.7202.

DISCLAIMER OF WARRANTY. ALL MATERIALS ARE PROVIDED “AS IS” WITH ALL FAULTS.

CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. In no event shall Cisco’s or its suppliers’ liability to You, whether in contract, tort (including negligence), or otherwise, exceed the price paid by You. The foregoing limitations shall apply even if the above- stated warranty fails of its essential purpose.

The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio

communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.

The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television reception. This equipment has been tested and

(3)

found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation.

You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:

• Turn the television or radio antenna until the interference stops.

• Move the equipment to one side or the other of the television or radio.

• Move the equipment farther away from the television or radio.

• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television or radio are on circuits controlled by different circuit breakers or fuses.) Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.

The following third-party software may be included with your product and will be subject to the software license agreement:

CiscoWorks software and documentation are based in part on HP OpenView under license from the Hewlett- Packard Company. HP OpenView is a trademark of the Hewlett-Packard Company. Copyright © 1992, 1993 Hewlett-Packard Company.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

Network Time Protocol (NTP). Copyright © 1992, David L. Mills. The University of Delaware makes no representations about the suitability of this software for any purpose.

Point-to-Point Protocol. Copyright © 1989, Carnegie-Mellon University. All rights reserved. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.

The Cisco implementation of TN3270 is an adaptation of the TN3270, curses, and termcap programs developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981-1988, Regents of the University of California.

Cisco incorporates Fastmac and TrueView software and the RingRunner chip in some Token Ring products.

Fastmac software is licensed to Cisco by Madge Networks Limited, and the RingRunner chip is licensed to Cisco by Madge NV. Fastmac, RingRunner, and TrueView are trademarks and in some jurisdictions registered trademarks of Madge Networks Limited. Copyright © 1995, Madge Networks Limited. All rights reserved.

XRemote is a trademark of Network Computing Devices, Inc. Copyright © 1989, Network Computing Devices, Inc., Mountain View, California. NCD makes no representations about the suitability of this software for any purpose.

The X Window System is a trademark of the X Consortium, Cambridge, Massachusetts. All rights reserved.

Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Web site at www.cisco.com/go/offices.

Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile China PRC Colombia Costa Rica Croatia Czech Republic Denmark Dubai, UAE Finland France Germany Greece Hong Kong SAR Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Scotland Singapore Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand Turkey Ukraine United Kingdom United States Venezuela Vietnam Zimbabwe

Copyright 2003, Cisco Systems, Inc. All rights reserved. AccessPath, AtmDirector, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, CiscoLink, the Cisco NetWorks logo, the CiscoPowered Network logo, Cisco Systems Networking Academy, Fast Step, Follow Me Browsing, FormShare, FrameShare, GigaStack, IGX, Internet Quotient, IP/VC, iQ Breakthrough, iQ Expertise, iQ FastTrack, the iQ logo, iQ Net Readiness Scorecard, MGX, the Networkers logo, Packet, RateMUX, ScriptBuilder, ScriptShare, SlideCast, SMARTnet, TransPath, Unity, Voice LAN, Wavelength Router, and WebViewer are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, and Empowering the Internet Generation, are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, Cisco, the Cisco Certified Internetwork Expert Logo, Cisco IOS, the Cisco IOS logo, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub, FastSwitch, IOS, IP/TV, LightStream, MICA, Network Registrar, PIX, Post-Routing, Pre- Routing, Registrar, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

(4)

All other brands, names, or trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0104R)

Cisco Secure PIX Firewall Advanced, Revision 3.1: Instructor Preparation Guide Copyright 2003, Cisco Systems, Inc.

All rights reserved. Printed in USA.

(5)

Copyright 200ì, Cisco Systems, Inc. Table of Contents xi

(6)

Copyright 2004, Cisco Systems, Inc. Table of Contents v

Table of Contents

COURSE INTRODUCTION 1-1

Overview 1-1

Course Objectives 1-2

Lab Topology Overview 1-9

SECURITY FUNDAMENTALS 2-1

Overview 2-1

Objectives 2-2

Need for Network Security 2-3

Network Security Policy 2-10

Primary Network Threats and Attacks 2-13

Reconnaissance Attacks and Mitigation 2-16

Access Attacks and Mitigation 2-23

Denial of Service Attacks and Mitigation 2-32

Worm, Virus, and Trojan Horse Attacks and Mitigation 2-38

Management Protocols and Functions 2-45

Summary 2-50

CISCO PIX FIREWALL TECHNOLOGY AND FEATURES 3-1

Overview 3-1

Objectives 3-2

Firewalls 3-3

PIX Firewall Overview 3-8

Summary 3-17

CISCO PIX FIREWALL FAMILY 4-1

Overview 4-1

Objectives 4-2

PIX Firewall Models 4-4

PIX Firewall Licensing 4-29

Firewall Services Module 4-33

Summary 4-37

GETTING STARTED WITH THE CISCO PIX FIREWALL 5-1

Overview 5-1

Objectives 5-2

User Interface 5-3

Configuring the PIX Firewall 5-9

(7)

vi CSPFA 3.2 Copyright 2004, Cisco Systems, Inc.

ASA Security Levels 5-20

Basic PIX Firewall Configuration 5-23

Examining PIX Firewall Status 5-39

Time Setting and NTP Support 5-52

Syslog Configuration 5-58

Summary 5-67

Lab Exercise—Configure the PIX Firewall and Execute General

Maintenance Commands Lab 5-1

TRANSLATIONS AND CONNECTIONS 6-1

Overview 6-1

Objectives 6-2

Transport Protocols 6-3

Network Address Translations 6-9

Port Address Translation 6-15

Static Command 6-21

Configuring DNS Support 6-26

Identity NAT Command 6-23

Policy NAT 6-25

Connections and Translation 6-28

Configuring Multiple Interfaces 6-33

Summary 6-36

Lab Exercise—Configuring Access through the PIX Firewall Lab 6-1

ACCESS CONTROL LISTS AND CONTENT FILTERING 7-1

Overview 7-1

Objectives 7-2

ACLs 7-3

Using ACLs 7-24

Malicious Active Code Filtering 7-29

URL Filtering 7-33

Summary 7-42

Lab Exercise—Configure ACLs in the PIX Firewall Lab 7-1

OBJECT GROUPING 8-1

Overview 8-1

Objectives 8-2

Overview of Object Grouping 8-3

Getting Started with Object Groups 8-7

Configuring Object Groups 8-9

Nested Object Groups 8-16

Summary 8-26

Lab Exercise—Configure Object Groups Lab 8-1

(8)

Copyright 2004, Cisco Systems, Inc. Table of Contents vii

ADVANCED PROTOCOL HANDLING 9-1

Overview 9-1

Objectives 9-2

Advanced Protocols 9-3

Multimedia Support 9-18

Summary 9-31

Lab Exercise—Configure and Test Advanced Protocol Handling on

the Cisco PIX Firewall Lab 9-1

ATTACK GUARDS, INTRUSION DETECTION, AND SHUNNING 10-1

Overview 10-1

Objectives 10-2

Attack Guards 10-3

Intrusion Detection 10-15

Shunning 10-23

Summary 10-26

Lab Exercise—Configure Intrusion Detection Lab 10-1

AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING 11-1

Overview 11-1

Objectives 11-2

Introduction 11-3

Installation of CSACS for Windows NT 11-10

Authentication Configuration 11-14

Authorization Configuration 11-36

Downloadable ACLs 11-47

Accounting Configuration 11-53

Troubleshooting the AAA Configuration 11-60

Summary 11-63

Lab Exercise—Configure AAA on the PIX Firewall Using Cisco Secure

ACS for Windows NT Lab 11-1

FAILOVER 12-1

Overview 12-1

Objectives 12-2

Understanding Failover 12-3

Serial Failover Configuration 12-10

LAN-Based Failover Configuration 12-20

Summary 12-33

Lab Exercise—Configure LAN-Based Failover Lab 12-1

SWITCHING AND ROUTING 13-1

Overview 13-1

Objectives 13-2

Virtual LANs 13-3

(9)

viii CSPFA 3.2 Copyright 2004, Cisco Systems, Inc.

Static and Dynamic Routing 13-8

OSPF 13-13

Multicast 13-30

Summary 13-40

VIRTUAL PRIVATE NETWORK CONFIGURATION 14-1

Overview 14-1

Objectives 14-2

The PIX Firewall Enables a Secure VPN 14-3

How IPSec Works 14-10

IPSec Configuration Tasks 14-22

Task 1—Prepare to Configure VPN Support 14-23

Task 2—Configure IKE Parameters 14-30

Task 3—Configure IPSec Parameters 14-36

Task 4—Test and Verify VPN Configuration 14-49

The Cisco VPN Client 14-51

Scale PIX Firewall VPNs 14-54

Summary 14-57

Lab Exercise—Configure PIX Firewall VPNs Lab 14-1

CONFIGURING PIX FIREWALL REMOTE ACCESS USING CISCO EASY VPN 15-01

Overview 15-1

Objectives 15-2

Introduction to the Cisco Easy VPN 15-3

Overview of the Easy VPN Server 15-5

Overview of the Easy VPN Remote Feature 15-9

Overview of the Cisco VPN 3.6 Client 15-19

How the Cisco Easy VPN Works 15-23

Configuring the Easy VPN Server for Extended Authentication 15-30 Cisco VPN Client 3.6 Manual Configuration Tasks 15-55

Working with the Cisco VPN 3.6 Client 15-64

Summary 15-70

EASY VPN REMOTE—SMALL OFFICE/HOME OFFICE 16-1

Overview 16-1

Objectives 16-2

PIX Easy VPN Remote Feature Overview 16-3

Easy VPN Remote Configuration 16-4

PPPoE and the PIX Firewall 16-12

DHCP Server Configuration 16-24

Summary 16-35

SYSTEM MAINTENANCE 17-1

Overview 17-1

Objectives 17-2

(10)

Copyright 2004, Cisco Systems, Inc. Table of Contents ix

Remote Access 17-3

Command Authorization 17-13

SNMP 17-28

Management Tools 17-36

Activation Keys 17-38

Password Recovery and Image Upgrade 17-44

Summary 17-48

Lab Exercise—Configuring the PIX Firewall with PDM Lab 17-1

CISCO PIX DEVICE MANAGER 18-1

Overview 18-1

Objectives 18-2

PDM Overview 18-3

PDM Operating Requirements 18-5

Prepare for PDM 18-10

Using PDM to Configure the PIX Firewall 18-14

Using PDM to Create Site-to-Site VPNs 18-27

Using PDM to Create Remote Access VPNs 18-34

Summary 18-38

Lab Exercise—Enterprise PIX Firewall Management Lab 18-1

INTRODUCTION TO ENTERPRISE PIX FIREWALL MANAGEMENT 19-1

Overview 19-1

Objectives 19-2

Introduction 19-3

Firewall MC Hardware Requirements 19-6

Preparing for Firewall MC 19-9

Understanding the Firewall MC 19-18

Importing and Managing Devices 19-21

Configuring Settings 19-27

Configuring Building Blocks 19-31

Configuring Access and Translation Rules 19-36

Managing Workflow 19-48

Reporting 19-53

Summary 19-57

Lab Exercise—Enterprise PIX Firewall Maintenance Lab 19-1

ENTERPRISE PIX FIREWALL MAINTENANCE 20-1

Overview 20-1

Objectives 20-2

Introduction to the Auto Update Server 20-3

PIX Firewall and AUS Communication Settings 20-10

Getting Started 20-19

Devices, Images, and Assignments 20-22

Reports and Administration 20-30

(11)

x CSPFA 3.2 Copyright 2004, Cisco Systems, Inc.

Summary 20-36

FIREWALL SERVICES MODULE 21-1

Overview 21-1

Objectives 21-2

FWSM Overview 21-3

Network Model 21-8

Getting Started 21-13

Using PDM with the FWSM 21-24

Troubleshooting the FWSM 21-27

Summary 21-30

(12)

Copyright 2004, Cisco Systems, Inc. Table of Contents xi

(13)

1

Course Introduction

Overview

This lesson includes the following topics:

!"Course objectives

!"Course agenda

!"Participant responsibilities

!"General administration

!"Graphic symbols

!"Participant introductions

!"Lab topology overview

(14)

1-2 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

Course Objectives

This topic introduces the course and the course objectives.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-3

Course Objectives

Upon completion of this course, you will be able to perform the following tasks:

Describe PIX Firewall technology and features.

Describe PIX Firewall models, option cards, and licenses.

Configure the PIX Firewall to statically and dynamically translate IP addresses.

Configure the PIX Firewall to control inbound and outbound traffic.

Configure object groups to simplify ACL configuration.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-4

Course Objectives (Cont.)

Configure the PIX Firewall to send messages to a Syslog server.

Explain the routing functionality of the PIX Firewall.

Configure content filtering on the PIX Firewall.

Configure the PIX Firewall as a DHCP client.

Configure advanced protocol handling on the PIX Firewall.

Configure AAA on the PIX Firewall.

Configure stateful failover on the PIX Firewall.

Configure the PIX Firewall’s IDS feature set.

Configure a site-to-site VPN using the PIX Firewall.

(15)

Copyright 2004, Cisco Systems, Inc. Course Introduction 1-3

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-5

Course Objectives (Cont.)

Configure a VPN Client-to-PIX Firewall VPN.

Configure PIX Firewall Easy VPN Remote.

Perform password recovery on the PIX Firewall.

Upgrade PIX Firewall software images.

Perform a PIX Firewall activation key upgrade.

Configure command authorization.

Configure the PIX Firewall to send traps to a SNMP Network Management Station.

Configure the PIX Firewall to permit SNMP traffic.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-6

Course Objectives (Cont.)

Configure a secure connection to the PIX Firewall using SSH.

Install the PIX Device Manager and use it to configure the PIX Firewall.

Use the PIX Device Manager to monitor the PIX Firewall.

Install the Firewall Management Center and use it to configure the PIX Firewall.

(16)

1-4 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-7

Course Agenda

Day 1

Lesson 1—Course Introduction

Lesson 2—Security Fundamentals

Lesson 3—Cisco PIX Firewall Technology and Features

Lunch

Lesson 4—The Cisco PIX Firewall Family

Lesson 5—Getting Started with the Cisco PIX Firewall Day 2

Lesson 6—Inside—Translations and Connections

Lesson 7—Access Control Lists and Content Filtering

Lunch

Lesson 8—Object Grouping

Lesson 9—Advanced Protocol Handling

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-8

Course Agenda (Cont.)

Day 3

Lesson 10—Attack Guards, Intrusion Detection, and Shunning

Lesson 11—Authentication, Authorization, and Accounting

Lunch

Lesson 12—Failover

Lesson 13—Switching and Routing Day 4

Lesson 14—Virtual Private Networks

Lesson 15—Configuring PIX Firewall Remote Access Using Cisco Easy VPN

Lunch

Lesson 16—Easy VPN Remote—Small Office/Home Office

Lesson 17—System Maintenance

(17)

Copyright 2004, Cisco Systems, Inc. Course Introduction 1-5

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-9

Course Agenda (Cont.)

Day 5

Lesson 18—Cisco PIX Device Manager

Lesson 19—Enterprise PIX Firewall Management Center

Lunch

Lesson 20—Enterprise PIX Firewall Auto Update Server

Lesson 21—Firewall Services Module

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-10

Participant Responsibilities

Student responsibilities

Complete prerequisites

Participate in lab exercises

Ask questions

Provide feedback

(18)

1-6 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-11

General Administration

Class-related

Sign-in sheet

Length and times

Break and lunch room locations

Attire

Facilities-related

Participant materials

Site emergency procedures

Restrooms

Telephones/faxes

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-12

Graphic Symbols

IOS Router PIX Firewall VPN 3000 IDS Sensor Catalyst 6500

w/ IDS Module IOS Firewall

Network Access Server

Policy Manager CA Server

PC Laptop Server

Web, FTP, etc.

Modem Ethernet Link VPN Tunnel

Hub Network

Cloud

(19)

Copyright 2004, Cisco Systems, Inc. Course Introduction 1-7

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-13

Participant Introductions

Your name

Your company

Prerequisite skills

Brief history

Objective

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-14

Cisco Security Career Certifications

Expand Your Professional Options and Advance Your Career

Cisco Certified Security Professional (CCSP) Certification

Expert

Professional CCIE

CCSP

CCNA

Associate

Professional-level recognition in designing and implementing Cisco security solutions

www.cisco.com/go/training

Recommended Training through Cisco Learning Partners Required

Exam

642-541 Cisco SAFE Implementation

Network Security

642-501 Securing Cisco IOS Networks 642-511 Cisco Secure Virtual Private Networks 642-531 Cisco Secure Intrusion Detection System 642-521 Cisco Secure PIX Firewall Advanced

(20)

1-8 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-15

Cisco Security Career Certifications

Enhance Your Cisco Certifications

and Validate Your Areas of Expertise Cisco Firewall, VPN, and IDS Specialists

www.cisco.com/go/training

Recommended Training through Cisco Learning Partners Required

Exam

642-501 Securing Cisco IOS Networks 642-521 Cisco Secure PIX Firewall Advanced

Recommended Training through Cisco Learning Partners Required

Exam

642-501 Securing Cisco IOS Networks 642-511 Cisco Secure Virtual Private Networks

Recommended Training through Cisco Learning Partners Required

Exam

642-501 Securing Cisco IOS Networks 642-531 Cisco Secure Intrusion Detection System

Cisco Firewall Specialist

Cisco VPN Specialist

Cisco IDS Specialist

Pre-requisite: Valid CCNA certification

Pre-requisite: Valid CCNA certification

Pre-requisite: Valid CCNA certification

(21)

Copyright 2004, Cisco Systems, Inc. Course Introduction 1-9

Lab Topology Overview

This topic explains the lab topology used in this course.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-17

192.168.Q.0 192.168.P.0

CSPFA Lab Visual Objective

.2 .1

.1

Student PC PIX

Firewall .1

.2

.1 .1

Local: 10.0.P.11 Local: 10.0.Q.11

10.0.P.0 10.0.Q.0

RTS .100

RTS .100

Pods 1–5 Pods 6–10

.10 .10

172.26.26.0 .150

.50 Web and

FTP

RBB

PIX Firewall

Student PC Web, FTP, and Cisco Secure ACS

Web and Cisco Secure

ACS

“bastionhost”:

Web and FTP 172.16.Q.0

172.16.P.0

.2 .1 .2

Web and Cisco Secure

ACS Web, FTP,

and Cisco Secure ACS

“bastionhost”:

Web and FTP

Each pair of students will be assigned a pod. In general, you will be setting up virtual private networks (VPNs) between your pod (pod P) and your assigned peer pod (pod Q).

Note The P in a command indicates your pod number. The Q in a command indicates the pod number of your peer router.

(22)

1-10 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-18

.2 .2

172.16.Q.0 192.168.Q.0

172.16.P.0

192.168.P.0

172.17.Q.0

CSPFA Failover Lab Visual Objective

.7 .7 .7

.7 .2

.1 .1 .1 .1

172.17.P.0 .2

.1 .1

.1 .7

.7 .7

.7 Failover

Primary PIX Firewall

.1

Secondary PIX Firewall

10.0.P.0 10.0.Q.0

RTS .100

RTS .100

Pods 1–5 Pods 6–10

.10 .10

172.26.26.0 .150

.50

RBB Web and

FTP

Web and Cisco Secure ACS

Failover Web FTP Web

FTP

Secondary PIX Firewall

Student PC Student PC

Primary PIX Firewall

Local: 10.0.Q.11 Local: 10.0.P.11

Web and Cisco Secure ACS Web, FTP,

and Cisco Secure ACS

Web, FTP, and Cisco Secure ACS

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—1-19

.100

CSPFA Client-to-LAN Lab Visual Objective

192.168.P.0 Student PC

VPN Client

.1 Local: 172.26.26.P

10.0.P.0 RTS

.2

.1

PIX Firewall .150

Web and Cisco Secure ACS

.10

172.26.26.0 RBB

(23)

2

Security Fundamentals

Overview

This lesson describes security fundamentals. It includes the following topics:

!"Objectives

!"Need for network security

!"Network security policy

!"Primary network threats and attacks

!"Reconnaissance attacks and mitigation

!"Access attacks and mitigation

!"Denial of service attacks and mitigation

!"Worm, virus, and Trojan horse attacks and mitigation

!"Management protocols and functions

!"Summary

(24)

2-2 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

Objectives

This topic lists the lesson’s objectives.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-3

Objectives

Upon completion of this chapter, you will be able to perform the following tasks:

Describe the need for network security.

Identify the components of a complete security policy.

Explain security as an ongoing process.

Describe the four types of security threats.

Describe the four primary attack categories.

Describe the types of attacks associated with each primary attack category and their mitigation methods.

Describe the configuration management and

management protocols and the recommendations for securing them.

(25)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-3

Need for Network Security

Over the past few years, Internet-enabled business, or e-business, has drastically improved companies’ efficiency and revenue growth. E-business applications such as e-commerce, supply- chain management, and remote access enable companies to streamline processes, lower

operating costs, and increase customer satisfaction. Such applications require mission-critical networks that accommodate voice, video, and data traffic, and these networks must be scalable to support increasing numbers of users and the need for greater capacity and performance.

However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats. To combat those threats and ensure that e-business transactions are not compromised, security technology must play a major role in today’s networks.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-5

The Closed Network

Remote site

Closed network

PSTN

Frame relay X.25 leased

line Frame relay

X.25 leased line

The closed network typically consists of a network designed and implemented in a corporate environment, and it provides connectivity only to known parties and sites without connecting to public networks. Networks were designed this way in the past and thought to be reasonably secure because there was no outside connectivity.

(26)

2-4 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-6

The Network Today

Mobile and remote

users

Partner site Remote

site

Open network

Internet-based intranet (VPN)

PSTN

Internet-based extranet (VPN) Internet-based

intranet (VPN)

Remote site mobile

and remote

users

The networks of today are designed with availability to the Internet and public networks, which is a major requirement. Most of today’s networks have several access points to other networks both public and private; therefore, securing these networks has become fundamentally important.

(27)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-5

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-7

Threat Capabilities—More Dangerous and Easier to Use

Sophistication of hacker tools

Packet forging/

spoofing

1990 1980

Password guessing Self-replicating code

Password cracking

Back doors

Hijacking sessions Scanners

Sniffers Stealth diagnostics

Technical knowledge required High

Low 2000

Exploiting known vulnerabilities

Disabling audits

With the development of large open networks there has been a huge increase in security threats in the past 20 years. Not only have hackers discovered more vulnerabilities, but the tools used to hack a network have become simpler and the technical knowledge required has decreased. There are downloadable applications available that require little or no hacking knowledge to

implement. There are also applications intended for troubleshooting a network that when used improperly can pose severe threats.

(28)

2-6 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-8

The Role of Security Is Changing

As businesses become more open to supporting Internet-powered

initiatives such as e-commerce, customer care, supply-chain

management, and extranet collaboration, network security risks are also increasing.

Security has moved to the forefront of network management and implementation. It is necessary for the survival of many businesses to allow open access to network resources and ensure that the data and resources are as secure as possible.

Security is becoming more important because of the following:

!"Required for e-business—The importance of e-business and the need for private data to

traverse public networks has increased the need for network security.

!"Required for communicating and doing business safely in potentially unsafe environments—

Today’s business environment requires communication with many public networks and systems, which produces the need for as much security as is possible.

!"Networks require development and implementation of a corporate-wide security policy—

Establishing a security policy should be the first step in migrating a network to a secure infrastructure.

(29)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-7

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-9

Supply chain Customer care E-commerce

E-learning Workforce

optimization

The E-Business Challenge

Expanded access, heightened security risks Internet

access Internet access

Corporate intranet Corporate

intranet

Internet presence

Internet presence Internet

business value

Business security requirements

Defense-in-depth

Multiple components

Integration into e-business infrastructure

Comprehensive blueprint

Security must be a fundamental component of any e-business strategy. As enterprise network managers open their networks to more users and applications, they also expose these networks to greater risk. The result has been an increase in business security requirements.

The Internet has radically shifted expectations of companies’ abilities to build stronger

relationships with customers, suppliers, partners, and employees. Driving companies to become more agile and competitive, e-business is giving birth to exciting new applications for

e-commerce, supply-chain management, customer care, workforce optimization, and e-learning—applications that streamline and improve processes, speed up turnaround times, lower costs, and increase user satisfaction.

E-business requires mission-critical networks that accommodate ever-increasing constituencies and demands for greater capacity and performance. These networks also need to handle voice, video, and data traffic as networks converge into multiservice environments.

(30)

2-8 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-10

Legal and Governmental Policy Issues

Many governments have formed cross-border task forces to deal with privacy issues.

The outcome of international privacy efforts is expected to take several years to develop.

National laws regarding privacy are expected to continue to evolve worldwide.

As concerns about privacy increase, many governments have formed cross-border task forces to deal with privacy issues. International privacy efforts are expected to take several years to develop and even longer to implement globally. National laws regarding privacy are expected to continue to evolve worldwide.

(31)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-9

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-11

Network Security Is a Continuous Process

Network security is a continuous process built around a security policy:

Step 1: Secure

Step 2: Monitor

Step 3: Test

Step 4: Improve

Secure

Monitor and Respond

Test Manage

and Improve Corporate Security

Policy

After setting appropriate policies, a company or organization must methodically consider security as part of normal network operations. This process could be as simple as configuring routers to not accept unauthorized addresses or services, or as complex as installing firewalls, intrusion detection systems (IDSs), centralized authentication servers, and encrypted virtual private networks (VPNs). Network security is a continuing process:

!"Secure—The following are methods used to secure a network:

— Authentication

— Encryption

— Firewalls

— Vulnerability patching

!"Monitor—To ensure that a network remains secure, it is important to monitor the state of

security preparation. Network vulnerability scanners can proactively identify areas of weakness, and IDSs can monitor and respond to security events as they occur. Using security monitoring solutions, organizations can obtain unprecedented visibility into both the

network data stream and the security posture of the network.

!"Test—Testing security is as important as monitoring. Without testing the security solutions

in place, it is impossible to know about existing or new attacks. The hacker community is an ever-changing environment. You can perform this testing yourself or outsource it to a third party such as the Cisco Security Posture Assessment (SPA) group.

!"Improve—Monitoring and testing provides the data necessary to improve network security.

Administrators and engineers should use the information from the monitor and test phases to make improvements to the security implementation as well as to adjust the security policy as vulnerabilities and risks are identified.

(32)

2-10 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

Network Security Policy

A security policy can be as simple as an acceptable use policy for network resources or it can be several hundred pages in length and detail every element of connectivity and associated policies.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-13

What Is a Security Policy?

“A security policy is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide.”

– RFC 2196, Site Security Handbook

According to the Site Security Handbook (RFC 2196), “A security policy is a formal statement of the rules by which people who are given access to an organization’s technology and

information assets must abide.” It further states, “A security policy is essentially a document summarizing how the corporation will use and protect its computing and network resources.”

(33)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-11

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-14

Why Create a Security Policy?

To create a baseline of your current security posture

To set the framework for security implementation

To define allowed and not-allowed behaviors

To help determine necessary tools and procedures

To communicate consensus and define roles

To define how to handle security incidents

To inform users of their responsibilities

To define assets and the way to use them

To state the ramifications of misuse

Security policies provide many benefits and are worth the time and effort needed to develop them. Developing a security policy:

!"Provides a process for auditing existing network security.

!"Provides a general security framework for implementing network security.

!"Defines which behavior is and is not allowed.

!"Helps determine which tools and procedures are needed for the organization.

!"Helps communicate consensus among a group of key decision makers and define

responsibilities of users and administrators.

!"Defines a process for handling network security incidents.

!"Enables global security implementation and enforcement. Computer security is now an

enterprise-wide issue, and computing sites are expected to conform to the network security policy.

!"Creates a basis for legal action if necessary.

(34)

2-12 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-15

What Should the Security Policy Contain?

Statement of authority and scope

Acceptable use policy

Identification and authentication policy

Internet use policy

Campus access policy

Remote access policy

Incident handling procedure

The following are some of the key policy components:

!"Statement of authority and scope—This topic specifies who sponsors the security policy and

what areas the policy covers.

!"Acceptable use policy—This topic specifies what the company will and will not allow

regarding its information infrastructure.

!"Identification and authentication policy—This topic specifies what technologies, equipment,

or combination of the two the company will use to ensure that only authorized individuals have access to its data.

!"Internet access policy—This topic specifies what the company considers ethical and proper

use of its Internet access capabilities.

!"Campus access policy—This topic specifies how on-campus users will use the company’s

data infrastructure.

!"Remote access policy—This topic specifies how remote users will access the company’s

data infrastructure.

!"Incident handling procedure—This topic specifies how the company will create an incident

response team and the procedures it will use during and after an incident.

(35)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-13

Primary Network Threats and Attacks

This topic provides an overview of primary network threats and attacks.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-17

Internet

Variety of Attacks

Network attacks can be as varied as the systems that they attempt to penetrate.

External exploitation

External exploita

tion

Internal exploitation

Internal exploitation Dial-in

exploitation Dial-in exploitation

Compromised host

Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors, or even internal employees. In fact, according to several studies, more than half of all network attacks are waged internally. The Computer Security Institute (CSI) in San

Francisco, California, estimates that between 60 and 80 percent of network misuse comes from inside the enterprises where the misuse has taken place. To determine the best ways to protect against attacks, IT managers should understand the many types of attacks that can be instigated and the damage that these attacks can cause to e-business infrastructures.

(36)

2-14 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-18

Network Security Threats

There are four general categories of security threats to the network:

Unstructured threats

Structured threats

External threats

Internal threats

There are four general threats to network security:

!"Unstructured threats—These threats primarily consist of random hackers using various

common tools, such as malicious shell scripts, password crackers, credit card number generators, and dialer daemons. Although hackers in this category may have malicious intent, many are more interested in the intellectual challenge of cracking safeguards than in creating havoc.

!"Structured threats—These threats are created by hackers who are more highly motivated and

technically competent. Typically, such hackers act alone or in small groups to understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.

These groups are often involved in the major fraud and theft cases reported to law enforcement agencies. Occasionally, such hackers are hired by organized crime, industry competitors, or state-sponsored intelligence collection organizations.

!"External threats—These threats consist of structured and unstructured threats originating

from an external source. These threats may have malicious and destructive intent, or they may simply be errors that generate a threat.

!"Internal threats—These threats typically involve disgruntled former or current employees.

Although internal threats may seem more ominous than threats from external sources, security measures are available for reducing vulnerabilities to internal threats and responding when attacks occur.

(37)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-15

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-19

The Four Primary Attack Categories

All of the following can be used to compromise your system:

Reconnaissance attacks

Access attacks

Denial of service attacks

Worms, viruses, and Trojan horses

There are four types of network attacks:

!"Reconnaissance attacks—An intruder attempts to discover and map systems, services, and

vulnerabilities.

!"Access attacks—An intruder attacks networks or systems to retrieve data, gain access, or

escalate access privileges.

!"Denial of service (DoS) attacks—An intruder attacks your network in a way that damages or

corrupts your computer system or denies you and others access to your networks, systems, or services.

!"Worms, viruses, and Trojan horses—Malicious software is inserted onto a host in order to

damage a system, corrupt a system, replicate itself, or deny services or access to networks, systems, or services.

(38)

2-16 Cisco Secure PIX Firewall Advanced (CSPFA) v3.2 Copyright 2004, Cisco Systems, Inc.

Reconnaissance Attacks and Mitigation

This topic describes reconnaissance attacks and their mitigation.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-21

Reconnaissance Attacks

Reconnaissance refers to the overall act of learning information about a target network by using readily

available information and applications.

Reconnaissance is the unauthorized discovery and mapping of systems, services, or

vulnerabilities. It is also known as information gathering and, in most cases, precedes an actual access or DoS attack. The malicious intruder typically conducts a ping sweep of the target network first to determine which IP addresses are alive. After this has been accomplished, the intruder determines which services or ports are active on the live IP addresses. From this information, the intruder queries the ports to determine the application type and version as well as the type and version of the operating system running on the target host.

Reconnaissance is somewhat analogous to a thief casing a neighborhood for vulnerable homes to break into, such as an unoccupied residence, a house with an easy-to-open door or window, and so on. In many cases the intruders go as far as “rattling the door handle,” not to go in

immediately if it is opened, but to discover vulnerable services that they can exploit later when there is less likelihood that anyone is looking.

Reconnaissance attacks can consist of the following:

!"Packet sniffers

!"Port scans

!"Ping sweeps

!"Internet information queries

(39)

Copyright 2004, Cisco Systems, Inc. Security Fundamentals 2-17

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—2-22

Packet Sniffers

A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets.

The following are the packet sniffer features:

Packet sniffers exploit information passed in clear text. Protocols that pass information in the clear include the following:

Telnet FTP SNMP POP HTTP

Packet sniffers must be on the same collision domain.

Packet sniffers can be general purpose or can be designed specifically for attack.

Host A Host B

Router A Router B

A packet sniffer is a software application that uses a network adapter card in promiscuous mode (a mode in which the network adapter card sends all packets received on the physical network wire to an application for processing) to capture all network packets that are sent across a LAN.

Several network applications distribute network packets in clear text; that is, the information sent across the network is not encrypted. Because the network packets are not encrypted, they can be processed and understood by any application that can pick them up off the network and process them.

A network protocol specifies how packets are identified and labeled, which enables a computer to determine whether a packet is intended for it. Because the specifications for network protocols, such as TCP/IP, are widely published, a third party can easily interpret the network packets and develop a packet sniffer. (The real threat today results from the numerous freeware and shareware packet sniffers that are available, which do not require the user to understand anything about the underlying protocols.)

Références

Documents relatifs

Summary In this chapter we have seen the following: • The various prompt variables that the shell uses to decide how to format information to display • The system of prompt escapes

Defaults If a aaa authentication http console server_tag command statement is not defined, you can gain access to the PIX Firewall (via PDM) with no username and the PIX

For more information on this feature, refer to “User Authentication Using the LOCAL Database” in the Cisco PIX Firewall and VPN Configuration Guide.For a complete description of

For example, as traffic on the corporate side of a fire- wall flows toward the Internet, it is known as traffic flowing from the trust- ed inside (corporate) to the untrusted

The command is tftp-server [if_name] ip_address path and it enables you to enter the default TFTP server parameters used on other commands. Upgrading

The Hypertext Transfer Protocol (HTTP) fixup protocol allows application inspection of traffic using the default port 80.. When HTTP fixups are enabled, three main functions

A new connection is used for each transfer; to avoid running afoul of TCP’s TIMEWAIT state, the client picks a new port number each time and sends a PORT command announcing

Categorizing errors helps both Call Agent and gateway developers: it helps gateway developers choose an appropriate return code when a specific one for the situation is