Notes 10‐1 - LPouliot/Junior-Spring-NET-330-01-Network-Design GitHub Wiki
Network Zoning, Segmentation and Isolation for Security
Reasons to Segment a Network
Reduce size of Broadcast Domains
Restrict unnecessary traffic crossing long distance and/or slow links
Conserve Public IP addresses with an organized NAT implementation
Security!
Security and Network Segmentation
What is one of the primary rules of information security:
Least Privilege
Providing network access to servers/services introduces risk – therefore
Limit access to only those remote systems that need it
Least Privilege for Network Access:
Risk Matrix
Network-based Defenses: Access Control
How is the system connected to the network?
-
Not connected to any network (stand-alone)?
-
- The best network defense ☺
-
On a private network (not the Internet)?
-
- Highly secure environments (military, utility grid…) may run separate networks
-
- On the Internet?
-
Use network connections and routing devices to control access to a system
Network Defense Techniques
Technical Solutions
- Network Address Translation (NAT)
- Access Control Lists (ACLs)
- Firewalls
Planning/Layout Solutions
- Network Zoning
Network-based Defenses: Access Control
Network Address Translation:
- Using private IP addresses internally and translating to “public” IP’s when communicating on Internet
Private IP Addresses
- 10.0.0.0
- 192.168.0.0
- 172.16.0.0
Organizations use private addresses on the local network
Router translates private to public IP’s and keeps track of translation in a table.
Access Control-NAT
Network-based Defenses: Access Control
Routers- devices that “route” traffic between different networks (think Post Office)
- Can create routing rule to control which networks can communicate.
- Can create Access Control Lists (ACLs) to drop certain types of traffic
-
- Spoofed addresses
-
- Certain protocols
Network-based Defenses: Firewalls
Device that controls traffic in and out of a network based on ruleset
Layer 4 Firewalls
Rules based on Layer 3:
- P Addresses of both internal and external computers
e.g. allow all external systems to 170.129 (Public).20.101
Allow 153.104.15.6 to 170.129 (Public).118.112
Allow 153.104.15.0/24 to 170.129 (Public).18.0/24
Deny Any to 170.129 (Public).15.0/24
And Layer 4 “Port Numbers”
- Such as Port 80 (HTTP), 443 (HTTPS), 3389 (RDP)
e.g. allow all external systems to 170.129 (Public).20.101 on port 80
Allow 153.104.15.6:3389 to 170.129 (Public).118.112:3389
Allow 153.104.15.0/24 to 170.129 (Public).18.0/24 on port 443
Deny Any to 170.129 (Public).15.0/24 on port 3389
Layer 7 – Application Firewalls
Newer Firewalls
Can inspect entire packet – including the data
Can set rules on layers 3 and 4 plus:
- Info in the data such as URLs
- Particular applications, regardless of port
Examples:
- Allow port 80 (HTTP) but block Facebook
- Allow port 80 (HTTP) to 170.129 (Public).20.101 but block if URL contains “/admin.php”
Network Zoning
Designing networks to improve security by:
-
Placing systems with similar security requirements in “zones” protected by firewalls
-
These requirements can include:
Services they run
Who accesses them
Who manages them
Operational criticality
Data they store/process
Regulatory requirements
Case-Study Network
20,000+ node network managed by central team
Two primary data centers with 1,000+ servers
Historical use of firewalls
- Perimeter firewalls with minimal ruleset put in place a few years ago
- A few firewall protected VLANs in Data Center for certain administrative and research systems
- Other data center VLANs a “hodge-podge” of administrative, academic, and research systems
Network Zoning Project - Overview
Move all servers into security “zones” behind network firewalls
- Recognized best-practice (ISO, NIST, SANS CSC)
- Hardware firewalls required by policy and regulations (PCI, FISMA)
Asset-based as opposed to perimeter approach to network traffic flow policy
Network Zoning Goals
Place all data center servers behind hardware firewall
Simplify rulesets as much as possible:
- Administrative access
- Services
- User access
Quicker troubleshooting and incident response
Improve intrusion prevention and monitoring
Defense-in-depth
Firewall Contexts
Context: Firewall contexts can be viewed as “virtual” firewalls on the same hardware.
Reasons for configuring separate contexts include:
- Simplify rule sets while maintaining security requirements
- Isolate systems according to security requirements
- Comply with policy and regulatory controls for isolation, monitoring, and logging
Planned Contexts
PCI: Systems processing credit cards
HIPAA: Systems processing/storing Protected Health Info (PHI)
ITS: Systems administered exclusively by central IT team
General: Systems administered by central IT, other IT, and/or vendors
Management: Systems used to manage network devices, building control, or other embedded devices
Other possible:
- Research projects
- Professional Schools (Tuck Business, Thayer Engineering)
VLAN Groups
Grouping of VLANs within a context. These can include:
-
DMZ: VLANS with systems directly accessible by Internal and/or External users.
-
Production: Production systems only directly accessible by administrators and load balancers.
-
Dev/Non-prod: Development and/or non-production systems
Grouping of VLANs within a context. These can include:
-
DMZ and Production will have both Public and Private (10.x) VLANs
-
Dev/Non-prod:
-
- Firewall rule update testing
-
- Allows different inbound, outbound and back-end rules
-
- Policy requirement and best practice
-
- Minimal impact for admins (different IP and checkbox on request)
Example Context and VLAN Table
Access-Lists on Cisco
Access-lists provide basic firewall capabilities on Cisco Routers.
Two types:
- Standard:
Apply to source IP address or Network Only.
Layer 3
- Extended:
Apply to source and destination IP address and/or network
Can also create rule for TCP Ports
Layer 3 and 4
Creating Access Lists
Two-Step Process
In global config mode – use ip access-list command to create list
Apply list to interface with ip access-group command
- Interface config mode
- Specify in or out
- Does list apply to packets entering interface (in) or leaving interface (out)
Step 1 – Extended and Standard
Standard is: ip access-list standard name_of_list
- Then rules:
permit/deny ip_address wildcard_mask
Extended: ip access-list extended name_of_list
- Rules:
permit/deny protocol source_ip wc_mask dst_ip wc_mask (port)
Standard ACL Example
1] Create ACL:
device(config)# ip access-list standard Net1
device(config-std-nacl-Net1)# deny host 10.157.22.26
device(config-std-nacl-Net1)# deny 10.16.4.0 0.0.0.255
device(config-std-nacl-Net1)# permit any
2] Apply to interface
device(config)# int eth 1/1
device(config-if-e10000-1/1)# ip access-group Net1 in
Extended ACL Example
1] Create Access List:
(config)# ip access-list extended MYACL
(config-nacl-myacl)# deny tcp host 10.0.0.2 host 10.0.1.2 eq 80
(config-nacl-myacl)# deny tcp 10.0.0.0 0.0.0.255 10.0.1.0 0.0.0.255 eq 23
(config-nacl-myacl)# permit ip any any
2] Apply to Interface
(config)# interface fastEthernet 0/0
(config-if)# ip access-group MYACL in
Access-list Gotchas
Rules applied in order – top to bottom
_Hidden “Deny all” by default: _
- When access lists are applied to an interface, a default “deny all all” is applied at the bottom
- _So, must apply a “permit any” at the end of your list if appropriate
Regular ACLs cannot be reordered: Must delete and recreate if order is messed up
Watch your INs/OUTs: Think of the packet flow. IN is entering the interface, OUT is leaving the interface