Hands-On Activity. Firewall Simulation. Simulated Network. Firewall Simulation 3/19/2010. On Friday, February 26, we will be meeting in

Similar documents
Firewall Simulation COMP620

Advanced Security and Forensic Computing

4. The transport layer

CSC Network Security

CCNA Access List Questions

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.

Extended ACL Configuration Mode Commands

Advanced Security and Mobile Networks

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

Lab Configure ACLs in the PIX Security Appliance using CLI

Appendix B Policies and Filters

Implementing Traffic Filtering with ACLs

Configuring IPv6 ACLs

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Lab 6: Access Lists. Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/ R1

Understanding Access Control Lists (ACLs) Semester 2 v3.1

BCM50 Rls 6.0. Router - IP Firewall. Task Based Guide

Configuring Commonly Used IP ACLs

Context Based Access Control (CBAC): Introduction and Configuration

IP Services Commands. Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services IP1R-157

7 Filtering and Firewalling

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

Access Control List Overview

Global Information Assurance Certification Paper

Lab b Simple Extended Access Lists

Object Groups for ACLs

6 Network Security Elements

2002, Cisco Systems, Inc. All rights reserved.

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Wireless LANs (CO72047) Bill Buchanan, Reader, School of Computing.

IP Named Access Control Lists

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &

Adding an Extended Access List

Named ACL Support for Noncontiguous Ports on an Access Control Entry

IP Services Commands. Network Protocols Command Reference, Part 1 P1R-95

Different Layers Lecture 21

Adding an IPv6 Access List

Object Groups for ACLs

Prof. Bill Buchanan Room: C.63

Three interface Router without NAT Cisco IOS Firewall Configuration

SE 4C03 Winter 2005 Network Firewalls

Application Firewall-Instant Message Traffic

IP Access List Entry Sequence Numbering

Application Firewall-Instant Message Traffic Enforcement

Object Groups for ACLs

Teacher s Reference Manual

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports

How to Create an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values,

Cisco IOS Firewall Authentication Proxy

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports

Internet Security: Firewall

Static Application Mapping Using Performance Routing

Introduction to Firewalls using IPTables

CS356 Lab NIL (Lam) In this lab you will learn: Cisco 2600 Router Configuration Static Routing PartB 20 min Access Control Lists PartC 30 min Explore!

GSS Administration and Troubleshooting

Step-by-Step Configuration

Antonio Cianfrani. Access Control List (ACL) Part I

Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports

ACL Rule Configuration on the WAP371

Access List Commands

Information about Network Security with ACLs

Stateless Firewall Implementation

Introduction to Network Security Missouri S&T University CPE 5420 Network Access Control

Packet Tracer Simulation - TCP and UDP Communications

Access List Commands

Access Control Lists and IP Fragments

HOW TURBO ACL S WORK

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Lab - Troubleshooting ACL Configuration and Placement Topology

VII. Corente Services SSL Client

PreLab for CS356 Lab NIL (Lam) (To be submitted when you come for the lab)

Validate Pre-Deployment and Live Networks and Applications

CSCD 330 Network Programming Spring Lecture 1 - Course Details

Step-by-Step Configuration

NAT Support for Multiple Pools Using Route Maps

ACL Compliance Director Tutorial

Firewall Policy. Edit Firewall Policy/ACL CHAPTER7. Configure a Firewall Before Using the Firewall Policy Feature

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists

Access List Commands

Sybex CCENT Chapter 12: Security. Instructor & Todd Lammle

Training UNIFIED SECURITY. Signature based packet analysis

IP Access List Overview

Meeting 40. CEH Networking

Web server Access Control Server

IP Access List Overview

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch

Lab 1: Packet Sniffing and Wireshark

This appendix contains job aids and supplementary information that cover the following topics:

Creating an IP Access List to Filter IP Options, TCP Flags, or Noncontiguous Ports

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

CSE 403 Spring UDub Mail. Gabriel Maganis Sachin Pradhan. April 04, 2006

Download the latest version of the DNS2Go Client from:

IP Access List Entry Sequence Numbering

Step-by-Step Configuration

Inspection of Router-Generated Traffic

IP Access List Entry Sequence Numbering

Choices for Using Wildcard Masks

Why Firewalls? Firewall Characteristics

Transcription:

Hands-On Activity Firewall Simulation COMP620 On Friday, February 26, we will be meeting in the Graham 212 lab to participate in a firewall configuration simulation. This simulator was written by Dr. Williams with help from several A&T students for an NSF funded workshop Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax. Participants can take benign or malicious actions against other players to score points. The interactive and competitive nature of the simulation helps students learn about firewalls while having fun. Simulated Network During the simulation you assume the role of network administrator and are required to configure your firewall to protect your network You can also attack the simulated networks of other students. If you are successful, you will earn points and the other student will lose points. During the simulation the security requirements will change requiring you to change your firewall s configuration. 1

Real World Security The firewall simulator is a Java applet that runs in a browser and communicates with a server program The applet is signed using a self generated certificate. Your browser will warn you about the evil Ken Williams. The Windows firewall may complain about using UDP port 49,876 although it seems to work. Firewall Configuration Window Simulation Process When you first start, you must enter your name to identify yourself to other participants. i t Configure your firewall to allow needed services while preventing attacks. Once the actions are enabled, you can take actions against other players. Reconfigure your firewall whenever necessary to correct problems. New tasks will appear that may require you to reconfigure your firewall. 2

Cisco-Like Configuration Syntax Address Formats access-list number {permit deny} [protocol] {any ipaddr mask host ipaddr} {any ipaddr mask host ipaddr} [operator port established] [log] The entire access-list command must be written on one line. You can specify a source or destination IP address in three different formats: any all addresses match host 12.34.56.78 This address matches one specific computer with the given address IPaddress mask This address is compared to the given IP address ignoring the bits that are one in the mask. Example This permits any computer on the Internet to connect to the computer whose IP address is 152.8.1.1 using the TCP protocol and port 443. access-list 111 permit tcp any host 152.8.1.1 eq 443 Example This prevents any UDP traffic from reaching computersin1528100xsubdomain 152.8.100.X subdomain access-list 112 deny udp any 152.8.100.0 0.0.0.255 Note: access-list statements must be written on one line. 3

Order is Important Try It When a packet arrives at your firewall, it will be compared with each access-list statement in the order they appear. The first statement that applies to that packet determines if it is permitted or denied. For incoming traffic, there is an implicit deny everything at the end of the access-lists. For outgoing traffic, there is an implicit permit everything at the end of the access-lists. Write an access statement to allow all users in your network to use the computer at 123.45.67.8 Restricting a Port Port numbers are used to identify specific applications The access-list statement must end with an operator and a port number The operators are: eq equal lt less than gt neq greater than not equal range a range of ports; you must specify two different port numbers Useful Port Numbers 21 FTP 23 Telnet 25 Simple Mail Transport Protocol 53 Domain Name Servers 80 HTTP 110 POP3 client email 123 Network Time Protocol 137-139 Microsoft NETBIOS 143 IMAP4 client email 161 Simple Network Maintenance Protocol 443 HTTPS 445 Windows File Sharing 1863 MSN Instant messaging 3389 Windows Remote Desktop Protocol 5190 AOL instant messenger 4

Example Firewall Configuration This allows FTP traffic to your local server at 152.8.110.47 110 access-list 113 allow tcp any host 152.8.100.0 eq 21 The firewall configuration window should contain all of your access-list commands. Some real firewalls allow you to input only one line at a time or upload a file of commands The simulator assumes the file upload concept Note: access-list statements must be written on one line. Try It Write a firewall configuration statement to allow everyone in your network to receive POP3 email from the server at 211.72.229.163 Your Simulated Network There is a link on the webpage to a diagram of the simulated network showing the computers and their IP addresses. Your domain has the Internet address of 152.8.0.0/16 5

Coming and Going The access-list commands specify source and destination addresses. If the source address starts with 152.8, then the traffic is going out from your network to the Internet. If the source is any other address, then the traffic is coming into your network. Initial Needed Services Access by the public to your web site Email from other email servers using SMTP Domain Name Server access Fairness Once you have successfully attacked another student, you may not initiate the same attack against the same student for 45 seconds When a configuration change is specified, you have 45 seconds before anyone can be attacked related to that change 6

Simulator System Requirements The simulation is designed to run on regular PCs with no special networking restrictions. Participants need a Java enabled browser. Runs on Windows, Linux, etc. Safe to run in a public environment. The web server has to run the central monitor program. UDP port 49876 has to be open on real firewalls. 7