Unaprjeñenje sigurnosti u mrežama pružatelja

Similar documents
Device Resiliency and Survivability

Network Infrastructure Filtering at the border. stole slides from Fakrul Alam

Network security session 9-2 Router Security. Network II

Cisco Router Security: Principles and Practise. The foundation of network security is router security.

AutoSecure. Finding Feature Information. Last Updated: January 18, 2012

Network Infrastructure Filtering at the border. PacNOG19 28th November - 2nd December 2016 Nadi, Fiji

CCNP (Routing & Switching and T.SHOOT)

Configuring VRF-lite CHAPTER

Implementing Cisco IP Routing

Welcome! APNIC Security Tutorial. Securing edge network devices. Overview

CISCO NETWORK FOUNDATION PROTECTION: PROTECTING THE CISCO CATALYST SERIES PLATFORM

Contents. Configuring urpf 1

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Network Infra Security Filtering at the Border. Network Security Workshop April 2017 Bali Indonesia

Syllabus. Cisco Certified Design Professional. Implementing Cisco IP Routing

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo

Data Plane Protection. The googles they do nothing.

Appendix B Policies and Filters

Routing Configuration Guide, Cisco IOS XE Everest a (Catalyst 9300 Switches)

Access Rules. Controlling Network Access

2002, Cisco Systems, Inc. All rights reserved.

CCIE Route & Switch Written (CCIERSW) 1.0

Configuring Control Plane Policing

Configuring Control Plane Policing

Question: 1 Which three parameters must match to establish OSPF neighbor adjacency? (Choose three.)

Network Operation Tips and Tricks

Network Infrastructure Filtering at the border. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Note that you can also use the password command but the secret command gives you a better encryption algorithm.

ITBraindumps. Latest IT Braindumps study guide

InterAS Option B. Information About InterAS. InterAS and ASBR

Internet Control Message Protocol (ICMP)

MPLS VPN--Inter-AS Option AB

Network Policy Enforcement

Configuring Control Plane Policing

Connecting to the Management Network and Securing Access

Securing network infrastructure

MPLS VPN Inter-AS Option AB

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0)

HP 6125 Blade Switch Series

CCIE Routing & Switching

Chapter 6 Global CONFIG Commands

IP Services Commands. Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services IP1R-157

Extended ACL Configuration Mode Commands

Borderless Networks Security: Cisco Catalyst 6500 Series Control Plane Protection Techniques for Maximum Uptime

About the HP A7500 Configuration Guides

A Commands CHAPTER. Commands that are identical to those documented in the Cisco IOS software documentation have been removed from this chapter.

DMVPN to Group Encrypted Transport VPN Migration

R&E ROUTING SECURITY BEST PRACTICES. Grover Browning Karl Newell

CCNP TSHOOT. Quick Reference Sheet Exam

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Remote Access MPLS-VPNs

IPv6. Copyright 2017 NTT corp. All Rights Reserved. 1

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Unsupported Commands in Cisco IOS Release 12.2(25)SEE

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

CCNA. The knowledge and skills that a learner must have before attending this course are as follows:

Contents. BGP commands 1

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Access List Commands

CCIE R&S v5.0. Troubleshooting Lab. Q1. PC 110 cannot access R7/R8, fix the problem so that PC 110 can ping R7


Access List Commands

Unicast Reverse Path Forwarding Loose Mode

Using the Management Ethernet Interface

set active-probe (PfR)

Chapter 4 Lab A: Configuring CBAC and Zone-Based Firewalls

Phase 4 Traceback the Attack. 2002, Cisco Systems, Inc. All rights reserved.

Remember Extension Headers?

Exam Actual. Higher Quality. Better Service! QUESTION & ANSWER

WiNG 5.x How-To Guide

Chapter 4 Software-Based IP Access Control Lists (ACLs)

CCIE R&S LAB CFG H2/A5 (Jacob s & Jameson s)

CCNA Practice test. 2. Which protocol can cause high CPU usage? A. NTP B. WCCP C. Telnet D. SNMP Answer: D

Exam Name: Implementing Cisco Edge Network Security Solutions

Organization of Product Documentation... xi

The Loopback Interface

Sink Holes, Dark IP, and HoneyNets

Configuring Commonly Used IP ACLs

Symbols I N D E X. (vertical bar), string searches, 19 20

Cisco CCIE Service Provider.

BRKDCT The Comprehensive Guide to Securing NX-OS Devices Derek Huckaby Technical Marketing Engineer (TME)

Performing Path Traces

WCCPv2 and WCCP Enhancements

HP 6125XLG Blade Switch

Configuring NetFlow and NDE

Exam Questions Demo Cisco. Exam Questions CCIE SP CCIE Service Provider Written Exam

CCIE(Routing & Switching) Course Catalog

Using the Management Ethernet Interface

Configuring IP Unicast Routing

MPLS VPN. 5 ian 2010

HP FlexFabric 5930 Switch Series

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300

Chapter 3 Command List

Configuring IP Version 6

INDEX. BGP Attributes Download. bgp policy accounting command broadcast addresses, used instead of bundle-hash command. cache entries, definition

Transcription:

Unaprjeñenje sigurnosti u mrežama pružatelja usluga Miroslav Šimić miroslav.simic@snt.hr CCIE #19429

Agenda Zaštita mrežne infrastrukture Zaštita na rubovima mreže Uočavanje i sprječavanje napada

Agenda Zaštita mrežne infrastrukture Zaštita na rubovima mreže Uočavanje i sprječavanje napada

Gašenje nepotrebnih servisa CDP: Globalno na cijelom ureñaju router(config)# no cdp run Na pojedinom sučelju router(config-if)# no cdp enable Directed Broadcast (SMURF napad): router(config-if)# no ip directed-broadcast U verziji IOS-a 11.2 i kasnijim verzijama ta je funkcionalnost isključena.

Gašenje nepotrebnih servisa Finger: Prije 12.1(5) i 12.1(5)T bio je uključen router(config)# no service finger Nakon 12.1(5) i 12.1(5)T je isključen. Ako ga treba isključiti: router(config)# no ip finger Maintenance Operations Protocol (MOP) router(config-if)# no mop enabled HTTP Server Isključen je. Ako ga treba isključiti: router(config)# no ip http server

Gašenje nepotrebnih servisa IP BOOTP Server router(config)# no ip bootp server IP Redirects router(config-if)# no ip redirects IP Source Routing router(config)# no ip source-route

Gašenje nepotrebnih servisa PAD router(config)# no service pad Proxy ARP router(config-if)# no ip proxy-arp Ident router(config)# no ip identd TCP i UDP small servers echo, chargen, daytime and discard services router(config)# no service tcp-small-servers router(config)# no service udp-small-servers

Implementacija korisnih alata i servisa Authentication, authorization, and accounting (AAA) Praćenje i spremanje konfiguracija Logiranje poruka Syslog Network Time Protocol (NTP) Out-of-band pristup ureñajima

Osnovne tehnike za zaštitu mreže Input Queues router(config-if)# hold-queue 1500 ICMP Unreachable router(config-if)# no ip unreachables router(config)# ip icmp rate-limit unreachable [df] milliseconds router(config)# mls rate-limit unicast ip icmp unreachable (SUP720 hardware based rate limit) Scheduler allocation router(config)# scheduler interval 500 router(config)# scheduler allocate 4000 1000

Osnovne tehnike za zaštitu mreže Skrivanje mreže MPLS VPN MPLS Core je sakriven, korisnik ima pristup samo PE usmjerniku Router(config)# no mpls ip propagate-ttl [forwarded local]

Kontrola prometa koji pristupa procesoru Control Plane Policing - COPP Usmjerivački protokoli Upravljački promet telnet, SSH, SNMP Promet koji kao odredište ima IP adresu koja se nalazi na samom ureñaju Razni drugi prometi ICMP, IP Options

Kontrola prometa koji pristupa procesoru Centralizirani COPP router(config)# control-plane router(config-<<???>>)# service-policy {input output} service_policy_name COPP na distribuiranim platformama 12000 router(config)# control-plane router(config-<<???>>)# service-policy input service_policy_name router(config)# control-plane slot slot_number router(config-<<???>>)# service-policy input service_policy_name Sup 720 router(config)# mls qos router(config)# control-plane router(config-<<???>>)# service-policy input service_policy_name router(config)# mls qos protocol arp police bps

Kontrola prometa koji pristupa procesoru Receive Access Control List router(config)# ip receive access-list num

Agenda Zaštita mrežne infrastrukture Zaštita na rubovima mreže Uočavanje i sprječavanje napada

Zaštita na rubovima mreže Infrastructure Protection Access Control Lists iacl

Zaštita na rubovima mreže 1. Dio! Deny your infrastructure space as a source of external packets access-list 101 deny ip your_public_infrastructure_block any! Deny src addresses of 0.0.0.0 and 127/8 (special useipv4 addresses) access-list 101 deny ip host 0.0.0.0 any access-list 101 deny ip 127.0.0.0 0.255.255.255 any! Deny RFC1918 space from entering AS access-list 101 deny ip 10.0.0.0 0.255.255.255 any access-list 101 deny ip 172.16.0.0 0.0.15.255 any access-list 101 deny ip 192.168.0.0 0.0.255.255 any

Zaštita na rubovima mreže 2. dio! Permit ebgp session access-list 101 permit tcp host bgp_peer host local_ip eq 179 access-list 101 permit tcp host bgp_peer eq 179 host local_ip! Permit OSPF access-list 101 permit ospf host ospf_neighbour host 224.0.0.5! Permit DR multicast address, if needed access-list 101 permit ospf host ospf_neighbour host 224.0.0.6 access-list 101 permit ospf host ospf_neighbour host local_ip 3. dio! Deny all other access to infrastructure access-list 101 deny ip any your_public_infrastructure_block 4. dio! Permit transit traffic (ISP). access-list 101 permit ip any any

Zaštita na rubovima mreže Filtriranje prometa od korisnika! Permit ebgp session access-list 101 permit tcp host bgp_peer host local_ip eq 179 access-list 101 permit tcp host bgp_peer eq 179 host local_ip! Permit OSPF access-list 101 permit ospf host ospf_neighbour host 224.0.0.5! Permit DR multicast address, if needed access-list 101 permit ospf host ospf_neighbour host 224.0.0.6 access-list 101 permit ospf host ospf_neighbour host local_ip! Deny access to infrastructure access-list 101 deny ip any your_public_infrastructure_block! Permit transit traffic (ISP). access-list 101 permit ip user_address_block any! Deny any other traffic. access-list 101 deny ip any any

Agenda Zaštita mrežne infrastrukture Zaštita na rubovima mreže Uočavanje i sprječavanje napada

Uočavanje i sprječavanje napada ACL Extended IP access list 169 permit icmp any any echo (2 matches) permit icmp any any echo reply (21374 matches) permit udp any any eq echo permit udp any eq echo any permit tcp any any established (150 matches) permit tcp any any (15 matches) permit ip any any (45 matches)

Netflow Uočavanje i sprječavanje napada

Uočavanje i sprječavanje napada Sink Holes

Uočavanje i sprječavanje napada Sink Holes

Uočavanje i sprječavanje napada Sink Holes

Uočavanje i sprječavanje napada Sink Holes! Static route to 96.0.0.0 /3 network ip route 96.0.0.0 63.255.255.255 192.0.2.200!...! ip arp 192.0.2.200 00.00.0c.12.34.56 arpa!

Uočavanje i sprječavanje napada Black Holes ip route 171.xxx.xxx.1 255.255.255.255 Null0

Uočavanje i sprječavanje napada Remote trigered Black Hole

Uočavanje i sprječavanje napada Remote trigered Black Hole preusmjeravanje po odredišnoj adresi Svi ruteri: ip route 192.0.2.0 255.255.255.0 Null0

Uočavanje i sprječavanje napada Remote trigered Black Hole preusmjeravanje po odredišnoj adresi Ruter sa kojega se oglašava ruta: router bgp 999... redistribute static route-map STATIC-TO-BGP! route-map STATIC-TO-BGP permit 10 match tag 66 set ip next-hop 192.0.2.1 set local-preference 50 set community no-export 999:000! Route-map STATIC-TO-BGP permit 20! ip route 171.xxx.xxx.1 255.255.255.255 Null0 Tag 66!

Uočavanje i sprječavanje napada Remote trigered Black Hole preusmjeravanje po source adresi (Unicast Reverse Path Forwarding (urpf) Loose mode) Svi ruteri:! interface FastEthernet2/0 ip address 192.xxx.xxx.50 255.255.255.0 ip verify unicast source reachable-via any... speed 100 full-duplex!

Uočavanje i sprječavanje napada Remote trigered Black Hole preusmjeravanje po source adresi Ruter sa kojega se oglašava ruta: router bgp 999... redistribute static route-map STATIC-TO-BGP! route-map STATIC-TO-BGP permit 10 match tag 66 set ip next-hop 192.0.2.1 set local-preference 50 set community no-export 999:000! Route-map STATIC-TO-BGP permit 20! ip route 171.xxx.xxx.1 255.255.255.255 Null0 Tag 66!

Uočavanje i sprječavanje napada Cisco Traffic Anomaly Detector Module Cisco Anomaly Guard Module

Miroslav Šimić, dipl. ing. miroslav.simic@snt.hr CCIE #19429 www.snt-world.com