1 / 27

Penetration testing Security Analysis and Advanced Tools:

Penetration testing Security Analysis and Advanced Tools:. Designing a DMZ. Introduction to Designing a DMZ. DMZ (demilitarized zone) Computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network

beulah
Télécharger la présentation

Penetration testing Security Analysis and Advanced Tools:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Penetration testingSecurity Analysis and Advanced Tools: Designing a DMZ

  2. Introduction to Designing a DMZ • DMZ (demilitarized zone) • Computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network • Network construct that provides secure segregation of networks that host services for users, visitors, or partners • DMZ use has become a necessary method of providing a multilayered, defense-in-depth approach to security

  3. Introduction to Designing a DMZ (cont’d.) Firewalls are essential for the secure segregation of networks.

  4. DMZ Concepts • DMZ has proven to be more secure and to offer multiple layers of protection for the security of the protected networks and machines • Bastion host • Device in a DMZ that is built to withstand attacks • Multitiered Firewall with a DMZ Flow • DMZ is established, separated, and protected from both the internal and external networks

  5. DMZ Concepts (cont’d.) A multitiered firewall is useful for protection from both internal and external networks.

  6. DMZ Design Fundamentals • DMZ designs generally consist of • Firewalls and segments that are protected from each other by firewall rules and routing as well as the use of RFC 1918 addressing on the internal network • Design of the DMZ is critically important to the overall protection of the internal network • Access control lists (ACLs) • Determine who is allowed access to an item in a network and how that item can be used • DMZ Protocols • See next slide

  7. DMZ Design Fundamentals (cont’d.) Certain protocols are vulnerable to attack and should be used with caution.

  8. Advanced Design Concepts • Internal Network Access • Consider the methods that might be used to provide VPN services • Limit or restrict outbound traffic from the internal network to inappropriate services • Provide for out-of-band management capabilities • Remote Administration • Extremely tempting to use the built-in capabilities of the various operating systems and the management software provided for many hardware devices • It is very important to thoroughly review alternatives

  9. Advanced Design Concepts (cont’d.) • Authentication • Generally inappropriate to locate a RADIUS or TACACS+ server in a DMZ segment • It might be necessary to implement a plan to accommodate the authentication of users entering the DMZ from a public network • DMZ design should include a separate authentication DMZ segment • Equipment in that segment should be hardened

  10. DMZ Architecture • Inside-Versus-Outside Architecture • Packet-filtering routers act as initial line of defense • Three-Homed Firewall Architecture • DMZ handles the traffic between the internal network and firewall, as well as the traffic between the firewall and DMZ • Weak-Screened Subnet Architecture • Used when routers have better high-bandwidth data-stream handling capacity • Strong-Screened Subnet Architecture • Both the DMZ and the internal networks are protected by a well-functioning firewall

  11. Designing a DMZ Using IPtables The inside and outside firewalls in a DMZ serve multiple functions.

  12. Designing a Wireless DMZ • Categories of attacks on wireless networks: • Passive attacks • Active attacks • Man-in-the-middle attacks • Jamming attacks • Placement of Wireless Equipment • Depends on needed accessibility area for the WLAN • Access to DMZ and Authentication Considerations • Access to DMZ Services • Authentication Considerations

  13. Designing a Wireless DMZ (cont’d.) • Wireless DMZ Components • Access Points • Network Adapters • Authentication Servers • Enterprise Wireless Gateways and Wireless Gateways • Firewalls and Screening Routers • Wireless DMZ Using RADIUS to Authenticate Users • See Figure 5-12 • WLAN DMZ security best practices include • Perform a risk analysis of the network • Develop relevant and comprehensive security policies

  14. Designing a Wireless DMZ (cont’d.) A RADIUS server can be used to provide authentication at an access point.

  15. Specific Operating System Design • Designing a Windows-Based DMZ • Select all the needed networking hardware • Scale up the number of connections to the Internet • Add more bandwidth and site-to-site VPN services • Set up a load-balanced solution • Make sure that users can obtain the information they need • Segment Internet-based resources via the DMZ for an added level of safety • Finalize the network layout

  16. Specific Operating System Design (cont’d.) • Precautions for DMZ Setup • Designer should consider other possible access to and from the DMZ • Security Analysis for the DMZ • After the DMZ network segment design is finalized and the systems are placed where they need to be, the security of such systems should be taken into account • ISA Server Support to DMZ Configuration • ISA firewall network needs to be created for the wireless DMZ segment • ISA firewall networks are defined depending on per-network interfaces

  17. Specific Operating System Design (cont’d.) • Designing a Sun Solaris DMZ • Features include zones, ZFS, and Reduced Networking Software Group • Placement of Servers • Depends on network requirements • Smaller networks generally place the DMZ server directly behind the router • Advanced Implementation of a Solaris DMZ Server • See Figure 5-17 • Solaris DMZ Servers in a Conceptual Highly Available Configuration • See Figure 5-18

  18. Specific Operating System Design (cont’d.) places a switch between the router and the DMZ server.

  19. Specific Operating System Design (cont’d.) In this conceptual Solaris configuration, three DMZs are connected to the external network switch.

  20. Specific Operating System Design (cont’d.) • Designing a Sun Solaris DMZ (cont’d.) • Private and Public Network Firewall Rule Set • Private Network Rules • Public Network Rules • DMZ Server Firewall Rule Set • Generally, the best policy is to deny all traffic to the host from all systems • Solaris DMZ System Design (phases) • Planning • Implementation • Maintenance

  21. Specific Operating System Design (cont’d.) • Designing a Sun Solaris DMZ (cont’d.) • Hardening Checklists for DMZ Servers and Solaris • Has a model or diagram of the host been made? • Is the host physically secured? • Designing a Linux DMZ • Ethernet Interface Requirements and Configuration • Traffic Routing Between Public and DMZ Servers • Protecting Internet Servers (Using DMZ Networks) • Disable all unnecessary services • Run services “chrooted” whenever possible • Use Firewall Security Policy and Anti-IP-Spoofing Features

  22. Specific Operating System Design (cont’d.) A common Linux DMZ configuration uses a Linux firewall and three Ethernet cards.

  23. DMZ Router Security Best Practices • Checklist for ensuring router security: • Authenticate routing updates on dynamic routing protocols • Use ACLs to protect network resources and prevent address spoofing • Secure the management interfaces • Lock down the router services • Disable interface-related services • Disable unneeded services • Keep up to date on IOS bug fixes and vulnerabilities

  24. DMZ Switch Security Best Practices • Checklist to follow to ensure switch security: • Secure the management interfaces • Lock down the switch services • Disable unneeded services • Use VLANs to logically segment a switch and PVLANs to isolate hosts on a VLAN • Use port security to secure the input to an interface by limiting and identifying the MAC addresses of hosts that are allowed to access the port • Do not use VTP on DMZ switches • Keep up to date on IOS bug fixes and vulnerabilities, and upgrade if necessary

  25. Six Ways to Stop Data Leaks • Consider: • Get a handle on the data • Monitor content in motion • Keep an eye on databases • Limit user privileges • Cover those endpoints • Centralize intellectual property data • Tool: Reconnex • Enables an organization to protect all information assets on its network without requiring up-front knowledge of what needs to be protected

  26. Summary • A DMZ functions as a “neutral zone” between an internal and external network • Multitiered firewalls are often used when there is a need to provide more than one type of service to the public • DMZ designers should be aware of protocol vulnerabilities • It is generally inappropriate to locate a RADIUS or TACACS+ server in a DMZ segment • DMZs for wireless networks must be set up with certain conditions in mind

  27. Summary (cont’d.) • A three-homed firewall DMZ handles the traffic between the internal network and firewall, as well as the traffic between the firewall and DMZ • A site survey can be conducted to determine the proper number of access points needed based on the expected number of users and the specific environment for a WLAN • Authentication may not be desired if a network is publicly accessible • An access point is a layer-2 device that serves as an interface between the wireless network and the wired network

More Related