| Introduction |
|
1 | (6) |
|
Who Should Read This Book |
|
|
1 | (1) |
|
Why We Created This Book's Second Edition |
|
|
1 | (1) |
|
Overview of the Book's Contents |
|
|
2 | (1) |
|
|
|
3 | (4) |
| I The Essentials of Network Perimeter Security |
|
|
1 Perimeter Security Fundamentals |
|
|
7 | (16) |
|
|
|
8 | (3) |
|
|
|
8 | (1) |
|
|
|
8 | (1) |
|
|
|
8 | (1) |
|
Intrusion Detection Systems |
|
|
9 | (1) |
|
Intrusion Prevention Systems |
|
|
9 | (1) |
|
|
|
9 | (1) |
|
|
|
10 | (1) |
|
De-Militarized Zones and Screened Subnets |
|
|
10 | (1) |
|
|
|
11 | (10) |
|
Components of Defense in Depth |
|
|
12 | (9) |
|
Case Study: Defense in Depth in Action |
|
|
21 | (1) |
|
|
|
22 | (1) |
|
|
|
23 | (32) |
|
TCP/IP Primer: How Packet Filtering Works |
|
|
23 | (1) |
|
|
|
24 | (1) |
|
TCP's Three-way Handshake |
|
|
25 | (1) |
|
The Cisco Router as a Packet Filter |
|
|
26 | (1) |
|
An Alternative Packer Filter: IPChains |
|
|
26 | (1) |
|
|
|
27 | (2) |
|
|
|
28 | (1) |
|
|
|
28 | (1) |
|
Effective Uses of Packet-Filtering Devices |
|
|
29 | (7) |
|
Filtering Based on Source Address: The Cisco Standard ACL |
|
|
29 | (7) |
|
|
|
36 | (1) |
|
Tracking Rejected Traffic |
|
|
37 | (3) |
|
Filtering by Port and Destination Address: The Cisco Extended ACL |
|
|
37 | (1) |
|
|
|
37 | (3) |
|
Problems with Packet Filters |
|
|
40 | (7) |
|
Spoofing and Source Routing |
|
|
41 | (1) |
|
|
|
41 | (1) |
|
Opening a "Hole" in a Static Packet Filter |
|
|
42 | (1) |
|
Two-way Traffic and the established Keyword |
|
|
43 | (2) |
|
Protocol Problems: Extended Access Lists and FTP |
|
|
45 | (2) |
|
Dynamic Packet Filtering and the Reflexive Access List |
|
|
47 | (6) |
|
FTP Problems Revisited with the Reflexive Access List |
|
|
49 | (1) |
|
Reflexive ACLs with UDP and ICMP Traffic: Clearing Up DNS Issues |
|
|
50 | (1) |
|
Trouble in Paradise: Problems with Reflexive Access Lists |
|
|
50 | (2) |
|
|
|
52 | (1) |
|
|
|
53 | (1) |
|
|
|
53 | (2) |
|
|
|
55 | (32) |
|
How a Stateful Firewall Works |
|
|
55 | (1) |
|
|
|
56 | (13) |
|
Transport and Network Protocols and State |
|
|
57 | (5) |
|
Application-Level Traffic and State |
|
|
62 | (7) |
|
Stateful Filtering and Stateful Inspection |
|
|
69 | (17) |
|
Stateful Firewall Product Examples |
|
|
70 | (16) |
|
|
|
86 | (1) |
|
|
|
86 | (1) |
|
|
|
87 | (18) |
|
|
|
88 | (4) |
|
Pros and Cons of Proxy Firewalls |
|
|
92 | (3) |
|
Advantages of Proxy Firewalls |
|
|
92 | (2) |
|
Disadvantages of Proxy Firewalls |
|
|
94 | (1) |
|
|
|
95 | (5) |
|
|
|
95 | (2) |
|
|
|
97 | (1) |
|
|
|
98 | (2) |
|
|
|
100 | (3) |
|
|
|
100 | (1) |
|
|
|
101 | (1) |
|
|
|
102 | (1) |
|
|
|
103 | (2) |
|
|
|
105 | (20) |
|
|
|
105 | (8) |
|
Active Policy Enforcement |
|
|
106 | (1) |
|
|
|
107 | (6) |
|
|
|
113 | (6) |
|
|
|
113 | (1) |
|
Communicate Your Findings |
|
|
114 | (1) |
|
Create or Update the Security Policy as Needed |
|
|
114 | (1) |
|
Determine Policy Compliance |
|
|
115 | (1) |
|
Sound Out the Organization's Rules and Culture |
|
|
115 | (2) |
|
|
|
117 | (1) |
|
|
|
118 | (1) |
|
|
|
119 | (3) |
|
Real-world Operations and Policy |
|
|
119 | (3) |
|
|
|
122 | (1) |
|
|
|
122 | (1) |
|
|
|
122 | (3) |
| II Fortifying the Security Perimeter |
|
|
|
|
125 | (36) |
|
The Router as a Perimeter Device |
|
|
125 | (5) |
|
|
|
126 | (2) |
|
|
|
128 | (2) |
|
The Router as a Security Device |
|
|
130 | (10) |
|
The Router as a Part of Defense in Depth |
|
|
130 | (5) |
|
The Router as a Lone Perimeter Security Solution |
|
|
135 | (5) |
|
|
|
140 | (18) |
|
|
|
140 | (1) |
|
Locking Down Administration Points |
|
|
140 | (2) |
|
|
|
142 | (2) |
|
|
|
144 | (1) |
|
|
|
144 | (1) |
|
Configuration Management Tricks with TFTP and Scripts |
|
|
145 | (1) |
|
Simple Network Management Protocol |
|
|
145 | (4) |
|
Disable Unneeded Services |
|
|
149 | (2) |
|
Configure NTP and NTP Authentication |
|
|
151 | (1) |
|
Cisco TCP Keepalives Services |
|
|
152 | (1) |
|
Unicast Reverse Path Forwarding |
|
|
153 | (1) |
|
Internet Control Message Protocol Blocking |
|
|
153 | (2) |
|
Spoofing and Source Routing |
|
|
155 | (1) |
|
|
|
155 | (2) |
|
Automatic Securing and Auditing of Cisco Routers |
|
|
157 | (1) |
|
|
|
158 | (3) |
|
7 Virtual Private Networks |
|
|
161 | (40) |
|
|
|
161 | (4) |
|
|
|
162 | (3) |
|
Advantages and Disadvantages of VPNs |
|
|
165 | (5) |
|
|
|
166 | (2) |
|
|
|
168 | (2) |
|
|
|
170 | (23) |
|
|
|
171 | (2) |
|
|
|
173 | (4) |
|
IPSec Security Protocols AH and ESP |
|
|
177 | (6) |
|
IPSec Configuration Examples |
|
|
183 | (10) |
|
Other VPN Protocols: PPTP and L2TP |
|
|
193 | (5) |
|
|
|
193 | (1) |
|
|
|
194 | (1) |
|
Comparison of PPTP, L2TP, and IPSec |
|
|
195 | (1) |
|
|
|
195 | (3) |
|
|
|
198 | (1) |
|
|
|
199 | (2) |
|
8 Network Intrusion Detection |
|
|
201 | (22) |
|
Network Intrusion Detection Basics |
|
|
201 | (9) |
|
The Need for Intrusion Detection |
|
|
202 | (1) |
|
|
|
203 | (1) |
|
|
|
204 | (1) |
|
False Positives and False Negatives |
|
|
205 | (2) |
|
Alerting, Logging, and Reporting |
|
|
207 | (1) |
|
Intrusion Detection Software |
|
|
208 | (1) |
|
Intrusion-Related Services |
|
|
209 | (1) |
|
The Roles of Network IDS in a Perimeter Defense |
|
|
210 | (3) |
|
|
|
210 | (1) |
|
Detecting Attacks from Your Own Hosts |
|
|
211 | (1) |
|
Incident Handling and Forensics |
|
|
211 | (1) |
|
Complementing Other Defense Components |
|
|
212 | (1) |
|
|
|
213 | (4) |
|
Deploying Multiple Network Sensors |
|
|
213 | (1) |
|
Placing Sensors Near Filtering Devices |
|
|
213 | (1) |
|
Placing IDS Sensors on the Internal Network |
|
|
214 | (1) |
|
|
|
215 | |
|
Processing in High-traffic Situation, |
|
|
213 | (2) |
|
|
|
215 | (1) |
|
Using an IDS Management Network |
|
|
216 | (1) |
|
Maintaining Sensor Security |
|
|
216 | (1) |
|
|
|
217 | (5) |
|
Case Study 1: Simple Network Infrastructure |
|
|
217 | (1) |
|
Case Study 2: Multiple External Access Points |
|
|
218 | (2) |
|
Case Study 3: Unrestricted Environment |
|
|
220 | (2) |
|
|
|
222 | (1) |
|
|
|
223 | (22) |
|
The Need for Host Hardening |
|
|
223 | (2) |
|
Removing or Disabling of Unnecessary Programs |
|
|
225 | (7) |
|
Controlling Network Services |
|
|
225 | (5) |
|
Removing Extraneous Software Components |
|
|
230 | (2) |
|
Limiting Access to Data and Configuration Files |
|
|
232 | (1) |
|
Controlling User and Privileges |
|
|
233 | (5) |
|
Managing Unattended Accounts |
|
|
233 | (1) |
|
Protecting Administrative Accounts |
|
|
234 | (1) |
|
Enforcing Strong Passwords |
|
|
235 | (2) |
|
Controlling Group Membership |
|
|
237 | (1) |
|
Maintaining Host Security Logs |
|
|
238 | (2) |
|
Windows Logging and Auditing |
|
|
238 | (1) |
|
UNIX Logging and Auditing |
|
|
238 | (2) |
|
|
|
240 | (1) |
|
Additional Hardening Guidelines |
|
|
241 | (2) |
|
Automating Host-Hardening Steps |
|
|
241 | (1) |
|
Common Security Vulnerabilities |
|
|
242 | (1) |
|
|
|
242 | (1) |
|
|
|
243 | (2) |
|
10 Host Defense Components |
|
|
245 | (28) |
|
|
|
245 | (4) |
|
Workstation Considerations |
|
|
246 | (2) |
|
|
|
248 | (1) |
|
|
|
249 | (3) |
|
Strengths of Antivirus Software |
|
|
249 | (1) |
|
Limitations of Antivirus Software |
|
|
250 | (2) |
|
|
|
252 | (9) |
|
Firewalls for Workstations |
|
|
253 | (3) |
|
|
|
256 | (5) |
|
Host-Based Intrusion Detection |
|
|
261 | (7) |
|
The Role off-lost-Based IDS |
|
|
261 | (1) |
|
Host-Based IDS Categories |
|
|
262 | (6) |
|
Challenges of Host Defense Components |
|
|
268 | (3) |
|
Defense Components on Compromised hosts |
|
|
269 | (1) |
|
Controlling Distributed Host Defense Components |
|
|
269 | (2) |
|
|
|
271 | (1) |
|
|
|
271 | (2) |
|
11 Intrusion Prevention Systems |
|
|
273 | (28) |
|
Rapid Changes in the Marketplace |
|
|
273 | (1) |
|
|
|
274 | (3) |
|
|
|
276 | (1) |
|
|
|
276 | (1) |
|
An IPS Must Be Accurate and Up to Date |
|
|
276 | (1) |
|
An. IPS Must Have the Ability to Nullify an Attack |
|
|
277 | (1) |
|
|
|
277 | (2) |
|
An Excuse to Ignore Sound Practice |
|
|
278 | (1) |
|
An IPS Simply Buys You Time |
|
|
278 | (1) |
|
|
|
279 | (14) |
|
|
|
280 | (5) |
|
|
|
285 | (6) |
|
Switch NIPS Deployment Recommendations |
|
|
291 | (2) |
|
Host-Based Intrusion Prevention Systems |
|
|
293 | (5) |
|
Real-world Defense Scenarios |
|
|
293 | (1) |
|
Dynamic Rule Creation for Custom Applications |
|
|
294 | (1) |
|
Monitoring File Integrity |
|
|
294 | (1) |
|
Monitoring Application Behavior |
|
|
295 | (1) |
|
|
|
295 | (1) |
|
|
|
296 | (1) |
|
|
|
296 | (1) |
|
|
|
297 | (1) |
|
|
|
298 | (3) |
| III Designing a Secure Network Perimeter |
|
|
12 Fundamentals of Secure Perimeter Design |
|
|
301 | (24) |
|
Gathering Design Requirements |
|
|
302 | (13) |
|
Determining Which Resources to Protect |
|
|
302 | (4) |
|
Determining Who the Potential Attackers Are |
|
|
306 | (3) |
|
Defining Your Business Requirements |
|
|
309 | (6) |
|
Design Elements for Perimeter Security |
|
|
315 | (8) |
|
|
|
315 | (3) |
|
|
|
318 | (2) |
|
|
|
320 | (3) |
|
|
|
323 | (1) |
|
|
|
323 | (2) |
|
|
|
325 | (28) |
|
|
|
325 | (9) |
|
|
|
326 | (3) |
|
|
|
329 | (5) |
|
|
|
334 | (12) |
|
|
|
334 | (4) |
|
|
|
338 | (5) |
|
|
|
343 | (3) |
|
|
|
346 | (4) |
|
|
|
346 | (1) |
|
|
|
347 | (1) |
|
|
|
348 | (1) |
|
|
|
349 | (1) |
|
|
|
350 | (1) |
|
|
|
351 | (2) |
|
14 Wireless Network Security |
|
|
353 | (22) |
|
|
|
353 | (1) |
|
Securing Wireless Networks |
|
|
354 | (13) |
|
|
|
355 | (4) |
|
|
|
359 | (4) |
|
|
|
363 | (3) |
|
Defense in Depth for Wireless Networks |
|
|
366 | (1) |
|
Auditing Wireless Security |
|
|
367 | (2) |
|
Auditing the Wireless Network Design |
|
|
367 | (1) |
|
|
|
368 | (1) |
|
Case Study: Effective Wireless Architecture |
|
|
369 | (4) |
|
|
|
373 | (1) |
|
|
|
373 | (2) |
|
|
|
375 | (20) |
|
Software Architecture and Network Defense |
|
|
375 | (2) |
|
The Importance of Software Architecture |
|
|
376 | (1) |
|
The Need to Evaluate Application Security |
|
|
377 | (1) |
|
How Software Architecture Affects Network Defense |
|
|
377 | (5) |
|
Firewall and Packet-Filtering Changes |
|
|
378 | (1) |
|
Web Services and Interapplication Communications |
|
|
378 | (2) |
|
Conflicts with Network Configuration |
|
|
380 | (1) |
|
|
|
381 | (1) |
|
Performance and Reliability |
|
|
382 | (1) |
|
Atypical Operating System |
|
|
382 | (1) |
|
Software Component Placement |
|
|
382 | (3) |
|
Single-System Applications |
|
|
383 | (1) |
|
|
|
383 | (1) |
|
Administrator Access to Systems |
|
|
383 | (1) |
|
Applications for Internal Users Only |
|
|
384 | (1) |
|
Identifying Potential Software Architecture Issues |
|
|
385 | (2) |
|
Software Evaluation Checklist |
|
|
385 | (1) |
|
Sources of Application Information |
|
|
386 | (1) |
|
How to Handle an Unsecurable Application |
|
|
387 | (1) |
|
|
|
387 | (2) |
|
|
|
387 | (1) |
|
Network Configuration and Security |
|
|
388 | (1) |
|
Network Defense Design Recommendations |
|
|
389 | (1) |
|
Case Study: Customer Feedback System |
|
|
389 | (2) |
|
|
|
390 | (1) |
|
Architecture Recommendation |
|
|
391 | (1) |
|
Case Study: Web-Based Online Billing Application |
|
|
391 | (3) |
|
|
|
393 | (1) |
|
Architecture Recommendation |
|
|
394 | (1) |
|
|
|
394 | (1) |
|
|
|
394 | (1) |
|
|
|
395 | (24) |
|
|
|
395 | (5) |
|
|
|
396 | (2) |
|
|
|
398 | (2) |
|
|
|
400 | (5) |
|
|
|
400 | (3) |
|
|
|
403 | (2) |
|
|
|
405 | (1) |
|
|
|
405 | (4) |
|
|
|
406 | (2) |
|
|
|
408 | (1) |
|
|
|
409 | (4) |
|
|
|
410 | (1) |
|
|
|
411 | (1) |
|
IPSec Perimeter Defense Adjustments |
|
|
412 | (1) |
|
|
|
413 | (1) |
|
|
|
413 | (1) |
|
Proprietary VPN Implementations |
|
|
413 | (1) |
|
Compromised or Malicious VPN Clients |
|
|
414 | (1) |
|
|
|
414 | (4) |
|
Case Study: Home Users and Multiple Applications |
|
|
414 | (4) |
|
|
|
418 | (1) |
|
|
|
418 | (1) |
|
17 Tuning the Design for Performance |
|
|
419 | (28) |
|
|
|
419 | (3) |
|
|
|
419 | (2) |
|
Understanding the Importance of Performance in Security |
|
|
421 | (1) |
|
Network Security Design Elements That Impact Performance |
|
|
422 | (10) |
|
The Performance Impacts of Network Filters |
|
|
422 | (3) |
|
|
|
425 | (5) |
|
Case Studies to Illustrate the Performance Impact of Network Security Design Elements |
|
|
430 | (2) |
|
|
|
432 | (7) |
|
|
|
433 | (1) |
|
Understanding Encryption at the Network and Transport Layers |
|
|
433 | (3) |
|
Using Hardware Accelerators to Improve Performance |
|
|
436 | (1) |
|
Case Studies to Illustrate the Performance Impact of Encryption |
|
|
437 | (2) |
|
Using Load Balancing to Improve Performance |
|
|
439 | (2) |
|
Problems with Load Balancing |
|
|
440 | (1) |
|
|
|
440 | (1) |
|
|
|
441 | (1) |
|
Mitigating the Effects of DoS Attacks |
|
|
441 | (4) |
|
|
|
442 | (2) |
|
|
|
444 | (1) |
|
|
|
445 | (1) |
|
|
|
445 | (2) |
|
|
|
447 | (24) |
|
Review of Security Design Criteria |
|
|
447 | (2) |
|
|
|
449 | (19) |
|
Case Study 1: Telecommuter Who Is Using a Broadband Connection |
|
|
450 | (2) |
|
Case Study 2: A Small Business That Has a Basic Internet Presence |
|
|
452 | (4) |
|
Case Study 3: A Small E-Commerce Site |
|
|
456 | (6) |
|
Case Study 4: A Complex E-Commerce Site |
|
|
462 | (6) |
|
|
|
468 | (3) |
| IV Maintaining and Monitoring Perimeter Security |
|
|
19 Maintaining a Security Perimeter |
|
|
471 | (26) |
|
System and Network Monitoring |
|
|
471 | (15) |
|
|
|
472 | (3) |
|
Establishing Monitoring Procedures |
|
|
475 | (8) |
|
Security Considerations for Remote Monitoring |
|
|
483 | (3) |
|
|
|
486 | (4) |
|
|
|
486 | (1) |
|
General Response Guidelines |
|
|
487 | (1) |
|
Responding to Malicious Incidents |
|
|
488 | (1) |
|
Automating Event Responses |
|
|
489 | (1) |
|
|
|
490 | (5) |
|
Fundamentals of Change Management |
|
|
490 | (2) |
|
Implementing Change-Management Controls |
|
|
492 | (3) |
|
|
|
495 | (1) |
|
|
|
496 | (1) |
|
|
|
497 | (20) |
|
The Importance of Network Log Files |
|
|
497 | (5) |
|
Characteristics of Log Files |
|
|
498 | (2) |
|
|
|
500 | (2) |
|
|
|
502 | (6) |
|
Getting Started with Log Analysis |
|
|
502 | (2) |
|
|
|
504 | (3) |
|
|
|
507 | (1) |
|
|
|
508 | (1) |
|
|
|
508 | (1) |
|
|
|
509 | (1) |
|
Analyzing Network Firewall Logs |
|
|
509 | (3) |
|
|
|
509 | (1) |
|
Check Point FireWall-1 Logs |
|
|
510 | (1) |
|
|
|
511 | (1) |
|
Analyzing Host-Based Firewall and IDS Logs |
|
|
512 | (3) |
|
|
|
512 | (1) |
|
|
|
513 | (2) |
|
|
|
515 | (2) |
|
21 Troubleshooting Defense Components |
|
|
517 | (34) |
|
The Process of Troubleshooting |
|
|
517 | (3) |
|
|
|
518 | |
|
|
|
515 | (4) |
|
|
|
519 | (1) |
|
|
|
519 | (1) |
|
|
|
519 | (1) |
|
|
|
519 | (1) |
|
Troubleshooting Rules of Thumb |
|
|
520 | (2) |
|
Make Orin One Change at a Time |
|
|
520 | (1) |
|
|
|
520 | (1) |
|
|
|
520 | (1) |
|
Stay Focused on Fixing the Problem |
|
|
521 | (1) |
|
Don't Implement a Fix That Further Compromises Your Security |
|
|
521 | (1) |
|
The Obvious Problems Are Often Overlooked |
|
|
521 | (1) |
|
Document, Document, Document! |
|
|
521 | (1) |
|
The Troubleshooter's Toolbox |
|
|
522 | (26) |
|
Application Layer Troubleshooting |
|
|
325 | (200) |
|
|
|
525 | (2) |
|
Transport Layer Troubleshooting |
|
|
527 | (13) |
|
Network Layer Troubleshooting |
|
|
540 | (5) |
|
Link Layer Troubleshooting |
|
|
545 | (3) |
|
|
|
548 | (1) |
|
|
|
549 | (2) |
|
|
|
551 | (38) |
|
Roadmap for Assessing the Security of Your Network |
|
|
551 | (2) |
|
|
|
553 | (2) |
|
|
|
555 | (5) |
|
Network Service Discovery |
|
|
560 | (6) |
|
|
|
560 | (3) |
|
|
|
563 | (3) |
|
|
|
566 | (7) |
|
|
|
567 | (1) |
|
|
|
568 | (1) |
|
|
|
569 | (1) |
|
|
|
570 | (2) |
|
|
|
572 | (1) |
|
Verification of Perimeter Components |
|
|
573 | (4) |
|
Preparing for the Firewall Validation |
|
|
573 | (2) |
|
Verifying Access Controls |
|
|
575 | (2) |
|
|
|
577 | (8) |
|
|
|
577 | (2) |
|
|
|
579 | (3) |
|
|
|
582 | (3) |
|
|
|
585 | (1) |
|
Results Analysis and Documentation |
|
|
586 | (1) |
|
|
|
587 | (2) |
|
|
|
589 | (30) |
|
The Hacker Approach to Attacking Networks |
|
|
589 | (1) |
|
|
|
590 | (2) |
|
GIAC GCFW Student Practical Designs |
|
|
592 | (24) |
|
|
|
593 | (13) |
|
|
|
606 | (10) |
|
|
|
616 | (1) |
|
|
|
617 | (2) |
|
24 A Unified Security Perimeter: The Importance of Defense in Depth |
|
|
619 | (22) |
|
Castles: An Example of Defense-in-Depth Architecture |
|
|
620 | (12) |
|
Hard Walls and Harder Cannonballs |
|
|
621 | (1) |
|
|
|
621 | (5) |
|
|
|
626 | (2) |
|
|
|
628 | (4) |
|
|
|
632 | (3) |
|
|
|
632 | (1) |
|
|
|
633 | (2) |
|
|
|
635 | (1) |
|
Defense in Depth with Information |
|
|
635 | (3) |
|
|
|
636 | (1) |
|
Cryptography and Defense in Depth |
|
|
637 | (1) |
|
|
|
638 | (3) |
| V Appendixes |
|
|
A Cisco Access List Sample Configurations |
|
|
641 | (16) |
|
Complete Access List for a Private Only Network |
|
|
641 | (4) |
|
Complete Access List for a Screened Subnet Network That Allot s Public Server Internet Access |
|
|
645 | (5) |
|
Example of a Router Configuration as Generated by the Cisco Auto Secure Feature |
|
|
650 | (7) |
|
|
|
657 | (6) |
|
|
|
657 | (4) |
|
|
|
658 | (1) |
|
Public-Private Key: Asymmetric |
|
|
659 | (1) |
|
Digital Signatures and Hash Algorithms |
|
|
660 | (1) |
|
|
|
661 | (2) |
| Index |
|
663 | |