YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1 CHAKTI N_YU_ G CFW.PDF SAN S G CFW P R A C T I C AL A SS I G N M E N TYuChakTinmicha
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 10Forperformancereason,aminimumoftwointernetlinksaredeployed,withonedevotedto
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 100AnInterfaceConfigurationExample:Asmentionedbefore,VisNetichasitsrulesconfigure
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 101n “In”definestrafficfromRemotetoLocaln “Out”definestrafficfromLocaltoRemot
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 102Settheactionto“Allow”forthisrule,andconfigurethefirewalltologalltheitems.
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 103LocalInterfaceConfiguration:AtVisNetic_1,wearetryingtoprotectthefollowingtrus
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 104n DISALLOWAny<IN&OUT,Any >AnyAnotherinterfacewhichrequiresfilter
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 105ConfiguringtheProxyServerRefertot he“ProductsPreparation”section forinformation
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 106SecurityPolicy:1. Provideproxyserviceforinternalclientsaccessingtheinternet.P
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 107ISAServerConfiguration:ISA_CacheisaMicrosoftISAserverbasedcachingsolution.It
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 108Internal_Admin,Internal_Dev),shouldbeconfiguredas“internal”.PresstheConstructTa
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 109Theinternalclientsshouldbeproperlydefinedasclientsets.Theseclientsincludeall
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 11q SSLanddigitalcertificatesaredeployedbytheecommercewebsite.Suchcapabilities
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 110ProtocolRules:ProtocolrulesinISAServerdeterminewhichprotocolsclientscanuseto
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 111n DNSn NNTPFirewallConfigurationOptions:AlthoughISA_Cacheisprimarilyresponsibl
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 112Forpacketfiltering,thesinglemostimportantsettingistodenyanyrequeststowardst
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 113SincetheinternalclientsmaybeactingasremoteVPNclientsforaccessingthepartners
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 114transformedintoanotherformatwhentherequestsareprocessedbyISAserver.HTTP/SSLs
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 115ISAServersupportstwomajortypesofcaching:HTTPandFTP.Thereisalwaysatradeoff
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 116Asmentionedbefore,cachedobjectsmaybeoutdated.Forcertainobjects thatinvolvedyn
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 117TheconfiguredISA_CacheserverwilllistenonTCPport8080aswellasSSLport8443(SS
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 118supposedtohandleincomingtraffic.BasicTesting: n FromInternal_Clients,accessan
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 119ConfiguringtheVPNServerRefertoAssignment1 forinformationonWindows2000hardening
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 12 à InternalstaffsasVPNclientsaccessingexternalpartners’securesitesviaPPTPRAS:
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 120VPNModel:A routertorouterVPNmodelisnotdeployedprimarilybecausethevolumeofu
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 121SecurityPolicy:Thesecuritypoliciestobeenforcedhereare:1. OnlyPPTPconnections
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 122serverfortheremoteusersaccordingly.Sincetheexternalpartnersandsuppliersareus
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 123Weshouldthen configureW2K_VPNtoaccept11 incomingPPTP connections. Thenumberofco
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 124Wealsowanttologasmuchinformationabouttheconnectionsaspossible.VPNProtocol:
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 125PPTP iseasyandinexpensivetoimplement.”26PPTPisconsideredasreasonablysecure.
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 126ConfiguretheVPNportsandthestatic route:Bydefault,RRASallocates5portsforPPT
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 127PPTP inputpacketfiltersareconfiguredontheadapterthatisonthesideof theIntern
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 128Foradditionalprotection,wewanttosetthefilterstoallowconnectionsonlyfromthe
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 129ConfiguringBasicFiltersonRouter_Eiconcard:Router_Eiconcardistherouterforinterne
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 13Thereasonstousemultipledevicesare:1,Onatrulysecurenetwork,multiplelayersof
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 130WithEiconcardConnectionsforWindows2000,allpacketsareforwardedforaconnectionf
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 131headerssothatitappearsthatthepacketsarecomingfromthathost.”30Detailedinfor
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 132shouldbeallowedtopassthroughatRouter_Eiconcard.n Inspectthelogfile.Indepth
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 133ConfiguringtheR ASServerTheRAS_NetRASserverisa“backdoor”tothenetwork. Itall
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 134theOnlineDocumentationprovidedbyMicrosoft,“InWindows2000,authorizationisgrante
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 135Moreindepthtestingshouldbeperformedattheauditstage.
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 136SpecialConsideration theEm ailServerEmailsecurityisamajorissueinnowadaysse
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 137Assignment3TheSecurity Audit
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 138Overview“Firewallsaregreatforrestrictingaccesstoyournetwork,butfirewallscanno
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 139n anyvulnerabilityexistinthesecuritydevicesn whetherthesecuritypoliciesarep
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 14simplicityasthekeytosuccessfulfirewallimplementation1.Inordertomakesimpleru
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 140Eachnetworkshouldbetestedfrom theinternal usernetworks toensurethatsafetyexist
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 141NumberofStaff:n 3Timebudget:n 1dayforPhrase0n 1dayforPhrase1n 1dayf
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 142ToolsoftheTradeToperform an auditagainstthefirewallsystems,weneedthehelpof
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 143comprehensivereportofeachscan.”(fromwww.eEye.com37)Retinaisusedinourproject
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 144CHAMinitsownvulnerabilityresearcheffortsandhasbeeninvaluableinenhancingitsc
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 145Selectalltheauditoptions.SuperScan“ApowerfulconnectbasedTCPportscanner,pinge
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 146NetBrute“NetBruteallowsyoutoscanasinglecomputerormultipleIPaddressesforavai
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 147A Trojanisadestructiveprogramthatmasqueradesasabenignapplication.Accordingto
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 148UDPFlood“AUDPpacketsender.ItsendsoutUDPpacketstothespecifiedIPandportata
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 149Assessment–froman“Insider”perspectiveSincetherearetimeandresourceconstraints,
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 15Subnets:TheGIACnetwork issegmentedintothefollowingsubnets:n Core_Net:thisisth
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 150Testscenarios:
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 151ScenarioOne:Segmentsinvolved:Core_Net(192.168.16.0), Internal_Servers(192.168.18.0)
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 152Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 153blockedviatheinterface’sportfilter,sinceweneverknowwhenanewvulnerabilitywil
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 154RulebaseassessmentAsanexternalpartner,connectasavalidVPNclientandaccessall
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 155ScenarioTwo:Involvedsegments:Core_Net(192.168.16.0), Internal_Clients(192.168.17.0)
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 156Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 157192.168.16.99Norton2_IDS Retina Nil*OScannotbedetected.Yes ThefactthattheOS
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 158192.168.16.99192.168.20.0NetBrute Nil Yes192.168.16.99Norton3_IDSShareScannerNil
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 159ScenarioThree:Segmentsinvolved:Core_Net(192.168.16.0),Public_Services(192.168.8.0)
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 16IPSettings:TheIP addressschemeinthisprojectissimplifiedforillustratingtheconn
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 160Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 161n nonHTTP/HTTPStrafficfromInternal_Clients.n nonHTTP/HTTPStrafficfromRAS_Net.
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 162“NSLOOKUP canbeusedtotransferanentirezonebyusingthelscommand.Thisisuseful
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 163recommendedin thebook“HackProofingyourECommerceSite”48.48PublishedbySyngres
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 164Scanfrom Target Tools Ports/SharesdiscoveredIntrusionloggedComments/Recommended
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 165Therefore,theservershouldbeinvestigatedsuchthattheservicesusingtheseportsare
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 166n TheRASphonenumbershouldalwaysbekeptconfidential.n Itistechnicallypossible
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 167Assessmentfroman“Outsider”perspectiveAgain,weneedtofirstidentifythepossible
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 168ScenarioOne:Remarks:Therouterisconfiguredwithonlyonetypeoffilter–filteraga
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 169Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 17n Ext_DNS– 192.168.8.4(NAT >192.168.7.9)n Ext_SMTP – 192.168.8.5(NAT >192.
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 170nothingelse.Theexistenceofanyactiveportmustbeinvestigatedtodetermineifthey
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 171OtherassessmentmethodsAnattackinghostwithitsIPaddressdeliberatelysettoan“in
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 172ScenarioTwo:Segmentsinvolved:Outsideworld,Public_Services(realaddress192.168.8.0
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 173asrecommendedinthebook“HackProofingyourECommerceSite”50.Scanfrom Target(s)
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 174OutsideFW1_B2CSub_Net Nil YesOutside192.168.7.0(publishedaddresses)Sub_Net Nil
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 175Firstofall,abaselineisobtainedbyrunningstresstestsagainstthewebserverdirec
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 176
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 177ScenarioThree:Segmentsinvolved:Outsideworld,Core_Net(192.168.16.0)Remarks:n Thi
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 178Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1791723/tcpPPTP8080/tcpproxy8080/udpproxyThefunctionofW2K_VPNisservicingremotea
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 18LayersofProtection:Intermsofsecurity,thegoalistoensurethatcritical internal r
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 180OutsideW2K_VPNNetBrute Nil N/AOutside192.168.16.0NetBrute Nil N/AOutsideW2K_VP
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 181ScenarioFour:Segmentsinvolved:Outsideworld,Internal_Clients(192.168.17.0), Interna
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 182Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 183ScannerOutside192.168.19.0ShareScannerNil YesOutside192.168.20.0ShareScannerNi
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 184AdministrativeSecurityAssessmentForeveryfirewallandrouterinuse,determinethefo
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 185AuditReportAuditoftheGIACnetworksecurityarchitecturewasperformedfrom4thApri
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 186businesscriticalapplicationsandendusers.FloodGate1canbedeployedwithVPN1®/Fir
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 187Recommendatio nFiveItisrecommendedthatanauditbeperformedonthepartner/supplier
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 188Assignment4Designunderfire
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 189AttackTargetVincentBerk’sdesignathttp://www.sans.org/y2k/practical/Vince_Berk_GCFW.
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 19n RoutingandtrafficinspectionareCPUintensive.Dualprocessorsystemisalwaysrecom
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 190FirewallAttackInformationGathering:VisitthetargetGIACwebsite.Studyitthoroughl
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 191Sincewejusttalkedaboutthedefaultports,onethingwecan try istoexplorevulnerab
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 192DNSserverthroughthefirewall.Iftheresultispositive,wecanstructureanattackba
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 193Attacking–theIPFragmentroute:ThisattackallowsustobogdownFW1.CheckPointha
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 194is changed to another one than your's, no packets get back. Dest: Is the destinatio
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 195DoSattackTheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurf
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 196Intheory,wecan pingaroundtheinternettofindoutwhocanbeusedasamplifiers.Thi
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1972,Retrieveandusethelistof existingamplifiers:Tools fortheAttackWhattoolssho
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 198TribeFloodNetwork UDP,ICMP,SYN.SmurfStacheldrachtandvariants UDP,ICMP,SYN.Sm
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 199andSmurfstyleattacks,aswellasprovidingan"ondemand"rootshellboundt
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 2TableofContentsAssignment1 ...
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 20Router_Eiconcard:n Borderrouterforboth theB2ClinkandtheB2Blinkn Platform:Pla
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 200stepsbelow:1. Writeasimpleprogramthatallowsustosetthenumberofpingattempts
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 201tradeoffsinlife.Still,theaboveapproachdoesnotsolvetheproblemoftrafficconges
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 202CompromisingInternalSys temsWhenIreviewthedifferentpostedpracticalassignments,
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 203Viathenonemailroute:IfGIAChasanantivirussolutionrunning,theemailattachment
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 204executable.Thistendstobehiddenfrom theuser,whoexpectsadocumenttobedatatha
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 205“MailScan isworld'sfirst'RealTime'ContentSecuritySoftwarethatper
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 206ListofReferences(inalphabeticalorder)HackProofingYourEcommerceSite,ISBN:192
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 207http://www.enteract.com/~lspitz/rules.htmlhttp://www.foundstone.com/knowledge/proddesc/s
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 208http://www.webopedia.com/TERM/P/proxy_server.htmlhttp://www.webopedia.com/TERM/s/spoof.h
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 209
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 21EiconcardS92dualWANportsadaptor andthree 100BaseTNICs.n Hardware:DualPentium3
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 22Norton2_IDS:n FirewallprotectionforInternal_Adminn IntrusionDetectionn Platform:
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 23VisNetic_1:n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resourcesn
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 24n Platform:x86basedWindows2000Servern Hardware:SinglePentium3500MHZ,256MBRAM
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 25Equipments’ IPSettings:TheIPaddressschemeinthisprojectissimplifiedforillustrat
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 26n 192.168.6.1(to W2K_VPN)n 192.168.7.1(toFW1_B2C)W2K_VPN:n 192.168.6.2(toRouter
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 27n 192.168.22.2(toRAS_Net)EquipmentFaultToleranceandRedundancy:Althoughitisposs
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 28NOT goingonlineatthesametime.Remember,thestandbysystem shouldbeallowedtogoon
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 29Assignment2DefinetheGIACSecurityPolicySecurityStepbystepTutorial
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 3ACleanFW1Installation...
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 30DesignPrincipleAsmentionedbyLanceSpitznerinhisarticle“BuildingYourFirewallRul
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 31OverallPolicyObjectivesFor theGIACproject,theoverall policyobjectivesaredefined
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 32n PolicyObjective7: Allinternalusers,aswellasallserversfrom theInternal_Server
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 33componentsthatareoftenoverlookedaspotentialthreats3.<Anythingnotexplicitly
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 34
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 35LocalPolicyE nforcementPoliciesatRouter_Ei concard1. Performroutingonthethreet
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 364,IDS:n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)is
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 375. RASuserswhoconnectviaRAS_NetcanaccesstheInternal_Serverssegmentwithanypro
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 38segment.2. Outboundaccessrequestsmadeby Internal_Dev arenotrestrictedbythisfire
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 39ProductsPreparationTopresentacompletepictureofthesecurityarchitectureimplementa
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 4ConfiguringtheNorton1_IDSFirewall:...
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 40inspectiontechnology.Aformofdynamicpacketfiltering,statefulinspectionworksatth
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 41Asofthetimeofthiswriting,thelatestservicepackavailableforNTServer4isversi
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 42n RPCConfigurationn ServerFW1canfunctionperfectlyevenwithouttheseservices.On
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 43Step4Removeunusedandpotential lydangerouscomponents.The“dangerous”componentsa
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 44Administratorsgroup.WindowsNTServer, likeotheroperatingsystems,allowsprivileged
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 45enhancedsecurityagainst"passwordguessing" or "dictionaryattacks"
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 46ACleanFW1InstallationAcleanFW1installationgivesagoodstart.Forourproject,e
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 47n 20001101: CheckPointFirewall1ValidUsernameVulnerabilityn 20000815: Chec
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 48HardenedWindows2000PerfectingtheWindow s2000 InstallationFirstofall,installthe
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 49Step1Removeunusednetworkservices.TCP/IPshouldbetheonlynetworkserviceattache
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 5ProxyFilters ...
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 50Forsecurityreason,wewanttologasmuchinformationonRIPaspossible.Also,weshoul
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 51n RoutingandRemoteAccessn Workstationn ServerThereasonweneedtokeeptheWorks
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 52Step6Removeunusedandpotential lydangerouscomponents.TheOS2andPosixsubsystems
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 53n net.exen netstat.exen NSLOOKUP.exen ping.exen ping.exen posix.exen qbasic.e
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 54filesarenotaccessiblefromotheroperatingsystemssuchasDOS.”(fromwebopedia.com14
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 55Formaximumprotection,thefirewallshouldbeconfiguredtorunautomaticallyatsystems
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 56peaceofmindthroughcomprehensiveintrusionprotection.”16VisNeticisdesignedforbus
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 57Whenrunning,thefirewallmustbeintheFilterstate.Whenthefirewallserviceisnotr
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 58VulnerabilitiesSameasforNortonFirewall,wehavenotbeenabletoidentifyanyvulnera
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 59datacrossingthefirewall,controlofaccesspolicy,androuting oftraffic.Thecachei
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 6Testscenarios:...
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 60Availableathttp://www.microsoft.com/isaserver/downloads/sp1.asp,"InternetSecurity
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 61ISAServerVuln erabilitiesAccordingtoSamCostelloofIDGNewsService,“MicrosoftFrid
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 62TheH.323GatekeeperandProxyServiceflawswerediscoveredbyPeterGrundl.Thescriptin
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 63DefaultPortAssignmentsforCommonServicesonaWindows2000NetworkSinceGIAC’snetwor
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 64LDAP(SSL) 636MTA X.400overTCP/IP 102POP3 110POP3(S SL) 995RPC 135SMTP 25
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 65Macintosh,FileServices(AFP/IP) 548MembershipDPA 568MembershipMSN 569MicrosoftC
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 66Radiusaccounting(RoutingandRemoteAccess)1646or1813Radiusauthentication(Routing
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 67PRIMARYFirewallConfigurationTutorial–Che ckPointFW1ConfiguringtheR ulebasefor
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 684. PropertiesmarkedBEFORELASTintheSecurityPolicyProperties5. RuleBaselastrul
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 69NetworkObjects:Beforewesetupanyrule,alltherelevantnetworkobjectsmustbebuilt
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 7CounterMeasures...
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 70DNSn TheDNSservern Theserver’saddressinthenetworkis192.168.8.4.n Theserver
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 71Emailn TheSMTPservern Theserver’saddressinthenetworkis192.168.8.5.n Theser
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 72SELFn FW1_B2Citselfn Totheoutside:192.168.7.2n Totheinside:192.168.8.2
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 73Rules:1,Removeall thedefaults(forsecuritypurpose) EXCEPTthe“AcceptOutgoingPacke
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 74Theoption“ApplyGatewayRulestoInterfaceDirection”isrelatedtotheconceptofinter
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 75Keepinmind,SYNGatewayisresourceintensive.Itdoesproducenegativeperformanceimpa
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 764,Verifytherules.ClickPolicy – Verifytocheckandensurethattheserulesareerror
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 77IfforsomereasonsthePolicywassuccessfullyverifiedbuterroroccursduringinstallat
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 78ThepossiblestatusesoftheFirewall1Daemonare:n INSTALLED,meaningthedaemonisru
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 79TotesttheDNSqueryrule,dothefollowing:n Fromtheoutside,useNSLOOKUPtoinitial
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 8Assignment1DefineasecurityarchitectureforGIACEnterprise,anebusinesswhichconduc
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 80Notethatthereare3typesoflog:theStandardLog,theAccountingLogandtheActiveLo
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 81Bydefault,thelogincludestoomanycolumns.WecanselectthecolumnstoviewviatheS
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 82Ifthelogfilegrowstoobig(thisispossibleinabusynetwork),considertostartane
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 83n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)isanideal
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 84n InternaltothefirewallWWWn TheEcommercewebservern Theserver’saddressinthe
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 852,DonotenabletheSynDefenderGateway option.ItisnotlikelytoseeSynfloodattacks
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 86ReviewthelogviatheLogViewer.BasicTesting: n FromInternal_Clients,useNSLOOKUP
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 87ConfiguringtheOtherDevicesConfiguringtheN orton1_IDSFirewall:Refertot he“Produc
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 88n Inournetwork, Internal_Clients(192.168.17.0)canfreelyaccessInternal_Servers(192
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 89ConfiguretheAdvancedOptions:IntheAdvancedOptionssection,enablethefollowingopti
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 9IntroductionAsecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevel
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 90ConfigureIntrusionDetection:NortonFirewallcandetectportscanattemptsandautomatic
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 91BasicTesting: n FromInternal_Clients,accessafileshareinInternal_Servers.Thereq
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 92ConfiguringtheN orton2_IDSFirewall:Refertot he“ProductsPreparation”section forin
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 93ConfiguretheSecurityLevel:Weneedthehighestpossiblelevelofsecurityhere.Toset
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 94FurtherindepthtestingshouldbeconductedattheAuditstage.
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 95ConfiguringtheN orton3_IDSFirewall:Refertot he“ProductsPreparation”section forin
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 96Internal_Servers(192.168.18.0)configuredasTrusted.ConfiguretheSecurityLevel:Wene
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 97requestshouldsucceed.n FromRAS_Net,accessafileshareinInternal_Dev.Therequest
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 98ConfiguringtheVisNetic _1Firewall:Refertot he“ProductsPreparation”section forinf
YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 99FW1.DefiningtheInterfaces:VisNetichasitsrulesconfiguredonaperinterfacebasis.
Komentáře k této Příručce