ImageVerifierCode 换一换
格式:PPT , 页数:27 ,大小:659KB ,
资源ID:378596      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-378596.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ASA 5500 seriesadaptive security appliances.ppt)为本站会员(Iclinic170)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ASA 5500 seriesadaptive security appliances.ppt

1、ASA 5500 series adaptive security appliances,Has replaced Ciscos PIX firewalls since 2008 Security services Source: http:/ application-aware firewall SSL and IPsec VPN IPS with global correlation and guaranteed coverage Antivirus Antispam Antiphishing web filtering services,Network Security,1,T. A.

2、Yang,Ciscos Firewall Service Module (FWSM),Network Security,2,http:/ a high-speed, integrated firewall module for Cisco Catalyst 6500 switches and Cisco 7600 Series routers provides the fastest firewall data rates in the industry 5-Gbps throughput, 100,000 CPS (connections per second) 1M concurrent

3、connections,T. A. Yang,Firewall Modes,Routed mode The device is considered a router hop in the network Requires an IP address for each interface The default modeTransparent mode (aka stealth firewalls) The device operates in a secure bridging mode Same subnet on its inside and outside interfaces Has

4、 an IP address assigned to the entire device The appliance continues to perform stateful application-aware inspection and other firewall functionsBenefits: hide its presence from the attackers/intruders,Network Security,3,T. A. Yang,Stealth mode example,Network Security,4,Default gateway for PCs in

5、VLAN 10 is 10.1.1.1 (the upstream router).,T. A. Yang,Example 2,Network Security,5,T. A. Yang,Source: http:/ The default gateway of Host A is not the Internet router (192.168.1.2) but the internal router (192.168.1.3).Scenario: an inside user visits an inside Web server - Host A (192.168.1.5) sends

6、the request packet to the Internet router (since it is a default gateway) through the ASA from the inside to the outside. Then the packet is redirected to the web server (10.1.1.1) through ASA (outside to inside) and the internal router.,Network Security,6,Adaptive Security Algorithm (ASA),An algori

7、thm that defines how traffic passing through the firewall are examined. Basic concepts: Keep track of the connections being formed from the networks behind the PIX to the public network Based on info about these connections, ASA allows packets to come back into the private network through the firewa

8、ll. All other traffic destined for the private network is blocked by the firewall (unless specifically allowed).,T. A. Yang,ASA Operations,Three basic operations ACLs Connections: xlate and conn tables Inspection engines (per RFC standards)Figure 6-5: a scenario where an external host requested a co

9、nnection to an internal server,T. A. Yang,Network Security,7,Network Security,8,ASA,ASA defines how the state and other information is used to track the sessions passing through the PIX.ASA keeps track of the following information: Source and destination info of IP packets TCP Sequence numbers and T

10、CP flags UDP packet flow and timers,T. A. Yang,Network Security,9,ASA and TCP,TCP is connection-oriented, and provides most of the information the firewall needs. The firewall keeps track of each session being formed, utilized, and terminated. ASA only allows for the packets confirming to the state

11、of a session to go through. All other packets are dropped.However, TCP has inherent weakness, which requires ASA to perform additional work managing the sessions SYN flood, session hijacking,T. A. Yang,Network Security,10,ASA and TCP,SYN flooding“The SYN flood attack sends TCP connections requests f

12、aster than a machine can process them.” (Internet Security Systems, http:/ next,T. A. Yang,Network Security,11,Syn Flood,A: the initiator; B: the destination TCP connection multi-step A: SYN to initiate B: SYN+ACK to respond C: ACK gets agreementSequence numbers then incremented for future messages

13、Ensures message order Retransmit if lost Verifies party really initiated connection,T. A. Yang,Network Security,12,Syn Flood,Implementation: A, the attacker; B: the victim B Receives SYN Allocate connection Acknowledge Wait for response See the problem? What if no response And many SYNs All space fo

14、r connections allocated None left for legitimate ones,Time?,T. A. Yang,Network Security,13,ASA vs Syn Flood,(Beginning in version 5.2 and later) When the number of incomplete connections through the PIX reaches a pre-configured limit (the limit on embryonic connections), ASA turns the PIX into a pro

15、xy for connection attempts (SYNs) to servers or other resources sitting behind it.PIX responds to SYN requests with SYN ACKs and continues proxying the connection until the three-way TCP handshake is complete. Only when the three-way handshake is complete would the PIX allow the connection through t

16、o the server or resource on the private or DMZ network.Benefit: Limits the exposure of the servers behind the PIX to SYN floods,T. A. Yang,Network Security,14,PIX: Basic Features,ASAs stateful inspection of traffic Assigning varying security levels to interfaces ACL Extensive logging Basic routing c

17、apability (including RIP) Failover and redundancy Traffic authentication,T. A. Yang,Network Security,15,PIX: Basic Features - ASAs stateful inspection of traffic,PIX uses a basic set of rules to control traffic flow: No packets can traverse the PIX w/o a translation, connection, and state. Outbound

18、connections are allowed, except those specifically denied by the ACLs. Inbound connections are denied, except for those specifically allowed. All ICMP packets are denied unless specifically permitted. All attempts to circumvent the rules are dropped, and a message is sent to syslog.To tighten or rel

19、ax some of these default rules: next few slides,T. A. Yang,Network Security,16,PIX: Basic Features,Assigning varying security levels to interfaces PIX allows varying security levels to be assigned to its various interfaces, creating the so called security zones. A PIX may have 2 to 10 interfaces. Ea

20、ch i/f can be assigned a level from 0 (least secure, usually the Internet) to 100 (most secure, usually the internal private network). Default rules: Traffic from a higher security zone can enter a lower security zone. PIX keeps track of the connections for this traffic and allows the return traffic

21、 through. Traffic from a lower security zone is not allowed to enter a higher security zone, unless explicitly permitted (such as using ACLs).,T. A. Yang,Network Security,17,PIX: Basic Features,ACL Mainly used to allow traffic from a less-secure portion of the network to enter a more-secure portion

22、of the network.Information used in ACLs: Source address Destination address Protocol numbers Port numbersExamples: To allow connections to be made to web or mail servers sitting on the DMZ of the PIX from the public network To allow a machine on a DMZ network to access the private network behind the

23、 DMZ Use of ACLs must be governed by the network security policy.,T. A. Yang,Network Security,18,PIX: Basic Features,Terminology related to failover : Active unit vs Standby unit Primary unit vs Secondary unit Question: relationships between active/standby and primary/secondary ?System IP vs Failove

24、r IP System IP: the address of the primary unit upon bootup Failover IP: that of the secondary unit,Failover and redundancy The failover capability allows a standby PIX to take over the functionality of the primary PIX, as soon as it fails.Stateful failover : The connection info stored on the failin

25、g PIX is transferred to the PIX taking over.The standby PIX assumes the IP and MAC addresses of the failed PIX.,T. A. Yang,Network Security,19,PIX: Basic Features - Failover and redundancy,How does failover work? A failover cable (RS-232 serial) connects the primary unit and the secondary unit, allo

26、wing the secondary unit to detect the primary units power status, and failover communication in between. (In the case of stateful failover) The state info is transferred via an Ethernet cable connecting the primary unit and the secondary unit. Every 15 seconds, special failover hello packets are sen

27、t in between the two units for synchronization. Requirements: The h/w, s/w, and configurations on the two PIXes must be identical.,T. A. Yang,Network Security,20,PIX: Basic Features - Failover and redundancy,Limitations of CISCO PIX failover ?Some info are not replicated between the two units: User

28、authentication table ISAKMP and IPsec SA table ARP table Routing infoThe secondary unit must rebuild the info to perform the functions of the failed unit.,T. A. Yang,Network Security,21,PIX: Basic Features,Traffic authentication on PIX: Cut-through proxy authentication Only when the authentication o

29、ccurring during the establishment of a given connection succeeds would PIX allows the data flow to be established through it. A successfully authenticated connection is entered the ASA as a valid state. As soon as an authenticated connection is established, PIX lets the rest of the packets belonging

30、 to that connection go through without further authentication. PIX supports both TACACS+ and Radius as the AAA servers.,T. A. Yang,Network Security,22,ASA and TCP: TCP session hijacking attack,Problem with the ISN: The initial sequence number (ISN) of TCP is not really random! possible TCP session h

31、ijacking attackCase study: Kevin Metnicks attack on Tsutomu Shimomuras computers in 1994-1995 Six steps : an initial reconnaissance attack: gather info about the victim a SYN flood attack: disable the login server; a DOS attack A reconnaissance attack: determine how one of the x-term generated its T

32、CP sequence numbers Spoof the servers identity, and establish a session with the x-term (using the sequence number the x-term must have sent) result: a one-way connection to the x-term modify the x-terms .rhosts file to trust every host Gain root access to the x-term,T. A. Yang,Network Security,23,A

33、SAs solution “proxy” the sequence number in an outgoing packet create a new, more random sequence number; use the new number as the sequence number in the outgoing packet, and store the difference between the new and the original number; When return traffic for that packet is received, ASA restores

34、the sequence number before forwarding the packet to the destination on the inside network.,T. A. Yang,TCP session hijacking attack (cont.),Network Security,24,initiator,T. A. Yang,Source: Malik, Network Security Principles and Practices, 2003.,Security Contexts,Software version 7.0 and up Multiple s

35、ecurity contexts (aka virtual firewalls) can be created within a single PIX or ASA firewall. Each virtual firewall is an independent device Has its own set of security policies, logical interfaces, and admin domain Interfaces can be shared btwn contexts (routed mode only)Limitations: Features such a

36、s VPN and dynamic routing protocols are not supported.,T. A. Yang,Network Security,25,Security Contexts: two modes,Routed Mode Figure 6-6 A physical firewall is configured with three contexts (Admin, Dept 1, Dept 2). Each virtual firewall has one Inside, one Outside, and one Shared interface. Each c

37、ontext has its own private segment. Resources to be shared among the three contexts are placed in the Shared segment, accessible through a shared intreface.Transparent Mode,T. A. Yang,Network Security,26,Security Contexts: two modes,Transparent Mode Each context is in the transparent mode. A transparent firewall has only one Inside and one Outside interfaces, both of which belong to the same subnet. Transparent mode does not allow shared interfaces (unlike the routed mode).Example: Figure 6-7,T. A. Yang,Network Security,27,

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1