Learning Objectives
- List and explain different network security devices: We’ll be looking at the common hardware that helps protect networks. Think of them as the guards and gatekeepers of your digital castle.
- Explain how network technologies enhance security: Certain network features themselves provide a layer of protection. We’ll explore how they work.
- Describe secure network design elements: We will discuss architectural choices that make a network inherently more resistant to attacks. This is about planning security from the ground up.
Security Through Network Devices - Layered Security
The core concept here is defense in depth, also known as layered security. Imagine a castle with multiple layers of defense: a moat, walls, guards, and then finally the king’s chambers. Breaking through one layer doesn’t guarantee access to the whole castle. Similarly, in networking, we use multiple security devices and techniques. An attacker needs to overcome all of them to succeed. This makes the attack much harder and more time-consuming, greatly reducing the likelihood of a successful breach.
Standard Network Devices and the OSI Model
This introduces the Open Systems Interconnection (OSI) model. It’s a conceptual framework that divides network communication into seven layers. Each layer has a specific function, and devices operate at different layers.
This is fundamental for understanding how networks work and how security devices fit in. Think of it as an assembly line, with each layer performing a specific task before passing the data on to the next.
- Layer 1 (Physical): The physical cables and connectors.
- Layer 2 (Data Link): Handles local network addressing (MAC addresses) and frame formatting. Switches operate here.
- Layer 3 (Network): Handles IP addresses and routing between networks. Routers operate here.
- Layer 4 (Transport): Handles reliable data transmission (TCP) and connectionless transmission (UDP).
- Layer 5 (Session): Manages connections between applications.
- Layer 6 (Presentation): Handles data formatting and encryption/decryption.
- Layer 7 (Application): The applications themselves (web browsers, email clients, etc.).
TIP
There are Seven Layers on OSI model, u can remember them easily by using mnemonic, “Please Do Not Throw Spinach Pizza Away”.
More about OSI Model : Networking Concepts>>>
Standard Network Devices - Switches
- Switches operate at Layer 2 (Data Link).
- They learn the MAC addresses of connected devices and forward frames only to the intended recipient.
- This is a significant improvement over older hubs, which broadcast every frame to every device, making them extremely vulnerable to eavesdropping.
- A switch significantly improves security by limiting the broadcast domain.
- An attacker attached to a switch will see only frames that are directed to that device and not others
- Network administrators should be able to monitor network traffic
Monitoring Network Traffic
Network administrators need to monitor traffic for troubleshooting and security. Two key methods are:
- Port mirroring: The switch copies traffic from one or more ports to a monitoring port, allowing the administrator to see all traffic on those ports without impacting network performance.
- Network tap: A passive device that copies traffic from the network without interfering with it. It’s a more dedicated monitoring solution.
Type of Attack | Description | Security Defense |
---|---|---|
MAC Flooding | An attacker can overflow the switch’s address table with fake MAC addresses, forcing it to act like a hub, sending packets to all devices. | Use a switch that can close ports with too many MAC addresses. |
MAC Address Impersonation | If two devices have the same MAC address, a switch may send frames to each device. An attacker can change the MAC address on her device to match the target device’s MAC address. | Configure the switch so that only one port can be assigned per MAC address. |
ARP Poisoning | The attacker sends a forged ARP packet to the source device, substituting the attacker’s computer MAC address. | Use an ARP detection appliance. |
Port Mirroring | An attacker connects his device to the switch’s mirror port. | Secure the switch in a locked room. |
Network Tap | A network tap is connected to the network to intercept frames. | Keep network connections secure by restricting physical access. |
Standard Network Devices - Routers and Load Balancers
-
Routers (Layer 3): Forward packets between different networks. They are crucial for routing traffic across the internet. They can also be configured with access control lists (ACLs) to filter traffic based on source/destination IP addresses, ports, and protocols.
-
Load Balancers: Distribute network traffic across multiple servers to prevent overload and improve performance. This is vital for website uptime and availability. They can also act as a first line of defense by distributing traffic, stopping attacks from crippling a single server.
-
Load balancers are grouped into two categories:
- Layer 4 load balancers - act upon data found in Network and Transport layer protocols
- Layer 7 load balancers - distribute requests based on data found in Application layer protocols
Load Balancers : Advantages and Security
Load balancers offer significant security advantages:
- Distributed Denial-of-Service (DDoS) Protection: By distributing traffic, they make it harder for DDoS attacks to overwhelm a single server.
- Attack Detection: Some load balancers can detect and mitigate attacks.
- Hiding Server Information: They can mask the internal structure of the network.
Standard Network Devices - Proxies
Proxies act as intermediaries between clients and servers. They can improve performance, reduce costs, and enhance security.
- Proxy Server: Intercepts requests, processes them, and forwards them to the destination server.
- Application-Aware Proxy: Understands application protocols, allowing for more sophisticated filtering and control.
- Reverse Proxy: Protects internal servers by sitting in front of them, handling client requests and forwarding them appropriately.
Network Security Hardware - Firewalls
Firewalls are specialized devices or software that inspect network traffic and block unauthorized access.
- Packet Filtering (Stateless): Examines each packet individually based on pre-defined rules.
- Packet Filtering (Stateful): Keeps track of the connection state, allowing it to make more intelligent decisions about which packets to allow or block. This is more secure than stateless filtering.
- Application-Aware Firewalls (NGFWs): Go beyond simple port-based filtering by identifying applications and their behavior.
- Web Application Firewalls (WAFs): Specifically designed to protect web applications from attacks.
- Special type of application-aware firewall that looks deeply into packets that carry HTTP traffic
- Can block specific sites or specific types of HTTP traffic
Network Security Hardware - Spam Filters
Spam filters prevent unwanted email from reaching users. They can be installed on mail servers or used as a third-party service. They typically work by analyzing email headers and content to identify spam. The key is to filter before the email reaches the internal network.
- Email systems use two protocols
-
Simple Mail Transfer Protocol (SMTP) : Handles outgoing mail
-
Post Office Protocol (POP) : Handles incoming mail
-
Spam filters installed with the SMTP server
-
Filter configured to listen on port 25
-
Pass non-spam e-mail to SMTP server listening on another port
-
This method prevents SMTP server from notifying spammer of failed message delivery
Spam filters installed on the POP3 server
- All spam must first pass through SMTP server and be delivered to user’s mailbox
- Can result in increased costs
- Storage, transmission, backup, deletion
Third-party entity contracted to filter spam
- All email directed to third-party’s remote spam filter
- E-mail cleaned before being redirected to organization
Network Security Hardware - VPNs
VPNs create secure connections over untrusted networks (like the internet). Data is encrypted, protecting it from eavesdropping. There are two main types:
- Remote Access VPN: Allows individual users to connect to a private network remotely.
- Site-to-Site VPN: Connects entire networks securely.
- Tunneling Protocols (IPsec, L2TP): These are the protocols that encrypt and encapsulate the data for transmission over the VPN tunnel.
Network Security Hardware - Internet Content Filters
Content filters block access to inappropriate or malicious websites and files. They typically work by blocking URLs or keywords.
Feature | Description |
---|---|
URL filtering and content inspection | Network administrators can block access to specific websites or allow only specific websites to be accessed while all others are blocked. Blocking can be based on keywords, URL patterns, or lists of prohibited sites. |
Malware inspection and filtering | Files are scanned for malicious content, and access is blocked if a file exhibits suspicious behavior. |
Prohibiting file downloads | Executable programs (.exe), audio or video files (.mp3, .avi, .mpg), and archive files (zip, rar) can be blocked. |
Profiles | Content-specific websites, such as adult, hacking, and virus-infected websites, can be blocked. |
Detailed reporting | Administrators can monitor Internet traffic and identify users who attempt to foil the filters. |
Web Security Gateways & Intrusion Detection/Prevention Systems
- Web Security Gateways: Inspect web traffic for malicious content and block it in real time.
- Intrusion Detection System (IDS): Monitors network traffic for malicious activity and alerts administrators.
- Intrusion Prevention System (IPS): Similar to an IDS, but it can also actively block malicious traffic.
Intrusion Detection/Prevention System Methodologies
IDS/IPS systems use various methods to detect intrusions:
- Signature-Based: Looks for known attack patterns.
- Anomaly-Based: Compares current behavior to a baseline and flags deviations.
- Behavior-Based: Monitors process behavior for suspicious activity.
- Heuristic-Based: Uses experience-based rules to identify suspicious activity.
Security Through Network Technologies - NAT & PAT
- Network Address Translation (NAT): Masks internal IP addresses, making them invisible from the outside world. This provides a layer of protection against direct attacks.
- Port Address Translation (PAT): A variation of NAT that allows multiple internal devices to share a single public IP address.
Security Through Network Technologies - Network Access Control (NAC)
NAC ensures that devices connecting to the network meet certain security requirements before being granted access. If a device doesn’t meet the requirements, it might be placed in a quarantined network until it’s fixed.
Security Through Network Design Elements
This introduces key architectural concepts for secure network design:
- Demilitarized Zones (DMZs): A buffer zone between the public internet and the internal network. Publicly accessible servers (web servers, mail servers) are often placed in the DMZ.
- Subnetting: Dividing a network into smaller subnets for better organization and security.
- Virtual LANs (VLANs): Logical segmentation of a network, allowing administrators to isolate different parts of the network for better security.
- Remote Access: Secure methods for allowing remote users to access the network (VPN is a key technology for this).
Labs
Summary
This lesson explores network security, focusing on layered security using various devices and network technologies. The core concept is “defense in depth,” where multiple security layers make attacks significantly harder.
The lesson covers:
-
Network Devices and the OSI Model: Explains how network devices (switches, routers, load balancers, proxies, firewalls, spam filters, VPNs, content filters, web security gateways, and IDS/IPS systems) operate at different layers of the OSI model to provide layered security. The importance of monitoring network traffic (port mirroring and network taps) is also highlighted.
-
Network Technologies: NAT and PAT are explained as mechanisms for masking internal IP addresses and improving security. Network Access Control (NAC) is introduced as a method to ensure devices meet security requirements before gaining network access.
-
Secure Network Design: Key architectural elements are discussed, including DMZs, subnetting, VLANs, and secure remote access methods (like VPNs). Different types of firewalls and their functionalities are outlined, including next-generation firewalls (NGFWs) and web application firewalls (WAFs). The methodologies used by intrusion detection/prevention systems (IDS/IPS) are also explained.
In essence, the lesson provides a comprehensive overview of network security devices, technologies, and design principles, emphasizing the importance of a multi-layered approach to protect networks effectively.