Security Basics: © 1999, Cisco Systems, Inc
Security Basics: © 1999, Cisco Systems, Inc
Security Basics: © 1999, Cisco Systems, Inc
www.cisco.com
Agenda
www.cisco.com
11-2
Why Security?
Three primary reasons
Policy vulnerabilities Configuration vulnerabilities Technology vulnerabilities
www.cisco.com
11-4
Security Threats
telnet company.org username: dan password:
Im Bob. Send Me All Corporate Correspondence with Cisco.
m-y-p-a-s-s-w-o-r-d
d-a-n
Bob
Loss of Privacy
Impersonation
Deposit $1000 Deposit $ 100
CPU
Customer
Bank
Denial of Service
CSE: Networking FundamentalsSecurity
Loss of Integrity
www.cisco.com
1999, Cisco Systems, Inc. 11-5
Security
Authentication
Authorization Accounting Assurance
Policy Management
www.cisco.com
11-6
Elements of Security
Identity
Accurately identify users
Determine what users are allowed to do
Integrity
Ensure network availability Provide perimeter security Ensure privacy
Active audit
Recognize network weak spots
Detect and react to intruders
Policy
www.cisco.com
11-7
Security Technology
Identity
CSE-SecurityBasics
www.cisco.com
3-8
Username/Password
ID/Password ID/Password ID/Password TACACS+ or RADIUS AAA Server PPP PAP or CHAP Dial-In User
Public Network
Password Network Access Server
Campus
User dials in with password to network access server NAS sends ID/password to AAA server AAA server authenticates user ID/password and tells NAS to accept (or reject) NAS accepts (or rejects) call
CSE: Networking FundamentalsSecurity
www.cisco.com
11-10
www.cisco.com
11-11
1 23 4 56 7 89 0
Authorization
Configures integrity What are you permitted to do?
Accounting
Assists with audit What did you do?
CSE: Networking FundamentalsSecurity
www.cisco.com
11-12
AAA Services
Network Access Server
Public Network Dial-In User Internet Internet User
CSE: Networking FundamentalsSecurity
AAA Server
TACACS+ RADIUS
Campus
Centralized security database High availability Same policy across many access points Per-user access control Single network login Support for: TACACS+, RADIUS
www.cisco.com
1999, Cisco Systems, Inc. 11-13
RADIUS
Re mote Acce ss U se r
Acce ss S e rve r
RAD IU S S e rve r
The RADIUS server maintains user authentication and network access information RADIUS clients run on access servers and send authentication requests to the RADIUS server
CSE: Networking FundamentalsSecurity
www.cisco.com
11-14
TACACS+ Authentication
Local or centralized Cisco continues to expand TACACS+
Username/Password Additional Information TACACS Database
Cisco customers benefit from additional functionality with CiscoSecure server of both TACACS TACACS+ and RADIUS
www.cisco.com
11-15
By exchanging public keys, two devices can determine a new unique key (the secret key) known only to them
DES
www.cisco.com
11-16
Digital Signatures
Bobs Document Bobs Document
Hash
Bobs Public Key
Digital Signature
Message Hash
www.cisco.com
11-17
Certificate Authority
BANK
?
CA
Internet
CA
Certificate Authority (CA) verifies identity CA signs digital certificate containing devices public key Certificate equivalent to an ID card Partners include Verisign, Entrust, Netscape, and Baltimore Technologies
CSE: Networking FundamentalsSecurity
www.cisco.com
11-18
Internet
10.0.0.1
Provides dynamic or static translation of private addresses to registered IP addresses Eliminates readdressing overheadLarge admin. cost benefit Conserves addressesHosts can share a single registered IP address for all external communications via port-level multiplexing Permits use of a single IP address range in multiple intranets Hides internal addresses
CSE: Networking FundamentalsSecurity
www.cisco.com
11-19
Security Technology
Integrity
CSE-SecurityBasics
www.cisco.com
3-20
IntegrityNetwork Availability
www.cisco.com
11-21
TCP Intercept
Request Intercepted Connection Established
Connection Transferred
Protects networks against denial of service attacks TCP SYN flooding can overpower server and cause it to deny service, exhaust memory, or waste processor cycles TCP Intercept protects network by intercepting TCP connection requests and replying on behalf of the destination
CSE: Networking FundamentalsSecurity
www.cisco.com
11-22
Route Authentication
Home Gateway
Internet
Trusted Source
Enables routers to identify one another and verify each others legitimacy before accepting route updates Ensures that routers receive legitimate update information from a trusted source
CSE: Networking FundamentalsSecurity
www.cisco.com
11-23
IntegrityPerimeter Security
Integrity also means ensuring the safety of the network devices and the flows of information between them Control access to critical network applications, data, and services
Access control lists, firewall technologies, content filtering, CBAC, authentication
CBAC = Context Based Access Control
CSE: Networking FundamentalsSecurity
www.cisco.com
11-24
Access Lists
Standard
Filter source address only Permit/deny entire protocol suite
Extended
Filter source, destination addresses Inbound or outbound Port number Permit/deny specific protocols Reflexive Time-based
CSE: Networking FundamentalsSecurity
www.cisco.com
11-25
What Is a Firewall?
All traffic from inside to outside and vice versa must pass through the firewall Only authorized traffic, as defined by the local security policy, is allowed in or out
CSE: Networking FundamentalsSecurity
www.cisco.com
11-27
Proxy Service
To the outside world, it appears as if all sessions terminate at a single host.
Proxy servers hide IP addresses, so they are not exposed to the outside world. Certain proxy servers also can examine content, so they can limit what can be done and what can not be done
Internet/ Intranet
Proxy Server
Internal Network
CSE: Networking FundamentalsSecurity
www.cisco.com
11-29
IntegrityPrivacy
IKE = Internet Key Exchange DES = Data Encryption Standard CET = Cisco Encryption Technology CEP = Certificate Enrollment Protocol
1999, Cisco Systems, Inc. 11-31
www.cisco.com
Encryption
Decryption
Cipher Text
CSE: Networking FundamentalsSecurity
www.cisco.com
11-32
What Is IPSec?
Network-layer encryption and authentication
Open standards for ensuring secure private communications over any IP network, including the Internet Data protected with network encryption, digital certification, and device authentication
Implemented transparently in network infrastructure Includes routers, firewalls, PCs, and servers Scales from small to very large networks
CSE: Networking FundamentalsSecurity
www.cisco.com
11-33
IPSec Everywhere!
Router to Firewall
Router to Router
PC to Firewall
PC to Router PC to Server
CSE: Networking FundamentalsSecurity
www.cisco.com
11-34
www.cisco.com
11-35
Router A
Router B
IKE
Router A
IKE Tunnel
IKE
Router B
3. Negotiation complete; router A and router B now have complete IPSec SAs in place
www.cisco.com
1999, Cisco Systems, Inc. 11-36
www.cisco.com
11-37
Security Technology
Active Audit
CSE-SecurityBasics
www.cisco.com
3-38
www.cisco.com
11-39
www.cisco.com
11-40
Presentation_ID
www.cisco.com
43