Eicon Networks S92 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel de sécurité antivirus Eicon Networks S92. Yu Chak Tin michael242 GCFW Version 1.7 Original submission Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - CHAKTI N_YU_ G CFW.PDF

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1 CHAKTI N_YU_ G CFW.PDF SAN S G CFW P R A C T I C AL A SS I G N M E N TYuChakTinmicha

Page 2

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 10Forperformancereason,aminimumoftwointernetlinksaredeployed,withonedevotedto

Page 3

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 100AnInterfaceConfigurationExample:Asmentionedbefore,VisNetichasitsrulesconfigure

Page 4

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 101n “In”definestrafficfromRemotetoLocaln “Out”definestrafficfromLocaltoRemot

Page 5

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 102Settheactionto“Allow”forthisrule,andconfigurethefirewalltologalltheitems.

Page 6

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 103LocalInterfaceConfiguration:AtVisNetic_1,wearetryingtoprotectthefollowingtrus

Page 7

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 104n DISALLOWAny<IN&OUT,Any >AnyAnotherinterfacewhichrequiresfilter

Page 8 - Assignment1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 105ConfiguringtheProxyServerRefertot he“ProductsPreparation”section forinformation

Page 9 - Techn icalRequirement

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 106SecurityPolicy:1. Provideproxyserviceforinternalclientsaccessingtheinternet.P

Page 10 - Page 10

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 107ISAServerConfiguration:ISA_CacheisaMicrosoftISAserverbasedcachingsolution.It

Page 11 - Page 11

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 108Internal_Admin,Internal_Dev),shouldbeconfiguredas“internal”.PresstheConstructTa

Page 12 - ArchitectureOverview

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 109Theinternalclientsshouldbeproperlydefinedasclientsets.Theseclientsincludeall

Page 13 - Page 13

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 11q SSLanddigitalcertificatesaredeployedbytheecommercewebsite.Suchcapabilities

Page 14 - IPInfrastructure

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 110ProtocolRules:ProtocolrulesinISAServerdeterminewhichprotocolsclientscanuseto

Page 15 - Page 15

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 111n DNSn NNTPFirewallConfigurationOptions:AlthoughISA_Cacheisprimarilyresponsibl

Page 16 - Page 16

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 112Forpacketfiltering,thesinglemostimportantsettingistodenyanyrequeststowardst

Page 17 - Page 17

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 113SincetheinternalclientsmaybeactingasremoteVPNclientsforaccessingthepartners

Page 18 - Page 18

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 114transformedintoanotherformatwhentherequestsareprocessedbyISAserver.HTTP/SSLs

Page 19 - Page 19

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 115ISAServersupportstwomajortypesofcaching:HTTPandFTP.Thereisalwaysatradeoff

Page 20 - Router_Eiconcard:

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 116Asmentionedbefore,cachedobjectsmaybeoutdated.Forcertainobjects thatinvolvedyn

Page 21 - Page 21

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 117TheconfiguredISA_CacheserverwilllistenonTCPport8080aswellasSSLport8443(SS

Page 22 - Page 22

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 118supposedtohandleincomingtraffic.BasicTesting: n FromInternal_Clients,accessan

Page 23 - Page 23

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 119ConfiguringtheVPNServerRefertoAssignment1 forinformationonWindows2000hardening

Page 24 - Page 24

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 12 à InternalstaffsasVPNclientsaccessingexternalpartners’securesitesviaPPTPRAS:

Page 25 - Page 25

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 120VPNModel:A routertorouterVPNmodelisnotdeployedprimarilybecausethevolumeofu

Page 26 - Page 26

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 121SecurityPolicy:Thesecuritypoliciestobeenforcedhereare:1. OnlyPPTPconnections

Page 27 - Page 27

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 122serverfortheremoteusersaccordingly.Sincetheexternalpartnersandsuppliersareus

Page 28 - Page 28

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 123Weshouldthen configureW2K_VPNtoaccept11 incomingPPTP connections. Thenumberofco

Page 29 - Assignment2

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 124Wealsowanttologasmuchinformationabouttheconnectionsaspossible.VPNProtocol:

Page 30 - DesignPrinciple

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 125PPTP iseasyandinexpensivetoimplement.”26PPTPisconsideredasreasonablysecure.

Page 31 - OverallPolicyObjectives

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 126ConfiguretheVPNportsandthestatic route:Bydefault,RRASallocates5portsforPPT

Page 32 - Page 32

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 127PPTP inputpacketfiltersareconfiguredontheadapterthatisonthesideof theIntern

Page 33 - Page 33

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 128Foradditionalprotection,wewanttosetthefilterstoallowconnectionsonlyfromthe

Page 34

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 129ConfiguringBasicFiltersonRouter_Eiconcard:Router_Eiconcardistherouterforinterne

Page 35 - LocalPolicyE nforcement

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 13Thereasonstousemultipledevicesare:1,Onatrulysecurenetwork,multiplelayersof

Page 36 - PoliciesatVisNetic_1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 130WithEiconcardConnectionsforWindows2000,allpacketsareforwardedforaconnectionf

Page 37 - PoliciesatNorton3_IDS

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 131headerssothatitappearsthatthepacketsarecomingfromthathost.”30Detailedinfor

Page 38 - PoliciesatRAS_Server

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 132shouldbeallowedtopassthroughatRouter_Eiconcard.n Inspectthelogfile.Indepth

Page 39 - ProductsPreparation

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 133ConfiguringtheR ASServerTheRAS_NetRASserverisa“backdoor”tothenetwork. Itall

Page 40 - Page 40

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 134theOnlineDocumentationprovidedbyMicrosoft,“InWindows2000,authorizationisgrante

Page 41 - Page 41

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 135Moreindepthtestingshouldbeperformedattheauditstage.

Page 42 - Page 42

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 136SpecialConsideration theEm ailServerEmailsecurityisamajorissueinnowadaysse

Page 43 - Page 43

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 137Assignment3TheSecurity Audit

Page 44 - Page 44

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 138Overview“Firewallsaregreatforrestrictingaccesstoyournetwork,butfirewallscanno

Page 45 - Page 45

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 139n anyvulnerabilityexistinthesecuritydevicesn whetherthesecuritypoliciesarep

Page 46 - ACleanFW1Installation

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 14simplicityasthekeytosuccessfulfirewallimplementation1.Inordertomakesimpleru

Page 47 - Page 47

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 140Eachnetworkshouldbetestedfrom theinternal usernetworks toensurethatsafetyexist

Page 48 - HardenedWindows2000

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 141NumberofStaff:n 3Timebudget:n 1dayforPhrase0n 1dayforPhrase1n 1dayf

Page 49 - Page 49

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 142ToolsoftheTradeToperform an auditagainstthefirewallsystems,weneedthehelpof

Page 50 - Page 50

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 143comprehensivereportofeachscan.”(fromwww.eEye.com37)Retinaisusedinourproject

Page 51 - Page 51

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 144CHAMinitsownvulnerabilityresearcheffortsandhasbeeninvaluableinenhancingitsc

Page 52 - Page 52

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 145Selectalltheauditoptions.SuperScan“ApowerfulconnectbasedTCPportscanner,pinge

Page 53 - Page 53

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 146NetBrute“NetBruteallowsyoutoscanasinglecomputerormultipleIPaddressesforavai

Page 54 - NortonFirewall 2002

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 147A Trojanisadestructiveprogramthatmasqueradesasabenignapplication.Accordingto

Page 55 - DeerfieldVisNeticFirewall

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 148UDPFlood“AUDPpacketsender.ItsendsoutUDPpacketstothespecifiedIPandportata

Page 56 - Page 56

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 149Assessment–froman“Insider”perspectiveSincetherearetimeandresourceconstraints,

Page 57 - Page 57

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 15Subnets:TheGIACnetwork issegmentedintothefollowingsubnets:n Core_Net:thisisth

Page 58 - MicrosoftISASe rver

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 150Testscenarios:

Page 59 - Hardeni ngtheConfiguration

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 151ScenarioOne:Segmentsinvolved:Core_Net(192.168.16.0), Internal_Servers(192.168.18.0)

Page 60 - Page 60

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 152Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 61 - ISAServerVuln erabilities

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 153blockedviatheinterface’sportfilter,sinceweneverknowwhenanewvulnerabilitywil

Page 62 - Page 62

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 154RulebaseassessmentAsanexternalpartner,connectasavalidVPNclientandaccessall

Page 63

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 155ScenarioTwo:Involvedsegments:Core_Net(192.168.16.0), Internal_Clients(192.168.17.0)

Page 64

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 156Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 65

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 157192.168.16.99Norton2_IDS Retina Nil*OScannotbedetected.Yes ThefactthattheOS

Page 66

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 158192.168.16.99192.168.20.0NetBrute Nil Yes192.168.16.99Norton3_IDSShareScannerNil

Page 67 - Tutorial–Che ckPointFW1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 159ScenarioThree:Segmentsinvolved:Core_Net(192.168.16.0),Public_Services(192.168.8.0)

Page 68 - Page 68

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 16IPSettings:TheIP addressschemeinthisprojectissimplifiedforillustratingtheconn

Page 69 - Page 69

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 160Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 70 - Page 70

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 161n nonHTTP/HTTPStrafficfromInternal_Clients.n nonHTTP/HTTPStrafficfromRAS_Net.

Page 71 - Page 71

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 162“NSLOOKUP canbeusedtotransferanentirezonebyusingthelscommand.Thisisuseful

Page 72 - Page 72

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 163recommendedin thebook“HackProofingyourECommerceSite”48.48PublishedbySyngres

Page 73 - Page 73

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 164Scanfrom Target Tools Ports/SharesdiscoveredIntrusionloggedComments/Recommended

Page 74 - Page 74

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 165Therefore,theservershouldbeinvestigatedsuchthattheservicesusingtheseportsare

Page 75 - Page 75

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 166n TheRASphonenumbershouldalwaysbekeptconfidential.n Itistechnicallypossible

Page 76 - Page 76

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 167Assessmentfroman“Outsider”perspectiveAgain,weneedtofirstidentifythepossible

Page 77 - Page 77

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 168ScenarioOne:Remarks:Therouterisconfiguredwithonlyonetypeoffilter–filteraga

Page 78 - Page 78

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 169Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 79 - Page 79

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 17n Ext_DNS– 192.168.8.4(NAT >192.168.7.9)n Ext_SMTP – 192.168.8.5(NAT >192.

Page 80 - Page 80

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 170nothingelse.Theexistenceofanyactiveportmustbeinvestigatedtodetermineifthey

Page 81 - Page 81

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 171OtherassessmentmethodsAnattackinghostwithitsIPaddressdeliberatelysettoan“in

Page 82 - Page 82

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 172ScenarioTwo:Segmentsinvolved:Outsideworld,Public_Services(realaddress192.168.8.0

Page 83 - Page 83

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 173asrecommendedinthebook“HackProofingyourECommerceSite”50.Scanfrom Target(s)

Page 84 - Page 84

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 174OutsideFW1_B2CSub_Net Nil YesOutside192.168.7.0(publishedaddresses)Sub_Net Nil

Page 85 - Page 85

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 175Firstofall,abaselineisobtainedbyrunningstresstestsagainstthewebserverdirec

Page 86 - Page 86

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 176

Page 87 - Page 87

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 177ScenarioThree:Segmentsinvolved:Outsideworld,Core_Net(192.168.16.0)Remarks:n Thi

Page 88 - Page 88

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 178Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 89 - Page 89

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1791723/tcpPPTP8080/tcpproxy8080/udpproxyThefunctionofW2K_VPNisservicingremotea

Page 90 - Page 90

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 18LayersofProtection:Intermsofsecurity,thegoalistoensurethatcritical internal r

Page 91 - Page 91

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 180OutsideW2K_VPNNetBrute Nil N/AOutside192.168.16.0NetBrute Nil N/AOutsideW2K_VP

Page 92 - Page 92

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 181ScenarioFour:Segmentsinvolved:Outsideworld,Internal_Clients(192.168.17.0), Interna

Page 93 - Page 93

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 182Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 94 - Page 94

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 183ScannerOutside192.168.19.0ShareScannerNil YesOutside192.168.20.0ShareScannerNi

Page 95 - Page 95

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 184AdministrativeSecurityAssessmentForeveryfirewallandrouterinuse,determinethefo

Page 96 - Page 96

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 185AuditReportAuditoftheGIACnetworksecurityarchitecturewasperformedfrom4thApri

Page 97 - Page 97

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 186businesscriticalapplicationsandendusers.FloodGate1canbedeployedwithVPN1®/Fir

Page 98 - Page 98

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 187Recommendatio nFiveItisrecommendedthatanauditbeperformedonthepartner/supplier

Page 99 - Page 99

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 188Assignment4Designunderfire

Page 100 - Page 100

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 189AttackTargetVincentBerk’sdesignathttp://www.sans.org/y2k/practical/Vince_Berk_GCFW.

Page 101 - Page 101

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 19n RoutingandtrafficinspectionareCPUintensive.Dualprocessorsystemisalwaysrecom

Page 102 - Page 102

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 190FirewallAttackInformationGathering:VisitthetargetGIACwebsite.Studyitthoroughl

Page 103 - Page 103

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 191Sincewejusttalkedaboutthedefaultports,onethingwecan try istoexplorevulnerab

Page 104 - Page 104

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 192DNSserverthroughthefirewall.Iftheresultispositive,wecanstructureanattackba

Page 105 - ConfiguringtheProxyServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 193Attacking–theIPFragmentroute:ThisattackallowsustobogdownFW1.CheckPointha

Page 106 - Page 106

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 194is changed to another one than your's, no packets get back. Dest: Is the destinatio

Page 107 - Page 107

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 195DoSattackTheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurf

Page 108 - Page 108

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 196Intheory,wecan pingaroundtheinternettofindoutwhocanbeusedasamplifiers.Thi

Page 109 - Page 109

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1972,Retrieveandusethelistof existingamplifiers:Tools fortheAttackWhattoolssho

Page 110 - Page 110

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 198TribeFloodNetwork UDP,ICMP,SYN.SmurfStacheldrachtandvariants UDP,ICMP,SYN.Sm

Page 111 - Page 111

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 199andSmurfstyleattacks,aswellasprovidingan"ondemand"rootshellboundt

Page 112 - Page 112

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 2TableofContentsAssignment1 ...

Page 113 - Page 113

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 20Router_Eiconcard:n Borderrouterforboth theB2ClinkandtheB2Blinkn Platform:Pla

Page 114 - Page 114

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 200stepsbelow:1. Writeasimpleprogramthatallowsustosetthenumberofpingattempts

Page 115 - Page 115

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 201tradeoffsinlife.Still,theaboveapproachdoesnotsolvetheproblemoftrafficconges

Page 116 - “CacheDynamicContent”

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 202CompromisingInternalSys temsWhenIreviewthedifferentpostedpracticalassignments,

Page 117 - Page 117

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 203Viathenonemailroute:IfGIAChasanantivirussolutionrunning,theemailattachment

Page 118 - Page 118

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 204executable.Thistendstobehiddenfrom theuser,whoexpectsadocumenttobedatatha

Page 119 - ConfiguringtheVPNServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 205“MailScan isworld'sfirst'RealTime'ContentSecuritySoftwarethatper

Page 120 - Page 120

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 206ListofReferences(inalphabeticalorder)HackProofingYourEcommerceSite,ISBN:192

Page 121 - Page 121

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 207http://www.enteract.com/~lspitz/rules.htmlhttp://www.foundstone.com/knowledge/proddesc/s

Page 122 - 75700347903

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 208http://www.webopedia.com/TERM/P/proxy_server.htmlhttp://www.webopedia.com/TERM/s/spoof.h

Page 123 - Page 123

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 209

Page 124 - Page 124

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 21EiconcardS92dualWANportsadaptor andthree 100BaseTNICs.n Hardware:DualPentium3

Page 125 - 75700347903

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 22Norton2_IDS:n FirewallprotectionforInternal_Adminn IntrusionDetectionn Platform:

Page 126 - Page 126

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 23VisNetic_1:n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resourcesn

Page 127 - Page 127

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 24n Platform:x86basedWindows2000Servern Hardware:SinglePentium3500MHZ,256MBRAM

Page 128 - Page 128

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 25Equipments’ IPSettings:TheIPaddressschemeinthisprojectissimplifiedforillustrat

Page 129 - Page 129

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 26n 192.168.6.1(to W2K_VPN)n 192.168.7.1(toFW1_B2C)W2K_VPN:n 192.168.6.2(toRouter

Page 130 - Page 130

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 27n 192.168.22.2(toRAS_Net)EquipmentFaultToleranceandRedundancy:Althoughitisposs

Page 131 - Page 131

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 28NOT goingonlineatthesametime.Remember,thestandbysystem shouldbeallowedtogoon

Page 132 - Page 132

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 29Assignment2DefinetheGIACSecurityPolicySecurityStepbystepTutorial

Page 133 - ConfiguringtheR ASServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 3ACleanFW1Installation...

Page 134 - Page 134

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 30DesignPrincipleAsmentionedbyLanceSpitznerinhisarticle“BuildingYourFirewallRul

Page 135 - Page 135

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 31OverallPolicyObjectivesFor theGIACproject,theoverall policyobjectivesaredefined

Page 136 - Page 136

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 32n PolicyObjective7: Allinternalusers,aswellasallserversfrom theInternal_Server

Page 137 - Assignment3

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 33componentsthatareoftenoverlookedaspotentialthreats3.<Anythingnotexplicitly

Page 138 - Overview

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 34

Page 139 - Phrases

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 35LocalPolicyE nforcementPoliciesatRouter_Ei concard1. Performroutingonthethreet

Page 140 - Page 140

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 364,IDS:n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)is

Page 141 - Page 141

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 375. RASuserswhoconnectviaRAS_NetcanaccesstheInternal_Serverssegmentwithanypro

Page 142 - ToolsoftheTrade

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 38segment.2. Outboundaccessrequestsmadeby Internal_Dev arenotrestrictedbythisfire

Page 143 - Page 143

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 39ProductsPreparationTopresentacompletepictureofthesecurityarchitectureimplementa

Page 144 - Page 144

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 4ConfiguringtheNorton1_IDSFirewall:...

Page 145 - Page 145

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 40inspectiontechnology.Aformofdynamicpacketfiltering,statefulinspectionworksatth

Page 146 - Page 146

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 41Asofthetimeofthiswriting,thelatestservicepackavailableforNTServer4isversi

Page 147 - Stress test tool s

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 42n RPCConfigurationn ServerFW1canfunctionperfectlyevenwithouttheseservices.On

Page 148 - Page 148

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 43Step4Removeunusedandpotential lydangerouscomponents.The“dangerous”componentsa

Page 149 - Page 149

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 44Administratorsgroup.WindowsNTServer, likeotheroperatingsystems,allowsprivileged

Page 150 - Testscenarios:

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 45enhancedsecurityagainst"passwordguessing" or "dictionaryattacks"

Page 151

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 46ACleanFW1InstallationAcleanFW1installationgivesagoodstart.Forourproject,e

Page 152

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 47n 20001101: CheckPointFirewall1ValidUsernameVulnerabilityn 20000815:  Chec

Page 153

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 48HardenedWindows2000PerfectingtheWindow s2000 InstallationFirstofall,installthe

Page 154 - Page 154

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 49Step1Removeunusednetworkservices.TCP/IPshouldbetheonlynetworkserviceattache

Page 155

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 5ProxyFilters ...

Page 156

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 50Forsecurityreason,wewanttologasmuchinformationonRIPaspossible.Also,weshoul

Page 157

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 51n RoutingandRemoteAccessn Workstationn ServerThereasonweneedtokeeptheWorks

Page 158

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 52Step6Removeunusedandpotential lydangerouscomponents.TheOS2andPosixsubsystems

Page 159 - 192.168.8.0

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 53n net.exen netstat.exen NSLOOKUP.exen ping.exen ping.exen posix.exen qbasic.e

Page 160

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 54filesarenotaccessiblefromotheroperatingsystemssuchasDOS.”(fromwebopedia.com14

Page 161 - Page 161

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 55Formaximumprotection,thefirewallshouldbeconfiguredtorunautomaticallyatsystems

Page 162 - Page 162

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 56peaceofmindthroughcomprehensiveintrusionprotection.”16VisNeticisdesignedforbus

Page 163 - Page 163

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 57Whenrunning,thefirewallmustbeintheFilterstate.Whenthefirewallserviceisnotr

Page 164 - Page 164

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 58VulnerabilitiesSameasforNortonFirewall,wehavenotbeenabletoidentifyanyvulnera

Page 165 - Page 165

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 59datacrossingthefirewall,controlofaccesspolicy,androuting oftraffic.Thecachei

Page 166 - Page 166

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 6Testscenarios:...

Page 167 - Page 167

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 60Availableathttp://www.microsoft.com/isaserver/downloads/sp1.asp,"InternetSecurity

Page 168 - Page 168

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 61ISAServerVuln erabilitiesAccordingtoSamCostelloofIDGNewsService,“MicrosoftFrid

Page 169 - Outside

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 62TheH.323GatekeeperandProxyServiceflawswerediscoveredbyPeterGrundl.Thescriptin

Page 170 - Page 170

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 63DefaultPortAssignmentsforCommonServicesonaWindows2000NetworkSinceGIAC’snetwor

Page 171 - Otherassessmentmethods

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 64LDAP(SSL) 636MTA X.400overTCP/IP 102POP3 110POP3(S SL) 995RPC 135SMTP 25

Page 172 - Page 172

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 65Macintosh,FileServices(AFP/IP) 548MembershipDPA 568MembershipMSN 569MicrosoftC

Page 173

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 66Radiusaccounting(RoutingandRemoteAccess)1646or1813Radiusauthentication(Routing

Page 174

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 67PRIMARYFirewallConfigurationTutorial–Che ckPointFW1ConfiguringtheR ulebasefor

Page 175 - Page 175

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 684. PropertiesmarkedBEFORELASTintheSecurityPolicyProperties5. RuleBaselastrul

Page 176 - Page 176

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 69NetworkObjects:Beforewesetupanyrule,alltherelevantnetworkobjectsmustbebuilt

Page 177 - 192.168.16.0

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 7CounterMeasures...

Page 178

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 70DNSn TheDNSservern Theserver’saddressinthenetworkis192.168.8.4.n Theserver

Page 179 - Page 179

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 71Emailn TheSMTPservern Theserver’saddressinthenetworkis192.168.8.5.n Theser

Page 180

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 72SELFn FW1_B2Citselfn Totheoutside:192.168.7.2n Totheinside:192.168.8.2

Page 181

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 73Rules:1,Removeall thedefaults(forsecuritypurpose) EXCEPTthe“AcceptOutgoingPacke

Page 182

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 74Theoption“ApplyGatewayRulestoInterfaceDirection”isrelatedtotheconceptofinter

Page 183

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 75Keepinmind,SYNGatewayisresourceintensive.Itdoesproducenegativeperformanceimpa

Page 184 - FaultToleranceAssessment

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 764,Verifytherules.ClickPolicy – Verifytocheckandensurethattheserulesareerror

Page 185 - AuditReport

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 77IfforsomereasonsthePolicywassuccessfullyverifiedbuterroroccursduringinstallat

Page 186

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 78ThepossiblestatusesoftheFirewall1Daemonare:n INSTALLED,meaningthedaemonisru

Page 187 - Page 187

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 79TotesttheDNSqueryrule,dothefollowing:n Fromtheoutside,useNSLOOKUPtoinitial

Page 188 - Assignment4

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 8Assignment1DefineasecurityarchitectureforGIACEnterprise,anebusinesswhichconduc

Page 189 - AttackTarget

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 80Notethatthereare3typesoflog:theStandardLog,theAccountingLogandtheActiveLo

Page 190 - FirewallAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 81Bydefault,thelogincludestoomanycolumns.WecanselectthecolumnstoviewviatheS

Page 191 - Page 191

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 82Ifthelogfilegrowstoobig(thisispossibleinabusynetwork),considertostartane

Page 192 - Page 192

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 83n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)isanideal

Page 193 - Page 193

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 84n InternaltothefirewallWWWn TheEcommercewebservern Theserver’saddressinthe

Page 194 - Page 194

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 852,DonotenabletheSynDefenderGateway option.ItisnotlikelytoseeSynfloodattacks

Page 195 - DoSattack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 86ReviewthelogviatheLogViewer.BasicTesting: n FromInternal_Clients,useNSLOOKUP

Page 196 - Page 196

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 87ConfiguringtheOtherDevicesConfiguringtheN orton1_IDSFirewall:Refertot he“Produc

Page 197 - Tools fortheAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 88n Inournetwork, Internal_Clients(192.168.17.0)canfreelyaccessInternal_Servers(192

Page 198 - Page 198

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 89ConfiguretheAdvancedOptions:IntheAdvancedOptionssection,enablethefollowingopti

Page 199 - A SimplerAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 9IntroductionAsecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevel

Page 200 - AgainstSmurfAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 90ConfigureIntrusionDetection:NortonFirewallcandetectportscanattemptsandautomatic

Page 201 - Page 201

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 91BasicTesting: n FromInternal_Clients,accessafileshareinInternal_Servers.Thereq

Page 202 - Page 202

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 92ConfiguringtheN orton2_IDSFirewall:Refertot he“ProductsPreparation”section forin

Page 203 - ForkBombsandViruses

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 93ConfiguretheSecurityLevel:Weneedthehighestpossiblelevelofsecurityhere.Toset

Page 204 - CounterMeasures

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 94FurtherindepthtestingshouldbeconductedattheAuditstage.

Page 205

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 95ConfiguringtheN orton3_IDSFirewall:Refertot he“ProductsPreparation”section forin

Page 206 - ListofReferences

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 96Internal_Servers(192.168.18.0)configuredasTrusted.ConfiguretheSecurityLevel:Wene

Page 207 - Page 207

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 97requestshouldsucceed.n FromRAS_Net,accessafileshareinInternal_Dev.Therequest

Page 208 - Page 208

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 98ConfiguringtheVisNetic _1Firewall:Refertot he“ProductsPreparation”section forinf

Page 209 - Page 209

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 99FW1.DefiningtheInterfaces:VisNetichasitsrulesconfiguredonaperinterfacebasis.

Commentaires sur ces manuels

Pas de commentaire