Eicon Networks S92 Manuel d'utilisateur Page 1

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel de sécurité antivirus Eicon Networks S92. Yu Chak Tin michael242 GCFW Version 1.7 Original submission Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - CHAKTI N_YU_ G CFW.PDF

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1 CHAKTI N_YU_ G CFW.PDF SAN S G CFW P R A C T I C AL A SS I G N M E N TYuChakTinmicha

Page 2

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 10Forperformancereason,aminimumoftwointernetlinksaredeployed,withonedevotedto

Page 3

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 100AnInterfaceConfigurationExample:Asmentionedbefore,VisNetichasitsrulesconfigure

Page 4

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 101n “In”definestrafficfromRemotetoLocaln “Out”definestrafficfromLocaltoRemot

Page 5

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 102Settheactionto“Allow”forthisrule,andconfigurethefirewalltologalltheitems.

Page 6

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 103LocalInterfaceConfiguration:AtVisNetic_1,wearetryingtoprotectthefollowingtrus

Page 7

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 104n DISALLOWAny<IN&OUT,Any >AnyAnotherinterfacewhichrequiresfilter

Page 8 - Assignment1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 105ConfiguringtheProxyServerRefertot he“ProductsPreparation”section forinformation

Page 9 - Techn icalRequirement

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 106SecurityPolicy:1. Provideproxyserviceforinternalclientsaccessingtheinternet.P

Page 10 - Page 10

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 107ISAServerConfiguration:ISA_CacheisaMicrosoftISAserverbasedcachingsolution.It

Page 11 - Page 11

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 108Internal_Admin,Internal_Dev),shouldbeconfiguredas“internal”.PresstheConstructTa

Page 12 - ArchitectureOverview

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 109Theinternalclientsshouldbeproperlydefinedasclientsets.Theseclientsincludeall

Page 13 - Page 13

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 11q SSLanddigitalcertificatesaredeployedbytheecommercewebsite.Suchcapabilities

Page 14 - IPInfrastructure

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 110ProtocolRules:ProtocolrulesinISAServerdeterminewhichprotocolsclientscanuseto

Page 15 - Page 15

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 111n DNSn NNTPFirewallConfigurationOptions:AlthoughISA_Cacheisprimarilyresponsibl

Page 16 - Page 16

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 112Forpacketfiltering,thesinglemostimportantsettingistodenyanyrequeststowardst

Page 17 - Page 17

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 113SincetheinternalclientsmaybeactingasremoteVPNclientsforaccessingthepartners

Page 18 - Page 18

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 114transformedintoanotherformatwhentherequestsareprocessedbyISAserver.HTTP/SSLs

Page 19 - Page 19

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 115ISAServersupportstwomajortypesofcaching:HTTPandFTP.Thereisalwaysatradeoff

Page 20 - Router_Eiconcard:

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 116Asmentionedbefore,cachedobjectsmaybeoutdated.Forcertainobjects thatinvolvedyn

Page 21 - Page 21

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 117TheconfiguredISA_CacheserverwilllistenonTCPport8080aswellasSSLport8443(SS

Page 22 - Page 22

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 118supposedtohandleincomingtraffic.BasicTesting: n FromInternal_Clients,accessan

Page 23 - Page 23

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 119ConfiguringtheVPNServerRefertoAssignment1 forinformationonWindows2000hardening

Page 24 - Page 24

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 12 à InternalstaffsasVPNclientsaccessingexternalpartners’securesitesviaPPTPRAS:

Page 25 - Page 25

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 120VPNModel:A routertorouterVPNmodelisnotdeployedprimarilybecausethevolumeofu

Page 26 - Page 26

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 121SecurityPolicy:Thesecuritypoliciestobeenforcedhereare:1. OnlyPPTPconnections

Page 27 - Page 27

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 122serverfortheremoteusersaccordingly.Sincetheexternalpartnersandsuppliersareus

Page 28 - Page 28

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 123Weshouldthen configureW2K_VPNtoaccept11 incomingPPTP connections. Thenumberofco

Page 29 - Assignment2

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 124Wealsowanttologasmuchinformationabouttheconnectionsaspossible.VPNProtocol:

Page 30 - DesignPrinciple

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 125PPTP iseasyandinexpensivetoimplement.”26PPTPisconsideredasreasonablysecure.

Page 31 - OverallPolicyObjectives

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 126ConfiguretheVPNportsandthestatic route:Bydefault,RRASallocates5portsforPPT

Page 32 - Page 32

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 127PPTP inputpacketfiltersareconfiguredontheadapterthatisonthesideof theIntern

Page 33 - Page 33

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 128Foradditionalprotection,wewanttosetthefilterstoallowconnectionsonlyfromthe

Page 34

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 129ConfiguringBasicFiltersonRouter_Eiconcard:Router_Eiconcardistherouterforinterne

Page 35 - LocalPolicyE nforcement

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 13Thereasonstousemultipledevicesare:1,Onatrulysecurenetwork,multiplelayersof

Page 36 - PoliciesatVisNetic_1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 130WithEiconcardConnectionsforWindows2000,allpacketsareforwardedforaconnectionf

Page 37 - PoliciesatNorton3_IDS

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 131headerssothatitappearsthatthepacketsarecomingfromthathost.”30Detailedinfor

Page 38 - PoliciesatRAS_Server

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 132shouldbeallowedtopassthroughatRouter_Eiconcard.n Inspectthelogfile.Indepth

Page 39 - ProductsPreparation

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 133ConfiguringtheR ASServerTheRAS_NetRASserverisa“backdoor”tothenetwork. Itall

Page 40 - Page 40

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 134theOnlineDocumentationprovidedbyMicrosoft,“InWindows2000,authorizationisgrante

Page 41 - Page 41

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 135Moreindepthtestingshouldbeperformedattheauditstage.

Page 42 - Page 42

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 136SpecialConsideration theEm ailServerEmailsecurityisamajorissueinnowadaysse

Page 43 - Page 43

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 137Assignment3TheSecurity Audit

Page 44 - Page 44

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 138Overview“Firewallsaregreatforrestrictingaccesstoyournetwork,butfirewallscanno

Page 45 - Page 45

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 139n anyvulnerabilityexistinthesecuritydevicesn whetherthesecuritypoliciesarep

Page 46 - ACleanFW1Installation

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 14simplicityasthekeytosuccessfulfirewallimplementation1.Inordertomakesimpleru

Page 47 - Page 47

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 140Eachnetworkshouldbetestedfrom theinternal usernetworks toensurethatsafetyexist

Page 48 - HardenedWindows2000

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 141NumberofStaff:n 3Timebudget:n 1dayforPhrase0n 1dayforPhrase1n 1dayf

Page 49 - Page 49

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 142ToolsoftheTradeToperform an auditagainstthefirewallsystems,weneedthehelpof

Page 50 - Page 50

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 143comprehensivereportofeachscan.”(fromwww.eEye.com37)Retinaisusedinourproject

Page 51 - Page 51

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 144CHAMinitsownvulnerabilityresearcheffortsandhasbeeninvaluableinenhancingitsc

Page 52 - Page 52

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 145Selectalltheauditoptions.SuperScan“ApowerfulconnectbasedTCPportscanner,pinge

Page 53 - Page 53

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 146NetBrute“NetBruteallowsyoutoscanasinglecomputerormultipleIPaddressesforavai

Page 54 - NortonFirewall 2002

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 147A Trojanisadestructiveprogramthatmasqueradesasabenignapplication.Accordingto

Page 55 - DeerfieldVisNeticFirewall

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 148UDPFlood“AUDPpacketsender.ItsendsoutUDPpacketstothespecifiedIPandportata

Page 56 - Page 56

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 149Assessment–froman“Insider”perspectiveSincetherearetimeandresourceconstraints,

Page 57 - Page 57

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 15Subnets:TheGIACnetwork issegmentedintothefollowingsubnets:n Core_Net:thisisth

Page 58 - MicrosoftISASe rver

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 150Testscenarios:

Page 59 - Hardeni ngtheConfiguration

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 151ScenarioOne:Segmentsinvolved:Core_Net(192.168.16.0), Internal_Servers(192.168.18.0)

Page 60 - Page 60

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 152Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 61 - ISAServerVuln erabilities

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 153blockedviatheinterface’sportfilter,sinceweneverknowwhenanewvulnerabilitywil

Page 62 - Page 62

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 154RulebaseassessmentAsanexternalpartner,connectasavalidVPNclientandaccessall

Page 63

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 155ScenarioTwo:Involvedsegments:Core_Net(192.168.16.0), Internal_Clients(192.168.17.0)

Page 64

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 156Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 65

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 157192.168.16.99Norton2_IDS Retina Nil*OScannotbedetected.Yes ThefactthattheOS

Page 66

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 158192.168.16.99192.168.20.0NetBrute Nil Yes192.168.16.99Norton3_IDSShareScannerNil

Page 67 - Tutorial–Che ckPointFW1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 159ScenarioThree:Segmentsinvolved:Core_Net(192.168.16.0),Public_Services(192.168.8.0)

Page 68 - Page 68

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 16IPSettings:TheIP addressschemeinthisprojectissimplifiedforillustratingtheconn

Page 69 - Page 69

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 160Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 70 - Page 70

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 161n nonHTTP/HTTPStrafficfromInternal_Clients.n nonHTTP/HTTPStrafficfromRAS_Net.

Page 71 - Page 71

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 162“NSLOOKUP canbeusedtotransferanentirezonebyusingthelscommand.Thisisuseful

Page 72 - Page 72

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 163recommendedin thebook“HackProofingyourECommerceSite”48.48PublishedbySyngres

Page 73 - Page 73

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 164Scanfrom Target Tools Ports/SharesdiscoveredIntrusionloggedComments/Recommended

Page 74 - Page 74

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 165Therefore,theservershouldbeinvestigatedsuchthattheservicesusingtheseportsare

Page 75 - Page 75

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 166n TheRASphonenumbershouldalwaysbekeptconfidential.n Itistechnicallypossible

Page 76 - Page 76

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 167Assessmentfroman“Outsider”perspectiveAgain,weneedtofirstidentifythepossible

Page 77 - Page 77

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 168ScenarioOne:Remarks:Therouterisconfiguredwithonlyonetypeoffilter–filteraga

Page 78 - Page 78

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 169Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 79 - Page 79

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 17n Ext_DNS– 192.168.8.4(NAT >192.168.7.9)n Ext_SMTP – 192.168.8.5(NAT >192.

Page 80 - Page 80

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 170nothingelse.Theexistenceofanyactiveportmustbeinvestigatedtodetermineifthey

Page 81 - Page 81

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 171OtherassessmentmethodsAnattackinghostwithitsIPaddressdeliberatelysettoan“in

Page 82 - Page 82

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 172ScenarioTwo:Segmentsinvolved:Outsideworld,Public_Services(realaddress192.168.8.0

Page 83 - Page 83

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 173asrecommendedinthebook“HackProofingyourECommerceSite”50.Scanfrom Target(s)

Page 84 - Page 84

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 174OutsideFW1_B2CSub_Net Nil YesOutside192.168.7.0(publishedaddresses)Sub_Net Nil

Page 85 - Page 85

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 175Firstofall,abaselineisobtainedbyrunningstresstestsagainstthewebserverdirec

Page 86 - Page 86

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 176

Page 87 - Page 87

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 177ScenarioThree:Segmentsinvolved:Outsideworld,Core_Net(192.168.16.0)Remarks:n Thi

Page 88 - Page 88

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 178Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 89 - Page 89

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1791723/tcpPPTP8080/tcpproxy8080/udpproxyThefunctionofW2K_VPNisservicingremotea

Page 90 - Page 90

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 18LayersofProtection:Intermsofsecurity,thegoalistoensurethatcritical internal r

Page 91 - Page 91

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 180OutsideW2K_VPNNetBrute Nil N/AOutside192.168.16.0NetBrute Nil N/AOutsideW2K_VP

Page 92 - Page 92

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 181ScenarioFour:Segmentsinvolved:Outsideworld,Internal_Clients(192.168.17.0), Interna

Page 93 - Page 93

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 182Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Page 94 - Page 94

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 183ScannerOutside192.168.19.0ShareScannerNil YesOutside192.168.20.0ShareScannerNi

Page 95 - Page 95

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 184AdministrativeSecurityAssessmentForeveryfirewallandrouterinuse,determinethefo

Page 96 - Page 96

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 185AuditReportAuditoftheGIACnetworksecurityarchitecturewasperformedfrom4thApri

Page 97 - Page 97

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 186businesscriticalapplicationsandendusers.FloodGate1canbedeployedwithVPN1®/Fir

Page 98 - Page 98

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 187Recommendatio nFiveItisrecommendedthatanauditbeperformedonthepartner/supplier

Page 99 - Page 99

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 188Assignment4Designunderfire

Page 100 - Page 100

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 189AttackTargetVincentBerk’sdesignathttp://www.sans.org/y2k/practical/Vince_Berk_GCFW.

Page 101 - Page 101

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 19n RoutingandtrafficinspectionareCPUintensive.Dualprocessorsystemisalwaysrecom

Page 102 - Page 102

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 190FirewallAttackInformationGathering:VisitthetargetGIACwebsite.Studyitthoroughl

Page 103 - Page 103

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 191Sincewejusttalkedaboutthedefaultports,onethingwecan try istoexplorevulnerab

Page 104 - Page 104

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 192DNSserverthroughthefirewall.Iftheresultispositive,wecanstructureanattackba

Page 105 - ConfiguringtheProxyServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 193Attacking–theIPFragmentroute:ThisattackallowsustobogdownFW1.CheckPointha

Page 106 - Page 106

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 194is changed to another one than your's, no packets get back. Dest: Is the destinatio

Page 107 - Page 107

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 195DoSattackTheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurf

Page 108 - Page 108

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 196Intheory,wecan pingaroundtheinternettofindoutwhocanbeusedasamplifiers.Thi

Page 109 - Page 109

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1972,Retrieveandusethelistof existingamplifiers:Tools fortheAttackWhattoolssho

Page 110 - Page 110

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 198TribeFloodNetwork UDP,ICMP,SYN.SmurfStacheldrachtandvariants UDP,ICMP,SYN.Sm

Page 111 - Page 111

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 199andSmurfstyleattacks,aswellasprovidingan"ondemand"rootshellboundt

Page 112 - Page 112

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 2TableofContentsAssignment1 ...

Page 113 - Page 113

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 20Router_Eiconcard:n Borderrouterforboth theB2ClinkandtheB2Blinkn Platform:Pla

Page 114 - Page 114

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 200stepsbelow:1. Writeasimpleprogramthatallowsustosetthenumberofpingattempts

Page 115 - Page 115

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 201tradeoffsinlife.Still,theaboveapproachdoesnotsolvetheproblemoftrafficconges

Page 116 - “CacheDynamicContent”

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 202CompromisingInternalSys temsWhenIreviewthedifferentpostedpracticalassignments,

Page 117 - Page 117

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 203Viathenonemailroute:IfGIAChasanantivirussolutionrunning,theemailattachment

Page 118 - Page 118

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 204executable.Thistendstobehiddenfrom theuser,whoexpectsadocumenttobedatatha

Page 119 - ConfiguringtheVPNServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 205“MailScan isworld'sfirst'RealTime'ContentSecuritySoftwarethatper

Page 120 - Page 120

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 206ListofReferences(inalphabeticalorder)HackProofingYourEcommerceSite,ISBN:192

Page 121 - Page 121

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 207http://www.enteract.com/~lspitz/rules.htmlhttp://www.foundstone.com/knowledge/proddesc/s

Page 122 - 75700347903

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 208http://www.webopedia.com/TERM/P/proxy_server.htmlhttp://www.webopedia.com/TERM/s/spoof.h

Page 123 - Page 123

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 209

Page 124 - Page 124

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 21EiconcardS92dualWANportsadaptor andthree 100BaseTNICs.n Hardware:DualPentium3

Page 125 - 75700347903

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 22Norton2_IDS:n FirewallprotectionforInternal_Adminn IntrusionDetectionn Platform:

Page 126 - Page 126

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 23VisNetic_1:n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resourcesn

Page 127 - Page 127

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 24n Platform:x86basedWindows2000Servern Hardware:SinglePentium3500MHZ,256MBRAM

Page 128 - Page 128

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 25Equipments’ IPSettings:TheIPaddressschemeinthisprojectissimplifiedforillustrat

Page 129 - Page 129

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 26n 192.168.6.1(to W2K_VPN)n 192.168.7.1(toFW1_B2C)W2K_VPN:n 192.168.6.2(toRouter

Page 130 - Page 130

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 27n 192.168.22.2(toRAS_Net)EquipmentFaultToleranceandRedundancy:Althoughitisposs

Page 131 - Page 131

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 28NOT goingonlineatthesametime.Remember,thestandbysystem shouldbeallowedtogoon

Page 132 - Page 132

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 29Assignment2DefinetheGIACSecurityPolicySecurityStepbystepTutorial

Page 133 - ConfiguringtheR ASServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 3ACleanFW1Installation...

Page 134 - Page 134

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 30DesignPrincipleAsmentionedbyLanceSpitznerinhisarticle“BuildingYourFirewallRul

Page 135 - Page 135

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 31OverallPolicyObjectivesFor theGIACproject,theoverall policyobjectivesaredefined

Page 136 - Page 136

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 32n PolicyObjective7: Allinternalusers,aswellasallserversfrom theInternal_Server

Page 137 - Assignment3

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 33componentsthatareoftenoverlookedaspotentialthreats3.<Anythingnotexplicitly

Page 138 - Overview

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 34

Page 139 - Phrases

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 35LocalPolicyE nforcementPoliciesatRouter_Ei concard1. Performroutingonthethreet

Page 140 - Page 140

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 364,IDS:n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)is

Page 141 - Page 141

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 375. RASuserswhoconnectviaRAS_NetcanaccesstheInternal_Serverssegmentwithanypro

Page 142 - ToolsoftheTrade

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 38segment.2. Outboundaccessrequestsmadeby Internal_Dev arenotrestrictedbythisfire

Page 143 - Page 143

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 39ProductsPreparationTopresentacompletepictureofthesecurityarchitectureimplementa

Page 144 - Page 144

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 4ConfiguringtheNorton1_IDSFirewall:...

Page 145 - Page 145

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 40inspectiontechnology.Aformofdynamicpacketfiltering,statefulinspectionworksatth

Page 146 - Page 146

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 41Asofthetimeofthiswriting,thelatestservicepackavailableforNTServer4isversi

Page 147 - Stress test tool s

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 42n RPCConfigurationn ServerFW1canfunctionperfectlyevenwithouttheseservices.On

Page 148 - Page 148

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 43Step4Removeunusedandpotential lydangerouscomponents.The“dangerous”componentsa

Page 149 - Page 149

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 44Administratorsgroup.WindowsNTServer, likeotheroperatingsystems,allowsprivileged

Page 150 - Testscenarios:

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 45enhancedsecurityagainst"passwordguessing" or "dictionaryattacks"

Page 151

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 46ACleanFW1InstallationAcleanFW1installationgivesagoodstart.Forourproject,e

Page 152

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 47n 20001101: CheckPointFirewall1ValidUsernameVulnerabilityn 20000815:  Chec

Page 153

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 48HardenedWindows2000PerfectingtheWindow s2000 InstallationFirstofall,installthe

Page 154 - Page 154

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 49Step1Removeunusednetworkservices.TCP/IPshouldbetheonlynetworkserviceattache

Page 155

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 5ProxyFilters ...

Page 156

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 50Forsecurityreason,wewanttologasmuchinformationonRIPaspossible.Also,weshoul

Page 157

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 51n RoutingandRemoteAccessn Workstationn ServerThereasonweneedtokeeptheWorks

Page 158

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 52Step6Removeunusedandpotential lydangerouscomponents.TheOS2andPosixsubsystems

Page 159 - 192.168.8.0

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 53n net.exen netstat.exen NSLOOKUP.exen ping.exen ping.exen posix.exen qbasic.e

Page 160

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 54filesarenotaccessiblefromotheroperatingsystemssuchasDOS.”(fromwebopedia.com14

Page 161 - Page 161

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 55Formaximumprotection,thefirewallshouldbeconfiguredtorunautomaticallyatsystems

Page 162 - Page 162

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 56peaceofmindthroughcomprehensiveintrusionprotection.”16VisNeticisdesignedforbus

Page 163 - Page 163

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 57Whenrunning,thefirewallmustbeintheFilterstate.Whenthefirewallserviceisnotr

Page 164 - Page 164

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 58VulnerabilitiesSameasforNortonFirewall,wehavenotbeenabletoidentifyanyvulnera

Page 165 - Page 165

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 59datacrossingthefirewall,controlofaccesspolicy,androuting oftraffic.Thecachei

Page 166 - Page 166

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 6Testscenarios:...

Page 167 - Page 167

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 60Availableathttp://www.microsoft.com/isaserver/downloads/sp1.asp,"InternetSecurity

Page 168 - Page 168

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 61ISAServerVuln erabilitiesAccordingtoSamCostelloofIDGNewsService,“MicrosoftFrid

Page 169 - Outside

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 62TheH.323GatekeeperandProxyServiceflawswerediscoveredbyPeterGrundl.Thescriptin

Page 170 - Page 170

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 63DefaultPortAssignmentsforCommonServicesonaWindows2000NetworkSinceGIAC’snetwor

Page 171 - Otherassessmentmethods

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 64LDAP(SSL) 636MTA X.400overTCP/IP 102POP3 110POP3(S SL) 995RPC 135SMTP 25

Page 172 - Page 172

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 65Macintosh,FileServices(AFP/IP) 548MembershipDPA 568MembershipMSN 569MicrosoftC

Page 173

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 66Radiusaccounting(RoutingandRemoteAccess)1646or1813Radiusauthentication(Routing

Page 174

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 67PRIMARYFirewallConfigurationTutorial–Che ckPointFW1ConfiguringtheR ulebasefor

Page 175 - Page 175

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 684. PropertiesmarkedBEFORELASTintheSecurityPolicyProperties5. RuleBaselastrul

Page 176 - Page 176

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 69NetworkObjects:Beforewesetupanyrule,alltherelevantnetworkobjectsmustbebuilt

Page 177 - 192.168.16.0

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 7CounterMeasures...

Page 178

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 70DNSn TheDNSservern Theserver’saddressinthenetworkis192.168.8.4.n Theserver

Page 179 - Page 179

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 71Emailn TheSMTPservern Theserver’saddressinthenetworkis192.168.8.5.n Theser

Page 180

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 72SELFn FW1_B2Citselfn Totheoutside:192.168.7.2n Totheinside:192.168.8.2

Page 181

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 73Rules:1,Removeall thedefaults(forsecuritypurpose) EXCEPTthe“AcceptOutgoingPacke

Page 182

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 74Theoption“ApplyGatewayRulestoInterfaceDirection”isrelatedtotheconceptofinter

Page 183

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 75Keepinmind,SYNGatewayisresourceintensive.Itdoesproducenegativeperformanceimpa

Page 184 - FaultToleranceAssessment

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 764,Verifytherules.ClickPolicy – Verifytocheckandensurethattheserulesareerror

Page 185 - AuditReport

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 77IfforsomereasonsthePolicywassuccessfullyverifiedbuterroroccursduringinstallat

Page 186

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 78ThepossiblestatusesoftheFirewall1Daemonare:n INSTALLED,meaningthedaemonisru

Page 187 - Page 187

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 79TotesttheDNSqueryrule,dothefollowing:n Fromtheoutside,useNSLOOKUPtoinitial

Page 188 - Assignment4

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 8Assignment1DefineasecurityarchitectureforGIACEnterprise,anebusinesswhichconduc

Page 189 - AttackTarget

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 80Notethatthereare3typesoflog:theStandardLog,theAccountingLogandtheActiveLo

Page 190 - FirewallAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 81Bydefault,thelogincludestoomanycolumns.WecanselectthecolumnstoviewviatheS

Page 191 - Page 191

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 82Ifthelogfilegrowstoobig(thisispossibleinabusynetwork),considertostartane

Page 192 - Page 192

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 83n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)isanideal

Page 193 - Page 193

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 84n InternaltothefirewallWWWn TheEcommercewebservern Theserver’saddressinthe

Page 194 - Page 194

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 852,DonotenabletheSynDefenderGateway option.ItisnotlikelytoseeSynfloodattacks

Page 195 - DoSattack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 86ReviewthelogviatheLogViewer.BasicTesting: n FromInternal_Clients,useNSLOOKUP

Page 196 - Page 196

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 87ConfiguringtheOtherDevicesConfiguringtheN orton1_IDSFirewall:Refertot he“Produc

Page 197 - Tools fortheAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 88n Inournetwork, Internal_Clients(192.168.17.0)canfreelyaccessInternal_Servers(192

Page 198 - Page 198

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 89ConfiguretheAdvancedOptions:IntheAdvancedOptionssection,enablethefollowingopti

Page 199 - A SimplerAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 9IntroductionAsecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevel

Page 200 - AgainstSmurfAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 90ConfigureIntrusionDetection:NortonFirewallcandetectportscanattemptsandautomatic

Page 201 - Page 201

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 91BasicTesting: n FromInternal_Clients,accessafileshareinInternal_Servers.Thereq

Page 202 - Page 202

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 92ConfiguringtheN orton2_IDSFirewall:Refertot he“ProductsPreparation”section forin

Page 203 - ForkBombsandViruses

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 93ConfiguretheSecurityLevel:Weneedthehighestpossiblelevelofsecurityhere.Toset

Page 204 - CounterMeasures

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 94FurtherindepthtestingshouldbeconductedattheAuditstage.

Page 205

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 95ConfiguringtheN orton3_IDSFirewall:Refertot he“ProductsPreparation”section forin

Page 206 - ListofReferences

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 96Internal_Servers(192.168.18.0)configuredasTrusted.ConfiguretheSecurityLevel:Wene

Page 207 - Page 207

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 97requestshouldsucceed.n FromRAS_Net,accessafileshareinInternal_Dev.Therequest

Page 208 - Page 208

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 98ConfiguringtheVisNetic _1Firewall:Refertot he“ProductsPreparation”section forinf

Page 209 - Page 209

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 99FW1.DefiningtheInterfaces:VisNetichasitsrulesconfiguredonaperinterfacebasis.

Commentaires sur ces manuels

Pas de commentaire