Eicon Networks S92 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Software de segurança antivirus Eicon Networks S92. Yu Chak Tin michael242 GCFW Version 1.7 Original submission Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 209
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 1 - CHAKTI N_YU_ G CFW.PDF

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1 CHAKTI N_YU_ G CFW.PDF SAN S G CFW P R A C T I C AL A SS I G N M E N TYuChakTinmicha

Página 2

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 10Forperformancereason,aminimumoftwointernetlinksaredeployed,withonedevotedto

Página 3

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 100AnInterfaceConfigurationExample:Asmentionedbefore,VisNetichasitsrulesconfigure

Página 4

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 101n “In”definestrafficfromRemotetoLocaln “Out”definestrafficfromLocaltoRemot

Página 5

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 102Settheactionto“Allow”forthisrule,andconfigurethefirewalltologalltheitems.

Página 6

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 103LocalInterfaceConfiguration:AtVisNetic_1,wearetryingtoprotectthefollowingtrus

Página 7

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 104n DISALLOWAny<IN&OUT,Any >AnyAnotherinterfacewhichrequiresfilter

Página 8 - Assignment1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 105ConfiguringtheProxyServerRefertot he“ProductsPreparation”section forinformation

Página 9 - Techn icalRequirement

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 106SecurityPolicy:1. Provideproxyserviceforinternalclientsaccessingtheinternet.P

Página 10 - Page 10

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 107ISAServerConfiguration:ISA_CacheisaMicrosoftISAserverbasedcachingsolution.It

Página 11 - Page 11

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 108Internal_Admin,Internal_Dev),shouldbeconfiguredas“internal”.PresstheConstructTa

Página 12 - ArchitectureOverview

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 109Theinternalclientsshouldbeproperlydefinedasclientsets.Theseclientsincludeall

Página 13 - Page 13

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 11q SSLanddigitalcertificatesaredeployedbytheecommercewebsite.Suchcapabilities

Página 14 - IPInfrastructure

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 110ProtocolRules:ProtocolrulesinISAServerdeterminewhichprotocolsclientscanuseto

Página 15 - Page 15

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 111n DNSn NNTPFirewallConfigurationOptions:AlthoughISA_Cacheisprimarilyresponsibl

Página 16 - Page 16

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 112Forpacketfiltering,thesinglemostimportantsettingistodenyanyrequeststowardst

Página 17 - Page 17

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 113SincetheinternalclientsmaybeactingasremoteVPNclientsforaccessingthepartners

Página 18 - Page 18

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 114transformedintoanotherformatwhentherequestsareprocessedbyISAserver.HTTP/SSLs

Página 19 - Page 19

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 115ISAServersupportstwomajortypesofcaching:HTTPandFTP.Thereisalwaysatradeoff

Página 20 - Router_Eiconcard:

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 116Asmentionedbefore,cachedobjectsmaybeoutdated.Forcertainobjects thatinvolvedyn

Página 21 - Page 21

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 117TheconfiguredISA_CacheserverwilllistenonTCPport8080aswellasSSLport8443(SS

Página 22 - Page 22

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 118supposedtohandleincomingtraffic.BasicTesting: n FromInternal_Clients,accessan

Página 23 - Page 23

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 119ConfiguringtheVPNServerRefertoAssignment1 forinformationonWindows2000hardening

Página 24 - Page 24

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 12 à InternalstaffsasVPNclientsaccessingexternalpartners’securesitesviaPPTPRAS:

Página 25 - Page 25

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 120VPNModel:A routertorouterVPNmodelisnotdeployedprimarilybecausethevolumeofu

Página 26 - Page 26

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 121SecurityPolicy:Thesecuritypoliciestobeenforcedhereare:1. OnlyPPTPconnections

Página 27 - Page 27

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 122serverfortheremoteusersaccordingly.Sincetheexternalpartnersandsuppliersareus

Página 28 - Page 28

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 123Weshouldthen configureW2K_VPNtoaccept11 incomingPPTP connections. Thenumberofco

Página 29 - Assignment2

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 124Wealsowanttologasmuchinformationabouttheconnectionsaspossible.VPNProtocol:

Página 30 - DesignPrinciple

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 125PPTP iseasyandinexpensivetoimplement.”26PPTPisconsideredasreasonablysecure.

Página 31 - OverallPolicyObjectives

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 126ConfiguretheVPNportsandthestatic route:Bydefault,RRASallocates5portsforPPT

Página 32 - Page 32

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 127PPTP inputpacketfiltersareconfiguredontheadapterthatisonthesideof theIntern

Página 33 - Page 33

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 128Foradditionalprotection,wewanttosetthefilterstoallowconnectionsonlyfromthe

Página 34

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 129ConfiguringBasicFiltersonRouter_Eiconcard:Router_Eiconcardistherouterforinterne

Página 35 - LocalPolicyE nforcement

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 13Thereasonstousemultipledevicesare:1,Onatrulysecurenetwork,multiplelayersof

Página 36 - PoliciesatVisNetic_1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 130WithEiconcardConnectionsforWindows2000,allpacketsareforwardedforaconnectionf

Página 37 - PoliciesatNorton3_IDS

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 131headerssothatitappearsthatthepacketsarecomingfromthathost.”30Detailedinfor

Página 38 - PoliciesatRAS_Server

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 132shouldbeallowedtopassthroughatRouter_Eiconcard.n Inspectthelogfile.Indepth

Página 39 - ProductsPreparation

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 133ConfiguringtheR ASServerTheRAS_NetRASserverisa“backdoor”tothenetwork. Itall

Página 40 - Page 40

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 134theOnlineDocumentationprovidedbyMicrosoft,“InWindows2000,authorizationisgrante

Página 41 - Page 41

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 135Moreindepthtestingshouldbeperformedattheauditstage.

Página 42 - Page 42

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 136SpecialConsideration theEm ailServerEmailsecurityisamajorissueinnowadaysse

Página 43 - Page 43

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 137Assignment3TheSecurity Audit

Página 44 - Page 44

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 138Overview“Firewallsaregreatforrestrictingaccesstoyournetwork,butfirewallscanno

Página 45 - Page 45

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 139n anyvulnerabilityexistinthesecuritydevicesn whetherthesecuritypoliciesarep

Página 46 - ACleanFW1Installation

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 14simplicityasthekeytosuccessfulfirewallimplementation1.Inordertomakesimpleru

Página 47 - Page 47

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 140Eachnetworkshouldbetestedfrom theinternal usernetworks toensurethatsafetyexist

Página 48 - HardenedWindows2000

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 141NumberofStaff:n 3Timebudget:n 1dayforPhrase0n 1dayforPhrase1n 1dayf

Página 49 - Page 49

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 142ToolsoftheTradeToperform an auditagainstthefirewallsystems,weneedthehelpof

Página 50 - Page 50

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 143comprehensivereportofeachscan.”(fromwww.eEye.com37)Retinaisusedinourproject

Página 51 - Page 51

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 144CHAMinitsownvulnerabilityresearcheffortsandhasbeeninvaluableinenhancingitsc

Página 52 - Page 52

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 145Selectalltheauditoptions.SuperScan“ApowerfulconnectbasedTCPportscanner,pinge

Página 53 - Page 53

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 146NetBrute“NetBruteallowsyoutoscanasinglecomputerormultipleIPaddressesforavai

Página 54 - NortonFirewall 2002

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 147A Trojanisadestructiveprogramthatmasqueradesasabenignapplication.Accordingto

Página 55 - DeerfieldVisNeticFirewall

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 148UDPFlood“AUDPpacketsender.ItsendsoutUDPpacketstothespecifiedIPandportata

Página 56 - Page 56

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 149Assessment–froman“Insider”perspectiveSincetherearetimeandresourceconstraints,

Página 57 - Page 57

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 15Subnets:TheGIACnetwork issegmentedintothefollowingsubnets:n Core_Net:thisisth

Página 58 - MicrosoftISASe rver

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 150Testscenarios:

Página 59 - Hardeni ngtheConfiguration

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 151ScenarioOne:Segmentsinvolved:Core_Net(192.168.16.0), Internal_Servers(192.168.18.0)

Página 60 - Page 60

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 152Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Página 61 - ISAServerVuln erabilities

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 153blockedviatheinterface’sportfilter,sinceweneverknowwhenanewvulnerabilitywil

Página 62 - Page 62

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 154RulebaseassessmentAsanexternalpartner,connectasavalidVPNclientandaccessall

Página 63

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 155ScenarioTwo:Involvedsegments:Core_Net(192.168.16.0), Internal_Clients(192.168.17.0)

Página 64

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 156Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Página 65

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 157192.168.16.99Norton2_IDS Retina Nil*OScannotbedetected.Yes ThefactthattheOS

Página 66

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 158192.168.16.99192.168.20.0NetBrute Nil Yes192.168.16.99Norton3_IDSShareScannerNil

Página 67 - Tutorial–Che ckPointFW1

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 159ScenarioThree:Segmentsinvolved:Core_Net(192.168.16.0),Public_Services(192.168.8.0)

Página 68 - Page 68

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 16IPSettings:TheIP addressschemeinthisprojectissimplifiedforillustratingtheconn

Página 69 - Page 69

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 160Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Página 70 - Page 70

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 161n nonHTTP/HTTPStrafficfromInternal_Clients.n nonHTTP/HTTPStrafficfromRAS_Net.

Página 71 - Page 71

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 162“NSLOOKUP canbeusedtotransferanentirezonebyusingthelscommand.Thisisuseful

Página 72 - Page 72

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 163recommendedin thebook“HackProofingyourECommerceSite”48.48PublishedbySyngres

Página 73 - Page 73

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 164Scanfrom Target Tools Ports/SharesdiscoveredIntrusionloggedComments/Recommended

Página 74 - Page 74

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 165Therefore,theservershouldbeinvestigatedsuchthattheservicesusingtheseportsare

Página 75 - Page 75

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 166n TheRASphonenumbershouldalwaysbekeptconfidential.n Itistechnicallypossible

Página 76 - Page 76

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 167Assessmentfroman“Outsider”perspectiveAgain,weneedtofirstidentifythepossible

Página 77 - Page 77

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 168ScenarioOne:Remarks:Therouterisconfiguredwithonlyonetypeoffilter–filteraga

Página 78 - Page 78

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 169Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Página 79 - Page 79

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 17n Ext_DNS– 192.168.8.4(NAT >192.168.7.9)n Ext_SMTP – 192.168.8.5(NAT >192.

Página 80 - Page 80

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 170nothingelse.Theexistenceofanyactiveportmustbeinvestigatedtodetermineifthey

Página 81 - Page 81

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 171OtherassessmentmethodsAnattackinghostwithitsIPaddressdeliberatelysettoan“in

Página 82 - Page 82

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 172ScenarioTwo:Segmentsinvolved:Outsideworld,Public_Services(realaddress192.168.8.0

Página 83 - Page 83

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 173asrecommendedinthebook“HackProofingyourECommerceSite”50.Scanfrom Target(s)

Página 84 - Page 84

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 174OutsideFW1_B2CSub_Net Nil YesOutside192.168.7.0(publishedaddresses)Sub_Net Nil

Página 85 - Page 85

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 175Firstofall,abaselineisobtainedbyrunningstresstestsagainstthewebserverdirec

Página 86 - Page 86

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 176

Página 87 - Page 87

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 177ScenarioThree:Segmentsinvolved:Outsideworld,Core_Net(192.168.16.0)Remarks:n Thi

Página 88 - Page 88

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 178Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Página 89 - Page 89

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1791723/tcpPPTP8080/tcpproxy8080/udpproxyThefunctionofW2K_VPNisservicingremotea

Página 90 - Page 90

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 18LayersofProtection:Intermsofsecurity,thegoalistoensurethatcritical internal r

Página 91 - Page 91

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 180OutsideW2K_VPNNetBrute Nil N/AOutside192.168.16.0NetBrute Nil N/AOutsideW2K_VP

Página 92 - Page 92

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 181ScenarioFour:Segmentsinvolved:Outsideworld,Internal_Clients(192.168.17.0), Interna

Página 93 - Page 93

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 182Scanfrom Target(s) Tool Ports/SharesdiscoveredIntrusionloggedComments/Recommend

Página 94 - Page 94

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 183ScannerOutside192.168.19.0ShareScannerNil YesOutside192.168.20.0ShareScannerNi

Página 95 - Page 95

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 184AdministrativeSecurityAssessmentForeveryfirewallandrouterinuse,determinethefo

Página 96 - Page 96

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 185AuditReportAuditoftheGIACnetworksecurityarchitecturewasperformedfrom4thApri

Página 97 - Page 97

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 186businesscriticalapplicationsandendusers.FloodGate1canbedeployedwithVPN1®/Fir

Página 98 - Page 98

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 187Recommendatio nFiveItisrecommendedthatanauditbeperformedonthepartner/supplier

Página 99 - Page 99

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 188Assignment4Designunderfire

Página 100 - Page 100

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 189AttackTargetVincentBerk’sdesignathttp://www.sans.org/y2k/practical/Vince_Berk_GCFW.

Página 101 - Page 101

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 19n RoutingandtrafficinspectionareCPUintensive.Dualprocessorsystemisalwaysrecom

Página 102 - Page 102

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 190FirewallAttackInformationGathering:VisitthetargetGIACwebsite.Studyitthoroughl

Página 103 - Page 103

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 191Sincewejusttalkedaboutthedefaultports,onethingwecan try istoexplorevulnerab

Página 104 - Page 104

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 192DNSserverthroughthefirewall.Iftheresultispositive,wecanstructureanattackba

Página 105 - ConfiguringtheProxyServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 193Attacking–theIPFragmentroute:ThisattackallowsustobogdownFW1.CheckPointha

Página 106 - Page 106

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 194is changed to another one than your's, no packets get back. Dest: Is the destinatio

Página 107 - Page 107

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 195DoSattackTheDoSattackthatIwilluseisaSmurfattack.AccordingtoSymantec,Smurf

Página 108 - Page 108

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 196Intheory,wecan pingaroundtheinternettofindoutwhocanbeusedasamplifiers.Thi

Página 109 - Page 109

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 1972,Retrieveandusethelistof existingamplifiers:Tools fortheAttackWhattoolssho

Página 110 - Page 110

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 198TribeFloodNetwork UDP,ICMP,SYN.SmurfStacheldrachtandvariants UDP,ICMP,SYN.Sm

Página 111 - Page 111

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 199andSmurfstyleattacks,aswellasprovidingan"ondemand"rootshellboundt

Página 112 - Page 112

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 2TableofContentsAssignment1 ...

Página 113 - Page 113

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 20Router_Eiconcard:n Borderrouterforboth theB2ClinkandtheB2Blinkn Platform:Pla

Página 114 - Page 114

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 200stepsbelow:1. Writeasimpleprogramthatallowsustosetthenumberofpingattempts

Página 115 - Page 115

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 201tradeoffsinlife.Still,theaboveapproachdoesnotsolvetheproblemoftrafficconges

Página 116 - “CacheDynamicContent”

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 202CompromisingInternalSys temsWhenIreviewthedifferentpostedpracticalassignments,

Página 117 - Page 117

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 203Viathenonemailroute:IfGIAChasanantivirussolutionrunning,theemailattachment

Página 118 - Page 118

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 204executable.Thistendstobehiddenfrom theuser,whoexpectsadocumenttobedatatha

Página 119 - ConfiguringtheVPNServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 205“MailScan isworld'sfirst'RealTime'ContentSecuritySoftwarethatper

Página 120 - Page 120

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 206ListofReferences(inalphabeticalorder)HackProofingYourEcommerceSite,ISBN:192

Página 121 - Page 121

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 207http://www.enteract.com/~lspitz/rules.htmlhttp://www.foundstone.com/knowledge/proddesc/s

Página 122 - 75700347903

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 208http://www.webopedia.com/TERM/P/proxy_server.htmlhttp://www.webopedia.com/TERM/s/spoof.h

Página 123 - Page 123

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 209

Página 124 - Page 124

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 21EiconcardS92dualWANportsadaptor andthree 100BaseTNICs.n Hardware:DualPentium3

Página 125 - 75700347903

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 22Norton2_IDS:n FirewallprotectionforInternal_Adminn IntrusionDetectionn Platform:

Página 126 - Page 126

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 23VisNetic_1:n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resourcesn

Página 127 - Page 127

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 24n Platform:x86basedWindows2000Servern Hardware:SinglePentium3500MHZ,256MBRAM

Página 128 - Page 128

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 25Equipments’ IPSettings:TheIPaddressschemeinthisprojectissimplifiedforillustrat

Página 129 - Page 129

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 26n 192.168.6.1(to W2K_VPN)n 192.168.7.1(toFW1_B2C)W2K_VPN:n 192.168.6.2(toRouter

Página 130 - Page 130

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 27n 192.168.22.2(toRAS_Net)EquipmentFaultToleranceandRedundancy:Althoughitisposs

Página 131 - Page 131

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 28NOT goingonlineatthesametime.Remember,thestandbysystem shouldbeallowedtogoon

Página 132 - Page 132

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 29Assignment2DefinetheGIACSecurityPolicySecurityStepbystepTutorial

Página 133 - ConfiguringtheR ASServer

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 3ACleanFW1Installation...

Página 134 - Page 134

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 30DesignPrincipleAsmentionedbyLanceSpitznerinhisarticle“BuildingYourFirewallRul

Página 135 - Page 135

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 31OverallPolicyObjectivesFor theGIACproject,theoverall policyobjectivesaredefined

Página 136 - Page 136

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 32n PolicyObjective7: Allinternalusers,aswellasallserversfrom theInternal_Server

Página 137 - Assignment3

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 33componentsthatareoftenoverlookedaspotentialthreats3.<Anythingnotexplicitly

Página 138 - Overview

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 34

Página 139 - Phrases

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 35LocalPolicyE nforcementPoliciesatRouter_Ei concard1. Performroutingonthethreet

Página 140 - Page 140

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 364,IDS:n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)is

Página 141 - Page 141

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 375. RASuserswhoconnectviaRAS_NetcanaccesstheInternal_Serverssegmentwithanypro

Página 142 - ToolsoftheTrade

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 38segment.2. Outboundaccessrequestsmadeby Internal_Dev arenotrestrictedbythisfire

Página 143 - Page 143

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 39ProductsPreparationTopresentacompletepictureofthesecurityarchitectureimplementa

Página 144 - Page 144

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 4ConfiguringtheNorton1_IDSFirewall:...

Página 145 - Page 145

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 40inspectiontechnology.Aformofdynamicpacketfiltering,statefulinspectionworksatth

Página 146 - Page 146

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 41Asofthetimeofthiswriting,thelatestservicepackavailableforNTServer4isversi

Página 147 - Stress test tool s

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 42n RPCConfigurationn ServerFW1canfunctionperfectlyevenwithouttheseservices.On

Página 148 - Page 148

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 43Step4Removeunusedandpotential lydangerouscomponents.The“dangerous”componentsa

Página 149 - Page 149

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 44Administratorsgroup.WindowsNTServer, likeotheroperatingsystems,allowsprivileged

Página 150 - Testscenarios:

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 45enhancedsecurityagainst"passwordguessing" or "dictionaryattacks"

Página 151

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 46ACleanFW1InstallationAcleanFW1installationgivesagoodstart.Forourproject,e

Página 152

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 47n 20001101: CheckPointFirewall1ValidUsernameVulnerabilityn 20000815:  Chec

Página 153

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 48HardenedWindows2000PerfectingtheWindow s2000 InstallationFirstofall,installthe

Página 154 - Page 154

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 49Step1Removeunusednetworkservices.TCP/IPshouldbetheonlynetworkserviceattache

Página 155

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 5ProxyFilters ...

Página 156

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 50Forsecurityreason,wewanttologasmuchinformationonRIPaspossible.Also,weshoul

Página 157

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 51n RoutingandRemoteAccessn Workstationn ServerThereasonweneedtokeeptheWorks

Página 158

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 52Step6Removeunusedandpotential lydangerouscomponents.TheOS2andPosixsubsystems

Página 159 - 192.168.8.0

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 53n net.exen netstat.exen NSLOOKUP.exen ping.exen ping.exen posix.exen qbasic.e

Página 160

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 54filesarenotaccessiblefromotheroperatingsystemssuchasDOS.”(fromwebopedia.com14

Página 161 - Page 161

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 55Formaximumprotection,thefirewallshouldbeconfiguredtorunautomaticallyatsystems

Página 162 - Page 162

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 56peaceofmindthroughcomprehensiveintrusionprotection.”16VisNeticisdesignedforbus

Página 163 - Page 163

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 57Whenrunning,thefirewallmustbeintheFilterstate.Whenthefirewallserviceisnotr

Página 164 - Page 164

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 58VulnerabilitiesSameasforNortonFirewall,wehavenotbeenabletoidentifyanyvulnera

Página 165 - Page 165

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 59datacrossingthefirewall,controlofaccesspolicy,androuting oftraffic.Thecachei

Página 166 - Page 166

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 6Testscenarios:...

Página 167 - Page 167

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 60Availableathttp://www.microsoft.com/isaserver/downloads/sp1.asp,"InternetSecurity

Página 168 - Page 168

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 61ISAServerVuln erabilitiesAccordingtoSamCostelloofIDGNewsService,“MicrosoftFrid

Página 169 - Outside

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 62TheH.323GatekeeperandProxyServiceflawswerediscoveredbyPeterGrundl.Thescriptin

Página 170 - Page 170

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 63DefaultPortAssignmentsforCommonServicesonaWindows2000NetworkSinceGIAC’snetwor

Página 171 - Otherassessmentmethods

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 64LDAP(SSL) 636MTA X.400overTCP/IP 102POP3 110POP3(S SL) 995RPC 135SMTP 25

Página 172 - Page 172

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 65Macintosh,FileServices(AFP/IP) 548MembershipDPA 568MembershipMSN 569MicrosoftC

Página 173

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 66Radiusaccounting(RoutingandRemoteAccess)1646or1813Radiusauthentication(Routing

Página 174

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 67PRIMARYFirewallConfigurationTutorial–Che ckPointFW1ConfiguringtheR ulebasefor

Página 175 - Page 175

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 684. PropertiesmarkedBEFORELASTintheSecurityPolicyProperties5. RuleBaselastrul

Página 176 - Page 176

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 69NetworkObjects:Beforewesetupanyrule,alltherelevantnetworkobjectsmustbebuilt

Página 177 - 192.168.16.0

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 7CounterMeasures...

Página 178

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 70DNSn TheDNSservern Theserver’saddressinthenetworkis192.168.8.4.n Theserver

Página 179 - Page 179

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 71Emailn TheSMTPservern Theserver’saddressinthenetworkis192.168.8.5.n Theser

Página 180

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 72SELFn FW1_B2Citselfn Totheoutside:192.168.7.2n Totheinside:192.168.8.2

Página 181

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 73Rules:1,Removeall thedefaults(forsecuritypurpose) EXCEPTthe“AcceptOutgoingPacke

Página 182

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 74Theoption“ApplyGatewayRulestoInterfaceDirection”isrelatedtotheconceptofinter

Página 183

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 75Keepinmind,SYNGatewayisresourceintensive.Itdoesproducenegativeperformanceimpa

Página 184 - FaultToleranceAssessment

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 764,Verifytherules.ClickPolicy – Verifytocheckandensurethattheserulesareerror

Página 185 - AuditReport

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 77IfforsomereasonsthePolicywassuccessfullyverifiedbuterroroccursduringinstallat

Página 186

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 78ThepossiblestatusesoftheFirewall1Daemonare:n INSTALLED,meaningthedaemonisru

Página 187 - Page 187

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 79TotesttheDNSqueryrule,dothefollowing:n Fromtheoutside,useNSLOOKUPtoinitial

Página 188 - Assignment4

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 8Assignment1DefineasecurityarchitectureforGIACEnterprise,anebusinesswhichconduc

Página 189 - AttackTarget

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 80Notethatthereare3typesoflog:theStandardLog,theAccountingLogandtheActiveLo

Página 190 - FirewallAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 81Bydefault,thelogincludestoomanycolumns.WecanselectthecolumnstoviewviatheS

Página 191 - Page 191

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 82Ifthelogfilegrowstoobig(thisispossibleinabusynetwork),considertostartane

Página 192 - Page 192

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 83n TheIDScanalertInternal_AdminviaSMTP.n Snort(http://www.snort.org/)isanideal

Página 193 - Page 193

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 84n InternaltothefirewallWWWn TheEcommercewebservern Theserver’saddressinthe

Página 194 - Page 194

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 852,DonotenabletheSynDefenderGateway option.ItisnotlikelytoseeSynfloodattacks

Página 195 - DoSattack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 86ReviewthelogviatheLogViewer.BasicTesting: n FromInternal_Clients,useNSLOOKUP

Página 196 - Page 196

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 87ConfiguringtheOtherDevicesConfiguringtheN orton1_IDSFirewall:Refertot he“Produc

Página 197 - Tools fortheAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 88n Inournetwork, Internal_Clients(192.168.17.0)canfreelyaccessInternal_Servers(192

Página 198 - Page 198

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 89ConfiguretheAdvancedOptions:IntheAdvancedOptionssection,enablethefollowingopti

Página 199 - A SimplerAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 9IntroductionAsecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevel

Página 200 - AgainstSmurfAttack

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 90ConfigureIntrusionDetection:NortonFirewallcandetectportscanattemptsandautomatic

Página 201 - Page 201

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 91BasicTesting: n FromInternal_Clients,accessafileshareinInternal_Servers.Thereq

Página 202 - Page 202

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 92ConfiguringtheN orton2_IDSFirewall:Refertot he“ProductsPreparation”section forin

Página 203 - ForkBombsandViruses

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 93ConfiguretheSecurityLevel:Weneedthehighestpossiblelevelofsecurityhere.Toset

Página 204 - CounterMeasures

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 94FurtherindepthtestingshouldbeconductedattheAuditstage.

Página 205

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 95ConfiguringtheN orton3_IDSFirewall:Refertot he“ProductsPreparation”section forin

Página 206 - ListofReferences

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 96Internal_Servers(192.168.18.0)configuredasTrusted.ConfiguretheSecurityLevel:Wene

Página 207 - Page 207

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 97requestshouldsucceed.n FromRAS_Net,accessafileshareinInternal_Dev.Therequest

Página 208 - Page 208

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 98ConfiguringtheVisNetic _1Firewall:Refertot he“ProductsPreparation”section forinf

Página 209 - Page 209

YuChakTinMichael‘sGIACGCFWProjectAssignmentPage 99FW1.DefiningtheInterfaces:VisNetichasitsrulesconfiguredonaperinterfacebasis.

Comentários a estes Manuais

Sem comentários