3 Telecom+Network Part2
3 Telecom+Network Part2
3 Telecom+Network Part2
Review:
Telecommunications &
Network Security Domain –
Part 2
Version: 5.9
CISSP Common Body of Knowledge Review by Alfred Ouyang is licensed under the Creative Commons
Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit
http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite
900, Mountain View, California, 94041, USA.
Learning Objectives
Telecommunications & Network Security Domain – Part 2
The Telecommunications and Network Security domain
encompasses the structures, techniques, transport protocols, and
security measures used to provide integrity, availability,
confidentiality, and authentication for transmissions over private
and public communication networks.
The candidate is expected to demonstrate an understanding of
communications and network security as it relates to data
communications in local area and wide area networks, remote
access, internet/intranet/extranet configurations. Candidates should
be knowledgeable with network equipment such as switches,
bridges, and routers, as well as networking protocols (e.g., TCP/IP,
IPSec,) and VPNs.
-2-
Question:
• Name the seven layers of OSI reference model?
–
–
–
–
–
–
–
-3-
Question:
• Name the seven layers of OSI reference model?
– Physical (people)
– Data-Link (do)
– Network (not)
– Transport (throw)
– Session (sausage)
– Presentation (pizza)
– Application (away)
-4-
Topics
-5-
Implementation of Technical Countermeasures
Example implementation of
technical countermeasures
in Network and
Process & Procedure
Security Operations
Operations
Security CONOPs,
DEFENSE-IN-DEPTH
Security
Internetworking Services:
Information Assurance Defense Information
OSI Reference Internet Protocol
• Routers
Technical Framework Infrastructure (DII) &
Model Suite
(IATF) Security Mechanisms
Certification and Accreditation
Application NFS
OS +
• Switches
Technical Countermeasures
• Encryptors
Security mechanism,
System Architecture,
Domain Controller +
Session RPC Active Directory
Supporting the Service + DIICOE APM
Infrastructure (+ Directory Services +
• Firewalls
X.509-based PKI/KMI/
Transport TCP UDP CA)
(IDS)
Data-Link
Physical Sec.
Physical
• Intrusion Prevention
Protection of Critical
Facility Security,
Infrastructure
Systems (IPS)
• Operating Systems (OS)
-6-
Topics
Network
• NAS
Access Layer
Do Data-Link
People Physical
-7-
Security Countermeasures & Controls
300GHz) Data-Link
Network
Access Layer
• Light Physical
– LAN: Infrared
– WAN: LASER (medium: fiber, air)
-8-
Security of Physical Layer
Transport Media
• Physical protection of transport media
– Cables/ Fibers: Casings (Concrete, Steel pipe, Plastic, etc.)
– RF: Allocation of radio spectrum, power of RF, selection of
line-of-sight (LOS), protection from element (rain, ice, air)
– Optical: Selection of transport medium, light wave spectrum
(multi-mode), LOS and strength of light beam (e.g. LASER,
single-mode)
• Path Diversity of transport media
– Cables / Fibers: Geographic diversity
– RF: Utilization of radio channels, coverage area
– Optical: Multi-mode
-9-
Security of Physical Layer
Transport Media
Security considerations for transport media…
• EMI (Electromagnetic Interference)
– Crosstalk
– HEMP (High-altitude Electromagnetic Pulse)
• RFI (Radio Frequency Interference)
– UWB (Ultra Wide Band): > 500MHz, FCC authorizes the
unlicensed use in 3.1 – 10.6GHz
– Household microwave oven: 2.45GHz
• Transient. Disturbance of power traveling across
transport medium
• Attenuation. Loss of signal strength over distance
- 10 -
Security of Physical Layer
- 11 -
Security of Physical Layer
Network Equipment
• Enable service password-encryption on all
routers.
• Use enable secret command and not with the
enable password command
• Each router shall have different enable and user
password
• Access routers only from “secured or trusted” server
or console
• Reconfigure the connect, telnet, rlogin, show ip
access-lists, and show logging command to privilege
level 15 (secret)
• Add Warning Banner
- 13 -
Answers:
• Why household microwave oven may interfere with
your Wi-Fi (IEEE 802.11b/g)?
– The microwave oven operates in 2.45GHz and Wi-Fi
operates in 2.4GHz
- 14 -
Topics
Network
• NAS
Access Layer
Do Data-Link
People Physical
- 15 -
Security Countermeasures & Controls
Network
- 17 -
Security of Data-Link Layer
- 18 -
Security of Data-Link Layer
- 19 -
Security of Data-Link Layer
- 20 -
Security of Data-Link Layer
- 21 -
Security of Data-Link Layer
PPP Frames
- 22 -
Security of Data-Link Layer
IEEE 802.1X
• IEEE 802.1X uses EAP (Extensible Authentication
Protocol)
– 802.1X is an interoperability standard NOT a security
standard!
• Uses 3-way handshake, in state machine model:
1. Unauthorized State: After link established, authenticator
(access point) sends a authentication request message to
the peer.
2. Unauthorized State: Peer send response with a set of values
that matches authentication mechanism of the authenticator.
3. Unauthorized State: Authenticator calculates the expected
value and match against the response.
4. Authorized State: Exchange encrypted data message.
Reference: http://standards.ieee.org/getieee802/download/802.1X-2004.pdf.
- 24 -
Security of Data-Link Layer
IEEE 802.11i
• IEEE 802.11i standard has
been ratified on 6/24/2004. Client Workstation
(STA)
Access Point
(AP)
Access version 2)
STA returns a “single use nonce” along
• Uses IEEE 802.1X (i.e.
STA constructs a Pair-wise
Transient Key (PTK)* with Message Integrity Code (MIC)
SNonce + MIC
EAP) for authentication.
• Uses 4-way handshake. AP returns a Group Temporal Key
(GTK) along with MIC to STA
AP constructs a
PTK*
block-chaining Message * As soon as the PTK is obtained it is divided into 3 separate keys:
EAP-KCK (Extended Authentication Protocol-Key Confirmation Key)
authentication code EAP-KEK (Key Encryption Key)
TK (Temporal Key) – The key used to encrypt the wireless traffic.
Protocol).
Reference:
- Q&A, Wi-Fi Protected Access, WPA2 and IEEE 802.11i, Cisco Systems
- http://en.wikipedia.org/wiki/IEEE_802.11i
- 25 -
Security of Data-Link Layer
- 26 -
Security of Data-Link Layer
- 29 -
Answers:
• Why Point-to-point protocol (PPP) is better than Serial
Line Internet Protocol (SLIP)?
– PPP supports multiple internetworking protocols in a session
– SLIP has no security feature
- 30 -
Questions:
• What is the size of the shared static symmetric key
for 128-bit Wired Equivalent Privacy (WEP)?
–
- 31 -
Answers:
• What is the size of the shared static symmetric key
for 128-bit Wired Equivalent Privacy (WEP)?
– 104-bit. 24-bit of Initialization vector (IV)
- 32 -
Topics
– IP Network Layer
Sausage Session
Network
• NAS
Access Layer
Do Data-Link
People Physical
- 33 -
Security Countermeasures & Controls
•
Application
Physical
- 34 -
Security of Network Layer
Reference: http://www.ietf.org/rfc/rfc1918.txt
- 35 -
Security of Network Layer
- 36 -
Security of Network Layer
- 37 -
Security of Network Layer
Dynamic Routing
There are two types of routing protocols:
• Interior Gateway Protocols (IGPs)
– Routing Information Protocols (RIP)
– Interior Gateway Routing Protocol (IGRP)
– Enhanced IGRP (EIGRP, Cisco proprietary)
– Open Shortest Path First (OSPF)
– Intermediate System to Intermediate System (IS-IS)
• Exterior Gateway Protocols (EGPs)
– Exterior Gateway Protocol (EGP, RFC 827). EGP is no
longer in use for Internet
– Border Gateway Protocol (BGP). BGP is the standard
routing protocol for Internet
- 38 -
Security of Network Layer
- 43 -
Security of Network Layer
- 44 -
Security of Network Layer
Packet-filtering Firewall
• Router ACL’s = Packet-filtering
firewall Application Application
filtering. Source
Firewall
Destination
(RTR w/ ACL)
– Knows the specific inbound and
outbound I/F’s
– Disable all un-necessary protocols
& services.
Packet-filtering Firewall
OSI Reference
allowed in/out.
2. Configure distribute-list in the appropriate Network
- 49 -
Answers:
• What are the two primary security issues associated
with the use of dynamic routing protocols?
– Integrity of routing tables
– Operational stability
- 50 -
Topics
Network
• NAS
Access Layer
Do Data-Link
People Physical
- 51 -
Security of Transport & Application Layers
Firewalls
• Packet-filtering firewall (i.e. Router ACLs)
– Do not examine Layer 4-7 data. Therefore it cannot prevent
application-specific attacks
• Proxy firewall
– It supports selected IP protocols (I.e. DNS, Finger, FTP,
HTTP, LDAP, NNTP, SMTP, Telnet). For multicast protocols
(PIM, IGMP…etc) must be TUNNEL through the firewall
• Stateful inspection firewall
– It’s faster than proxy firewall and more flexible because it
examines TCP/IP protocols not the data
– Unlike proxy firewall, it does not rewrite every packets and
does not “talk” on application server’s behalf
- 52 -
Security of Transport & Application Layers
Firewalls
Hybrid Firewalls…
• Circuit-level proxy firewall
– IETF created SOCKS proxy protocol (RFC 1928) for secure
communications
– SOCKS creates a circuit between client and server without
requiring knowledge about the internetworking service. (No
application specific controls)
– It supports user authentication
• Application proxy firewall
– Application proxy + Stateful inspection
– A different proxy is needed for each service
– It supports user authentication for each supported services.
– e.g. Checkpoint Firewall-1 NG
- 53 -
Security of Transport & Application Layers
Packet-filtering firewalls
• Router ACL’s ~ Packet-filter
firewall Application Application
filtering Source
Firewall
Destination
(RTR w/ ACL)
– Knows the specific inbound and
outbound I/F’s
– Disable all un-necessary protocols
& services
Proxy firewalls
• Do not allow any direct
connections between internal
and external computing hosts Application Application Application
TCP/IP Application
Layer
Presentation Presentation Presentation
- 55 -
Security of Transport & Application Layers
Stateful Inspection
• Inspects TCP/IP packets and Session Session Session
- 56 -
Security of Transport & Application Layers
Firewall Policy
OSI Reference
Model
In principal, firewall performs three actions:
• Accept: where the firewall passes the IP packets
Application
rule Session
- 57 -
Security of Transport & Application Layers
Exterior Firewalls
Multi-Service Switches
DMZ DMZ
FTP Srvr. Web Srvrs Web Application Srvrs Web Application Srvrs Web Srvrs FTP Srvr.
Primary Backup
- 58 -
Security of Transport & Application Layers
- 59 -
Security of Transport & Application Layers
- 60 -
Security of Transport & Application Layers
N-IDS N-IDS
Sensor Sensor
Monitor & Management VLAN Reporting I/F Monitor & Management VLAN Reporting I/F
- 61 -
Security of Transport & Application Layers
N-IPS
Exterior Firewalls
Multi-Service Switches
DMZ DMZ
Primary Backup
- 62 -
Questions:
• What are the five common types of firewall?
–
–
–
–
–
- 63 -
Answers:
• What are the five common types of firewall?
– Packet filtering
– Proxy
– Stateful inspection
– Circuit-level proxy (i.e., SOCKS)
– Application proxy
- 64 -
Questions:
• If 1 is a router, 4 is located in a DMZ.
What is 2?
1 2 4 –
3
• If 3 is a switch, 5 is a N-IDS, and 6 is a
5 6 computing platform. What does one
have to do to the switch ports to 5 and
6?
–
- 65 -
Answers:
• If 1 is a router, 4 is located in a DMZ.
What is 2?
1 2 4 – Firewall
3
• If 3 is a switch, 5 is a N-IDS, and 6 is a
5 6 computing platform. What does one
have to do to the switch ports to 5 and
6?
– Provision a port span
- 66 -
Topics
Network
• NAS
Access Layer
Do Data-Link
People Physical
- 67 -
Security Countermeasures & Controls
- 68 -
Security Countermeasures & Controls
Reference: http://en.wikipedia.org/wiki/Domain_name_system
- 70 -
Security Countermeasures & Controls
- 73 -
Security Countermeasures & Controls
- 74 -
Virtual Private Network (VPN)
- 75 -
Virtual Private Network (VPN)
- 76 -
Virtual Private Network (VPN)
- 77 -
Virtual Private Network (VPN)
- 78 -
Virtual Private Network (VPN)
IPsec… (1/6)
IPsec is a protocol suite (RFC 2401 4301, 2411).
• Transport Layer:
– AH (IP Authentication Header) provides connection-less
integrity, data origin authentication.
– ESP (Encapsulating Security Payload) provides
confidentiality through encryption.
• Application Layer: (RFC 4306)
– IKE (Internet Key Exchange) is performed using ISAKMP
(Internet Security Association and Key Management
Protocol).
- 79 -
Virtual Private Network (VPN)
IPsec… (2/6)
• Authentication Header (AH) (RFC 4302)
– AH follows right after IP header
– Next Header: Identifies the protocol of transferred data
– Payload Length: Size of AH packet
– SPI: Identifies the security parameters, which in combination
with the IP address, identify the security association
implemented with this packet
– Sequence Number: Used to prevent replay attacks
– Authentication Data: Contains the integrity check value
(ICV) to authenticate the packet
Bits
0 4 8 12 16 20 24 28 31
1 Next Header Payload Length Reserved
3 Sequence Number
IPsec… (3/6)
• Encapsulating Security Payload (ESP) (RFC 4303)
– ESP operates directly on top of IP header
– SPI: Identifies the security parameters in combination with
the IP address
– Sequence Number: Used to prevent replay attacks
– Payload Data: The encapsulated data
– Padding: Used to pad the data for block cipher
– Pad Length: Necessary to indicate the size of padding
– Next Header: Identifies the protocol of the transferred data
– Authentication Data: Contains the integrity check value (ICV)
to authenticate the packet Bits
0 4 8 12 16 20 24 28 31
1 Security Parameters Index (SPI)
2 Sequence Number
Words
IPsec… (4/6)
IPsec imposes computational
performance costs on the host or IPsec
Architecture
security gateways.
• Memory needed for IPSec code and ESP Protocol AH Protocol
data structures
• Computation of integrity check
values. Encryption
Algorithm
Authentication
Algorithm
Encryption Authentication
IPsec… (5/6)
IPsec operates in two modes:
• Transport mode:
– Only the payload is protected (i.e., encryption & hash)
– IP headers are not encrypted
– If AH is used then IP address can not be translated (i.e., NAT)
– For host-to-host communications only
• Tunnel mode:
– The payload and header are protected (i.e., encryption & hash)
– Used for network-to-network, host-to-network, and host-to-host
communications
Reference: http://en.wikipedia.org/wiki/IPsec
- 83 -
Virtual Private Network (VPN)
IPsec... (6/6)
IPsec is implemented in the following “popular” ways…
• Network-to-Network
– IPsec tunnel between two security gateways
– GRE/IPsec in established Layer 3 tunnel
– L2TP/IPsec in established Layer 2 tunnel
• Host-to-Network
– L2TP/IPsec in established Layer 2 tunnel via VPN client on
remote client (i.e. your laptop or PC)
– IPsec tunnel between VPN client to security gateway
• Host-to-Host
– IPsec in transport mode or tunnel mode between two
computing machines
Reference:
• http://en.wikipedia.org/wiki/IPsec
• http://en.wikipedia.org/wiki/L2TP
• http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html
• http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/secur_c/scprt4/scipsec.htm
• RFC 4301, Security Architecture for the Internet Protocol (http://tools.ietf.org/html/rfc4301)
- 84 -
Virtual Private Network (VPN)
finished
3DES or AES
change cipher specification
– One-way hash functions: MD5 or SHA finished
Application Data...
Reference: http://wp.netscape.com/eng/ssl3/
- 85 -
Virtual Private Network (VPN)
SSLv3/TLSv1 SSLv3/TLSv1
- 86 -
Virtual Private Network (VPN)
certificate
certificate verification
the “hello”.
finished
finished
Application Data...
Reference: http://www.ietf.org/rfc/rfc2246.txt
- 87 -
Virtual Private Network (VPN)
Target
- 89 -
Answers:
• Why PPP can utilize PPTP and L2TP?
– Because PPP allows multiple protocols per session
- 90 -
Questions:
• Why IPsec requires AH protocol and ESP protocol?
–
- 91 -
Answers:
• Why IPsec requires AH protocol and ESP protocol?
– AH for authentication and ESP for encryption
- 92 -
Topics
- 93 -
Security Countermeasures & Controls
Reference:
• RADIUS: http://www.ietf.org/rfc/rfc3579.txt
• DIAMETER: http://www.ietf.org/rfc/rfc4005.txt
- 94 -
Network Access Servers (NAS)
Reference:
• RADIUS: http://www.ietf.org/rfc/rfc3579.txt
• DIAMETER: http://www.ietf.org/rfc/rfc4005.txt
- 96 -
Network Access Servers (NAS)
Reference:
• RADIUS: http://www.ietf.org/rfc/rfc3579.txt
• Diameter:
• http://tools.ietf.org/html/rfc4005
http://tools.ietf.org/html/rfc3588
- 97 -
Validation Time…
1. Class Exercise
2. Review Answers
- 98 -
Exercise #1: VPN
• Please provide explanations for the following:
– If you are running WPA2 (IEEE 802.11i) at home, why would
you need to run IPsec to MITRE?
- 99 -
Exercise #2: Layers of Perimeter Security
• Please provide examples of network-based perimeter
security controls and provide rationale:
– For boundary protection at the edge?
– For DMZ?
- 100 -