Network Security and ISA Server Paul Hogan Ward Solutions.

52
Network Security and ISA Server Paul Hogan Ward Solutions

Transcript of Network Security and ISA Server Paul Hogan Ward Solutions.

Page 1: Network Security and ISA Server Paul Hogan Ward Solutions.

Network Security and ISA Server

Paul Hogan

Ward Solutions

Page 2: Network Security and ISA Server Paul Hogan Ward Solutions.

Session Prerequisites

Hands-on experience with Windows 2000 or Windows Server 2003

Working knowledge of networking, including basics of security

Basic knowledge of network security-assessment strategies

Level 300

Page 3: Network Security and ISA Server Paul Hogan Ward Solutions.

Agenda

10:00 11:00 Network Security

11:00 11:15 Break

11:30 12:00 Securing SQL Server

12:00 1:00 Lunch

1:00 2:00 Securing Exchange

2:30 2:15 Break

2:15 3:15 Lab Sessions

3:15 Q&A

Page 4: Network Security and ISA Server Paul Hogan Ward Solutions.

This sessions are about…

…about operational security

The easy way is not always the secure way

Networks are usually designed in particular ways

In many cases, these practices simplify attacks

In some cases these practices enable attacks

In order to avoid these practices it helps to understand how an attacker can use them

Page 5: Network Security and ISA Server Paul Hogan Ward Solutions.

This sessions are NOT …

a hacking tutorial

Hacking networks you own can be enlightening

HACKING NETWORKS YOU DO NOT OWN IS ILLEGAL

…demonstrating vulnerabilities in Windows

Everything we show stems from operational security or custom applications

Knowing how Windows operates is critical to avoiding problems

…for the faint of heart

Page 6: Network Security and ISA Server Paul Hogan Ward Solutions.

The Sessions

Page 7: Network Security and ISA Server Paul Hogan Ward Solutions.

The Network

External LAN

Internal LAN

ISA Server Firewall

IIS 6.0Windows 2003

Access Points

ISA Server Firewall

Page 8: Network Security and ISA Server Paul Hogan Ward Solutions.

Introducing the Case-Study Scenario

Page 9: Network Security and ISA Server Paul Hogan Ward Solutions.

Understanding Defense-in-Depth

Using a layered approach:Increases an attacker’s risk of detection Reduces an attacker’s chance of success

Security policies, procedures, and educationPolicies, procedures, and awarenessPolicies, procedures, and awareness

Guards, locks, tracking devicesPhysical securityPhysical security

Application hardeningApplication

OS hardening, authentication, security update management, antivirus updates, auditing

Host

Network segments, NIDSInternal network

Firewalls, boarder routers, VPNs with quarantine proceduresPerimeter

Strong passwords, ACLs, backup and restore strategy

Data

Page 10: Network Security and ISA Server Paul Hogan Ward Solutions.

Why Does Network Security Fail?

Network security fails in several common areas, including:Network security fails in several common areas, including:

Human awareness Policy factors Hardware or software misconfigurations Poor assumptions Ignorance Failure to stay up-to-date

Human awareness Policy factors Hardware or software misconfigurations Poor assumptions Ignorance Failure to stay up-to-date

Page 11: Network Security and ISA Server Paul Hogan Ward Solutions.

What we will cover:

How to Implement Perimeter defenses

How ISA Server protects networks

Using Windows Firewalls to Protect Clients

How to Protect Wireless Networks

Page 12: Network Security and ISA Server Paul Hogan Ward Solutions.

Purpose and Limitations of Perimeter Defenses

Properly configured firewalls and border routers are the cornerstone for perimeter security

The Internet and mobility increase security risks

VPNs have exposed a destructive, pernicious entry point for viruses and worms in many organizations

Traditional packet-filtering firewalls only block network ports and computer addresses

Most modern attacks occur at the application layer

Page 13: Network Security and ISA Server Paul Hogan Ward Solutions.

Purpose and Limitations of Intrusion Detection

Detects the pattern of common attacks and records suspicious traffic in event logs and/or alerts administrators

Integrates with other firewall features to prevent common attacks

Threats and vulnerabilities are constantly evolving, which leaves systems vulnerable until a new attack is known and a new signature is created and distributed

Page 14: Network Security and ISA Server Paul Hogan Ward Solutions.

Implementing Network-Based Intrusion-Detection Systems

Important points to note:Important points to note:

Network-based intrusion-detection systems are only as good as the process that is followed once an intrusion is detected

ISA Server 2004 provides network-based intrusion-detection abilities

Network-based intrusion-detection systems are only as good as the process that is followed once an intrusion is detected

ISA Server 2004 provides network-based intrusion-detection abilities

Provides rapid detection and reporting of external malware attacks

Provides rapid detection and reporting of external malware attacks

Network-based intrusion-detection system

Network-based intrusion-detection system

Page 15: Network Security and ISA Server Paul Hogan Ward Solutions.

Perimeter Connections

The Internet Branch offices Business partners Remote users Wireless networks Internet applications

Network perimeters include connections to:

Business Partner

LAN

Main Office

LAN

LAN

Wireless Network

Remote User

Internet

Branch OfficeBranch Office

Page 16: Network Security and ISA Server Paul Hogan Ward Solutions.

Firewall Design: Three Homed

Screened SubnetInternet

LAN

Firewall

Page 17: Network Security and ISA Server Paul Hogan Ward Solutions.

Firewall Design: Back-to-Back

DMZInternet

ExternalFirewall

LANInternalFirewall

Page 18: Network Security and ISA Server Paul Hogan Ward Solutions.

Software vs Hardware Firewalls

Decision Factors Description

Flexibility Updating for latest vulnerabilities and patches is easier with software-based firewalls.

Extensibility Many hardware firewalls only allow for limited customizability.

Choice of Vendors

Software firewalls allow you to choose from hardware for a wide variety of needs, and there is no reliance on single vendor for additional hardware.

CostsInitial purchase price for hardware firewalls may be less. Software firewalls take advantage of low CPU costs. The hardware can be easily upgraded and old hardware can be repurposed.

Complexity Hardware firewalls are often less complex.

Page 19: Network Security and ISA Server Paul Hogan Ward Solutions.

Types of Firewalls

Packet Filtering

Stateful Inspection

Application-Layer Inspection

Multi-layer inspectionMulti-layer inspection(including application-layer filtering)(including application-layer filtering)

InternetInternet

Page 20: Network Security and ISA Server Paul Hogan Ward Solutions.

Agenda

Introduction/Defense in Depth

Using Perimeter Defenses

Using ISA Server to Protect Perimeters

Using Windows Firewall to Protect Clients

Protecting Wireless Networks

Protecting Networks by Using IPSec

Page 21: Network Security and ISA Server Paul Hogan Ward Solutions.

Protecting Perimeters

ISA Server has full screening capabilities:

Packet filtering

Stateful inspection

Application-level inspection

ISA Server blocks all network traffic unless you allow it

ISA Server is ICSA and Common Criteria certified

Page 22: Network Security and ISA Server Paul Hogan Ward Solutions.

Protecting Clients

Method Description

Proxy Functions Processes all requests for clients and never allows direct connections.

Client Support Support for all clients without special software. Installation of ISA Firewall software allows for greater functionality.

Rules Protocol Rules, Site and Content Rules, and Publishing Rules determine if access is allowed.

Add-onsInitial purchase price for hardware firewalls may be less. Software firewalls take advantage of low CPU costs. The hardware can be easily upgraded and old hardware can be repurposed.

Page 23: Network Security and ISA Server Paul Hogan Ward Solutions.

Protecting Web Servers

Web Publishing Rules Protect Web servers behind the firewall from external

attacks by inspecting HTTP traffic and ensuring it is properly formatted and complies with standards.

Inspection of SSL traffic Inspects incoming encrypted Web requests for proper

formatting and standards compliance.

Will optionally re-encrypt the traffic before sending them to your Web server

Page 24: Network Security and ISA Server Paul Hogan Ward Solutions.

URLScan

ISA Server Feature Pack 1 includes URLScan 2.5 for ISA ServerAllows URLScan ISAPI filter to be applied at the network perimeter General blocking for all Web servers behind the firewall Perimeter blocking for known and newly discovered attacks

Web Server 1

ISA Server

Web Server 2

Web Server 3

Page 25: Network Security and ISA Server Paul Hogan Ward Solutions.

Protecting Exchange Server

Method Description

Mail Publishing Wizard

Configures ISA Server rules to securely publish internal mail services to external users.

Message Screener Screens e-mail messages that enter the internal network.

RPC Publishing Secure native protocol access for Outlook clients.

OWA Publishing Provides protection for remote Outlook users accessing Exchange Server over untrusted networks without a VPN.

Page 26: Network Security and ISA Server Paul Hogan Ward Solutions.

Demonstration 1Application-Layer Inspection in

ISA Server

URL ScanWeb Publishing

Message Screener

Page 27: Network Security and ISA Server Paul Hogan Ward Solutions.

Traffic that Bypasses Firewall Inspection

SSL tunnels through traditional firewalls because it is encrypted, which allows viruses and worms to pass through undetected and infect internal servers.

VPN traffic is encrypted and can’t be inspected

Instant Messenger (IM) traffic often is not inspected and may be used to transfer files in addition to be used for messaging.

Page 28: Network Security and ISA Server Paul Hogan Ward Solutions.

Inspecting All Traffic

Use intrusion detection and other mechanisms to inspect VPN traffic after it has been decrypted

Remember: Defense in Depth

Use a firewall that can inspect SSL traffic

Expand inspection capabilities of your firewall

Use firewall add-ons to inspect IM traffic

Page 29: Network Security and ISA Server Paul Hogan Ward Solutions.

SSL Inspection

SSL tunnels through traditional firewalls because it is encrypted, which allows viruses and worms to pass through undetected and infect internal servers.

ISA Server pre-authenticates users, eliminating multiple dialog boxes and allowing only valid traffic through.

ISA Server can decrypt and inspect SSL traffic. Inspected traffic can be sent to the internal server re-encrypted or in the clear.

ISA Server with Feature Pack 1

Client Internal ServerInternet

Page 30: Network Security and ISA Server Paul Hogan Ward Solutions.

Demonstration 2SSL Inspection in ISA Server

Page 31: Network Security and ISA Server Paul Hogan Ward Solutions.

ISA Server Hardening

Secure your Server Wizard

Review Bastion Host information in Security Guides

Disable unnecessary services

Harden the Network Stack

Disable unnecessary network protocols on the external network interface:

File and print sharing

Client for Microsoft Networks

NetBIOS over TCP/IP

Page 32: Network Security and ISA Server Paul Hogan Ward Solutions.

Best Practices

Use access rules that only allow requests that are specifically allowed

Use ISA server’s authentication capabilities to restrict and log Internet access

Configure Web publishing rules only for specific URLs

Use SSL Inspection to inspect encrypted data that is entering your network

Page 33: Network Security and ISA Server Paul Hogan Ward Solutions.

Demonstration 3Internet Connection Firewall

(ICF)

Configuring ICF ManuallyTesting ICF

Reviewing ICF Log FilesConfiguring Group Policy

Settings

Page 34: Network Security and ISA Server Paul Hogan Ward Solutions.

Agenda

Introduction/Defense in Depth

Using Perimeter Defenses

Using ISA Server to Protect Perimeters

Using Windows Firewall to Protect Clients

Protecting Wireless Networks

Protecting Networks by Using IPSec

Page 35: Network Security and ISA Server Paul Hogan Ward Solutions.

New Security Features in Windows Firewall

On by defaultOn by default

Boot-time securityBoot-time security

Global configuration and restore defaultsGlobal configuration and restore defaults

Local subnet restrictionsLocal subnet restrictions

Command-line supportCommand-line support

On with no exceptionsOn with no exceptions

Windows Firewall exceptions listWindows Firewall exceptions list

Multiple profilesMultiple profiles

RPC supportRPC support

Unattended setup supportUnattended setup support

Page 36: Network Security and ISA Server Paul Hogan Ward Solutions.

Configuring Windows Firewall for Antivirus Defense

Page 37: Network Security and ISA Server Paul Hogan Ward Solutions.

Agenda

Introduction/Defense in Depth

Using Perimeter Defenses

Using ISA Server to Protect Perimeters

Using Windows Firewall to Protect Clients

Protecting Wireless Networks

Protecting Networks by Using IPSec

Page 38: Network Security and ISA Server Paul Hogan Ward Solutions.

Limitations of Wired Equivalent Privacy (WEP) WEP is inherently weak to due poor key exchange. WEP keys are not dynamically changed and therefore

vulnerable to attack. No method for provisioning WEP keys to clients.Limitations of MAC Address Filtering Scalability - Must be administered and propagated to all APs.

List may have a size limit. No way to associate a MAC to a username. User could neglect to report a lost card. Attacker could spoof an allowed MAC address.

Wireless Security Issues

Page 39: Network Security and ISA Server Paul Hogan Ward Solutions.

VPN Connectivity PPTP L2TP Third PartyIPSec Many vendorsPassword-based Layer 2 Authentication Cisco LEAP RSA/Secure ID IEEE 802.1x PEAP/MSCHAP v2Certificate-based Layer 2 Authentication IEEE 802.1x EAP/TLS

Possible Solutions

Page 40: Network Security and ISA Server Paul Hogan Ward Solutions.

WLAN Security Type Security Level Ease of Deployment Usability and Integration

IEEE 802.11 Low High High

VPN Medium Medium Low

Password-based Medium Medium High

IPSec High Low Low

IEEE 802.1x TLS High Low High

WLAN Security Comparisons

Page 41: Network Security and ISA Server Paul Hogan Ward Solutions.

Defines port-based access control mechanism

Works on anything, wired and wireless

Access point must support 802.1X

No special encryption key requirements

Allows choice of authentication methods using EAP

Chosen by peers at authentication time

Access point doesn’t care about EAP methods

Manages keys automatically

No need to preprogram wireless encryption keys

802.1X

Page 42: Network Security and ISA Server Paul Hogan Ward Solutions.

802.1X using EAP/TLS or MSCHAPv2

Domain Controller

DHCPExchange

File Server

Certification Authority

RADIUS (IAS)

Server Certificate

802.11/.1XAccess Point

Laptop

Domain User/Machine

CertificateEAP Connection1, 2, 6 3, 5, 7

4

Page 43: Network Security and ISA Server Paul Hogan Ward Solutions.

A specification of standards-based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN systems

Goals Enhanced Data Encryption Provide user authentication Be forward compatible with 802.11i Provide non-RADIUS solution for Small/Home offices (WPA-PSK)

Products shipping

Wi-Fi Protected Access (WPA)

Page 44: Network Security and ISA Server Paul Hogan Ward Solutions.

Best Practices

Use 802.1x authentication

Organize wireless users and computers into groups

Apply wireless access policies using Group Policy

Use EAP/TLS and 128 bit WEP

Set clients to force user authentication as well as machine authentication

Develop a method to manage rogue APs such as LAN based 802.1x authentication and wireless sniffers.

Page 45: Network Security and ISA Server Paul Hogan Ward Solutions.

Malicious traffic that is passed on open ports and not inspected by the firewall

Any traffic that passes through an encrypted tunnel or session

Attacks after a network has been penetrated

Traffic that appears legitimate

Users and administrators who intentionally or accidentally install viruses

Administrators who use weak passwords

What Firewalls Do NOT Protect Against

Page 46: Network Security and ISA Server Paul Hogan Ward Solutions.

Understanding Application and Database Attacks

Common application and database attacks include:Common application and database attacks include:

Buffer overruns:Buffer overruns:

Write applications in managed code Write applications in managed code

SQL injection attacks:SQL injection attacks:

Validate input for correct size and type Validate input for correct size and type

Page 47: Network Security and ISA Server Paul Hogan Ward Solutions.

Attacks: Buffer Overflow

Aka the “Boundary Condition Error”: Stuff more data into a buffer than it can handle. The resulting overflowed data “falls” into a precise location and is executed by the system

Local overflows are executed while logged into the target system

Remote overflows are executed by processes running on the target that the attacker “connects” to

Result: Commands are executed at the privilege level of the overflowed program

Page 48: Network Security and ISA Server Paul Hogan Ward Solutions.

Attacks: Input validation

An process does not “strip” input before processing it, ie special shell characters such as semicolon and pipe symbols

An attacker provides data in unexpected fields, ie SQL database parameters

Page 49: Network Security and ISA Server Paul Hogan Ward Solutions.

Implementing Application Layer Filtering

Application layer filtering includes the following:Application layer filtering includes the following:

Web browsing and e-mail can be scanned to ensure that content specific to each does not contain illegitimate data Web browsing and e-mail can be scanned to ensure that content specific to each does not contain illegitimate data

Deep content analyses, including the ability to detect, inspect, and validate traffic using any port and protocol Deep content analyses, including the ability to detect, inspect, and validate traffic using any port and protocol

Page 50: Network Security and ISA Server Paul Hogan Ward Solutions.

Session Summary

Introduction/Defense in Depth

Using Perimeter Defenses

Using ISA Server to Protect Perimeters

Using ICF to Protect Clients

Protecting Wireless Networks

Page 51: Network Security and ISA Server Paul Hogan Ward Solutions.
Page 52: Network Security and ISA Server Paul Hogan Ward Solutions.

Questions and Answers