Example Network Design
Example Network Design
DATE
1.00
24TH FEBRUARY
1.01
25TH FEBRUARY
1.02
27TH FEBRUARY
ADDED DATA
1.03
30TH FEBRUARY
ADDED DATA
CHANGES
CREATED BODY
NOTE
ADDED BASE
INFORMATION FROM
REVIEW
REVIEW RUBIK AND
APPLY CURRENT
FIELDS
NEED TO TEST PACKET
TRACER
NEED TO REVIEW
WORDING OF ROUTING
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Contents
Background Current Network.............................................................................................................3
Organisational Structure Old and New...............................................................................................4
Sites...................................................................................................................................................4
Admin............................................................................................................................................4
Manufacturing...............................................................................................................................5
Sales..............................................................................................................................................5
Operations.....................................................................................................................................6
Organisation Units.............................................................................................................................6
Server Specifications Dual Selection..................................................................................................8
Physical Server(s)..............................................................................................................................8
Role of Server....................................................................................................................................9
Approval..........................................................................................................................................10
Server Build (Template).......................................................................................................................11
Server Guide........................................................................................................................................15
Server and Networking Test.................................................................................................................16
Server Maintenance.............................................................................................................................17
Routing Policy.....................................................................................................................................17
Planning for Implementation...........................................................................................................19
Cabling............................................................................................................................................19
Protocols..........................................................................................................................................19
Traffic Monitoring...........................................................................................................................20
Security...............................................................................................................................................22
Perimeter Designs............................................................................................................................22
Remote Access.................................................................................................................................25
Site To Site Links and VPN.............................................................................................................26
Defence In Depth.............................................................................................................................27
Security Auditing.............................................................................................................................30
Risk Analysis...................................................................................................................................30
Documentation....................................................................................................................................31
Vendor Documentation....................................................................................................................31
In House Documentation.................................................................................................................31
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Provide the client with more current hardware for file servers and the SQL database;
In house web server with appropriate security;
VoIP implementation for communications;
Virtualisation options with redundancy on a domain level;
Effective ordering system for online orders to communicate with an in-house database and;
Remote access to database and internal resources.
This does not cover the entire needs for TFF (Talon Textile Fasteners) however the main project
deliverables are. The project deliverable can be highlighted as follows:
Planning
Implementation
Testing
Each step needs to be performed during the 10 week project, and must be rolled out to all sites for the
company. Each phase should require two weeks for completion, leaving another 4 weeks for delays,
review and discussions.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Admin
The admin department (Data Entry Officers) reside in the head office at Millicent. All computers run
on Windows XP SP1 and have not been updated for over 12 years. These computers engage an on
premise file server and SQL database, and use an internal exchange server for E-Mail. These users are
currently happy with the computers although understand the performance speeds cause issue. Due to
the age of the system and the software used, upgrading to a later Operating System (Such as Windows
8) may cause issues with running software.
The admin department is heavily reliant on E-Mail and access to the Microsoft Windows Small
Business Server both are considered to be a critical IT service.
The current hardware infrastructure of this site is as follows:
1.
2.
3.
4.
The IP Scheme of head office (hereby referenced as HO) is 10.128.15.0/24 with the following
devices:
1. The main DC (Domain Controller) has an IP address of 10.128.15.10 and resolves at
tffdc1.tff.com.au
2. The Linux File Server has an IP address of 10.128.15.12 and resolves at qld-lrhfs.tff.com.au
3. The printer scopes for static IP is 10.128.15.2-9 where the FS-3920 start at 2-4 and the 2535
at .5 of the range
4. All computers have static IP address of .100-.135 for ease of maintenance for users.
This site has no backup solutions, redundancy or remote access so the IT support needs to attend to
this site for an IT related issues. This servers Domain Controller has been promoted and all others
DCs in the forest are below- all master operations have been applied to this DC.
The current phone system is an older desk phone style however has limitations for internal calling and
is frequently facing issues with services being provided. This site needs major consideration for
redundancy, security and failover options to ensure that there is little to no downtime on critical IT
needs.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Manufacturing
The manufacturing plants suffers from lack of real time updates from the sales department. In some
aspects this site has less IT reliance than others. Currently on site there are:
1.
2.
3.
4.
5.
Sales
The sales department are negatively impacted by the delayed data transfer to the manufacturing
department, however have fast access to the servers housed at Millicent. The sales department has
seen an increase of 5% in the previous year and thus required more hardware infrastructure to support
the growth of the department. The current hardware infrastructure of this site (Pts. Pirie) consists of
the following:
1. One Domain Controller with DHCP and DNS roles at 10.128.17.10 on the 10.128.17.0/24;
2. Twenty Five Windows XP machines ranging from 10.128.17.100-.125
3. Four Kyocera FS-3920DN with an IP scheme of 10.128.17.2-.5
This site is currently functioning at optimal settings, however would like to be setup as the failover if
Admin faces critical issues.
The current phone system here is not functioning at optimal levels, and thus E-Mail and Social
Networking has become a critical IT service; an in-house exchange server should be setup here for
faster access.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Operations
The new saw mill at Mt. Burr will be opening up soon and will employ approximately 25 employees;
it is estimated only 6 staff will require a computer whilst all other users operate machinery. Mt. Burr
will be receiving a new communications rack and ADSL2 connection back to Millicent (HO). As this
site is newly opened there is no existing infrastructure in place, so SkillageIT will start from
scratch. This site will require access to the in-house database, phone system, fileserver access and EMail.
This site is situated in a remote location and will be difficult to administer/maintain in the event issues
occurred. This site needs to be virtualised and have a redundancy link so that any failover does not
leave users with no services for an extended timeframe.
Organisation Units
As an organisational unit, there are uniform setups for IP schemes and infrastructure. The flexible
single master operation is applied to the one DC; tffdc1.tff.com.au. The following standards have been
applied per site:
1.
2.
3.
4.
Domain controllers are applied a static IP address of .10 per sites IP address;
The Linux File server resolved at .12 of the 10.128.15.0/24 network;
The printer scopes are .2-9 (no printers have exceeded this range currently);
All computers have static IP address of .100-.135 for ease of maintenance for users
Each department requires access to the in-house exchange server, the DMS/SQL database and the
Linux Red Hat file server. The preliminary organise unit goal for TFF has been designed with the
following boundaries:
1.
2.
3.
4.
5.
6.
Telstra TIPT phone system employed resolving through the WAN to an external SIP Server;
A Wan scenario divided into four sites; Amin, Manufacturing, Operations and Sales;
One HP 48 port switch for Computers and one 48 port for VoIP with VLANS setup;
Default route through the admin router for accessing the external internet;
Citrix Remote Management server on the 10.128.15 network;
Redundancy links within Manufacturing for failover;
There is currently no failover setup for IT issues, backup solutions or remote management/access.
This will be accomplished by single-sign on applications using Citrix XenApp. Failover routes,
backup solutions and a review of current security policies. The preliminary network outline has
been designed and published as below. This does not currently include the hosted exchange server,
backup solution or redundancy links.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
This highlights the connection to the internet through the default route on the 10.128.15.0/24 network
to the internet, how the Web Server will be hosted for external access and the firewall policies for
sites. For a detailed breakdown of each sites infrastructure refer to the Server Build section of this
report.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Physical Server(s)
Current Servers
The current servers can be described as follows:
-
(1) Linux Red Hat (7.0) file server hosted on the 10.128.15.0/24 network;
(1) Master Domain Controller with DNS and DHCP Role hosted on 10.128.15.0/24 and;
(1) Microsoft Small Business Server with SQL hosted on the 10.128.15.0/24.
All servers are hosted on the .15.0 network at Admin. This is the closest connection to the external
router for Telstra and the connection to the internet.
Anticipated Servers
The anticipated servers for this site are as follows:
-
(1) Master Domain Controller with DNS and DHCP Role hosted on 10.128.15.0/24 and;
(1) Read Only Domain Controller on the 10.128.18.0/24 network;
(1) Backup Domain Controller on the 10.128.17.0/24 network with DNS and DHCP;
(1) Citrix Remote Access Server on the 10.128.18.0/24 network;
(1) Windows Server 2008 on the 10.128.15.0/24 network with the SQL;
(1) One secondary backup server for SQL Database;
(3) 2013 Exchange Servers at .15, .18 and .17 with SMTP sever on the .15;
(1) Web Server hosted on the .15 Admin network.
There is also a discussion to install a Nagios server for the monitoring of hardware such as WAPS,
switches and other network devices.
If requested, there may also be a printer server setup to link with the Active Directory for
maintenance.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Role of Server
There are several additional servers that will be deployed for TFF, each with their own special role.
The main roles to be considered are the Active Directory FSMO roles (Shema, Domain Naming, RID,
PDC and Infrastructure Masters) and the Global Catalogue Server.
Master Domain Controller with DNS and DHCP Role
The Master Domain Control (ttfdc1.tff.com.au on the 10.128.15.0/24) has the DHCP and DNS role
applied- this DC also runs all the Master FMSO roles for the TFF Company. This Domain Controller
also houses the active directory service and is the root of the TFF forest. This DC is critical for TFF;
any downtime from this machine and there will be group-wide downtime for all sites.
Read Only Domain Controller
The Read-Only Domain controller will be implemented for redundancy. In the event the master DC
(tffdc1) goes down (and the backup takes lead), the flexibility to promote this DC should be present.
This Read-Only Domain serves the purpose of copying the main DC for a redundancy and acts as a
load-balance for DNS requests. This server will probably be housed at 10.128.17.0/24 network.
Backup Domain Controller
The backup Domain Controller server helps alleviate the pressure when there is an issue on the
main DC. It serves the role of the secondary DHCP and DNS for TFF and can be used as a loadbalance when there is high demand.
Citrix Remote Access Server
An independent server is to be commissioned for remote access to internal files. This XenApp Citrix
Server (qld-cit1.tff.com.au) can be housed on any network and will have an external IP address and
public DNS address to allow users to log into the internal service with their AD accounts. This will
allow the users to work from home and will allow remote management for sessions.
Windows Server 2008 with SQL
The Windows Server (2000) is no longer supported and needs to be updated. Because the SQL
Database is hosted on this server it needs to be backed up and migrated or virtualised. The Windows
Server 2008 can act as the host for the SQL Database and DMS system, file-system (replacing the
RDHS). This server can act as a dual role (granting the hardware is updated) for in-house DMS and
the file-server.
One secondary backup server
The secondary backup server acts as the backup snapshot of the file server and also SQL database.
This server will be housed on the same network as we cannot afford to transfer large volumes of data
from site-to-site but will have a UPS for power failover.
2013 Exchange Servers
There will be three exchange servers to delegate E-Mail for the .15, .16 and .18 network. This will
cover the SMTP gateway, storage and operation. These servers will operate off AD for groups etc. and
will function internally. The option to convert to Exchange Active Sync (365) is also available.
Web Server hosted
There will also be a web-server to publish applications such as ordering parts etc. from an online
interface. This is separate to Citrix. Once this has been setup the relevant security protocol/measures
will be applied. Further discussion of this is required.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Network Virtualisation
With the physical hardware selected for server upgrades, the ability to implement hardware
virtualisation through Hyper V 3.0 becomes available. Hyper-V, formerly Windows Server
Virtualisation, is a utility that allows multiple servers to be hosted on the one physical machine. This
means that one machine can be managed as a File-Share, DNS server, DHCP server or whatever role
is required through the business. Some of the key uses for Hyper-V could be the use of making virtual
Windows XP machines to support archaic programs, or help unfamiliar users transition from their
older computers. This VM environment can also be utilised for testing purposes for application
settings and other real-world settings before applying them to sites.
According to TechNet, the following are the hardware requirements to run HyperV 3.0 on a Windows
Server:
To install and use the Hyper-V role, you need the following:
Hardware-enforced Data Execution Prevention (DEP) must be available and be enabled. Specifically,
you must enable the Intel XD bit (execute disable bit) or AMD NX bit (no execute bit).
CPU
RAM
HDD
Plan
Designed For
Features
License Type
Price
To an enterprise, three key benefits to Microsofts server are the Data Deduplication Process,
implementation of Hyper-V 3.0 and out-of-the-box Server Management. Along with the tools
to operate the system, there are online forums, technical support and hardware support
associated with a Microsoft product3.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
By enabling server virtualisation in a data centre, or across a high-speed WAN, virtual server images
(.vhd) can be migrated across host machines in a live environment. Utilising hardware that can
perform this function will allow TFF a greater uptime percentage and will lower their downtime.
Assuming Server A and Server B are the two Eland Pro Pedestal (Mentioned below), all having the
DC, DNS, DHCP and Exchange Server hosted on Server A. In the event of network issues on
premise, or the requirement to move from one site to another, Windows Server 2012 with Hyper-V
3.0 can live migrate a VHDX (Virtual Hard Disk) from Server A to Server B. In this process, users are
still able to access Server As file in a read only format, but will write all changes to Server B.
By utilising this tool, there is a greater flexibility in moving servers and data from site-to-site with
little to no downtime. The key role server virtualisation can perform for TFF is the ability to take
snapshots of servers in real time; in the event of an attack or malfunction on the server, the server with
the troublesome VHD can be decommissioned and the older VHD setup.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Approval
The following hardware will be purchased (upon approval) for the new network design:
Device
Cisco Meraki Cloud
Managed Indoor
Access Points
HP1620
Eland Pro Pedestal
Total Price
25
Approval
CFO - $12,000.00
Asset Tag
20140000-0025
$680.00
$15,000.00
10
3
CFO - $6,800.00
CFO - $45,000.00
20140026-0036
20140037-40
$802.00
25
20140041-66
$799.00
25
CFO - $19,975.00
20140067-20140093
$109.00
CFO - $545.00
20140094-0099
$329.00
CFO - $329.00
20150000
$357.00
CFO - $2,500.00
20150000-0005
The total price for the above is $102, 199.00 leaving $47,801.00 for the purchase of software
(XenApp, Microsoft Server(s), Backup Solutions etc.). This will need to be placed to the board (CIO,
CEO and CFO) for the required approval. This plan covers all require servers, UPS devices, Wireless
Access Points and 50 stations for users. There are also two switches per site with a backup of two
switches for replacement. There will also need to be 5 routers added for the new cutover, or possibly
re-design the current router infrastructure.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Server Guide
The Primary Domain Controller, Microsoft Windows 2008 Server with SQL and Web Hosting server
run the following hardware4:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
The other servers are pre-deployed with relevant OS and roles (as the manufacturer are customer
made) to cover all relevant needs. The credentials to login to these systems are variants of the
following:
Username: issadmin
Password: <rub1x>
Password: <sk1ll@g3!>
Password: <sysw0w64>
All servers will have appropriate security permissions set to prevent users from tampering with
settings. The hardware choices far exceed the current needs of TFF, but have been built with the
intention to perform their role for a minimum of five years before being needed to upgrade.
The speeds of the servers and computers will exceed (anticipated) the requirements of the customers,
but will ensure that the effectiveness of the company is not hindered. The switches are connected via a
1GB/ps fibre-optic link, and depending on provider, will be efficient enough to handle all data on the
current WAN network.
Ping
Pathping
Tracert
NetStat
NSLookup
Testing should focus on ensuring data reaches the destination (such as the default-route-router) in a
timely manner, accessing the database and file server occurs in an acceptable timeframe, that failover
methods such as secondary WAPS effectively work and that all devices on the network can be
monitored. Example tests can be as follows:
1. Remove/Turn Off the default route router to the internet to ensure that the Provider Edge
Routers are able to setup a secondary route to the internet;
2. Turn off the primary Domain Controller and ensure that the backup DC promotes to primary
and supports the network;
3. Access the web server internal and externally and;
4. Ensure that the UPS are able to ensure little to no downtime for users when power outages
occur.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Server Maintenance
Maintaining the hardware and software on servers is crucial for increasing the lifespan of the device
and providing services in a timely matter. Server Maintenance should occur regularly to ensure system
performance acceptable. Server maintenance can refer to applying Windows Updates and Patches or
physical cleaning of hardware. There should be strict guidelines on maintenance applied to serverse.g. each Friday set server is backed up, updates applied and it rebooted. When there are issues with
servers, the issue should be rectified as quick as possible, the scenario reviewed and then the server
have relevant changes made to it (if applicable) for future instances.
The On-Going maintenance plan can be summarised as follows:
1. All relevant system(s) will be backed up once per month (prior to) and updates and patches
applied;
2. System Logs will be monitored and reviewed periodically to ensure there are no issues with
the service;
3. All systems will be rebooted one Sunday per month to ensure there are no lingering issues
with the system.
Management is to be consulted for any other changes required. Full details of changes are to be
documented for historical purposes.
Routing Policy
Routing policies need to be applied to ensure that there is QoS and Load Balancing. Routing policies
need to be setup for Web Traffic (http:80/https:443), FTP (P21) and other internal applications. The
following routing policies are defined:
Packet Size
All Routing Policies are defined with the enterprise security software, current McAfee as follows:
The monitoring of packet size and destination is imperative to ensure there are no network overloads
or attacks from external parties. By placing size limitations on packets, such as the SMTP packets
from Outlook, TFF are able to monitor and reduce malicious attacks on data.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Application
The monitoring of data sent from an application is important. The routing policies need to be setup
and correct firewall settings to allow only desired connections to be established- this is imperative
when hosting a web-service such as online order forms. By employing Enterprise Security such as the
McAfee Security Engine, the internal IT team can trace packet destinations etc. and create firewall
rules to either accept or deny requests:
Whilst using the GUI is easier, users should be able to delve into command line to perform testing. All
policies need to be setup in one universal program for ease of access, and must be able to be altered
by the IT team if needed.
Port/Protocol
Port 80: HTTP Protocol At current there is only one default route to the web, through the CPE
router on the .15 network. All routing through the WAN is setup via the provider, with redundancy
links here. There is an obsolete routing policy of the following:
[Client IP address] > 10.128.[Site].254 (CPE Router) > CPE Router > 10.128.15.254 > Internet
In some cases, such as access to the web application, Port 80 is filtered to only allow secure (https)
access.
Port 443: HTTPS Protocol
HTTPS routes are only filtered for content size to prevent DoS attacks and other malicious attacks.
The provider handles all routes for this protocol.
Port 21: FTP Protocol
FTP is denied by default and only allows known destinations (explicit entries) access to internal and
external hosts.
Port 25: SMTP Protocol
Friday, 26 June 2015
7/274668453.docx
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
SMTP is accepted, based on packet size. The default route for this is setup and only filtered when
large packets are sent, high volumes of packets or if the firewall (or anti-virus) flags the packets as
malicious.
Port 23: Telnet
Telnet protocol is disabled/denied any access. The router rule adds known exceptions such as:
If the destination address is 172.20.3.34:23 then allow traffic, otherwise block.
This policy can be applied to ensure only applications with desired connections are not refused. This
policy relies on a firewall, router and anti-virus solution for data integrity and security.
Cabling
All cabling will be handled internally. Colour-coded RJ45 will be used on switches to highlight
servers, WAPS, Computer and phones. Ideally on all switches, using the ports from left to right (0-12
and 25-36) will allow for easier scalability in the future.
Fibre converters (LC to SC) will be a universal option and will be deployed on all newer switches.
Cable ties will be applied on the communications rack and zip ties for users cables. This will help
minimise damage to cables, mess and ultimately make easier to monitor and maintain.
Protocols
Several different protocols will be employed for TFF, such as http(s), FTP and STP. Each protocol is a
standard employed for an operation on the network.
HTTP/HTTP: Hyper Text Transfer Protocol (Secure): is the set of rules for transferring files (text,
graphic images, sound, video, and other multimedia files) on the World Wide Web.
SSL: Secure Socket Layer: Is the standard security technology for establishing an encrypted link
between a web server and a browser.
FTP: File Transfer Protocol: is a standard network protocol used to transfer computer files from one
host to another host over a TCP-based network, such as the Internet.
STP: Spanning Tree Protocol: is a network protocol that ensures a loop-free topology for any bridged
Ethernet local area network. The basic function of STP was to prevent bridge loops and the broadcast
radiation that results from them. Spanning tree also allowed a network design to include spare
(redundant) links to provide automatic backup paths if an active link fails, without the danger of
bridge loops, or the need for manual enabling/disabling of these backup links.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
SMTP: Standard Mail Transfer Protocol: is an Internet standard for electronic mail (e-mail)
transmission.
Each different protocol utilises a standard port and can be defined as an application/protocol rule
within an enterprise solution. By setting policies based on port usage, such as ftp.server.example:21
TFF can help ensure there are no security threats for users to penetrate the internal network.
Traffic Monitoring
Traffic monitoring should occur for both security and review. Tools such as Microsoft Network
Manager and Nagios will allow TFF to highlight bandwidth hogs or isolate issue with the network.
By employing a monitoring solution such as Nagios, TFF is able to actively watch the services of all
servers, switches and WAPS and identify minor issues that could escalate to larger problems if not
attended to. By implementing another tool such as BandwidthD, TFF will be able to identify network
usage by IP address, or computer. This tool will allow TFF to ensure there are no DDoS attacks or
other network problems that will hinder the performance for others.
Nagios is a free-ware tool that monitors statistics of infrastructure by sending SMTP request to poll
for information on current services, such as:
All hosts and services can be expanded on for more detailed information on the issues and history. By
coupling this with site-hierarchy schemes Nagios can effectively advise whether an entire network can
go down, or effectively just portions (such as wireless devices off WAP1). An example of the network
monitor can be shown as follows:
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
By coupling a monitoring solution such as Nagios with a database, TFF will be able to increase their
overall system uptime and response to issues.
It is also important to maintain usage of services for TFF, such as how much data is being used per
PC, per protocol. Using BandwidthD to achieve this can help reduce network load, by identifying and
stopping known issues.
Overall, having live system monitoring can assist the internal IT department highlight any issues
within the network and attend to it before it causes implications to the business. Ensuring that critical
IT services are operational is an imperative goal on any network.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Security
Implementing firewalls per-site is a key solution to maximise security from both external and internal
attacks. This section will highlight the security measures SkillageIT employ for clients.
Perimeter Designs
Implementing Permitter Firewalls/Security5 is a crucial step to ensuring the internal network is safely
guarded. The following network design highlights the flow of network traffic employed at TFF.
Border Routers and Switches are referred to as CPE (Client Perimeter Equipment) in the document,
and firewalls have not been highlighted. The above photo highlights both the .15 network and the
WAN, which can be defined as follows:
Note: For Intentions of stating network, routing and IP address schemes have been ignored.
It is also important to know common forms of attacks on networks, such as:
1.
2.
3.
4.
5.
6.
Packet Sniffers/Sniffing;
IP Spoofing;
Denial Of Service Attacks (DoS);
Application Layer Attacks;
Virus Attacks and;
Trojans
5 https://technet.microsoft.com/en-us/library/cc700828.aspx
Friday, 26 June 2015
7/274668453.docx
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
All of the above attacks can be expanded upon the TechNet website. By employing strict policy
guidelines, most attacks can be identified by clients. By employing a Class 4 High End Firewall
TFF can obtain the following:
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
High cost
High-end hardware firewalls tend to be expensive. Although they can be purchased for as little as
$100, the cost is much higher for an enterprise firewall, since the price is often based on the number
of concurrent sessions, throughput, and availability requirements.
Complex configuration and management
Because high-end hardware firewalls have much greater capability than low-end firewalls, they are
also more complex to configure and manage. Although this system can be more expensive and
difficult to maintain than other firewall options, it covers all potential system holes in the system. This
system can be optimised to match IP policies, port policies, ICMP messages, outgoing access, and
application protection and provides real time alerts and logging for the review of security.
By coupling this option with the remote management feature and VPN connectivity TFF are able to
maximise their security for access internally and externally to systems. This option is the preferred
option for TFF. The following are known issues with employing a Perimeter Firewall and should be
considered before selecting an enterprise solution:
Issue
Required firewall features, as specified by the
security administrator
Availability requirements
Michael Nancarrow
If a perimeter firewall is setup per site, it is recommended 6 that the following settings be reviewed to
ensure compliance with the master perimeter firewall:
This can be achieved by having one server deployed as the master firewall and the secondary
obtaining changes to policy automatically as a mirrored firewall. This can be accomplished by
employing a heartbeat setup where traffic is balanced between firewalls:
The only downside of having load-balancing on Firewall is increased complexity (if mirroring does
not occur) and increased pressure on single firewalls if one node goes down. The full breakdown of
6 All information is sourced from TechNet, and is not written by SkillageIT
Friday, 26 June 2015
7/274668453.docx
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Remote Access
Remote access to internal web-applications are run via the use of a XenApp Citrix Server- mstsc.exe
is defined as blocked on the firewall for any external access for example someone trying to remote
externally to a known internal IP address. Remote access on all computers is disabled and requires
administration credentials to enable.
To remote to any server, telnet to any switch or WAP you must have elevated privileges such as
Domain Administrator. Due to strict policies the only method to use RDP for a non-admin account is
via the Citrix XenApp application which can be accessed at remote.tffmstsc.com (which is a public
DNS that points to this specific program).
The decision to patch RDP can be elaborated upon the following:
The more severe of these vulnerabilities could allow remote code execution if an attacker sends a
sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop
Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP
enabled are not at risk. Technet Article7
The requirement for remote support within TFF can be handled with third-party software such as
LanDesk- which notifies the end user if there is someone accessing their computer remotely.
7 https://technet.microsoft.com/library/security/ms12-020
8 https://technet.microsoft.com/en-us/library/cc771298(WS.10).aspx
Friday, 26 June 2015
7/274668453.docx
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Whilst this protocol does not ensure data has not been tampered with in transit, the ease of
management and setup compared to other protocols outweigh this risk. It is SkillageITs belief the
encryption method of PPTP is sufficient, as follows:
The PPP frame is encrypted with Microsoft Point-to-Point Encryption (MPPE) by using encryption
keys generated from the MS-CHAP v2 or EAP-TLS authentication process. Virtual private networking
clients must use the MS-CHAP v2 or EAP-TLS authentication protocol in order for the payloads of
PPP frames to be encrypted. PPTP is taking advantage of the underlying PPP encryption and
encapsulating a previously encrypted PPP frame.
The process for the encapsulation of set packets can be defined as follows:
The PPTP packet leaves the PE router and connects to the internet, only to be redirected to a VPN
server which passes the packet onto an internal router, allowing site-to-site connection.
Note: No integrity check (by default) occurs between the connection from the internet to the VPN
sever.
To effectively deploy site-to-site VPN, TFF need to identify the known hardware requirements to have
an operational connection. The minimal requirements for Site-To-Site VPN are perimeter VPN
firewalls on each site to create the locked tunnel, routers on each site that can support the required
routing policies and a network connection that does not time out in sending packet site to site.
9 Refer to appendix for another example
Friday, 26 June 2015
7/274668453.docx
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Note: Firewall and Routers can be one device and function as both.
Defence In Depth
The concept can be defined as Defence in Depth (also known as Castle Approach) is an information
assurance (IA) concept in which multiple layers of security controls (defence) are placed throughout
an information technology (IT) system. Its intent is to provide redundancy in the event a security
control fails or a vulnerability is exploited that can cover aspects of personnel, procedural, technical
and physical for the duration of the system's life cycle. Security measures can be applied on 7 levels,
as below:
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Host
Host security can refer to many different technologies, such as Firewall, Packet Fileting and AntiVirus software. At this level, HIPS (Host Intrusion Prevention Systems) should be applied (either
directly from an enterprise solution or firewall option) to protect against the following:
Take control of other programs. For example sending a mail using the default mail client or
sending your browser to a certain site to download more malware.
Trying to change important registry keys, so that the program starts at certain events.
Ending other programs. For example your virus scanner.
Installing devices or drivers, so that they get started before other programs
Interposes memory access, so it can inject malicious code into a trusted program.
HIPS is a sub-category of IPS (Intrusion Prevention Systems) that monitors local events on systems
(hosts) for suspicious activity, and then applies policies defined by the administrator, such as blocking
changes to start-up entries.
HIPS is usually an option to be enabled from an Anti-Virus solution, such as McAfee:
http://en.wikipedia.org/wiki/Intrusion_prevention_system
http://www.techsupportalert.com/content/hips-explained.htm
Application
Application security is the use of software, hardware, and procedural methods to protect
applications from external threats. Once an afterthought in software design, security is becoming an
increasingly important concern during development as applications become more frequently
accessible over networks and are, as a result, vulnerable to a wide variety of threats. The application
layer can consist of the following10:
10 http://en.wikipedia.org/wiki/Application_security
Friday, 26 June 2015
7/274668453.docx
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
To ensure there are no issue with application security, secure strategies (Protocols such as HTTPS
over HTTP, SSH over Telnet) and sufficient services must be applied. An Application Firewall is an
example of security measures that can be employed to ensure any data breaches/connections are
denied and recorded. The application firewall can fall under the following:
These rules can be applied to Source Locations, Destination Locations, Service, and Authentication
and by QoS.
By employing strict policies on this layer, the internal IT team can ensure that both malicious code
from external sources do not get in, and if internal code is executed, will be blocked at the client-edge
firewall per site.
Security Auditing
Security Auditing should be applied for applications that create a denied connection, or receive a
block on the firewall due to a protocol/destination request. By coupling this logging style with an
Anti-Virus log, system administrators are able to identify potential security threats to the system. The
McAfee Enterprise security features a Next Generation Firewall that is able to assist with Policy
and Protection, and maintain logs and events for system engineers to review.
Risk Analysis
When it comes to internal network monitoring and risk analysis, critical IT services need to be
identified. Key points in a risk analysis theory can be identified as follows:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Documentation
All documentation is to be housed on premise to allow relevant access granted. Below will list the
method for the documentation for TFF.
Vendor Documentation
Documentation on the hardware used (and/or software) will be stored centrally to allow access.
Documentation on known faults, updates and/or technical support forums should also be listed. For
any material found online that is of relevance, links should be housed for later review.
In House Documentation
Any information on the systems (Roles, changes, hardware, configuration) should also be stored so
that any member of the internal IT team (or relevant managers) have access to. This document should
contain the following information:
1.
2.
3.
4.
5.
This information should be regular reviewed to ensure that any member of the IT support team can
administer changes to systems if needed.
Appendix
Server Requirements
According to Microsoft, the minimal hardware requirements for Windows Server 2008 are as follows:
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
The System76 systems are custom built (Overkill) with their hardware; this hardware is sufficient
enough to house multiple virtual servers and can support growth of the company.
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Site-To-Site VPN
Secondary example of how Site-To-Site VPN encapsulation and packet delivery occurs:
Candidate
displays good
Candidate
displays
Candidate
displays poor
Candidate does
not address
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
significant
engagement
with the
learning
materials,
conveys an
exemplary
transfer of
knowledge and
skills gained
4points
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
Candidate does
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
Candidate
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
displays
significant
engagement
with the
learning
materials,
conveys an
exemplary
transfer of
knowledge and
skills gained
4points
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Candidate
displays
significant
engagement
with the
learning
materials,
conveys an
exemplary
transfer of
knowledge and
skills gained
4points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Candidate
displays
significant
engagement
with the
learning
materials,
conveys an
exemplary
transfer of
knowledge and
skills gained
4points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Candidate
displays
significant
engagement
with the
learning
materials,
conveys an
exemplary
transfer of
knowledge and
skills gained
4points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
/var/www/apps/conversion/tmp/scratch_
Michael Nancarrow
Candidate
displays
significant
engagement
with the
learning
materials,
conveys an
exemplary
transfer of
knowledge and
skills gained
4points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays poor
engagement
with the
learning
materials,
conveys
beginning
level transfer
of knowledge
skills gained
1points
Candidate does
not address
any of the
learning
materials,
conveys no
transfer of
knowledge
skills gained
0points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
Candidate
displays good
engagement
with the
learning
materials,
conveys an
accomplished
transfer of
knowledge and
skills gained
3points
Candidate
displays
engagement
with the
learning
materials,
conveys a
developing
transfer of
knowledge and
skills gained
2points
/var/www/apps/conversion/tmp/scratch_