09 - Implementing Secure Network Designs
09 - Implementing Secure Network Designs
Ahmed Sultan
Senior Technical Instructor
ahmedsultan.me/about
1
Outlines
Labs
Lab 13: Implementing a Secure Network Design
✓ Wireless access points—provide a bridge between a cabled network and wireless clients, or
stations, Access points work at layer 2 of the OSI model.
✓ Firewalls— apply an access control list (ACL) to filter traffic passing in or out of a network
segment, Firewalls can work at layer 3 of the OSI model or higher.
• The basic function of a network is to forward traffic from one node to another.
• A number of routing and switching protocols are used to implement forwarding.
• The forwarding function takes place at two different layers:
✓ Layer 2 forwarding occurs between nodes on the same local network segment that are all in
the same broadcast domain, At layer 2, a broadcast domain is either all the nodes connected
to the same physical unmanaged switch, or all the nodes within a virtual LAN (VLAN)
configured on one or more managed switches, At layer 2, each node is identified by the
network interface's hardware or Media Access Control (MAC) address, A MAC address is a
48-bit value written in hexadecimal notation, such as 00-15-5D-F4-83-48.
• Dividing a campus network or data center into zones implies that each zone has a
different security configuration.
• The main zones are as follows:
✓ Intranet (private network)—this is a network of trusted hosts owned and controlled by the
organization, Within the intranet, there may be sub-zones for different host groups, such as
servers, employee workstations, VoIP handsets, and management workstations.
✓ Extranet—this is a network of semi-trusted hosts, typically representing business partners,
suppliers, or customers, Hosts must authenticate to join the extranet.
✓ Internet/guest—this is a zone permitting anonymous access (or perhaps a mix of anonymous
and authenticated access) by untrusted hosts over the Internet.
• Man-in-the-Middle/On-Path Attacks
✓ Attackers can take advantage of the lack of security in low-level data link protocols to
perform man-in-the-middle (MitM) attacks.
✓ A MitM or on-path attack is where the threat actor gains a position between two hosts, and
transparently captures, monitors, and relays all communication between the hosts.
✓ An on-path attack could also be used to covertly modify the traffic.
✓ For example, a MitM host could present a workstation with a spoofed website form, to try to
capture the user credential.
✓ Another common on-path attack spoofs responses to DNS queries, redirecting users to
spoofed websites.
✓ On-path attacks can be defeated using mutual authentication, where both hosts exchange
secure credentials, but at layer 2 it is not always possible to put these controls in place.
• MAC Cloning
✓ MAC cloning, or MAC address spoofing, changes the hardware address configured on an
adapter interface or asserts the use of an arbitrary MAC address.
✓ While a unique MAC address is assigned to each network interface by the vendor at the
factory, it is simple to override it in software via OS commands, alterations to the network
driver configuration, or using packet crafting software.
✓ This can lead to a variety of issues when investigating security incidents or when depending
on MAC addresses as part of a security control, as the presented address of the device may
not be reliable.
• Because of the risks, access to the physical switch ports and switch hardware
should be restricted to authorized staff, using a secure server room and/or
lockable hardware cabinets.
• MAC Filtering and MAC Limiting
✓ Configuring MAC filtering on a switch means defining which MAC addresses are allowed to
connect to a particular port.
✓ This can be done by creating a list of valid MAC addresses or by specifying a limit to the
number of permitted addresses.
✓ For example, if port security is enabled with a maximum of two MAC addresses, the switch
will record the first two MACs to connect to that port, but then drop any traffic from
machines with different MAC addresses that try to connect.
(cisco.com/c/en/us/td/docs/ios/lanswitch/command/reference/lsw_book/lsw_m1.html).
• A successful attack against route security enables the attacker to redirect traffic
from its intended destination.
• On the Internet, this may allow the threat actor to herd users to spoofed
websites.
• Routes between networks and subnets can be configured manually, but most
routers automatically discover routes by communicating with each other.
• Dynamic routers exchange information about routes using routing protocols.
• It is important that this traffic be separated from channels used for other types of
data.
• Most organizations have both a wired and a wireless network for employees to
access while on the move within their facilities.
• An infrastructure-based wireless network comprises one or more wireless access
points, each connected to a wired network.
• The access points forward traffic to and from the wired switched network.
• Each WAP is identified by its MAC address, also referred to as its basic service set
identifier (BSSID).
• Each wireless network is identified by its name, or service set identifier (SSID).
• Wireless networks can operate in either the 2.4 GHz or 5 GHz radio band.
• Each radio band is divided into a number of channels, and each WAP must be
configured to use a specific channel.
• Site Surveys and Heat Maps
✓ The coverage and interference factors mean that WAPs must be positioned and configured so
that the whole area is covered, but that they overlap as little as possible.
✓ A site survey is used to measure signal strength and channel usage throughout the area to
cover.
✓ A site survey starts with an architectural map of the site, with features that can cause
background interference marked.
✓ These features include solid walls, reflective surfaces, motors, microwave ovens, and so on.
The survey is performed with a Wi-Fi-enabled laptop or mobile device with Wi-Fi analyzer
software installed.
Security+ (SY0-601) © netriders.academy 27
CONTROLLER AND ACCESS POINT
• A rogue access point is one that has been installed on the network without
authorization, whether with malicious intent or not.
• It is vital to periodically survey the site to detect rogue WAPs.
• A malicious user can set up such an access point with something as basic as a
smartphone with tethering capabilities, and a non-malicious user could enable
such an access point by accident.
• If connected to a LAN without security, an unauthorized WAP creates a backdoor
through which to attack the network.
• A rogue WAP could also be used to capture user logon attempts, allow man-in-
the-middle attacks, and allow access to private information.
• The only ways to defeat a jamming attack are either to locate the offending radio
source and disable it, or to boost the signal from the legitimate equipment.
• WAPs for home and small business use are not often configurable, but the more
advanced wireless access points, such as Cisco's Aironet series, support
configurable power level controls.
• The source of interference can be detected using a spectrum analyzer.
• Unlike a Wi-Fi analyzer, a spectrum analyzer must use a special radio receiver (Wi-
Fi adapters filter out anything that isn't a Wi-Fi signal).
• They are usually supplied as handheld units with a directional antenna, so that
the exact location of the interference can be pinpointed.
• Most denial of service (DoS) attacks against websites and gateways are
distributed DoS (DDoS).
• This means that the attack is launched from multiple hosts simultaneously.
• Typically, a threat actor will compromise machines to use as handlers in a
command and control network.
• The handlers are used to compromise hundreds or thousands or millions of hosts
with DoS tools (bots) forming a botnet.
• DDoS attacks simply aim to consume network bandwidth, denying it to legitimate
hosts, by using overwhelming numbers of bots.
• A load balancer distributes client requests across available server nodes in a farm
or pool.
• This is used to provision services that can scale from light to heavy loads, and to
provide mitigation against DDoS attacks.
• A load balancer also provides fault tolerance.
• If there are multiple servers available in a farm, all addressed by a single name/IP
address via a load balancer, then if a single server fails, client requests can be
routed to another server in the farm.
• You can use a load balancer in any situation where you have multiple servers
providing the same function.
• Examples include web servers, front-end email servers, and web conferencing,
A/V conferencing, or streaming media servers.
• There are two main types of load balancers:
✓ Layer 4 load balancer—basic load balancers make forwarding decisions on IP address and
TCP/UDP port values, working at the transport layer of the OSI model.
✓ Layer 7 load balancer (content switch)—as web applications have become more complex,
modern load balancers need to be able to make forwarding decisions based on application-
level data, such as a request for a particular URL or data types like video or audio streaming,
This requires more complex logic, but the processing power of modern appliances is
sufficient to deal with this.