36
Secure Network Design Jose David Garcia

Secure Network Design

Embed Size (px)

Citation preview

Page 1: Secure Network Design

Secure Network Design

Jose David Garcia

Page 2: Secure Network Design

Index

1. Diagram Legend2. Layered Network Design

1. Access Layer2. Distribution Layer3. Core Layer

3. High Availability and Load Balancing4. Modular Network Design

1. Management Block1. Out of Band Management2. In Band Management

2. Server Block3. Wan Block4. Internet Block

Page 3: Secure Network Design

Diagram Legend

CC

NIDS

HIDS

VPN

Router

Switch

Multilayer Switch

Load Balancer

Terminal Server

Firewall

Server

Management Console

Remote User

Network Intrusion Detection System

Host Intrusion Detection System

Virtual Private Network

Crypto Cluster

Page 4: Secure Network Design

Switch Block 1 Switch Block 2

Internet Block

Wan Block

Server Block

Management Block

C C

IDS

VPN

IDS

VPN VPN VPN

IDSIDS

IDS

IDSIDS

Page 5: Secure Network Design

Access LayerSwitch Block 1 Switch Block 2

VPN

Internet Block

Wan Block

Server Block

Management Block

Page 6: Secure Network Design

Characteristics

• Low Cost per port

• High port density

• Uplink to higher layers

• Layer 2 Services

Page 7: Secure Network Design

Security Design

•Identity based network services

•Vlan and Pvlan segregation

•Rate Limiting

•Management encryption

•Physical isolation

Page 8: Secure Network Design

Best Practices

• Ports without need to Trunk should be set to OFF rather than AUTO

• Limit each port to a limited number of MAC addresses (5)

• Configure Storm Broadcast control

• Turn off Telnet and limit SNMP access to the Switches

• Logging to external server

Page 9: Secure Network Design

Distribution LayerSwitch Block 1 Switch Block 2

VPN

Internet Block

Wan Block

Server Block

Management Block

Page 10: Secure Network Design

Characteristics

• Aggregation of Access Layer Devices

• High layer 3 throughput

• Robust layer 3 functionality

• Security

• Media Translation

• QoS

Page 11: Secure Network Design

Security

•Access Control List

•Span ports for IDS

•Physical isolation

Page 12: Secure Network Design

Best practices

• Turn off unneeded services• Disable all unused ports• Limit the Mac addresses on a port to known MAC

adressess when possible (no trunking ports)• For trunking ports use a dedicated VLAN identifier• Eliminate native vlans for 802.1q trunks• Turn off Telnet and limit SNMP access to the

Switches• Logging to external server

Page 13: Secure Network Design

Core LayerSwitch Block 1 Switch Block 2

VPN

Internet Block

Wan Block

Server Block

Management Block

Page 14: Secure Network Design

Characteristics

• No Expensive Layer 3 Processing

• Very High Throughput

• No unnecessary packet manipulation

• Resiliency

• High Availability

Page 15: Secure Network Design

Security

• Physical isolation

Page 16: Secure Network Design

Best practices

• Disable all unused ports

• Limit the Mac addresses on a port to known MAC adressess when possible

• Turn off Telnet and limit SNMP access to the Switches

• Logging to external server

Page 17: Secure Network Design

High AvailabilityLoad Balancing

Page 18: Secure Network Design

HIDS

Management Block

NIDSNIDS

Page 19: Secure Network Design

Key Devices

• Firewalls

• NIDS and HIDS

• IDS Hosts

• Syslog Hosts

• SNMP Management Hosts

• Cisco Works, HP Open View

• System Admin Host

Page 20: Secure Network Design

Out Band Management

• Preferred method of management

• Isolated from production network

• Physical Isolation

Page 21: Secure Network Design

In Band Management

• Only management traffic

• Different address space than Production Network

• NAT

• Encryption (IpSec, SSH, SSL)

• Firewall Security + IDS

Page 22: Secure Network Design

Best Practices

• Only use In band Management when necessary.

• PVLAN segregation among hosts in management block.

• Periodic log revision

• Configuration base-line establishment

• Periodic base-line checking

Page 23: Secure Network Design

Threats Mitigated

• Only use In band Management

when necessary.

• PVLAN segregation among hosts

in management block.

• Periodic log revision

• Configuration base-line

establishment

• Periodic base-line checking

• Unauthorised Access

• Man in the middle attacks

• Network reconnaissance

• Packet sniffing

• Compromised host hoping

• Hacking attempts going unnoticed

Page 24: Secure Network Design

Server Block

NIDS

NIDS

NIDS

HIDS

Page 25: Secure Network Design

Key Devices

• Firewalls• NIDS and HIDS• NTP Server• TACACS+ Server• Certificate server• Secur-ID Server (Strong authentication)• Corporate Servers• Call Manager• DNS Servers• E-Mail Servers• Etc…

Page 26: Secure Network Design

Best Practices

• Firewall and NIDS implementation• PVLAN Isolation for each Server• Host Based IDS on each Server• Service redundancy• Backup Policy• Logging to an external server in the

mangement module• Version Control

Page 27: Secure Network Design

Threats Mitigated

• Firewall and NIDS implementation

• Host Based IDS on each Server

• PVLAN Isolation for each Server

• Service redundancy• Logging to an external

server in the mangement module

• Backup Policy• Version Control

• Unauthorized Access• Ip Spoofing• Application Layer Attacks• Trust Exploitation• Compromised host hoping• Packet Sniffing• DoS• Hacking attempts going

unnoticed• Lost Data

Page 28: Secure Network Design

WAN Block

C C

NIDS

Page 29: Secure Network Design

Key Devices

• Firewalls

• NIDS

• Crypto Clusters

• Routers

Page 30: Secure Network Design

Best Practices

• Data encryption

• Access List implementation

• High Availability thru different providers

Page 31: Secure Network Design

Threats mitigated

• Data encryption

• Access List

implementation

• High Availability thru

different providers

• Data theft

• Man in the middle

attack

• IP spoofing

• Unauthorized access

• DoS

Page 32: Secure Network Design

Internet Block

VPNVPN VPN VPN

NIDS

HIDS HIDS

Page 33: Secure Network Design

Key Elements

• Firewalls

• HIDS and NIDS

• VPN Concentrator

• HTTP Servers

• DNS Servers

Page 34: Secure Network Design

Best Practices

• Security policy with ISP to mitigate DDoS

• Private VLAN Isolation among Servers

• No corporate Servers at this point

• High Availability thru diferent ISP

• VPN for Remote user Access

Page 35: Secure Network Design

Threats Mitigated

• Security policy with ISP

• Private VLAN Isolation among

Servers

• Firewall, NIDS and HIDS

implementation

• High Availability thru diferent

ISP

• VPN for Remote user Access

• No corporate Servers at this point

• IP Spoofing

• Packet Sniffing

• Compromised host hoping

• Hacking attempts going

unnoticed

• DDoS attacks

• Unauthorized Access

Page 36: Secure Network Design

THE END