intelligent address management and university network security unc-cause 2004 author:joff thyer...

30
Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author: Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Upload: harry-hudson

Post on 26-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Intelligent Address Management and University

Network Security

UNC-CAUSE 2004Author: Joff Thyer…Thanks to many UNCG IT colleagues for their contributions…

Page 2: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Disclaimers!

• According to pseudo-random neuron activity, this material may seem like a good idea for the moment.

• There are a million assumptions contained within of which I will recall maybe 50,000.

• Nirvana always seems just another fingertip reach away….

• I don’t claim to have a handle on the “be all and end all” of network management.

Page 3: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Background – 2004 Enrollment.• 11,497 undergraduate students.• 3,217 graduate students.• 14, 714 total headcount.• Largest freshman class (2,158)• Residence halls at capacity! (approx.

3,800)• Approx. 2000 employees (Faculty/Staff)

Page 4: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Background – Data Network!• End to end Cisco network (IP only)• 700 network switches

– 200 in residence halls (10m/bit ports)– 500 in campus general population (100m/bit ports)

• Approx. 25,000 ports.• Approx. 7000 active MAC addresses

– 3,400 workstations in Residence Halls– 500 IT managed workstations in public labs– Approx. 150 non-IT managed workstations in departmental labs– Approx. 1800 faculty/staff workstations– Balance is application servers, switches, routers, printers, HVAC

devices and other misc. network connected devices.

Page 5: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Background – Data Network!

• 50 buildings connected to the campus network via Gigabit single mode fiber to one of four core routing points.

• A collapsed core model!– Predictably the 4 core routers are Catalyst 6500 series

• Primary segment (VLAN) deployed per building

• VLAN’s deployed per IT managed lab

• VLAN’s deployed per IT server groupings (O/S based)

Page 6: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…
Page 7: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

How do we provide IP addressing?

• Manual address assignment is clearly not an option.

• Desktop ownership is in the hands of various groups.

• Early in our network deployment (years ago) we adopted a policy that all network communications devices must be “registered” with IT.

Page 8: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

MacMaster – Our own SQL database appl.

• We grew our own system to manage all computer workstation registrations

• Web driven, LDAP authenticated role based users.• Data from SQL tables gets extracted to campus DHCP /

DNS servers on a periodic basis.• Reporting ability shows data on:

– DHCP lease requests– Workstation names within individual VLANS (buildings)– Address assignments– Last seen on network – switch/port attached to.– Track a MAC address to a port.

Page 9: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…
Page 10: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…
Page 11: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…
Page 12: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

MacMaster gives us flexibility

• You don’t get an IP in the DHCP table unless you are registered in this database

• We can re-address a sub-network if we need with a simple router and database change.

• We associate names and locations with workstations.

• Effective (though loose) MAC address level access control.

Page 13: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Why give everyone public IP space?

• This is a historical issue that we are faced with.• It used to be a promotional point that all

workstations on campus were full fledged Internet members.

• It effectively promotes fiefdoms within your network!

Page 14: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Security – starting from an open network.

• It’s a University – quit now while you’re still alive.– Not acceptable folks! Start out by securing things you can reach

out and touch.

• We have a diverse population but there are some defined groups based on subnet/VLAN segmentation

• Some of these groups are:– Residence Hall buildings– IT managed labs– IT managed application servers– Servers subject to our Enterprise Systems Policy

Page 15: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Initial Steps – Policy

• UNCG created an Information Security Committee and asked for IT staff consulting assistance.

• As of this year, we have executive level approval of a new set of policies.

• This is of critical importance! You may view our policies at: http://www.uncg.edu/itp/

(see the New Policies section of the page)

Page 16: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Initial Steps - Technical

• Protect your perimeter using router ACL’s.– Common sense protections:

• Allow only your address block to transit the perimeter– In our case 152.13.0.0/16

• Filter RFC-3330/1918 – Private/Reserved address blocks– (eg: 192.168.0.0/16, 10.0.0.0/8… etc)

• Filter protocols/ports used for network management– UDP/TCP 161 and 162 (snmp/snmp trap)– UDP 69 (tftp), UDP 67/68 (dhcp/bootp)

– If your Policy statements allow for it:• Filter Netbios/SMB protocols

– TCP/UDP ports 445, 135-139

• Send email traffic only to legitimate email relay hosts

Page 17: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Initial Steps – Technical

• Protect your campus from the Residence Hall traffic using router ACL’s.– Obtain buy in from Residence Hall staff.

• UNCG RESNET – Highest Priority is literally 99% uptime. They are highly supportive of tightening security.

– UNCG RESNET security measures to date look a lot like the perimeter filtering

• Filtered network based protocols• Allowed email traffic only to legitimate relay hosts• Filtered SMB/Netbios protocols

• Deploy a server farm firewall and begin securing servers incrementally.– Deploy intrusion prevention technology in front of servers.– Use router ACL’s to log activity on commonly abused TCP/UDP ports

Page 18: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Security for clients – a la carte?

• What do we do with the rest of the general client workstation population?

• Let them handle it themselves / workstation centric?– This can work but we really want a “defense in depth” strategy.

– Can also depend on how much desktop management control IT professionals have. In most Universities, this control is limited.

• We can secure things by VLAN using some policy routing tricks.

Page 19: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Traffic routing by policy?

• We could customize traffic routing on a per subnet, or per user basis

• What about destinations of communications?– Primarily driven to two locations – either server farm or Internet.

– All servers actually live in XX bits of the class B address space.

– This masks easily as: 152.13.0.0/**censored**

– One large subnet? No – actually a collection of smaller subnets.

Page 20: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

The client perspective

• A policy route-map can be placed on any router interface to control traffic destinations.

• Our servers nicely fall into one block• The concept for “a la carte” security is to

– Route Internet bound traffic through a firewall– Route enterprise server traffic directly to the server

address block.– Don’t allow “other” subnets to communicate back to

secured client subnets.

Page 21: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

152.13.55.0/30

Page 22: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Router configuration example 1

route-map CLIENT-SECURED permit 10 match ip address CLIENT-SECURED set ip next-hop 152.13.55.1  ip access-list extended CLIENT-SECURED deny ip any 152.13(SERVER BLOCK) deny udp any any eq bootps permit ip any any

Page 23: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Router configuration example 2

interface Vlan512 description Forney Building (Secured - Testing - Joff)

ip address 152.13.145.254 255.255.255.0 ip helper-address 152.13.1.60 no ip redirects ip pim sparse-dense-mode ip cgmp ip policy route-map CLIENT-SECURED!

Page 24: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Firewall Configurationhostname ScapeGoat

nameif gb-ethernet1 inside security100

nameif gb-ethernet0 outside security0

ip address inside 152.13.55.1 255.255.255.252

ip address outside 152.13.60.1 255.255.255.0

global (outside) 1 152.13.60.3-152.13.60.252 netmask 255.255.255.0

global (outside) 1 152.13.60.253

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

route inside 152.13.145.0 255.255.255.0 152.13.55.2 1

route outside 0.0.0.0 0.0.0.0 152.13.60.254 1

Page 25: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Firewall Config – ACL’s

access-group inside in interface inside

access-group outside in interface outside

access-list inside permit tcp any range 1024 65535 any eq www

access-list inside permit tcp any range 1024 65535 any eq https

access-list inside permit tcp any range 1024 65535 any eq ftp

access-list inside permit tcp any range 1024 65535 any eq ssh

access-list inside permit tcp any range 1024 65535 any eq aol

access-list inside permit icmp any any echo

access-list outside permit icmp any any echo-reply

Page 26: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Separate clients at layer 2

• Optionally we can use a Cisco switch feature which separates layer 2 traffic on a per port basis.

• This is called “protected” ports and is available on Cat. 2950/3550 switches and later.– Traffic coming into a “protected” port within a single VLAN

cannot communicate at layer 2 with another “protected” port.

– Make your uplink port (link to router) be non-protected and then all access ports be “protected”.

– Client machines communicate with the router but not each other!

Page 27: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

What if all my clients in one subnet don’t want this?

• Even though we have segmented things nicely, the people don’t all fit nicely into the VLAN/subnet boundaries!

• Choices….– Policy routing allows us to select clients by logical address within

an ACL.

– Apply layer 2 traffic separation.

– Segment into smaller pieces – the power of VLANs!

• Caution! – KISS principle should be kept in mind.– Too much VLAN segmentation can be administratively

burdensome. You have to find a balance.

Page 28: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Summing it all up

• Actively manage logical addressing.• Segment network using both physical and administrative

boundaries.• Begin deploying security measures:

– Secure the perimeter– Secure the RESNET– Secure the servers– Secure the clients

• Just throw in a database, a web server, a router, a couple of firewalls, some programming work and season to taste.

Page 29: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Future steps for UNCG

• Enhance our database application for general campus workstation registration– If someone moves a workstation, we want it “de-registered” automatically.– When you first plug in, you will be driven to an automatic registration

application• The auto-registration app. will allow clients to select their preferred security

profile.

• Offer “customer self service” for network communications profiles.– Try to get our customers to “buy in” to a more secure profile at registration

time.– Directly negotiate higher security communications profiles with specific

business units. (They will become VLAN’s – surprise!)

Page 30: Intelligent Address Management and University Network Security UNC-CAUSE 2004 Author:Joff Thyer …Thanks to many UNCG IT colleagues for their contributions…

Thank you!

• Feel free to share your questions/suggestions.• Email later if you would like to.

Joff Thyer, UNCG IT-Networks

[email protected]