SlideShare a Scribd company logo
TCP/IP Networks Management
and Security
Presented by:
David M. Litton, CPA, CISA, CGFM
Deputy Director, Audit and Management Services
Virginia Commonwealth University
May 7, 2001
5/7/2001 TCP/IP Networks Management and Security 2
5/7/2001 TCP/IP Networks Management and Security 3
Course Objectives:
• What is a TCP/IP Network?
• Common components of a TCP/IP network
• Network environment: TCP/IP protocol and
associated devices functionality
• General network risks
• Specific risks and compensating controls for
TCP/IP network devices
• Areas of a TCP/IP Infrastructure Audit
5/7/2001 TCP/IP Networks Management and Security 4
What is a TCP/IP Network?
• Envelope and post office concept
• Ethernet Frames
• Internet Protocol (IP) – Connectionless datagram;
tries to send but not sure if it gets there
• Transmission Control Protocol (TCP)
• Alternatives to TCP: UDP and ICMP
• Ports
• Socket (Combination of port# & IP address)
• Connection (pair of sockets for a session)
Host
(Ex. Unix/Win NT
Server)
Client
(Ex. Win 98/2000)
Telnet (Also: HTTP, SMTP, POP3...)
Single Control and Data Circuit
IP
128.172.161.139
IP
128.172.2.30
High Random Port
(Ex. Port #3003)
Port 23
FTP
Seperate Control and
Data Circuits
Host
(Ex. Unix/Win NT
Server)
Client
(Ex. Win98/2000)
IP
128.172.161.139
IP
128.172.22.9
Port 21
Port 20
High Random
Port (Ex. Port
#2987)
High Random
Port (Ex. Port
#2986)
Tcp ip management & security
Tcp ip management & security
Tcp ip management & security
5/7/2001 TCP/IP Networks Management and Security 9
Tcp ip management & security
Tcp ip management & security
Tcp ip management & security
Tcp ip management & security
Host
(Ex. Unix/Win NT
Server)
Client
(Ex. Win 98/2000)
Telnet (Also: HTTP, SMTP, POP3...)
Single Control and Data Circuit
IP
128.172.161.139
IP
128.172.2.30
High Random Port
(Ex. Port #3003)
Port 23
FTP
Seperate Control and
Data Circuits
Host
(Ex. Unix/Win NT
Server)
Client
(Ex. Win98/2000)
IP
128.172.161.139
IP
128.172.22.9
Port 21
Port 20
High Random
Port (Ex. Port
#2987)
High Random
Port (Ex. Port
#2986)
(7)
Application
Layer
(6)
Presentation
Layer
(5)
Session Layer
(4)
Transport Layer
(3)
Network Layer
(2)
Data Link Layer
(1)
Physical Layer
Logical Link
Media Access
Control
(MAC)
FTP, Telnet,
HTTP
TCP, UDP
IP
Ethernet,
Frame Relay,
Token Ring
Twisted Pair,
Fiber
(4)
Application
Layer
(3)
Transport Layer
(2)
Internet Layer
(1)
Network
Interface Layer
OSI Reference
Model Examples
TCP/IP
Protocol Stack
OSI Model
and
TCP/IP
Compared
5/7/2001 TCP/IP Networks Management and Security 16
5/7/2001 TCP/IP Networks Management and Security 17
Common components of a
TCP/IP network
• Cat 5 UTP Wiring & fiber optics lower layer 1
• Hubs emphasis layer 1
• Bridges layer 1 or lower-part of layer 2 (MAC)
• Switches – some layer 1 & emphasis layer 2
• Routers – emphasis layer 3 & some layer 4
• Applications/network utilities: layers 5-7; FTP,
HTTP, NFS, X-Windows, Telnet…
• Protocol Stacks: part of server/work station O/S
• Servers - physical and logical contrasted
• Specialized IP servers: DHCP, BOOTP, DNS…
5/7/2001 TCP/IP Networks Management and Security 18
Network Environment: TCP/IP
Protocol and Associated Devices
Functionality
Ethernet
Token-ring
Ethernet
Workstation
w/s Laptop
Laser printer
Hub
Router
Firewall
`
WAN
(ATM)
(T-1)
(ISDN)
(Frame Relay)
(SMDS)
Firewall
Router
IBM Compatible
Laptop computer
Workstation
HUB
MAU
w/s
Laptop
w/s
Laser printer
Router
Router
Enet[IP[TCP[Data]]]
Enet[IP[TCP[Data]]]
TRing[IP[TCP[Data]]]
ATM[IP[TCP[Data]]]
LAN/WAN Protocol
Example
5/7/2001 TCP/IP Networks Management and Security 20
General network risks
• Inconsistently applied
back-up procedures for
Network Equipment and
Servers
• Lack of a test lab and
change control procedures
• Intercepting clear text,
log-on identifiers and
passwords
• Staff turn-over
• Use of unauthenticated
services on network hosts
and pass through routers
• Lack of spoofing
prevention measures
• Use of default passwords
on network equipment
• Lack of password change
procedures for network
equipment
• Poor O/S controls on
network devices
5/7/2001 TCP/IP Networks Management and Security 21
General network risks
• Improper access to
restricted systems (patient
information, financial
records, payroll, etc.)
• Release of sensitive
information
• Prolonged outages and
inconsistent availability
• Lack of documentation
• Non-compartmentalized
traffic
• Trojan Horses
• Lack of expertise,
training, and cross-
training
• Lack of restoration plans
or spare parts
• Ineffective procedures
• Masquerading as another
individual
• Spying, Sabotage
• Risk from easy-to-use
freeware utilities
• Stolen Passwords
5/7/2001 TCP/IP Networks Management and Security 22
Specific risks and compensating
controls for TCP/IP network
devices
5/7/2001 TCP/IP Networks Management and Security 23
Router Risks and Controls
Inappropriate addresses
or dangerous protocols
accessing hosts/servers
Access Control Lists – filter
through router
Inappropriate addresses
conducting router
maintenance
ACLs to restrict IP
addresses to router
Unauthenticated or
trusted services used for
maintenance
Turn off these services in
router configuration, use
services with stronger
authentication
5/7/2001 TCP/IP Networks Management and Security 24
Router Risks and Controls
Damaged router/network
device configuration
Create backups of the
configuration file, store on
network, hard copy, and
“secret” backup
Failed upgrades or changes Development and
maintenance controls &
“back-out” plans
Not capturing network events Turn on logging, secure the
host that the logs are
streaming to
5/7/2001 TCP/IP Networks Management and Security 25
Router Risks and Controls
Default passwords and
clear text passwords
transmitted over the
network
Change passwords
periodically with
timeouts
No console passwords Add passwords with
timeouts
Community strings =
PUBLIC, PRIVATE and
pass network in clear text
Change Community
strings and use encrypted
SNMP
5/7/2001 TCP/IP Networks Management and Security 26
Router Risks and Controls:
Methods of Accessing Routers
• Console
• TFTP
• Telnet
• TACACS
• MOP (maintenance
operation protocol by
DEC for CISCO
routers)
• SNMP
• R-Shell
• R-Copy
• FTP
• HTTP
• More being added,
check manufacturer
documentation
5/7/2001 TCP/IP Networks Management and Security 27
Domain Name Service:
Risks and Controls
Allowing zone file transfers to
unauthorized clients provides
MX and HINFO records
Use router filters for TCP port
53 (DNS) or control servers
that receive DNS zone files
Updates require time to
propagate usually 24 hours
Use strong change control
procedures – management
review
Providing information about
internal devices one at a time
Configure external name
servers to provide info on
Internet connected machines
Whois Command Whois returns the DNS IP
addresses + sensitive info.
5/7/2001 TCP/IP Networks Management and Security 28
Network Address Translation
Static translation does not
hide the device from the
Internet
Port translation is needed
to get the full benefit for
security.
Reduced router
performance and can
interfere with
authentication schemes
that verify integrity of the
entire packet
Must weigh these costs
when reviewing NAT
INTERNET
NAT
Router
DHCP Server
Hub
10.xxx.xxx.001
10.xxx.xxx.002
10.xxx.xxx.003
10.xxx.xxx.004
INTERNET
NAT
Router
DHCP Server
Hub
10.xxx.xxx.001
10.xxx.xxx.002
10.xxx.xxx.003
10.xxx.xxx.004
Primary
DNS
Secondary
DNS
TCP/IP Environment Example
5/7/2001 TCP/IP Networks Management and Security 30
Wiring/Hubs:
Risks and Controls
Inability to track wiring
problems
Diagrams, labeling
Sniffing equipment, theft,
inappropriate access to
equipment
Secure wiring
concentrations (closets)
No redundant paths for
backbone/WAN connections
Redundant Layer 1 path
Power surges Surge protectors or UPSs
Heat and water damage Design of locations that
house equipment
5/7/2001 TCP/IP Networks Management and Security 31
Additional Server
Risks and Controls
Legitimate network access
can cause security
problems. Example: Sun
Telnet hack, Microsoft IIS
hacks
Install up to date patches,
Backup (OS, applications &
database) , password
controls, file permissions,
restrict privileges, logging,
disable unnecessary
services
Differences in server
configurations
Use consistent setup
checklists and/or scripts for
servers and user profiles
5/7/2001 TCP/IP Networks Management and Security 32
Dangerous Services to be
Restricted
Zone Transfers
UDP&TCP 53
Link
TCP 87
LPD
TCP 515
BOOTP
UDP 67
RPC
TCP & UDP 111
NFS
UDP 2049
TFTP
UDP 69
SNMP
UDP 161,162
X-Windows
TCP 6000+
Finger
UDP 79
Berkley R-Commands
TCP 512-514
Windows Sharing
TCP 135-139,445
Chargen,Discard
,Echo TCP/UDP
9,19,7
Block ICMP redirects *Internal address
from outside the
network
5/7/2001 TCP/IP Networks Management and Security 33
Work Stations Risks and Controls
Trojan Horses: key
capture, sniffers, remote
control
BOClean, up to date virus
software (for detection)
Viruses Virus software up to date
Modem Lines exposures Policy, inventory,
standardization, dial-in
servers, Unique id &
complex passwords,
Wardial company #s
5/7/2001 TCP/IP Networks Management and Security 34
Encryption
• Examine Encryption Practices
• Determine where the traffic is the most exposed –
going out on the Internet, between business
partners…
• Look for controls like compartmentalization &
VLANs to reduce internal exposure
• Use Encrypted methods like SNMP V.2 and
CHAP V.2 to communicate to network devices
• Consider testing encryption controls with a sniffer
5/7/2001 TCP/IP Networks Management and Security 35
Sniffed PPP Connection in Clear
Text
5/7/2001 TCP/IP Networks Management and Security 36
Areas of a TCP/IP Infrastructure
Audit: Why Examine Network
Infrastructure
• Rarely examined
• Large investment
• Basis for most technology - the
“common denominator”
• Connects to the World
• Lost Revenue on E-Commerce
• Susceptible to Denial of Service Attacks
5/7/2001 TCP/IP Networks Management and Security 37
Areas of a TCP/IP Infrastructure
Audit: Recommended Objectives
• Continuity (consistent reliability and availability
of system -- back-up and ability to recover)
• Management and Maintenance (additions,
change procedures, upgrades, and documentation)
• Security (appropriate physical and logical access
to network devices and hosts)
5/7/2001 TCP/IP Networks Management and Security 38
Auditing TCP/IP Infrastructure
• Review network policies and procedures
• Review network diagrams (layer 1 & 2), design, and walk-
through, list of network equipment and IP address list
• Verify diagrams with Ping and Trace Route
• Review utilization, trouble reports & helpdesk procedures
• Probe systems (Netscan tools and Portscanner)
• Interview network vendors, users, and network technicians
• Review software settings on network equipment
• Inspect computer room and network locations
• Evaluate back-up and operational procedures
5/7/2001 TCP/IP Networks Management and Security 39
Conclusion
• Identify the paths and equipment used to navigate
the network
• Identify TCP/IP infrastructure areas of concern
• Break into manageable pieces
• Every network is different and the components
and risks must be fully understood
• Identify risks and prioritize
• Dedicate more upfront planning
• RELAX !! It’s not that bad !
5/7/2001 TCP/IP Networks Management and Security 40
Additional Information
• Presentation located on line at URL:
http://www.vcu.edu/iaweb/iam_welc.html
• Contact information:
dmlitton@vcu.edu
(804) 828-9248

More Related Content

PPTX
Troubleshooting Network and Network Utilities
PPTX
IP tables and Filtering
PDF
Sevana VQM Administration Manual
PPT
Linux Based Advanced Routing with Firewall and Traffic Control
PDF
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
PDF
Mr201304 open flow_security_eng
PPTX
Topic22
PPTX
Securityic2
Troubleshooting Network and Network Utilities
IP tables and Filtering
Sevana VQM Administration Manual
Linux Based Advanced Routing with Firewall and Traffic Control
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
Mr201304 open flow_security_eng
Topic22
Securityic2

What's hot (20)

PPT
ECS Introduction
PPTX
Ip tables
PPTX
TCP/IP
PDF
Enabling Application Integrated Proactive Fault Tolerance
PPT
Linux Firewall - NullCon Chennai Presentation
PPTX
Network Packet Analysis with Wireshark
PDF
Approved MikroTik training programs and certificates outlines
PPT
Wireshark
PPT
Hacking Cisco
PPTX
Network time sync solutions for security
PPTX
Monitoring network performance- Part 3_Free OpManager training
PPT
Wireshark working and basics
PPTX
2009 osi 7 layers
PPTX
Session 3
PPTX
Tlc 004 - take a sip of sip
PPT
Audio And Video Over Internet
PDF
Ccna 2 Chapter 8 V4.1 Answers
PDF
Voip (rtp) server requirements
PPT
Edge Device Multi-unicasting for Video Streaming
PPT
운영체제론 Ch20
ECS Introduction
Ip tables
TCP/IP
Enabling Application Integrated Proactive Fault Tolerance
Linux Firewall - NullCon Chennai Presentation
Network Packet Analysis with Wireshark
Approved MikroTik training programs and certificates outlines
Wireshark
Hacking Cisco
Network time sync solutions for security
Monitoring network performance- Part 3_Free OpManager training
Wireshark working and basics
2009 osi 7 layers
Session 3
Tlc 004 - take a sip of sip
Audio And Video Over Internet
Ccna 2 Chapter 8 V4.1 Answers
Voip (rtp) server requirements
Edge Device Multi-unicasting for Video Streaming
운영체제론 Ch20
Ad

Similar to Tcp ip management & security (20)

PPTX
CompTIA Security Plus Overview
PPT
Chapter 4.ppt
PPTX
Firewall, Router and Switch Configuration Review
PPTX
501 ch 3 network technologies tools
PPTX
Internet infrastructure UNIT 5
PPTX
501 ch 3 network technologies tools
PPSX
Network & security startup
PPTX
gkk20211e4djwew4dSecurity essentials domain 2
PPTX
gkkSecurity essentials domain 2
PPTX
gkk_2021123rg5hSecurity essentials domain 2
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
Introduction to Cyber security module - III
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
How Secure is TCP/IP - A review of Network Protocol
PDF
Tcpip Network Administration 3rd Edition 3rd Edition Craig Hunt
DOCX
NETWORK MANAGEMENT - 2015
PPTX
topicCybersecurity_4
PPT
12 tcp-dns
PPTX
A Deep Dive in the World of IT Networking (Part 2)
PPTX
Computer networks and network security
CompTIA Security Plus Overview
Chapter 4.ppt
Firewall, Router and Switch Configuration Review
501 ch 3 network technologies tools
Internet infrastructure UNIT 5
501 ch 3 network technologies tools
Network & security startup
gkk20211e4djwew4dSecurity essentials domain 2
gkkSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials domain 2
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
Introduction to Cyber security module - III
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
How Secure is TCP/IP - A review of Network Protocol
Tcpip Network Administration 3rd Edition 3rd Edition Craig Hunt
NETWORK MANAGEMENT - 2015
topicCybersecurity_4
12 tcp-dns
A Deep Dive in the World of IT Networking (Part 2)
Computer networks and network security
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development
sap open course for s4hana steps from ECC to s4
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...

Tcp ip management & security

  • 1. TCP/IP Networks Management and Security Presented by: David M. Litton, CPA, CISA, CGFM Deputy Director, Audit and Management Services Virginia Commonwealth University May 7, 2001
  • 2. 5/7/2001 TCP/IP Networks Management and Security 2
  • 3. 5/7/2001 TCP/IP Networks Management and Security 3 Course Objectives: • What is a TCP/IP Network? • Common components of a TCP/IP network • Network environment: TCP/IP protocol and associated devices functionality • General network risks • Specific risks and compensating controls for TCP/IP network devices • Areas of a TCP/IP Infrastructure Audit
  • 4. 5/7/2001 TCP/IP Networks Management and Security 4 What is a TCP/IP Network? • Envelope and post office concept • Ethernet Frames • Internet Protocol (IP) – Connectionless datagram; tries to send but not sure if it gets there • Transmission Control Protocol (TCP) • Alternatives to TCP: UDP and ICMP • Ports • Socket (Combination of port# & IP address) • Connection (pair of sockets for a session)
  • 5. Host (Ex. Unix/Win NT Server) Client (Ex. Win 98/2000) Telnet (Also: HTTP, SMTP, POP3...) Single Control and Data Circuit IP 128.172.161.139 IP 128.172.2.30 High Random Port (Ex. Port #3003) Port 23 FTP Seperate Control and Data Circuits Host (Ex. Unix/Win NT Server) Client (Ex. Win98/2000) IP 128.172.161.139 IP 128.172.22.9 Port 21 Port 20 High Random Port (Ex. Port #2987) High Random Port (Ex. Port #2986)
  • 9. 5/7/2001 TCP/IP Networks Management and Security 9
  • 14. Host (Ex. Unix/Win NT Server) Client (Ex. Win 98/2000) Telnet (Also: HTTP, SMTP, POP3...) Single Control and Data Circuit IP 128.172.161.139 IP 128.172.2.30 High Random Port (Ex. Port #3003) Port 23 FTP Seperate Control and Data Circuits Host (Ex. Unix/Win NT Server) Client (Ex. Win98/2000) IP 128.172.161.139 IP 128.172.22.9 Port 21 Port 20 High Random Port (Ex. Port #2987) High Random Port (Ex. Port #2986)
  • 15. (7) Application Layer (6) Presentation Layer (5) Session Layer (4) Transport Layer (3) Network Layer (2) Data Link Layer (1) Physical Layer Logical Link Media Access Control (MAC) FTP, Telnet, HTTP TCP, UDP IP Ethernet, Frame Relay, Token Ring Twisted Pair, Fiber (4) Application Layer (3) Transport Layer (2) Internet Layer (1) Network Interface Layer OSI Reference Model Examples TCP/IP Protocol Stack OSI Model and TCP/IP Compared
  • 16. 5/7/2001 TCP/IP Networks Management and Security 16
  • 17. 5/7/2001 TCP/IP Networks Management and Security 17 Common components of a TCP/IP network • Cat 5 UTP Wiring & fiber optics lower layer 1 • Hubs emphasis layer 1 • Bridges layer 1 or lower-part of layer 2 (MAC) • Switches – some layer 1 & emphasis layer 2 • Routers – emphasis layer 3 & some layer 4 • Applications/network utilities: layers 5-7; FTP, HTTP, NFS, X-Windows, Telnet… • Protocol Stacks: part of server/work station O/S • Servers - physical and logical contrasted • Specialized IP servers: DHCP, BOOTP, DNS…
  • 18. 5/7/2001 TCP/IP Networks Management and Security 18 Network Environment: TCP/IP Protocol and Associated Devices Functionality
  • 19. Ethernet Token-ring Ethernet Workstation w/s Laptop Laser printer Hub Router Firewall ` WAN (ATM) (T-1) (ISDN) (Frame Relay) (SMDS) Firewall Router IBM Compatible Laptop computer Workstation HUB MAU w/s Laptop w/s Laser printer Router Router Enet[IP[TCP[Data]]] Enet[IP[TCP[Data]]] TRing[IP[TCP[Data]]] ATM[IP[TCP[Data]]] LAN/WAN Protocol Example
  • 20. 5/7/2001 TCP/IP Networks Management and Security 20 General network risks • Inconsistently applied back-up procedures for Network Equipment and Servers • Lack of a test lab and change control procedures • Intercepting clear text, log-on identifiers and passwords • Staff turn-over • Use of unauthenticated services on network hosts and pass through routers • Lack of spoofing prevention measures • Use of default passwords on network equipment • Lack of password change procedures for network equipment • Poor O/S controls on network devices
  • 21. 5/7/2001 TCP/IP Networks Management and Security 21 General network risks • Improper access to restricted systems (patient information, financial records, payroll, etc.) • Release of sensitive information • Prolonged outages and inconsistent availability • Lack of documentation • Non-compartmentalized traffic • Trojan Horses • Lack of expertise, training, and cross- training • Lack of restoration plans or spare parts • Ineffective procedures • Masquerading as another individual • Spying, Sabotage • Risk from easy-to-use freeware utilities • Stolen Passwords
  • 22. 5/7/2001 TCP/IP Networks Management and Security 22 Specific risks and compensating controls for TCP/IP network devices
  • 23. 5/7/2001 TCP/IP Networks Management and Security 23 Router Risks and Controls Inappropriate addresses or dangerous protocols accessing hosts/servers Access Control Lists – filter through router Inappropriate addresses conducting router maintenance ACLs to restrict IP addresses to router Unauthenticated or trusted services used for maintenance Turn off these services in router configuration, use services with stronger authentication
  • 24. 5/7/2001 TCP/IP Networks Management and Security 24 Router Risks and Controls Damaged router/network device configuration Create backups of the configuration file, store on network, hard copy, and “secret” backup Failed upgrades or changes Development and maintenance controls & “back-out” plans Not capturing network events Turn on logging, secure the host that the logs are streaming to
  • 25. 5/7/2001 TCP/IP Networks Management and Security 25 Router Risks and Controls Default passwords and clear text passwords transmitted over the network Change passwords periodically with timeouts No console passwords Add passwords with timeouts Community strings = PUBLIC, PRIVATE and pass network in clear text Change Community strings and use encrypted SNMP
  • 26. 5/7/2001 TCP/IP Networks Management and Security 26 Router Risks and Controls: Methods of Accessing Routers • Console • TFTP • Telnet • TACACS • MOP (maintenance operation protocol by DEC for CISCO routers) • SNMP • R-Shell • R-Copy • FTP • HTTP • More being added, check manufacturer documentation
  • 27. 5/7/2001 TCP/IP Networks Management and Security 27 Domain Name Service: Risks and Controls Allowing zone file transfers to unauthorized clients provides MX and HINFO records Use router filters for TCP port 53 (DNS) or control servers that receive DNS zone files Updates require time to propagate usually 24 hours Use strong change control procedures – management review Providing information about internal devices one at a time Configure external name servers to provide info on Internet connected machines Whois Command Whois returns the DNS IP addresses + sensitive info.
  • 28. 5/7/2001 TCP/IP Networks Management and Security 28 Network Address Translation Static translation does not hide the device from the Internet Port translation is needed to get the full benefit for security. Reduced router performance and can interfere with authentication schemes that verify integrity of the entire packet Must weigh these costs when reviewing NAT
  • 30. 5/7/2001 TCP/IP Networks Management and Security 30 Wiring/Hubs: Risks and Controls Inability to track wiring problems Diagrams, labeling Sniffing equipment, theft, inappropriate access to equipment Secure wiring concentrations (closets) No redundant paths for backbone/WAN connections Redundant Layer 1 path Power surges Surge protectors or UPSs Heat and water damage Design of locations that house equipment
  • 31. 5/7/2001 TCP/IP Networks Management and Security 31 Additional Server Risks and Controls Legitimate network access can cause security problems. Example: Sun Telnet hack, Microsoft IIS hacks Install up to date patches, Backup (OS, applications & database) , password controls, file permissions, restrict privileges, logging, disable unnecessary services Differences in server configurations Use consistent setup checklists and/or scripts for servers and user profiles
  • 32. 5/7/2001 TCP/IP Networks Management and Security 32 Dangerous Services to be Restricted Zone Transfers UDP&TCP 53 Link TCP 87 LPD TCP 515 BOOTP UDP 67 RPC TCP & UDP 111 NFS UDP 2049 TFTP UDP 69 SNMP UDP 161,162 X-Windows TCP 6000+ Finger UDP 79 Berkley R-Commands TCP 512-514 Windows Sharing TCP 135-139,445 Chargen,Discard ,Echo TCP/UDP 9,19,7 Block ICMP redirects *Internal address from outside the network
  • 33. 5/7/2001 TCP/IP Networks Management and Security 33 Work Stations Risks and Controls Trojan Horses: key capture, sniffers, remote control BOClean, up to date virus software (for detection) Viruses Virus software up to date Modem Lines exposures Policy, inventory, standardization, dial-in servers, Unique id & complex passwords, Wardial company #s
  • 34. 5/7/2001 TCP/IP Networks Management and Security 34 Encryption • Examine Encryption Practices • Determine where the traffic is the most exposed – going out on the Internet, between business partners… • Look for controls like compartmentalization & VLANs to reduce internal exposure • Use Encrypted methods like SNMP V.2 and CHAP V.2 to communicate to network devices • Consider testing encryption controls with a sniffer
  • 35. 5/7/2001 TCP/IP Networks Management and Security 35 Sniffed PPP Connection in Clear Text
  • 36. 5/7/2001 TCP/IP Networks Management and Security 36 Areas of a TCP/IP Infrastructure Audit: Why Examine Network Infrastructure • Rarely examined • Large investment • Basis for most technology - the “common denominator” • Connects to the World • Lost Revenue on E-Commerce • Susceptible to Denial of Service Attacks
  • 37. 5/7/2001 TCP/IP Networks Management and Security 37 Areas of a TCP/IP Infrastructure Audit: Recommended Objectives • Continuity (consistent reliability and availability of system -- back-up and ability to recover) • Management and Maintenance (additions, change procedures, upgrades, and documentation) • Security (appropriate physical and logical access to network devices and hosts)
  • 38. 5/7/2001 TCP/IP Networks Management and Security 38 Auditing TCP/IP Infrastructure • Review network policies and procedures • Review network diagrams (layer 1 & 2), design, and walk- through, list of network equipment and IP address list • Verify diagrams with Ping and Trace Route • Review utilization, trouble reports & helpdesk procedures • Probe systems (Netscan tools and Portscanner) • Interview network vendors, users, and network technicians • Review software settings on network equipment • Inspect computer room and network locations • Evaluate back-up and operational procedures
  • 39. 5/7/2001 TCP/IP Networks Management and Security 39 Conclusion • Identify the paths and equipment used to navigate the network • Identify TCP/IP infrastructure areas of concern • Break into manageable pieces • Every network is different and the components and risks must be fully understood • Identify risks and prioritize • Dedicate more upfront planning • RELAX !! It’s not that bad !
  • 40. 5/7/2001 TCP/IP Networks Management and Security 40 Additional Information • Presentation located on line at URL: http://www.vcu.edu/iaweb/iam_welc.html • Contact information: dmlitton@vcu.edu (804) 828-9248