Datacenter Security & Virtualized Architecture

FTP abuse. ACE's FTP inspection engine can match requests and responses ... T e a rs d o w n U D P c o n n e c tio n s a fte r re c e p tio n o f a re p ly. Blocked ...
3MB taille 36 téléchargements 412 vues
Datacenter Security & V irtual iz ed A rch itecture

Franck Bonneau TSE, Data Center

f b o nneau @ c i s c o . c o m fb o n n e a u @

c is c o .c o m

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

1

Agenda  Datacenter Security Threats  Datacenter Desig n O v erv iew  Datacenter V irtual iz atio n

 C isco I P serv ice in v irtual iz ed architecture ex am p l es –V irtual iz ed central Firewall D ep lo y m ent ex am p le

– H o w A C E L o ad b alanc er h elp to s ec u re s erv er f arm . • HTTP inspection in action HTTP tunneling • HTTP inspection in action U

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

R L c a no nic a liz a tio n

2

D at a C ent er S ec u r i t y

Protecting the Enterprise Data  Who to protect applications from? E x t ernal threats from the Internet

Internet

I nt ernal threats from the Intranet

F rom P artner’s netw ork s ori g i nati ng attac k s

 What to protect applications from? Intru si on

D eni al of serv i c e W orms

 P rev ent the serv ers from b ecoming the sou rce of attack s ag ainst a third party entity

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

3

T y p i c al I nt r u s i o n S eq u enc e

Phase 1 : H ack ing the W eb / A ppl ication S erv er L ay er 2 S eg m ent HTTP

L ay er 2 S eg m ent

W eb W eb S erv er S erv er

W eb / A p p l i cat i on

D at ab as e

 A f ter a p h as e o f p ro b ing / s c anning , th e h ac k er d etec ts th e v u lnerab ility o f th e W eb / ap p lic atio n s erv er  T h e h ac k er ex p lo its th e v u lnerab ility to g et a s h ell  Fo r ex am p le:

C opy th e tr oj an on th e W eb / appl ication ser v er :

HTTPS: / / w w w . ex am pl e. com / scr ipts/ . . % c0 % af . . / w innt/ sy stem 3 2 / cm d . ex e? / c+ tf tp % 2 0 -i% 2 0 1 0 . 2 0 . 1 5 . 1 5 % 2 0 G E T% 2 0 tr oj an. ex e% 2 0 tr oj an. ex e F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

4

T y p i c al I nt r u s i o n S eq u enc e

Phase 1 : O b taining a R ev erse S hel l  B y u s ing v ario u s to o ls and ex p lo its th e h ac k er ev entu ally o b tains th e W eb s erv er s h ell  Fro m th is s h ell th e h ac k ef f ec tiv ely c o ntro ls th e W s erv er, wh ic h g iv es h im to th e o th er s erv ers in th c enter

H acker’s P C

er eb ac c es s e d ata

 O nc e th e h ac k er h as a s h ell f ro m th e W eb s erv er h e c an f o llo w two s trateg ies to ac c es s c o nf id ential d ata: 1 . Hack th e d atab ase 2 . S nif f th e tr af f ic

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

5

T y p i c al I nt r u s i o n S eq u enc e

Phase 2 —S trategy 1 : A ccessing the Datab ase L ay er 2 S eg m ent HTTP

L ay er 2 S eg m ent

W eb W eb S erv er S erv er

W eb / A p p l i cat i on

D at ab as e

 T h e h ac k er lo o k s f o r th e d atab as e s erv er, and if th e W eb / ap p lic atio n s erv ers are L ay er 2 ad j ac ent ( with d u al N I C s , f o r ex am p le) , th is is ex trem ely eas y  U s e a c o m m and line s c anner

 I d entif y th e v u lnerab ilities o f th e D B s erv er

 T h en o b tain th e s h ell o f th e d atab as e s erv er and d u m p th e d atab as e inf o rm atio n F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

6

T y p i c al I nt r u s i o n S eq u enc e

Phase 2 —S trategy 2 : S nif f ing the T raf f ic D a ta C e n te r D e fa u lt G a te w a y

U s e r Pa s s w o r d a n d C r e d i t C a r d In f o r m a t i o n

.1 N o r m a l Tr a f f i c Pa t h

Tr a f f i c Pa t h i n Pr e s e n c e o f A R P Po i s o n i n g

1 9 2 .1 6 8 .1 0 .0 /2 4

I’m

.1 Tr o j a n

Se r v e r A .5 F b o n n e a u -a s a

Se r v e r B .4

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

Se r v e r C .3 C is c o C o n fid e n tia l

Se r v e r D .2 7

D eni al o f S er v i c e At t ac k s DoS and DDoS

 Do Ses are m eant to d eny access to autho riz ed users and co nsum e enterp rise reso urces: B and wid th C P U













 The hack er can util iz e co m p ro m ised P C s/ serv ers that b eco m e Z o m b ies o r B o ts to l aunch the attack ( DDo S)



M em o ry b lo c k s

V u l nera b i l i ti es m o s t u s u a l l y ex p l o i ted b y b o ts to s p rea d a re W eb s erv ers ( IIS a nd A p a c h e) , W i nd o w s R P C , S Q L s erv er a nd M y S Q L , W IN S a nd o p en d o o rs u s ed b y th e a l terna ti v es o f B a g l e a nd M y d o o m . F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

W eb Serv er W eb Serv er 8

D eni al o f S er v i c e At t ac k s S ou rce I P S poof ing ( 1 )

Source IP Spoofing Is Used to:

S rc IP = 1 0 . 2 0 . 5 . 0

 H id e th e s o u rc e:

S o th e attack er or r esou r ce is not r ev eal ed

 B y p as s s ec u rity :

M asq u er ad ing as v al id pack ets

e. g . 1 0 . 2 0 . 5 . 0 can tal k to 1 0 . 2 0 . 1 0 . 0 , and b y d ef au l t d ir ect access to 1 0 . 2 0 . 1 0 . 0 is d enied

B y spoof ing th e sou r ce I P th e h ack er can attack th e netw or k 1 0 . 2 0 . 1 0 . 0

 M as q u erad e as th e real targ et:

Tu r ns th e “v ictim ” into an ag ent of th e r eal attack

 C o ns u m e netwo rk res o u rc es : C r eate tr ansl ations/ f l ow s on l oad b al ancer s or f ir ew al l s

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

1 0 .2 0 .5 .0

1 0 .2 0 .1 0 .0 9

D eni al o f S er v i c e At t ac k s S ou rce I P S poof ing ( 2 )

Source IP Spoofing Is Used to:  H id e th e s o u rc e:

S erv erf a rm

S o th e attack er or r esou r ce is not r ev eal ed

SY N

 B y p as s s ec u rity :

M asq u er ad ing as v al id pack ets

 M as q u erad e as th e real targ et:

A C K

1 9 2 .1 6 8 .2 .0 /2 4

Tu r ns th e “v ictim ” into an ag ent of th e r eal attack , e. g . S Y N r ef l ector

1 0 .5 6 .3 2 .1

 C o ns u m e netwo rk res o u rc es : C r eate tr ansl ations/ f l ow s on l oad b al ancer s or f ir ew al l s

D es t: 1 9 2 . 1 6 8 . 2 . 2 5 5 S o u rc e: 1 0 . 5 6 . 3 2 . 1 A tta c k er 1 9 2 .0 .2 .1 5 0

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

10

D eni al o f S er v i c e At t ac k s S ou rce I P S poof ing ( 3 )

Source IP Spoofing Is Used to:  H id e th e s o u rc e:

S o th e attack er or r esou r ce is not r ev eal ed

 B y p as s s ec u rity :

Po t e n t i a l V i c t i m s

M asq u er ad ing as v al id Packets

 M as q u erad e as th e real targ et:

Tu r ns th e “v ictim ” into an ag ent of th e r eal attack

 C o ns u m e netwo rk res o u rc es : C r eate tr ansl ations/ f l ow s on l oad b al ancer s or f ir ew al l s

Th e com pr om ised h osts cy cl es m u l tipl e sou r ce I P ad d r esses to ex h au st netw or k r esou r ces

IP 1 IP 2

IP 3

1 0 .2 0 .5 .0 F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

1 0 .2 0 .1 0 .0 11

W o rm s

Ef f ects on S erv ers and N etw ork E f f ect o n the N etw o rk I nf rastructure:

E f f ect o n the Serv ers

 H i g h C P U ( thread c reati on, sc anni ng )

 R and om sc anni ng for v u l nerab l e hosts, i nc l u d i ng the R out er P roces s ors

 A p p l i c ati ons i mp ac ted

 Inc reased traffi c : netw ork l i nk s ov erl oad ed

D a ta C e n te r Sy s t e m U n d e r A tta c k

Si Si

Si

A c c e s s F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C o re

Si

In f e c t e d So u r c e

A g g r e g a tio n C is c o C o n fid e n tia l

12

W h at ar e t h e s o l u t i o ns ???

 In first, enforce the Datacenter Infrastructure

–L ev el 2 S ecuri t y ( A C L , D A I , uR P F, D H C P S noop i ng , P V L A N , P ort S ecuri t y , S ource G uard …. ) –P rot ect C ont rol P l ane ( C oP P - C ont rol P l ane P ol i ci ng ) –...

 P rotect Datacenter ag ainst DoS & DDoS –D –R –D S w –D –D

et ect i on w i t h N et f l ow / S y s l og s / C S -M A R S em ot e T ri g g ered Bl ack H ol e ( S ource Bas ed , D es t i nat i on Bas ed ) eni al of S erv i ce M i t i g at i on w i t h Fi rew al l s , L oad Bal ancers and i t ch es / R out ers , A cces s C ont rol L i s t s , R at e L i m i t i ng / P ol i ci ng oS and D D oS M i t i g at i on w i t h t h e C i s co G uard at a C ent er D es i g n f or D oS and D D oS p rot ect i on

 Datacenter seg m entation

– U s e v i rt ual i z i ng t ech nol og i es – C ont rol t raf i c b et w een « V P N » us i ng FW , I P S , W eb FW

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

13

Agenda  Datacenter Security Threats  Datacenter Desig n O v erv iew  Datacenter V irtual iz atio n

 C isco I P serv ice in v irtual iz ed architecture ex am p l es –V irtual iz ed central Firewall D ep lo y m ent ex am p le

– H o w A C E L o ad b alanc er h elp to s ec u re s erv er f arm . • HTTP inspection in action HTTP tunneling • HTTP inspection in action U

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

R L c a no nic a liz a tio n

14

D at a C ent er S w i t c h i ng Data Center Layout

Data Data Centers Centers tyty p p i i c c alal l l y y c c o o m m p p riri se se thth ree ree f f u u ncnc titi o o nal nal l l ayay ers… ers…

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

15

D at a C ent er D es i gn

Core Des i g n Cons i d erati ons U se of E th erc h annel to inc rease resil ienc y u sing L4 op tion in h ash

Layer 2 extension to Core not rec om m end ed

A Catalyst 6500 deployed in the c or e su ppor ts the f ollow ing k ey tec hnolog ies…

P ref er Layer 3 on al l interf ac es

•1 0G E P or t D ensity •D istr ib u ted F or w ar ding •E CM P •I P M u ltic ast •L ow L atenc y S w itc hing •M u ltiple I G P S u ppor t •( O S P F / E I G R P / I S -I S ) •H S R P / V R R P and G L B P •V R F -L ite

U se I G P au th entic ation to sec u re ad j ac enc ies

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

S u m m ariz e ag g reg ation rou tes to c ore

C is c o C o n fid e n tia l

16

D i s t r i b u t i o n/ Aggr egat i o n L ay er 1 0 G E D ensity S p anning T ree S p anning T ree E xtensions H S R P / V R R P and G LB P I nteg rated S erv ic es V R F E th erc h annel E CM P

A Catal yst 6 5 0 0 d ep l oyed in th e A g g reg ation Layer su p p orts th e f ol l ow ing k ey tec h nol og ies…

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

17

L ay er 2 D i s t r i b u t i o n R edunda nt L ink from H SR P A c ti v e & STP R o o t V L A N 2 0 ,1 4 0

Si

Layer 2 Li n k s

1 0 .1 .2 0 .0 1 0 .1 .1 2 0 .0

A ccess L a y er is b l ock ed

Layer 2 Tru nk

Si

A cces s 1 0 .1 .4 0 .0 1 0 .1 .1 4 0 .0

• U se onl y i f L ay er 2 V L A N

D i s t ri b ut i on

Layer 2 Li n k s

S T P M od el

V L A N 2 0 Data V L A N 1 2 0 V o ic e

H SR P A c ti v e & STP R o o t V L A N 4 0 ,1 2 0

V L A N 4 0 Data V L A N 1 4 0 V o ic e

sp anni ng fl ex i b i l i ty req u i red

• S T P c onv erg enc e req u i red for u p l i nk fai l u re / rec ov ery

• M ore c omp l ex as S T P R oot and H S R P shou l d matc h

• D i stri b u ti on to D i stri b u ti on L i nk req u i red for rou te su mmari z ati on F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

18

L ay er 3 D i s t r i b u t i o n

N o Spa nning T ree – a l l l ink s a ctiv e H SR P A c ti v e V L A N 2 0 ,1 4 0

Layer 2 Li n k s

1 0 .1 .2 0 .0 1 0 .1 .1 2 0 .0

Layer 3 Si

Si

H S R P / G L BP M od el V L A N 2 0 Data V L A N 1 2 0 V o ic e

1 0 .1 .4 0 .0 1 0 .1 .1 4 0 .0

H SR P A c ti v e V L A N 4 0 ,1 2 0

D i s t ri b ut i on Layer 2 Li n k s

V L A N 4 0 Data V L A N 1 4 0 V o ic e

A cces s

• R ec ommend ed ‘B est P rac ti c e’ – T ri ed and T ru e • F u l l y u ti l i z e U p l i nk s v i a G L B P

• N o S T P c onv erg enc e req u i red for u p l i nk fai l u re/ rec ov ery

• D i stri b u ti on to D i stri b u ti on L i nk req u i red for rou te su mmari z ati on • M ap L 2 v l an nu mb er to L 3 su b net for ease of u se/ manag ement F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

19

R o u t i ng t o t h e E dge

L a y er 3 D istrib ution w ith L a y er 3 A ccess E IG R P /O S P F

E IG R P /O S P F Si

E IG R P /O S P F 10.1.20.0 10.1.120.0

Si

G L BP M od el V L A N V L A N

20 D a t a 120 V o i c e

10.1.4 0.0 10.1.14 0.0

E IG R P /O S P F

Layer 3 Layer 3 Layer 2 Layer 2

V L A N 4 0D a ta V L A N 14 0 V o i c e

 M o v e th e L ay er 2 / 3 d em arc atio n to th e netwo rk ed g e

 U p s tream c o nv erg enc e tim es trig g ered b y h ard ware d etec tio n o f lig h t lo s t f ro m u p s tream neig h b o r  B enef ic ial f o r th e rig h t env iro nm ent F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

20

R o u t i ng t o t h e E dge

Advantages, Yes in the Right Environment  E ase of i mp l ementati on, l ess to g et ri g ht No matching of STP/HSRP/GLBP p r ior ity No L2 /L3 M u l ticas t top ol ogy incons is te ncie s

 S i ng l e C ontrol P l ane and w el l k now n tool set  M S  E  O  R

tr ace r ou te , s how ip r ou te , s how ip e igr p ne ighb or , e tc. …

c d H

F b o n n e a u -a s a

ost C atal y sts su p p ort L 3 w i tc hi ng tod ay IG R P c onv erg es i n < 2 0 0 msec S P F w i th su b -sec ond tu ni ng onv erg es i n < 2 0 0 msec P V S T + c onv erg enc e ti mes ep end ent on G L B P / S R P tu ni ng ©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

2

Both L2 and L3 Can Provide S u b -S ec ond Converg enc e

1. 8 1. 6

U p s tr e a m

1. 4

D o w n s tr e a m

1. 2 1 0. 8 0. 6 0. 4 0. 2 0

R P V S T +

O S P F 12. 2S

E IG R P 21

I nc r eas i ng H A i n t h e D at a C ent er F ail over: W hat is the T ime to B eat?  T h e o v erall f ailo v er tim e is th e c o m b inatio n o f c o nv erg enc e at L 2 , L 3 , + L 4 c o m p o nents

S tatef u l d ev ices can r epl icate connection inf or m ation and ty pical l y f ail ov er w ith in 3 -5 sec

E th er C h annel s < 1 sec

S TP conv er g es in ~ 1 sec ( 8 0 2 . 1 w ) HS R P can b e tu ned to < 1 s

Failover Time

 W h ere d o es T C P b reak ? L inu x , A I X, etc .

F b o n n e a u -a s a

L 2C o n v e r g e n c e

M ic ro s o f t,

L 3 C o n v e rg e n c e

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

L 4 C o n v e rg e n c e ~ 5 s

M ic r o 2003 T C P T o le ~

s o ft S e rv S ta c ra n c 9 s

X P e r k e

L in u O th e rs a L o O u

x a T o n g ta g

n d le r a te e r e

22

I nc r eas i ng H A i n t h e D at a C ent er

Failover Time

F ail over T ime C omp arison       

ST P -8 0 2 .1 w—O ne s ec O SP F-E I G R P —O ne s ec A C E M o d u le with A u to s tate H SR P —T h ree s ec ( u s ing 1 / 3 ) FW SM M o d u le—T h ree s ec C SM M o d u le—Fiv e s ec W inXP / 2 0 0 3 Serv erT C P Stac k —N ine s ec

OSPF/EIGRP Su b -s e c o n d

F b o n n e a u -a s a

Sp a n n i n g T r e e ~ 1 s e c

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

A C E ~ 1 s

C is c o C o n fid e n tia l

H SRP ~ 3 s (m a y b e tu n e d to le s s )

Fi r e Se r M o ~

W a ll v ic e d u le 3 s

C o n te n t Se r v i c e M o d u le ~ 5 s

T C P St a c k T o le r a n c e ~ 9 s

23

G l ob al L 3 arc hitec tu re – W here I nstal l I P S ervic es ( F W , I P S , . . ) ? ? ?

L3

Access D i st r i b u t i o n

Co r e

I nt ernet

? L3

D i st r i b u t i o n Access

?

Layer 3

?

?

M od ul ar, h i erarch i cal  S C A L A BL E y et not v i rt ual i z ed F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

?

? 24

Agenda  Datacenter Security Threats  Datacenter Desig n O v erv iew  Datacenter V irtual iz atio n

 C isco I P serv ice in v irtual iz ed architecture ex am p l es –V irtual iz ed central Firewall D ep lo y m ent ex am p le

– H o w A C E L o ad b alanc er h elp to s ec u re s erv er f arm . • HTTP inspection in action HTTP tunneling • HTTP inspection in action U

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

R L c a no nic a liz a tio n

25

P r o b l em

D ef i ni t i o n - D r i v er s

 C l o sed U ser G ro up creatio n

P riv ate, Sec u re & I nd ep end ent

O v er a s h ared inf ras tru c tu re  T rans p arenc y E nab le U s er M o b ility  P ro d u c tiv ity G ains

 C entral iz atio n o f P o l icies and Serv ices

P o lic ies b as ed o n g ro u p s  Sim p lif ied D ep lo y m ent

E nh anc ed M anag eab ility  L o wer O p eratio nal C o s ts

 Sharing o f N etw o rk I ntel l ig ence/ Serv ices

C o s tly res o u rc es c entrally s erv e all g ro u p s wh ile m aintaining p riv ac y

e.g . D ata C enter FW , I P S, P ro x y , W eb FW , ….

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

26

… w i t h C ent r al i z ed S er v i c es & P o l i c i es  Serv ic es no t d u p lic ated p er g ro u p  E c o no m ic al

 E f f ic ient and M anag eab le

Internet / S h a red

 P o lic ies C entrally D ep lo y ed

R es ou rc e 1 0 .2 /1 6 DC Core

S h a r ed f o r a l l g r o u p s: Internet G a tew a y

Con t ra c t or 1 0 .2 /1 6

V i d eo S erv er

P a rtn e rs

F i rew a l l a nd N A T

C o n tra c to rs

H o s ted C o ntent

Con t ra c t or 1 0 .3 /1 6

R e s o u rc e s

D H C P

E m p lo y e e s

IP S ec G a tew a y F b o n n e a u -a s a

P a rt n er 1 0 .2 /1 6

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

27

Access

I nt ernet

L2 / L3

Co r e

Layer 3

D i st r i b u t i o n

L2 / L3

C u r r ent D at ac ent er D es i gn R ec o m m endat i o n

M od ul ar, h i erarch i cal  S C A L A BL E y et not v i rt ual i z ed F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

28

A V i r t u al N et w o r k p er G r o u p

A cces s D i s t ri b ut i on C ore

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

29

V i r t u al i z at i o n Al t er nat i v es

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

30

D at ac ent er V P N

O p t i o ns

 Seg m entatio n at L ayer 2 V L A N s

 Seg m entatio n at L ayer 3 A C L s o rG R E

 Datacenter L 3 V P N

M P L SL 3 V P N s V R F-lite V L A N s m ap p ed to V P N s to “ex tend ” V P N s o v er L 2 d o m ains and b etween V R F-lite ro u ters

 Datacenter V P N = L 2V L A N + L 3 V P N = end -2-end F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

31

D at ac ent er V P N – V R F L i t e Vl a n 1 0 0

Vl a n 1 0 1

V R FV P N 1

Vl a n 2 0 1

V R FV P N 2 Vl a n 2 0 0

Vl a n 3 0 3

V R F V P N -S E R V E R S Vl a n 3 0 4

Vl a n 3 0 1 F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

Vl a n 3 0 2 32

A

V R F -l i t e

V irtua l R outer I P s w i t ch i ng

I P s w i t ch i ng

8 0 2 .1 q

8 0 2 .1 q V R F V R F V R F

S V I or s ub -i nt erf ace ( L ay er 3 ) F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

S V I or s ub -i nt erf ace ( L ay er 3 ) 33

V R F L ite

R outers – R outers Intera ction SW1

S V Io r s u b -i nterf a c e ( L a y er 3 )

S V Io r s u b -i nterf a c e ( L a y er 3 )

P E -V R F

C E -V R F

P E -V R F

C E -V R F

P E -V R F

8 0 2 .1 q

8 0 2 .1 q

T o A cces s V R Fs m ap toV L A N s

F b o n n e a u -a s a

SW2

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

V R Fs p eer ov er s ep arat e rout i ng i ns t ances C is c o C o n fid e n tia l

C E -V R F

S V Io r s u b -i nterf a c e ( L a y er 3 )

8 0 2 .1 q

T o A cces s V R Fs m ap toV L A N s

34

U s i ng V R F -L i t e E nd-t o -E nd ex am p l e  L 2 A ccess

 U sing V R F -l ite o nl y

V R F-lite at C o re and D is trib u tio n

 R o uted sub -interf aces b etw een sw itches N o B G P o rM P L S

M P L S lab els s u b s titu ted b y 8 0 2 .1 q tag s end -to -end E v ery link is a 8 0 2 .1 q tru nk O ne s u b -interf ac e p er V R F

 R estricted Scal ab il ity

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

35

8 0 2 . 1 q t ags end-t o -end Trunk with s witc hp o rt

1–V R F D e fin itio n s R o u te D is tin g u is h e r a n d R o u te ta rg e t Ca t 4 5 0 0

Ca t 65 0 0

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

ip ip v r rd d r ro ou !! ip ip v r rd d r ro ou !! ip ip v r rd d r ro ou !!

vr rf f V VP 3 3: :3 3 u t t e e -t-t a

P N N -S-S E E R R V V E E R R S S

vr rf f V VP 1 1: :1 1 u t t e e -t-t a

PN N1 1

vr rf f V VP 2 2: :2 2 u t t e e -t-t a

PN N2 2

a r r g g e e t t e e x x popo r r t t 3 3 : : 3 3

a r r g g e e t t e e x x popo r r t t 1 1 : : 1 1

a r r g g e e t t e e x x popo r r t t 2 2 : : 2 2

36

8 0 2 . 1 q t ags end-t o -end Trunk with s witc hp o rt 2 a -L in k s b e tw e e n r o u te r s d e fin e d a s L 2 T r u n k w ith S w itc h p o r ts Ca t 4 5 0 0

2 0 0 0 -2 0 0 3

Ca t 65 0 0

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

Cat4500 Cat4500 interface interface GigabitEthernet1/1 GigabitEthernet1/1 d d eses crip crip tio tio nn ----- T T o o C C at6 at6 5 5 0 0 0 0 -1 -1 ----s s w w itchp o rt tru nk encap s u l atio n itchp o rt tru nk encap s u l atio n d d o o t1q t1q s s w w itchp o rt tru nk al l o w ed v l an 2 0 0 0 itchp o rt tru nk al l o w ed v l an 2 0 0 0 -2-2 0 0 0 0 3 3 s s w w itchp itchp o o rt rt m m o o d d ee tru tru nknk s s p p anning-tree p o rtfas anning-tree p o rtfas tt tru tru nknk !! interface interface V V l l an2 an2 0 0 0 0 0 0 d d eses crip crip tio tio nn ----- L L ink ink toto C C at6 at6 5 5 0 0 0 0 -1 -1 ipip adad d d res res s s 1010 . . 1414 9 9 . . 1212 . . 2 2 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! interface interface V V l l an2 an2 0 0 0 0 11 ipip v v rf rf fofo rwrw ard ard ing ing V V P P N N 11 ipip adad d d res res s s 1.1. 1.1. 1212 . . 2 2 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! interface interface V V l l an2 an2 0 0 0 0 2 2 ipip v v rf rf fofo rwrw ard ard ing ing V V P P N N 2 2 ipip adad d d res res s s 2 2 . . 2 2 . . 1212 . . 2 2 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! interface interface V V l l an2 an2 0 0 0 0 3 3 ipip v v rf rf fofo rwrw ard ard ing ing V V P P N N -S-S ERER V V ERER S S ipip adad d d res res s s 3 3 . . 3 3 . . 1212 . . 2 2 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! 37

8 0 2 . 1 q t ags end-t o -end Trunk with s witc hp o rt 2 b O r s u

-L in k s b e tw e e n r o u te r s d e fin e d a s L 3 T r u n k w ith b -i n t e r f a c e s Ca t 4 5 0 0

2 0 0 0 -2 0 0 3

Ca t 65 0 0

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

Cat6 Cat6 500 500 interface interface GigabitEthernet6 GigabitEthernet6 /1 /1 nono ipip adad d d res res s s !! interface interface GigabitEthernet6 GigabitEthernet6 /1. /1. 2 2 0 0 0 0 0 0 encap s u l atio n d o t1Q 2 0 0 0 encap s u l atio n d o t1Q 2 0 0 0 ipip adad d d res res s s 1010 . . 1414 9 9 . . 1212 . . 11 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! interface interface GigabitEthernet6 GigabitEthernet6 /1. /1. 2 2 0 0 0 0 11 encap s u l atio n d o t1Q 2 0 0 1 encap s u l atio n d o t1Q 2 0 0 1 ipip v v rf rf fofo rwrw ard ard ing ing V V P P N N 11 ipip adad d d res res s s 1.1. 1.1. 1212 . . 11 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! interface interface GigabitEthernet6 GigabitEthernet6 /1. /1. 2 2 0 0 0 0 2 2 encap encap s s u u l l atio atio nn d d o o t1Q t1Q 2 2 0 0 0 0 2 2 ipip v v rf fo rw ard ing rf fo rw ard ing V V P P N N 2 2 ipip adad d d res res s s 2 2 . . 2 2 . . 1212 . . 11 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! interface interface GigabitEthernet6 GigabitEthernet6 /1. /1. 2 2 0 0 0 0 3 3 encap s u l atio n d o t1Q 2 0 0 3 encap s u l atio n d o t1Q 2 0 0 3 ipip v v rf rf fofo rwrw ard ard ing ing V V P P N N -S-S ERER V V ERER S S ipip adad d d res res s s 3 3 . . 3 3 . . 1212 . . 11 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 2 2 5 5 5 5 . . 0 0 ipip o o s s p p ff netw netw o o rkrk p p o o int-to int-to -p-p o o int int !! 38

8 0 2 . 1 q t ags end-t o -end Trunk with s witc hp o rt

3–V L A N s M o v e V L A N s in th e ir r e s p e c tiv e V R F Ca t 4 5 0 0

2 0 0 0 -2 0 0 3

Ca t 65 0 0

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

!! i in nt i ip i ip !! i in nt i ip i ip !! !! i in nt i ip i ip !! i in nt i ip i ip !!

te p p

er v a

rf vr ad

fa rf dd

ac f dr

ce f re

e V Vl fo or rw es ss s

la wa 1

an ar 10

n1 rd 0.

11 di .1

10 in 1.

te p p

er v a

rf vr ad

fa rf dd

ac f dr

ce f re

e V Vl fo or rw es ss s

la wa 2

an ar 20

n1 rd 0.

12 di .1

20 in 1.

te p p

er v a

rf vr ad

fa rf dd

ac f dr

ce f re

e V Vl fo or rw es ss s

la wa 1

an ar 10

n1 rd 0.

11 di .1

10 in 1.

te p p

er v a

rf vr ad

fa rf dd

ac f dr

ce f re

e V Vl fo or rw es ss s

la wa 2

an ar 20

n1 rd 0.

12 di .1

20 in 1.

0

ng g V VP PN N1 1 .1 1. .2 2 2 25 55 5. .2 25 55 5. .2 25 55 5. .0 0

0

0

ng g V VP PN N2 2 .1 1. .2 2 2 25 55 5. .2 25 55 5. .2 25 55 5. .0 0

ng g V VP PN N1 1 .1 1. .1 1 2 25 55 5. .2 25 55 5. .2 25 55 5. .0 0 0

ng g V VP PN N2 2 .1 1. .1 1 2 25 55 5. .2 25 55 5. .2 25 55 5. .0 0 39

8 0 2 . 1 q t ags end-t o -end Trunk with s witc hp o rt

4 –R o u tin g P r o c e s s e s A n d th e n r u n n in g s e p a r a te O S P F p r o c e s s e s p e r V R F s Ca t 4 5 0 0

2 0 0 0 -2 0 0 3

r ro ou n ne n ne !! r ro ou n ne n ne !!

ut et et

te tw tw

er wo wo

r o os or rk k or rk k

s pfpf 1 1. .0 1 10 0.

11 0. .0 .0 0.

v vr rf 0. .0 0 .0 0. .0

f V VP 0 0. .2 0 0 0.

PN 25 .2

N1 55 25

ut et et

te tw tw

er wo wo

r o os or rk k or rk k

s pfpf 2 2. .0 2 20 0.

22 0. .0 .0 0.

v vr rf 0. .0 0 .0 0. .0

f V VP 0 0. .2 0 0 0.

PN 25 .2

N2 55 25

1

5. 55

.2 5.

25 .2

55 25

5. 55

.2 5.

25 .2

55 5 a 25 55 5

ar a

re ar

ea a 0 0 re ea a 0 0

5. 55

.2 5.

25 .2

55 25

5. 55

.2 5.

25 .2

55 5 a 25 55 5

ar a

re ar

ea a 0 0 re ea a 0 0

2

Ca t 65 0 0

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

40

I nt er V R F C o m m u ni c at i o n T wo B as ic M o d els :

1 . C o ntro lled b y Firewalls / A C L s :

Provides p rot ec t ed a c c ess t o S h a red S ervic es Provides p rot ec t ed c om m u n ic a t ion b et w een V R F s I s eq u iva l en t t o in t erc on n ec t in g sep a ra t e I P n et w ork s  R ou t in g b et w een n et w ork s oc c u rs a t sp ec if ic GW Y p oin t s

2 . R o u te L eak ing b etween V R Fs u s ing a B G P p ro c es s

Provides u n -p rot ec t ed c om m u n ic a t ion b et w een V R F s A l l ow s ex t ra n et c rea t ion f or sh a red servic es Pop u l a t es rou t in g t a b l es t o en a b l e rea c h a b il it y b et w een V PN s  R ou t in g b et w een n et w ork s is op t im a l  N o in t er V PN p ol ic y en f orc em en t p ossib l e

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

41

Agenda  Datacenter Security Threats  Datacenter Desig n O v erv iew  Datacenter V irtual iz atio n

 C isco I P serv ice in v irtual iz ed architecture ex am p l es –V irtual iz ed central Firewall D ep lo y m ent ex am p le

– H o w A C E L o ad b alanc er h elp to s ec u re s erv er f arm . • HTTP inspection in action HTTP tunneling • HTTP inspection in action U

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

R L c a no nic a liz a tio n

42

F i r ew al l S er v i c es M o du l e

C isco’s H igh est Perform a nce F irew a l l  Tr anspar ent ( L 2 ) and R ou ted ( L 3 ) f ir ew al l s in th e sam e ser v ice m od u l e  R esou r ce M anag er : A ssig n S er v ice C l asses, R esou r ce L im its

 2 5 6 V L A N s per contex t w ith m ax im u m of 2 0 0 0 V L A N s

 L A N f ail ov er activ e/ stand b y and activ e/ activ e ( b oth intr a/ inter ch assis)

P er f o r m a n ce  Hig h Per f or m ance F ir ew al l : 5 . 5 G b ps b and w id th

 D y nam ic R ou ting : O S PF and R I P ( 2 O S PF v ir tu al r ou ter s) ( m ono contex t onl y ) . S tu b B G P in 3 . 2 ev en in m u l ti contex ts.

 2 . 8 5 M il l ion pps th r ou g h pu t

 S u ppor t m u l tipl e b l ad es in th e ch assis, u p to 4 f or 2 0 G b ps

 1 0 0 K new connections/ sec f or HTTP, D N S and enh anced S M TP

 S u ppor ted on N ativ e I O S 1 2 . 1 ( 1 3 E ) and C atO S 7 . 5 ( 1 ) onw ar d s

 1 m il l ion concu r r ent connections  2 5 0 V ir tu al f ir ew al l s / contex ts

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

 8 0 K access-l ists enf or ced in h ar d w ar e  J u m b o-r ead y ( 9 0 2 2 b y tes)

43

V i r t u al F i r ew al l O v er v i ew  Context hierarchy: Ad m i n co n t ex t R em o t e r o o t a ccess

S y st em A Ad m i n

( m a nd a to ry )

ex ecu t i o n sp a ce i . e. “sessi o n sl o t 6” T h e r o o t co n t ex t

B

(m a n d a to r y ) C

S ecu r i t y co n t ex t s ssh , t el n et , i p sec, h t t p s

 T here is no p ol icy inheritance b etw een contexts

 T he s ys tem s p ace u s es the ad m in context f or netw ork connectiv ity; s ys tem s p ace creates other contexts F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

44

E ac h V F W

c an b e r o u t ed o r t r ans p ar ent c lie n t

V la n3 0

V la n3 0 1 0 .3 0 .1 .0 /2 4

C a ta ly s t 6 5 00

R o u ted m o d e

S lo t 5

1 0 .3 0 .1 .0 /2 4

F a 8 /1

C a ta ly s t 6 5 00

o u t side 1 0 .3 0 .1 .1

FW SM

S lo t 5

F a 8 /1 o u t side

inside

F a 8 /2

F a 8 /2 V la n3 1

WEB ©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

T rans p arent m o d e

FW SM

1 0 .6 0 .1 .1 inside

V la n6 0 1 0 .6 0 .1 .0 /2 4

F b o n n e a u -a s a

c lie n t

C is c o C o n fid e n tia l

1 0 .3 0 .1 .0 /2 4

WEB 45

W h y r u n T r ans p ar ent m o de? Ba ck b o n e

H S R P , V R R P , G L B P

O S P F , E IG R P , R IP , et c .

P IM , m u l t ic a st t r a f f ic  B P D U s, IP X , M P L S

   

M S F C 1 0 .1 .2 .3

V la n2 0

F W S M V la n3 0

1 0 .1 .2 .3

2 2 4 .0 .0 .2

O K if A C L p er m it s

1 0 .1 .2 .4

R o u te r

Routers can establish routing protocols adjacencies through the f irew all P rotocols such as H S RP , V RRP , G L B P can cross the f irew all M ulticast stream s can also trav erse the f irew all N on-I P traf f ic can be allow ed ( pre-conf igured ty pes are I P X , M P L S , B P D U s)

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

46

V i r t u al F i r ew al l R es o u r c e M anager  I n s y s tem

m o d e, u p to 2 5 6 classes c an b e d ef ined

 I nd iv id u al c o ntex ts are th en m ap p ed to c las s es

 W ith in a c las s , lim its c an b e ap p lied to s p ec if ic res o u rc es • Co n n s:

• F i x u p s: • S y sl o g s:

CP S F i x u p s/ sec S y sl o g s/ sec

R R a at e t el i l m i m i t i ed t ed

Co n n s H o st s I P sec S S H T el n et

Co n n ect i o n s H o st s I P sec M g m t T u n n el s S S H S essi o n s T el n et S essi o n s

X l a t es M AC-en t r i es AL L

AbAb soso l u l u t e t el i l m i m i t i s ts

 L im its s p ec if ied as integ er o r % ; 0 m eans no lim it

 R es o u rc es can b e o v ers u b s c rib ed : e.g . c las s as s ig ns m ax 1 0 % res o u rc es , b u t 5 0 c o ntex ts are m ap p ed to it F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

o f 47

R es o u r c e l i m i t i ng and m o ni t o r i ng FWSM-6 K 1 -2 0 4 3 #

R e so u r c e

sh r e so u r c e

b ri d g e -ta b l e -e n tri

u sa g e

C u r r e n t

C o n n s

X l a te s H o s ts

b ri d g e -ta b l e -e n tri X l a te s

7 1

2

1 2

2 7

2

H o s ts

2

b ri d g e -ta b l e -e n tri T e l n e t

FWSM-6 K 1 -2 0 4 3 #

R e so u r c e

sh r e s u sa g e

b ri d g e -ta b l e -e n tri

C u r r e n t

b ri d g e -ta b l e -e n tri

b ri d g e -ta b l e -e n tri

FWSM-6 K 1 -2 0 4 3 #

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

M a x i m u m

7

7

2

L i m i t

3

u n l i m i te d

3

u n l i m i te d

u n l i m i te d

u n l i m i te d

7 4

1

r e s b r i d g e 8

M a x i m u m

C is c o C o n fid e n tia l

4

5 0

8

u n l i m i te d

0 0

C o n t e x t

0

a d m i n

0

c l i e n t-h s rp

c l i e n t-h s rp

c l i e n t-h s rp

0

1

5 0

D e n i e d

5 0

0

8

5 0

0

5

L i m i t

u n l i m i te d

c l i e n t-h s rp 0

u n l i m i te d

1 2 7

7

D e n i e d

0

0

0

s e rv e r-h s rp

0

s e rv e r-h s rp

s e rv e r-h s rp s y s te m

C o n t e x t a d m i n

c l i e n t-h s rp

s e rv e r-h s rp

48

V i r t u al F i r ew al l C o nc ep t - C o nt ex t s i nterf a c e V l a n1 0 1 i p v rf f o rw a rd i ng V P N 1 i p a d d res s 1 0 . 1 0 . 1 0 1 . 1 2 5 5 . 2 5 5 . 2 5 5 . 0

c o ntex t B l u e l o g i c a l -i nterf a c e v l a n1 0 1 l o g i c a l -i nterf a c e v l a n1 1 1

i nterf a c e V l a n1 0 2 i p v rf f o rw a rd i ng V P N 2 i p a d d res s 1 0 . 1 0 . 1 0 2 . 1 2 5 5 . 2 5 5 . 2 5 5 . 0

C a t6 K M P L S C lo u d o r V R F -L i te

V R F

V L A N 1 0 1 ,1 0 2 ( i ns i d e)

V R F

V F W

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

T ru nk (V L A N 1 1 1 ,1 1 2 )

V F W

 R ou t ed or T ra n sp a ren t m ode  I n dep en den t p ol ic ies p er c on t ex t  I n dep en den t m a n a g em en t p er c on t ex F b o n n e a u -a s a

V L A N 1 1 1 ,1 1 2 ( o u ts i d e)

C is c o C o n fid e n tia l

Internet E d g e

c o ntex t R ed l o g i c a l -i nterf a c e v l a n1 0 2 l o g i c a l -i nterf a c e v l a n1 1 2

49

I nt er -V P N

C o m m u ni c at i o n

2 a

FW in Single Routed Mode

FW—S i n g l e R o u t e r M o d e ( N o C o n t e x t s )

V L A N

2 0 1 0

1 0 .1 1 .1 .0 /2 4

V L A N

OSPF

2 0 2 0

2 0 .1 1 .1 .0 /2 4

OSPF

V R F V PN 1

1 0 .1 .1 .0 /2 4

F b o n n e a u -a s a

V R F V PN 2

V L A N

1 1 0

FW i s a n OSPF R o u t e r . T r a f f i c f r o m On e V R F t o t h e Ot h e r i s E n t i r e l y G o v e r n e d b y t h e Se c u r i t y Po l i c y D e f i n e d o n t h e FW SM

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

V L A N

1 2 0

2 0 .1 .1 .0 /2 4

50

I nt er -V P N

C o m m u ni c at i o n

2 b

FW in T r a ns p a r ent Mode

FW—T r a n s p a r e n t M o d e

V L A N

4 0 0

V L A N

4 0 1

1 0 .2 2 5 .2 2 5 /2 4

OSPF, PI M V R F V PN 1

V R F V PN 2 FW

1 0 .2 2 0 .2 2 0 .0 /2 4

F b o n n e a u -a s a

V L A N

4 04

d o e s n o t p a r tic ip a t th e IG P T r a ffic fr o m o n e V R Fto Ot h e r i s E n t i r e l y G o v e r b y t h e Se c u r i t y Po l i c D e f i n e d o n t h e FW

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

e in th e n e d y

V L A N 120

2 0 .1 .1 .0 /2 4

51

I nt er -V P N

C o m m u ni c at i o n

Multi-C ontex t T r a ns p a r ent Mode—P a ir s V R F2 OSPF

OSPF c x t1

c x t2

c x t3 V R F3

V R F1 OSPF

 O ne c o ntex t p er V R F p air, T rans p arent m o d e

 Filtering ru les h av e to b e d o ne m u ltip le tim es f o r eac h V R F p air

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

52

I nt er -V P N

C o m m u ni c at i o n

Multi-C ontex t T r a ns p a r ent Mode—P a ir s

?

c x t6

V R F2

V R F4

S h a re d S e r v ic e s

c x t1

c x t2

c x t3

c x t5

c x t4 V R F3

V R F1

 O ne c o ntex t p er V R F p air, T rans p arent m o d e

 Filtering ru les h av e to b e d o ne m u ltip le tim es f o r eac h V R F p air  V ery lim ited s c alab ility  an alternativ e is req u ired  H o w s h o u ld s h ared s erv ic es b e reac h ed ? F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

53

I nt er -V P N

C o m m u ni c at i o n

2 c

T r a ns p a r ent Mode—Fus ion Router / V RF Fu s i o n R o u t e r / V R F

c tx 1

O S P F , E IG R P

c tx 2

V R F1

S h a re d S e r v ic e s

O S P F , E IG R P

V R F2

 F u sion R ou t er/ V R F ( h u b a n d sp ok e) : A l l in t erV PN t h is R ou t er/ V R F  F W

c tx 3

V R F3 t ra f f ic m u st g o t h rou g h

C on t ex t s c ou l d b e m a n a g ed p er V PN

 R ou t in g p rot oc ol b et w een V R F s c ou l d b e E I GR P t o a l l ow rou t e f il t erin g c a p a b il it ies F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

54

F u s i o n V R F S i ngl e D ev i c e I m p l em ent at i o n eB G P p eer ing b etw een V RFs on a s ingle r outer S h a re d S e r v ic e s

Fu s i o n V R F

c tx 1

e B G P

c tx 2

V R F1

e B G P

e B G P

V R F2

c tx 3

V R F3

 A l l V R F s ( in c l u din g F u sion ) reside on t h e sa m e p h y sic a l devic e  eB GP p eerin g w it h in t h e sa m e devic e req u ires: B G P r ou ter -id per V R F

M u l ti-A S su ppor t f or B G P

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

55

Route Leaking Between VRFs

Singl e B ox ex tra net - Using a B G P Process a B G P Pr o c e s s to le a k th e ro u te s b e tw e e n V R Fs

B lu e R e d

I m p o r t -e x p o r t b e t w e e n V R Fs u s in g R T

Sh a r e d Se r v i c e s

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

56

S ingl e Box E x tr anet I m p l em entation B G P Process

router router b b g g p p 6 6 5 5 0 0 0 0 11 b b g g p p l l ogog -n-n eiei g g h h b b or-c or-c h h a a n !! a a d d d d res res s s -f-f a a m m i i l l y y i i p p v v 4 4 v red red i i s s tri tri b b ute ute osos p p f f 22 n n oo a a uto-s uto-s umum m m a a ryry n n oo s s y y n n c c h h ron ron i i z z a a titi onon exex i i t-a t-a d d d d res res s s -f-f a a m m i i l l y y !! a a d d d d res res s s -f-f a a m m i i l l y y i i p p v v 4 4 v red red i i s s tri tri b b ute ute osos p p f f 11 n n oo a a uto-s uto-s umum m m a a ryry n n oo s s y y n n c c h h ron ron i i z z a a titi onon exex i i t-a t-a d d d d res res s s -f-f a a m m i i l l y y !! a a d d d d res res s s -f-f a a m m i i l l y y i i p p v v 4 4 v red red i i s s tri tri b b ute ute osos p p f f 33 n n oo a a uto-s uto-s umum m m a a ryry n n oo s s y y n n c c h h ron ron i i z z a a titi onon exex i i t-a t-a d d d d res res s s -f-f a a m m i i l l y y !!

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

n g g eses v rfrf B B L L U U E E

v rfrf R R E E D D

N e to b e

e d a le a k tw e e

B G th e n V

P P ro c e s s ro u te s R Fs

D o n ’t n e e d a n y b g p n e ig h b o r s /s e s s io n s

v rfrf S S E E R R V V I I C C E E S S

C is c o C o n fid e n tia l

57

S ingl e Box E x tr anet I m p l em entation

V R F C onfigura tion – Serv ices E x tra net V PN ip ip v r rd d r ro ou r ro ou r ro ou r ro ou !! ip ip v r rd d r ro ou r ro ou r ro ou !! ip ip v r rd d r ro ou r ro ou r ro ou F b o n n e a u -a s a

vr rf f S SE 1 10 0: :1 10 u t t e e -t-t a u t t e e -t-t a u t t e e -t-t a u t t e e -t-t a

ar ar ar ar

vr rf f R RE 3 30 0: :3 30 u t t e e -t-t a u t t e e -t-t a u t t e e -t-t a

ED D 0 ar rg ge ar rg ge ar rg ge

e t t e e x x popo r r t t 3 3 : : 3 3 e t t imim popo r r t t 3 3 : : 3 3 e t t imim popo r r t t 1 1 : : 1 1

vr rf f B BL 2 20 0: :2 20 u t t e e -t-t a u t t e e -t-t a u t t e e -t-t a

LU 0 ar ar ar

e t t e e x x popo r r t t 2 2 : : 2 2 e t t imim popo r r t t 2 2 : : 2 2 e t t imim popo r r t t 1 1 : : 1 1

0

ER RV VI IC CE ES S rg rg rg rg

ge ge ge ge

et et et et

t e e x x popo r t imim popo r t imim popo r t imim popo r

rt rt rt rt

t 1 1: t 1 1: t 3 3: t 2 2:

:1 :1 :3 :2 1

1 3

2

UE E rg rg rg

ge ge ge

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

58

D ep l o y m ent ex am p l e

1 A c c e s s

N e e d FW H e re !

2 D is tr ib u tio n N e e d FW H e re !

3 C o re

N e e d FW H e re !

Cat 6K

4 D is tr ib u tio n 5 A c c e s s F b o n n e a u -a s a

F W S M

F W S M

C O R E -G Cat 6K

N e e d FW H e re !

Dist -H D

Dist –H G

6

WAN1-S W

F W S M

7

F W S M

F W S M

F W S M

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

T o i p 1-S W

S S E-S W A C U i s cT o -SC o n W fid e n

tia l

N e e d FW H e re !

C O R E -D Cat 6K

Dic t -B D

Dist -B G Cat 6K

WAN2 -S W

Cat 6K

N e e d FW H e re !

Cat 6K

59

S ec u r i t y D o m ai ns ? D o m a i n e s éc u r i t é f i l t r é p a r FW c o e u r D o m a i n e s éc u r i t é n o n f i l t r é p a r FW c o e u r V la n s u tilis a te u r s

V la n 1 2 0

D o m a i n e s éc u r i t é s e r v e u r n °1

V la n 2 1 0 V la n 2 1 1

V la n s s e r v e u r s

V la n 2 0 V la n 2 1 V la n 2 2

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

V la n 1 1 0 V la n 1 1 1 1

D o m a i n e s éc u r i t é u t i l i s a t e u r n °2

V la n 1 0 V la n 1 1 V la n 1 2

F b o n n e a u -a s a

D o m a i n e s éc u r i t é u t i l i s a t e u r n °1

D o m a i n e s éc u r i t é s e r v e u r n °2

V la n 2 2 0 V la n 2 2 1 V la n 2 2 2

C is c o C o n fid e n tia l

60

A r c h itec tur e v ir tuel l e / FW

V l a n u t i l i s a t e u r n °1 n o n f i l t r é

– LA N

S ite X

V l a n u t i l i s a t e u r n °2 f i l t r é ( d o m a i n e s éc u r i t é v e r t ) D i s tri b / u s er

D i s tri b / u s er

6 5 0 0 /S U P 7 2 0

6 5 0 0 /S U P 7 2 0

C o re

C o re

6 5 0 0 /S U P 7 2 0

6 5 0 0 /S U P 7 2 0

D i s tr i b / S e r v e u r s

D i s tr i b / S e r v e u r s

65 0 0 / S U P 7 2 0

F b o n n e a u -a s a

65 0 0 / S U P 7 2 0

©2 0 0 6 C is c o S y s te m s , In c . A

V l a n s e r v e u r n °1 f i l t r é ( d V l a n s e r v e u r n °2 f i l t r é ( d V la n s e r v e u r n ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l V la n s e r v e u r n

o m o m °3 °4

a in a in n o n n o n

e s éc u r i t é r o u g e ) e s éc u r i t é j a u n e ) filtr é filtr é

61

Agenda  Datacenter Security Threats  Datacenter Desig n O v erv iew

 Secure a C isco Datacenter I nf rastructure  Datacenter V irtual iz atio n

 C isco I P serv ice in v irtual iz ed architecture ex am p l es –V irtual iz ed central Firewall D ep lo y m ent ex am p le – H o w A C E L o ad b alanc er h elp to s ec u re s erv er f arm . • HTTP inspection in action HTTP tunneling • HTTP inspection in action U R L c a no nic a liz a tio n

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

62

W h at I s AC E ? A ppl ica tion C ontrol E ngine

 N ew p ro d u c t line in th e C is c o A N S p o rtf o lio

 I nf ras tru c tu re s im p lic ity in a s ing le h ard ware p latf o rm , A C E integ rates C on t en t sw it c h in g S S L of f l oa d

D a ta c e n te r s e c u r ity fe a tu r e s

 T h e f irs t A C E p ro d u c t is a C is c o C ataly s t® 6 5 0 0 s erv ic e m o d u le, wh ic h c o m es in th ree f lav o u rs : 4 G b p s , 8 G b p s , and 1 6 G b p s

 T h e h ard ware s u p p o rts two f ield -rep lac eab le d au g h terc ard s f o r f u tu re h ard ware-ac c elerated ap p lic atio n d eliv ery f u nc tio nality lik e H T T P c o m p res s io n

 I t d eliv ers ap p lic atio n inf ras tru c tu re c o ntro l, with f eatu res lik e v irtu al p artitio ns and nativ e ro le b as ed ac c es s c o ntro l ( R B A C ) F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

63

IP Services & Security

ex : L oa d B a la nc ing / SSL w ith A C E Ph y s i c a l D e v i c e

Ad m i n Co n t ex t

V-R a ck 1

V-R a ck 2

V-R a ck 3

G l o b al Co n f i g u r ati o n Co n te x t D e f i n i ti o n R e s o u r c e A l l o c ati o n A d m i n M an ag e m e n t

M a n a g e m e n t s ta tio n

A A A F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

64

S ec u r i t y F eat u r es i n AC E  TC P / I P no rm al iz atio n

–B u ilt-in T rans p o rt P ro to c o l Sec u rity –U s er C o nf ig u rab le, to m eet Sec u rity R eq u irem ents

 A p p l icatio n P ro to co l I nsp ectio n  A d v anced H TTP I nsp ectio n

–R FC C o m p lianc e –M I M E T y p e V alid atio n –P rev ent T u nneling P ro to c o ls o v er H T T P P o rts

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

65

T C P ex p l oits b l oc ked b y A C E 1 . T C P c h e c k s p e r fo r m e d b y d e fa u lt:         

E nf or ces cor r ect u sag e of TC P f l ag s ( can b e d isab l ed ; f l ag s can b e cl ear ed )

R and om iz ation of seq u ence nu m b er s ( cl oak s O S ty pe, m ak es f ing er pr inting r econ attack s u nr el iab l e, pr ev ents m an-in-th e-m id d l e session h ij ack ing ) E nf or ces cor r ect h ead er l eng th Pr ev ents ou t-of -state pack ets

Pr ev ents pack ets th at d o not b el ong to ex isting connections Possib il ity to d ef ine m ax im u m

nu m b er of conns per second

M atch es TC P l eng th w ith I P h ead er ’s + d ata B l ock s il l icit por ts ( por t = z er o) E nf or ces m in and m ax M S S

E x a m p le o f b lo c k e d a tta c k s : T e a r D r o p , S e s s io n H ija c k in g , J o lt, B l o o p , T a r g a , B o n k , B o i n k , Fr a g g l e , X m a s s c a n , n u l l s c a n , e t c .

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

66

I P / U D P / I C M P ex p l oits blocked by ACE

1 .

     

2 .

  

IP c h e c k s p e r fo r m e d b y A C E :

A u tom atic A nti-spoof ing ( sou r ce I P = d est I P) ; u nicast R PF ch eck Head er l eng th ch eck ( m in and m ax l eng th s, L 3 < L 2 ) I P options contr ol

D r op il l icit I P ad d r esses ( sou r ce I P = cl ass D

or b r oad cast or l oopb ack )

O v er l apping f r ag m ents d r opped , contr ol ov er m ax nu m b er of f r ag m ents ARP Inspection in transparent mode

IC M P c h e c k s p e r fo r m e d b y d e fa u lt: R eq u ests and r esponses m atch ing

Pr ev ents inj ection of u nsol icited I C M P er r or s

C ou nter m easu r es specif ied in d r af t-g ont-tcpm -icm p-attack s. tx t

B lo c k e d a tta c k s : T im e s ta m p /r o u te r e c o r d /s o u r c e r o u tin g /fr a g m e n t D o S a tta c k s , IP s p o o fin g , P in g o f D e a th , IC M P Fl o o d , S m u r f , A R P a t t a c k s F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

67

T C P / I P p r otoc ol ex p l oits p r ev en t ed by ACE

1 . FT P a b u s e      

ACE’s F T P i n s p e c t i o n e n g i n e c a n m a t c h r e q u e s t s a n d r e s p o n s e s D ro p tru n c a te d c o m m a n d s

Ch e c k s t h e s i z e o f R ET R / S T O R En f o r c e R F C c o m p l i a n c e B l o c k P AS V s e n t f r o m

c o m m a n d s

c lie n ts

V e r ify th e r a n g e o f d y n a m ic a lly n e g o tia te d p o r ts

2 . D N S e x p lo its   

ACE m a t c h e s D N S r e q u e s t s a n d r e s p o n s e s En f o r c e s l a b e l l e n g t h s c h e c k s

T e a r s d o w n U D P c o n n e c tio n s a fte r r e c e p tio n o f a r e p ly

 B l o c k e d a t t a c k s : FT P ‘P O R T ’ a t t a c k s , FT P B o u n c e , D N S f l o o d s

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

68

“Lev el 1 ” H T T P attac ks blocked by ACE 1 .

E n cr y p t ed ch a n n el a t t a ck s - H T T P S d ecr y p t i o n

2 .

W o r m s a n d d a y -z er o a t t a ck s

3 . 4 . 5 . 6. 7. F b o n n e a u -a s a

ACE i s e q u i p p e d w i t h a p o w e r f u l S S L o f f l o a d / t e r m i n a t i o n c h i p , g i v i n g i t f u l l v i s i b i l i t y i n t o a t t a c k s h o p in g to g e t a r o u n d s e c u r it y d e v ic e s b y r id in g o n t o p o f a n e n c r y p t e d c h a n n e l ACE’s e a h

H T T P n g in e . tta c k s e a d e rs

in s p U s in fo r w , th e

e c t io g re g h ic h U R L

R F C co m p l i a n ce

n e u la n o o r

n g r e k n e v

in e c o n t a in x p r e s s io n s o w n re m e d e n th e p a y

s a , u s y is lo a d

p o w e r e rs c a p u b lis o f H T

fu n h T

l f u l l y -c u s t o m i z a b l e r e g u l a r e x p r e s s i o n d e v e lo p s ig n a tu r e s t h a t c a n b lo c k w o r m s a n d e d y e t ! R e g e x e s c a n b e a p p lie d o n th e P tr a f f ic .

ACE’s H T T P i n s p e c t i o n e n g i n e a u t o m a t i c a l l y e n f o r c e s R F C2 6 1 6 c o m p l i a n c e a n d c a n d r o p a n y m e t h o d s , m i m e -t y p e s o r t r a n s f e r e n c o d i n g a s c o n f i g u r e d b y t h e u s e r

Bu f f er O v er f l o w s M a x im u m

H T T P h e a d e r le n g th c a n b e e n f o r c e d , a v o id in g a tt e m p t s a t b u ff e r o v e r f lo w e x p lo it s

D i r ect o r y t r a v er sa l s

An a t t e m p t a t w o r k i n g o n e ’s w a y u p a n H T T P s e r v e r ’s d i r e c t o r y s t r u c t u r e b y u s i n g . . / . . i n G ET r e q u e s t s . Ea s i l y b l o c k e d b y ACE’s r e g u l a r e x p r e s s i o n f i l t e r s .

M a l i ci o u s U R L s

ACE a l w a y s c a n o n i c a l i z e s U R L s , d e f e a t i n g a n y a t t a c k s r e l y i n g o n e n c o d e d U R L

P eer -t o -p eer , I n st a n t M essa g i n g , H T T P -T u n n el s

T r a f f i c t u n n e l e d o v e r H T T P c a n b e b l o c k e d b y ACE’s H T T P i n s p e c t i o n e n g i n e ©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

69

HTTP inspection in action HTTP tunneling

fb o n n e a u @

c is c o .c o m

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

70

I nt r o du c i ng H T T P t u nnel s  V a riou s f ree or c om m erc ia l p rog ra m s t h a t t a k e c l ien t t ra f f ic ( a n y T C P/ U DP) a n d rel a y t o a c c om p l ic e w eb server over H T T P ( u sin g PO S T req u est s m ost of t h e t im e)  U se p rop erl y f orm a t t ed H T T P

passes L 4 f ir ew al l s passes stand ar d HTTP ch eck s ( R F C

com pl iance, etc. )

 W eb server dem u x es t h e t ra f f ic a n d sen ds t o in t en ded rec ip ien t / t a rg et  Prog ra m s in c l u de: F ir epass HTu n Httptu nnel Hopster …

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

71

[ 2 0 ] ace

switch/lab# sh ru n int G e ne rating co nf ig u ratio n. . . . inte rf ace ip ad d re acce ss-g no shu td inte rf ace ip ad d re no shu td

v lan ss 1 0 ro u p o wn v lan ss 1 0 o wn

A C E o n l y p er m i t s H T T P . t el n et t o t ar g et !

C l i en t

can

s t i l l

[ 1 0 0 ]

C o m p r o m is ed w eb 1 0 . 1 0 . 1 0 . 1 0 1

Router

s er v er

2 0

. 2 0 . 1 0 . 4 2 55. 2 55. 2 55. 0 inp u t http inbo u nd 1 0 0 . 1 0 . 1 0 . 4

ta r g et 1 0 . 4 8 . 8 2 . 6 5

2 55. 2 55. 2 55. 0

switch/lab# switch/lab# sh ru n acce ss-list acce ss-list http inbo u nd line 1 0 switch/lab# F b o n n e a u -a s a

client 1 0 . 2 0 . 1 0 . 1 0 0



     

H T T P T u nnel E x am p l e

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

e x te nd e d

C is c o C o n fid e n tia l

p e rm it tcp

any

any

e q

www 72

C l i ent -s i de f i r ep as s c o nf i g [ ro o t@ re d hatA S 4 f p clie nt]# m o re co nf /f p clie nt. ru le s # # f p clie nt. ru le s # F I R E P A S S re d ire ct ru le s f ile # V E R S I O N 1 . 1 . 2 a # # S y ntax : # lo cal_ p o rt lo cal_ p ro to co l targ e t_ nam e _ o r_ ip targ e t_ p o rt targ e t_ p ro to co l[ C R ] # # A ny nu m be r o f sp ace s o r tabs m ay se p arate the v alu e s # # E x am p le s: # 7 4 7 4 u d p 1 1 1 . 2 2 2 . 3 3 . 4 8 0 tcp # F I R E P A S S clie nt will liste n o n lo cal p o rt 7 4 7 4 /u d p and ask F I R E P A S S se rv e r # to re d ire ct d ata f lo w to targ e t se rv e r 1 1 1 . 2 2 2 . 3 3 . 4 , p o rt 8 0 /tcp . # 8 0 8 0 tcp www. p ro x y . co m 3 1 2 8 tcp # F I R E P A S S clie nt will liste n o n lo cal p o rt 8 0 8 0 /tcp and ask F I R E P A S S se rv e r # to re d ire ct d ata f lo w to targ e t se rv e r www. p ro x y . co m , p o rt 3 1 2 8 /tcp . # ################################################################################ 8 0 0 0

tc p

1 0 . 4 8 . 8 2 . 6 5

2 3

tc p

[ ro o t@ re d hatA S 4 f p clie nt]# . /f p clie nt. p l co nf /f p clie nt. co nf 1 . 1 . 2 a/f p se rv e r/f p se rv e r. cg i

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

1 0 . 1 0 . 1 0 . 1 0 1 /cg i-bin/f ire p ass-

73

H T T P T u nnel i ng i n ac t i o n 1 .

Cl i en t i n i t i a t es co n n ect i o n t o l o ca l p o r t 8 0 0 0

[ root@ red h a tA S 4

f p c l i ent] #

T ry ing

1 2 7 . 0 . 0 . 1 . . .

E scap e

characte r is ' ^ ]' .

C o nne cte d

to

tel net l oc a l h os t 8 0 0 0

lo calho st. lo cald o m ain ( 1 2 7 . 0 . 0 . 1 ) .

---------------------------------------------------------------------U se

y o u r T A C S U N

u se rid

N O T I C E

and

P A S S W O R D

to

acce ss this ho st

---------------------------------------------------------------------U se r A cce ss V e rif icatio n

P asswo rd :

-------------------------------------------------------------|

|

* * *

P le ase

d o

|

| T his ho st is m aintaine d | p ro ble m s by

su bm itting

no t alte r the

by

C A L O .

a C A L O

co nf ig . * * *

P le ase

case

re p o rt any

at http : //calo . cisco . co m

|

|

|

|

|

-------------------------------------------------------------M S F C 2 > s h V l8 2 2

F b o n n e a u -a s a

s ta nd

1 1

b ri ef 2 55

| P

i nc l

A ctiv e

8 2 . 6 5

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

lo cal

C is c o C o n fid e n tia l

1 0 . 4 8 . 8 2 . 6 6

1 0 . 4 8 . 8 2 . 6 5

74

W h at s h o w s u p i n t h e l o gs  Sep 7 2006 14:51:00 lab: %ACE-6-3 02022: B u i lt T CP c o n n ec t i o n 0x 59 f o r v lan 20:10. 20. 10. 100/ 5028 1 ( 10. 20. 10. 100/ 5028 1) t o v lan 100:10. 10. 10. 101/80 ( 10. 10. 10. 101/ 8 0)  Sep 7 2006 14:59 :00 lab: %ACE-6-3 02023 : T ear d o w n T CP c o n n ec t i o n 0x 59 f o r v lan 20:10. 20. 10. 100/ 5028 1 t o v lan 100:10. 10. 10. 101/80 d u r at i o n 0:08 :00 by t es 9 3 9 T CP

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

F I N s

75

C l i ent -s i de p ac k et dec o di ng I P , S rc: 1 0 . 2 0 . 1 0 . 1 0 0 ( 1 0 . 2 0 . 1 T C P , S rc P o rt: 50 4 1 8 ( 50 4 1 8 ) , D H y p e rte x t T ransf e r P ro to co l P O S T /cg i-bin/f ire p ass-1 . 1 . Req ues t M eth od : P O S T R e q u e st U R I : /cg i-bin/f R e q u e st V e rsio n: H T T P /1 C o nte nt-T y p e : ap p licatio n/o U se r-A g e nt: M o z illa/4 . 0 ( co H o st: 1 0 . 1 0 . 1 0 . 1 0 1 \r\n C o nte nt-L e ng th: 0 \r\n X-S es s i on: 7 \r\n X-C ounter: 1 \r\n X-C o nne ctio n: aliv e \r\n X-H os t: 1 0 . 4 8 . 8 2 . 6 5 \r\n X-P ort: 2 3 \r\n X-P roto: tc p \r\n \r\n

0 . 1 0 0 ) , D st: 1 0 . 1 0 . 1 0 . 1 0 1 ( 1 0 . 1 0 . 1 0 . 1 0 1 ) st P o rt: http ( 8 0 ) , S e q : 1 , A ck : 1 , L e n: 2 a/f p se rv e r/f p se rv e r. cg i H T T P /1 . 1 \r\n ire p ass-1 . 1 . 2 a/f p se rv e r/f p se rv e r. cg i . 1 cte t-stre am \r\n m p atible ; M S I E 6 . 0 ; W ind o ws 9 8 ) \r\n

S erver resp on ds w it h 2 0 0 a n d oc t ec t -st rea m t o del iver da t a b a c k t o c l ien t F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

2 9 9

C is c o C o n fid e n tia l

I n t erp ret ed b y t h e server-side f irep a ss t u n n el a p p l ic a t ion Hypertext Transfer Protocol HTTP/ 1 . 1 2 0 0 O K \r\n R eq u est V ersi on: HTTP/ 1 . 1 R esponse C od e: 2 0 0 D ate: F ri , 0 8 S ep 2 0 0 6 0 8 : 5 7 : 3 2 G M T\r\n S erv er: A pach e/ 2 . 0 . 4 0 ( R ed Hat L i nu x) \r\n X-C onnecti on: ali v e\r\n C ontent-L eng th : 3 0 1 \r\n C onnecti on: close\r\n C ontent-Type: appli cati on/ octet-stream \r\n \r\n M ed i a Type: appli cati on/ octet-stream ( 3 0 1 b ytes) 76

S o h o w

do I b l o c k t h at t r af f i c ??

 Drastic so l utio n: b l o ck P O ST req uest m etho d , b ut l ik el y to b reak b ro w sing to to ns o f w eb sites  B etter so l utio n: b uil d custo m

reg ex to catch X-h e a d e r s

Firep as s c lient id entif ies c o nnec tio n u s ing th es e h ead ers : • X-Ses s io n • X-C o u nter

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

77

L et ’s b u i l d t h e p o l i c y o n AC E 1 .

Def in e a c l a ss-m a p t h a t m a t c h es p ort 8 0 :

2 .

B u il d h ea der reg ex es: if w e see b ot h h ea ders, m a t c h !

3 .

I n st ru c t A C E t o drop p a c k et s t h a t m a t c h t h e reg ex

4 .

A p p l y t h e H T T P p ol ic y t o p ort -8 0 t ra f f ic :

5 .

switch/lab( co nf ig ) # class-m ap m atch-any switch/lab( co nf ig -cm ap ) # m atch p o rt tcp switch/lab( switch/lab( v alu e . switch/lab( v alu e .

co nf ig ) # class-m ap ty p e http insp e ct m a tc h -a l l he ad e rs co nf ig -cm ap -http -insp ) # m atch he ad e r X-C ounter he ad e r* co nf ig -cm ap -http -insp ) # m atch he ad e r X-S es s i on he ad e r*

switch/lab( co nf ig ) # p o licy -m ap ty p e insp e ct http switch/lab( co nf ig -p m ap -ins-http ) # class he ad e rs switch/lab( co nf ig -p m ap -ins-http -c) # re se t

all-m atch htp o licy

switch/lab( co nf ig ) # p o licy -m ap m u lti-m atch no f ire p ass switch/lab( co nf ig -p m ap ) # class http switch/lab( co nf ig -p m ap -c) # insp e ct http p o licy htp o licy

M a p t h e p ol ic y t o t h e c l ien t -side in t erf a c e: switch/l a b ( co n f ig ) #

in t v l a n

switch/l a b ( co n f ig -if ) #

F b o n n e a u -a s a

http e q www

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

2 0

se r v ice -p o l icy

C is c o C o n fid e n tia l

u rl-lo g g ing

in p u t n o f ir e p a ss

78

V er i f i c at i o n 1 .

L og w h en H T T P f il t erin g p ol ic y is a p p l ied: l a b % A C E -6-3 0 2 0 2 2 : Built TCP connection 0 x 7 6 f o r v l a n 1 0 0 : 1 0 . 1 0 . 1 0 . 1 0 1 /8 0 ( 1 0 . 1 0 . 1 0 . 1 0 1 /8 0 ) l a b % A C E -5-3 0 4 0 0 1 : U s er : 1 0 . 2 0 . 1 0 . 1 0 0 1 . 1 . 2 a / f p s er v er / f p s er v er . cg i

A cces s ed

v l a n 2 0 : 1 0 . 2 0 . 1 0 . 1 0 0 /52 4 3 1

U R L

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

to

1 0 . 1 0 . 1 0 . 1 0 1 : / cg i-b in/ f ir ep a s s -

l a b % A C E -6-3 0 2 0 2 3 : Tea r d ow n TCP connection 0 x 7 6 f o r d u r a tio n 0 : 0 0 : 0 0 b y te s 50 8 Policy Clos e

S o u rce : 1 0 . 1 0 . 1 0 . 1 0 1 ( 1 0 . 1 0 . 1 0 . 1 0 1 ) D e stinatio n: 1 0 . 2 0 . 1 0 . 1 0 0 ( 1 0 . 2 0 . 1 0 T ransm issio n C o ntro l P ro to co l, S rc ( 52 54 1 ) , S e q : 1 , A ck : 2 6 5, L e n: 0 S o u rce p o rt: http ( 8 0 ) D e stinatio n p o rt: 52 54 1 ( 52 54 1 ) S e q u e nce nu m be r: 1 ( re lativ e A ck no wle d g e m e nt nu m be r: 2 6 5 ( H e ad e r le ng th: 2 0 by te s F lag s: 0 x 0 0 1 4 ( R S T , A C K ) 0 . . . . . . . = C o ng e stio n W ind o . 0 . . . . . . = E C N -E cho : N o t se . . 0 . . . . . = U rg e nt: N o t se t . . . 1 . . . . = A ck no wle d g m e nt: . . . . 0 . . . = P u sh: N o t se t . . . . . 1 . . = Res et: S et . . . . . . 0 . = S y n: N o t se t . . . . . . . 0 = F in: N o t se t W ind o w siz e : 1 7 4 0 8 C he ck su m : 0 x 7 6 2 9 [ co rre ct]

( 1 0 . 2 0 . 1 0 . 1 0 0 /52 4 3 1 )

v l a n 2 0 : 1 0 . 2 0 . 1 0 . 1 0 0 /52 4 3 1

. 1 0 0 ) P o rt:

http

se q u e nce re lativ e w R e d u ce d t

( 8 0 ) ,

to

v l a n 1 0 0 : 1 0 . 1 0 . 1 0 . 1 0 1 /8 0

D st P o rt:

52 54 1

nu m be r) ack nu m be r) ( C W R ) :

N o t se t

S e t

79

HTTP inspection in action URL c a n o n i c a l i z a t i o n

fb o n n e a u @

c is c o .c o m

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

80

H T T P insp ec tion URL Normalization

Normalization of all traffic to a canonical form before applying policies

–fe a tu r e o n ly fo u n d o n

A C E , A VS &

A S A

d5opx;ÐÓG E ] Ì €³ó â = [ Z ܾ ç - Ù ‰V ð „'‰ '5@ Ì ¿êÜ Ýë ;u % 2 F h ome pa g e % 2 F i nde x% 2 / h ome pa g e / i nde x/ pi c t u r e s / g og . h t ml ³7 J M µ4 [ øÈò¾ ø má ¼

Terminate and decrypt SSL

N o rmal iz e

A ppl y Secu rity P o l icy

Stops attacks disguised by encoding URLs F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

81

B y p as s i ng r egex / I P S f i l t er s • I nsert yo ur f av o rite av erag e p hishing U R L : •h t t p : / / r d s . y a h o o . c d w R s A 1 d T M Q R w * * h ttp % 3 a //1 9 8 .1 3 68 % 7 7 % 2 F % 6D % % 7 5 % 63 % 7 4% 7 3 3 % 64% 3 8 % 3 0 % 3

o m b 3 M 3 .2 6F % 5 4%

/_ y lt= A 0 L a D M w R z Z 1 9 . 2 5 / % 65 % 64% 7 5 % F % 64% 61 3 5 % 3 8 % 3

S V 66f N t D W M D c 3 IE % 6E % 2 F 6C % 65 % % 7 4% 61 % 6% 3 1 % 62

g .k A U o J X N y o A ;_ y lu = X d n R p Z A N G N jU 1 X z c 1 /S % 5 5 % 5 3 % 2 F % 7 0 % 7 2 % 7 3 % 2 F % 7 0 % 7 3 % 3 2 % 3 5 F % 7 3 % 68 % 65 % 65 % % 2 E % 68 % 7 4% 6D % 6C

•H ere’s w hat A C E / P I X sho w ACE-5-3 0 4 0 0 1 : U s e r : 1 0 . 4 8 . 8 2 . 1 0 4 /_y l t = 3 IE d n % 7 0 % 3 6 % 2 % 6 5 %

F b o n n e a u -a s a

A 0 L a R p Z 7 2 % F % 7 6 3 %

S V A N 6 F 0 % 6 4

6 6 fN G N jU % 6 4 7 2 % % 3 8

tD g .k 1 X z c % 7 5 % 6 F % 6 % 3 0 %

A U 1 /S 6 3 4 % 3 4

o J X N y o A IG = 1 4 8 v % 7 4 % 7 3 7 5 % 6 3 % % 3 5 % 3 8

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

; _y l u = X 3 s d 1 j p /E X % 2 F % 6 8 7 4 % 7 3 % % 3 6 % 3 1

C is c o C o n fid e n tia l

E 2 8 5 2 F 4 % 2 E

M T E 2 Z H 1 48 v s d 1 % 64% 7 5 3 0 % 3 6% 3 0 % 3 9 %

V u Z 3 E 3 B G N v b G 8 D j p / E X P = 1 1 3 8 5 441 8 6/ % 63 % 7 4% 7 3 % 2 F % 2 F % 7 0 % 7 2 % 6F % 64 3 0 % 3 0 % 61 % 65 % 6

w hen l o g g ing that U R L :

Ac c e s s e d

o D M T P = 1 1 3 % 7 7 % 5 F % 6 % 6 2 %

3 o D IG = 6F 7 % 7 4%

Z H V 4 4 1 8 % 6 D 6 1 % % 6 8

u Z 3 E 6 /* * h % 6 F 7 4 % % 7 4

U R L 3 B ttp % 6 1

G N % 3 6 4 % % 5 % 6 D %

2 1 6. 1 0 9 . 1 1 7 . 1 3 6: / _

v b G 8 D d w R s A a //1 9 8 . 1 3 3 . 2 1 9 7 5 % 6 C % 6 5 % F % 7 3 % 6 8 % 6 5 6 C

1 d T M . 2 5 /% 7 3 % 2 % 6 5 %

Q R 6 5 F % 7 4

w b % 6 7 0 % 3

3 M D E % 2 % 7 3 0 % 3

M w F % % 3 9 %

R z Z 5 5 % 2 % 3 3 0 %

W M 5 3 % 7 % 3 3 0 %

D c 2 F 0 % 6 1

82

AC E no r m al i z es t h e U R L W rite y o u r reg ex in p lain A SC I I – A C E tak es c are o f th e res t clas s -map type h ttp ins pect match -any tes th ttp 2 match u rl . * d ata_ s h eet

S e p 1 3 2 0 0 6 1 8 : 4 9 : 2 7 Ad m i n : % ACE-6-3 0 2 0 2 2 : B u i l t v l a n 1 8 2 2 : 1 0 . 4 8 . 8 2 . 1 0 4 / 59 9 9 1 ( 1 0 . 4 8 . 8 2 . 1 0 4 / 59 9 9 1 ) v l a n 8 2 2 : 2 1 6. 1 0 9 . 1 1 7 . 1 3 6/ 8 0 ( 2 1 6. 1 0 9 . 1 1 7 . 1 3 6/ 8 0 ) S e p 2 1 6 .1 /_y l t = 3 IE d n % 7 0 % 3 6 % 2 % 6 5 %

1 3 2 0 0 6 0 9 .1 1 7 .1 A 0 L a S V 6 R p Z A N G 7 2 % 6 F % F % 7 0 % 7 6 3 % 6 4 %

1 8 : 4 9 : 2 7 3 6 :/_ 6 fN tD g .k A U N j U 1 X z c 1 /S 6 4 % 7 5 % 6 3 2 % 6 F % 6 4 % 3 8 % 3 0 % 3 4

A d m in: o J X N y o A IG = 1 4 8 v % 7 4 % 7 3 7 5 % 6 3 % % 3 5 % 3 8

% A C E -5-3 0 4 0 0 1 : ; _y l u = X 3 s d 1 j p /E X % 2 F % 6 8 7 4 % 7 3 % % 3 6 % 3 1

o D M T P = 1 1 3 % 7 7 % 5 F % 6 % 6 2 %

E 2 8 5 2 F 4 % 2 E

Z H V 4 4 1 8 % 6 D 6 1 % % 6 8

T CP t o

U se r: 1 0 . 4 8 . 8 2 . 1 0 4 u Z 3 E 6 /* * h % 6 F 7 4 % % 7 4

3 B ttp % 6 1

G N % 3 6 4 % % 5 % 6 D %

v b G 8 D d w R s A a //1 9 8 . 1 3 3 . 2 1 9 7 5 % 6 C % 6 5 % F % 7 3 % 6 8 % 6 5 6 C

c o n n e c t i o n

0 x 3 5 f o r

Accessed URL 1 d T M . 2 5 /% 7 3 % 2 % 6 5 %

Q R 6 5 F % 7 4

w b % 6 7 0 % 3

3 M D E % 2 % 7 3 0 % 3

M w F % % 3 9 %

R z Z 5 5 % 2 % 3 3 0 %

W M 5 3 % 7 % 3 3 0 %

D c 2 F 0 % 6 1

S e p 1 3 2 0 0 6 1 8 : 4 9 : 2 7 Ad m i n : % ACE-6-3 0 2 0 2 3 : T e a r d o w n T CP c o n n e c t i o n 0 x 3 5 f o r v l a n 1 8 2 2 : 1 0 . 4 8 . 8 2 . 1 0 4 / 59 9 9 1 t o v l a n 8 2 2 : 2 1 6. 1 0 9 . 1 1 7 . 1 3 6/ 8 0 d u r a t i o n 0 : 0 0 : 0 0 b y t e s 8 59 P o l i c y Cl o s e F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

83

Q&A

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

84

 R etro u v ez c h aq u e m o is l’ac tu alité C is c o s u r C is c o M ag , la news letter d e C is c o Franc e A b o nnem ent : www.c is c o .f r/ g o / c is c o m ag

 Sém inaire s o lu tio ns : L e rés eau d e C am p u s J eu d i 2 4 m ai 2 0 0 7 en m atinée à l’I ns titu t O c éano g rap h iq u e - P aris

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

85

F b o n n e a u -a s a

©2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

86