Home > Store > Security > Software Security

Inside Network Perimeter Security, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

Inside Network Perimeter Security, 2nd Edition

Book

  • Your Price: $39.99
  • List Price: $49.99
  • Usually ships in 24 hours.

Description

  • Copyright 2005
  • Dimensions: 7 X 9
  • Pages: 768
  • Edition: 2nd
  • Book
  • ISBN-10: 0-672-32737-6
  • ISBN-13: 978-0-672-32737-7

Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.

Sample Content

Online Sample Chapters

Inside Network Perimeter Security: Packet Filtering

Inside Network Perimeter Security: Proxy Firewalls

Inside Network Perimeter Security: Stateful Firewalls

Packet Filtering

Perimeter Security Fundamentals

Perimeter Security Fundamentals

Proxy Firewalls

Stateful Firewalls

Table of Contents

Introduction.

    Who Should Read This Book.

    Why We Created This Book’s Second Edition.

    Overview of the Book’s Contents.

    Conventions.

I. THE ESSENTIALS OF NETWORK PERIMETER SECURITY.

1. Perimeter Security Fundamentals.

    Terms of the Trade.

      The Perimeter.

      Border Routers.

      Firewalls.

      Intrusion Detection Systems.

      Intrusion Prevention Systems.

      Virtual Private Networks.

      Software Architecture.

      De-Militarized Zones and Screened Subnets.

    Defense in Depth.

      Components of Defense in Depth.

    Case Study: Defense in Depth in Action.

    Summary.

2. Packet Filtering.

    TCP/IP Primer: How Packet Filtering Works.

    TCP and UDP Ports.

    TCP’s Three-way Handshake.

    The Cisco Router as a Packet Filter.

    An Alternative Packet Filter: IPChains.

    The Cisco ACL.

      Rule Order.

      Cisco IOS Basics.

    Effective Uses of Packet-Filtering Devices.

      Filtering Based on Source Address: The Cisco Standard ACL.

    Egress Filtering.

    Tracking Rejected Traffic.

      Filtering by Port and Destination Address: The Cisco Extended ACL.

      The Cisco Extended ACL.

    Problems with Packet Filters.

      Spoofing and Source Routing.

      Fragments.

      Opening a “Hole” in a Static Packet Filter.

      Two-way Traffic and the established  Keyword.

      Protocol Problems: Extended Access Lists and FTP.

    Dynamic Packet Filtering and the Reflexive Access List.

      FTP Problems Revisited with the Reflexive Access List.

      Reflexive ACLs with UDP and ICMP Traffic: Clearing Up DNS Issues.

      Trouble in Paradise: Problems with Reflexive Access Lists.

      Cisco IPv6 Access Lists.

    Summary.

    References.

3. Stateful Firewalls.

    How a Stateful Firewall Works.

    The Concept of State.

      Transport and Network Protocols and State.

      Application-Level Traffic and State.

    Stateful Filtering and Stateful Inspection.

      Stateful Firewall Product Examples.

    Summary.

    References.

4. Proxy Firewalls.

    Fundamentals of Proxying.

    Pros and Cons of Proxy Firewalls.

      Advantages of Proxy Firewalls.

      Disadvantages of Proxy Firewalls.

    Types of Proxies.

      Web Proxies.

      Reverse Proxies.

      Anonymizing Proxies.

    Tools for Proxying.

      Firewall Toolkit (FWTK).

      SOCKS.

      Squid.

    Summary.

5. Security Policy.

    Firewalls Are Policy.

      Active Policy Enforcement.

      Unenforceable Policy.

    How to Develop Policy.

      Identify Risks.

      Communicate Your Findings.

      Create or Update the Security Policy as Needed.

      Determine Policy Compliance.

      Sound Out the Organization’s Rules and Culture.

      Elements of Policy.

      Hallmarks of Good Policy.

    Perimeter Considerations.

      Real-world Operations and Policy.

      Rules of the Road.

    Summary.

    References.

II. FORTIFYING THE SECURITY PERIMETER.

6. The Role of a Router.

    The Router as a Perimeter Device.

      Routing.

      Secure Dynamic Routing.

    The Router as a Security Device.

      The Router as a Part of Defense in Depth.

      The Router as a Lone Perimeter Security Solution.

    Router Hardening.

      Operating System.

      Locking Down Administration Points.

      SSH.

      The Console Port.

      TFTP and FTP.

      Configuration Management Tricks with TFTP and Scripts.

      Simple Network Management Protocol.

      Disable Unneeded Services.

      Configure NTP and NTP Authentication.

      Cisco TCP Keepalives Services.

      Unicast Reverse Path Forwarding.

      Internet Control Message Protocol Blocking.

      Spoofing and Source Routing.

      Router Logging.

      Automatic Securing and Auditing of Cisco Routers.

    Summary.

7. Virtual Private Networks.

    VPN Basics.

      Basic VPN Methodology.

    Advantages and Disadvantages of VPNs.

      Benefits of a VPN.

      Disadvantages of VPN.

    IPSec Basics.

      IPSec Protocol Suite.

      IKE.

      IPSec Security Protocols AH and ESP.

      IPSec Configuration Examples.

    Other VPN Protocols: PPTP and L2TP.

      PPTP.

      L2TP.

      Comparison of PPTP, L2TP, and IPSec.

      PPTP and L2TP Examples.

    Summary.

    References.

8. Network Intrusion Detection.

    Network Intrusion Detection Basics.

      The Need for Intrusion Detection.

      Anomaly Detection.

      Signature Detection.

      False Positives and False Negatives.

      Alerting, Logging, and Reporting.

      Intrusion Detection Software.

      Intrusion-Related Services.

    The Roles of Network IDS in a Perimeter Defense.

      Identifying Weaknesses.

      Detecting Attacks from Your Own Hosts.

      Incident Handling and Forensics.

      Complementing Other Defense Components.

    IDS Sensor Placement.

      Deploying Multiple Network Sensors.

      Placing Sensors Near Filtering Devices.

      Placing IDS Sensors on the Internal Network.

      Working with Encryption.

      Processing in High-traffic Situations.

      Configuring Switches.

      Using an IDS Management Network.

      Maintaining Sensor Security.

    Case Studies.

      Case Study 1: Simple Network Infrastructure.

      Case Study 2: Multiple External Access Points.

      Case Study 3: Unrestricted Environment.

    Summary.

9. Host Hardening.

    The Need for Host Hardening.

    Removing or Disabling of Unnecessary Programs.

      Controlling Network Services.

      Removing Extraneous Software Components.

    Limiting Access to Data and Configuration Files.

    Controlling User and Privileges.

      Managing Unattended Accounts.

      Protecting Administrative Accounts.

      Enforcing Strong Passwords.

      Controlling Group Membership.

    Maintaining Host Security Logs.

      Windows Logging and Auditing.

      UNIX Logging and Auditing.

    Applying Patches.

    Additional Hardening Guidelines.

      Automating Host-Hardening Steps.

      Common Security Vulnerabilities.

      Hardening Checklists.

    Summary.

10. Host Defense Components.

    Hosts and the Perimeter.

      Workstation Considerations.

      Server Considerations.

    Antivirus Software.

      Strengths of Antivirus Software.

      Limitations of Antivirus Software.

    Host-Based Firewalls.

      Firewalls for Workstations.

      Firewalls for Servers.

    Host-Based Intrusion Detection.

      The Role of Host-Based IDS.

      Host-Based IDS Categories.

    Challenges of Host Defense Components.

      Defense Components on Compromised Hosts.

      Controlling Distributed Host Defense Components.

    Summary.

    References.

11. Intrusion Prevention Systems.

    Rapid Changes in the Marketplace.

    What Is IPS?

      An IPS Must Be Fast.

      An IPS Must Keep State.

      An IPS Must Be Accurate and Up to Date.

      An IPS Must Have the Ability to Nullify an Attack.

    IPS Limitations.

      An Excuse to Ignore Sound Practice.

      An IPS Simply Buys You Time.

    NIPS.

      How Chokepoint NIPS Work.

      Switch-Type NIPS.

      Switch NIPS Deployment Recommendations.

    Host-Based Intrusion Prevention Systems.

      Real-world Defense Scenarios.

      Dynamic Rule Creation for Custom Applications.

      Monitoring File Integrity.

      Monitoring Application Behavior.

      HIPS Advantages.

      HIPS Challenges.

      More HIPS Challenges.

      HIPS Recommendations.

    Summary.

III. DESIGNING A SECURE NETWORK PERIMETER.

12. Fundamentals of Secure Perimeter Design.

    Gathering Design Requirements.

      Determining Which Resources to Protect.

      Determining Who the Potential Attackers Are.

      Defining Your Business Requirements.

    Design Elements for Perimeter Security.

      Firewall and Router.

      Firewall and VPN.

      Multiple Firewalls.

    Summary.

    References.

13. Separating Resources.

    Security Zones.

      A Single Subnet.

      Multiple Subnets.

    Common Design Elements.

      Mail Relay.

      Split DNS.

      Client Separation.

    VLAN-Based Separation.

      VLAN Boundaries.

      Jumping Across VLANs.

      Firewalls and VLANs.

      Private VLANs.

    Summary.

    References.

14. Wireless Network Security.

    802.11 Fundamentals.

    Securing Wireless Networks.

      Network Design.

      Wireless Encryption.

      Hardening Access Points.

      Defense in Depth for Wireless Networks.

    Auditing Wireless Security.

      Auditing the Wireless Network Design.

      Auditing Encryption.

    Case Study: Effective Wireless Architecture.

    Summary.

    References.

15. Software Architecture.

    Software Architecture and Network Defense.

      The Importance of Software Architecture.

      The Need to Evaluate Application Security.

    How Software Architecture Affects Network Defense.

      Firewall and Packet-Filtering Changes.

      Web Services and Interapplication Communications.

      Conflicts with Network Configuration.

      Encrypting Connections.

      Performance and Reliability.

      Atypical Operating System.

    Software Component Placement.

      Single-System Applications.

      Multitier Applications 

      Administrator Access to Systems.

      Applications for Internal Users Only.

    Identifying Potential Software Architecture Issues.

      Software Evaluation Checklist.

      Sources of Application Information.

      How to Handle an Unsecurable.

      Application.

    Software Testing.

      Host Security.

      Network Configuration and Security.

    Network Defense Design Recommendations.

    Case Study: Customer Feedback System.

      Deployment Locations.

      Architecture Recommendation.

    Case Study: Web-Based Online Billing Application.

      Deployment Locations.

      Architecture Recommendation.

    Summary.

      References.

16. VPN Integration.

    Secure Shell.

      Standard SSH Connections.

      SSH Tunnels.

    Secure Sockets Layer.

      SSL Standard Connections.

      SSL Tunnels.

      SSL Proxy Servers.

    Remote Desktop Solutions.

      Single Session.

      Multiple Session.

    IPSec.

      IPSec Client Integration.

      IPSec Server Integration.

      IPSec Perimeter Defense Adjustments.

      IPSec Architectures.

    Other VPN Considerations.

      Proprietary VPN Implementations.

      Compromised or Malicious VPN Clients.

    VPN Design Case Study.

      Case Study: Home Users and Multiple Applications.

    Summary.

    References.

17. Tuning the Design for Performance.

    Performance and Security.

      Defining Performance.

      Understanding the Importance of Performance in Security.

    Network Security Design Elements That Impact Performance.

      The Performance Impacts of Network Filters.

      Network Architecture.

      Case Studies to Illustrate the Performance Impact of Network Security Design Elements.

    Impact of Encryption.

      Cryptographic Services.

      Understanding Encryption at the Network and Transport Layers.

      Using Hardware Accelerators to Improve Performance.

      Case Studies to Illustrate the Performance Impact of Encryption.

    Using Load Balancing to Improve Performance.

      Problems with Load Balancing.

      Layer 4 Dispatchers.

      Layer 7 Dispatchers.

    Mitigating the Effects of DoS Attacks.

      ICMP Flooding.

      SYN Flooding.

    Summary.

    References.

18. Sample Designs.

    Review of Security Design Criteria.

    Case Studies.

      Case Study 1: Telecommuter Who Is Using a Broadband Connection.

      Case Study 2: A Small Business That Has a Basic Internet Presence.

      Case Study 3: A Small E-Commerce Site.

      Case Study 4: A Complex E-Commerce Site.

    Summary.

IV. MAINTAINING AND MONITORING PERIMETER SECURITY

19. Maintaining a Security Perimeter.

    System and Network Monitoring.

      Big Brother Fundamentals.

      Establishing Monitoring Procedures.

      Security Considerations for Remote Monitoring.

    Incident Response.

      Notification Options.

      General Response Guidelines.

      Responding to Malicious Incidents.

      Automating Event Responses.

    Accommodating Change.

      Fundamentals of Change Management.

      Implementing Change-Management Controls.

    Summary.

    References.

20. Network Log Analysis.

    The Importance of Network Log Files.

      Characteristics of Log Files.

      Purposes of Log Files.

    Log Analysis Basics.

      Getting Started with Log Analysis.

      Automating Log Analysis.

      Timestamps.

    Analyzing Router Logs.

      Cisco Router Logs.

      Other Router Logs.

    Analyzing Network Firewall Logs.

      Cisco PIX Logs.

      Check Point FireWall-1 Logs.

      IPTables Logs.

    Analyzing Host-Based Firewall and IDS Logs.

      ZoneAlarm.

      Norton Personal Firewall.

    Summary.

21. Troubleshooting Defense Components.

    The Process of Troubleshooting.

      Collecting Symptoms.

      Reviewing Recent Changes.

      Forming a Hypothesis.

      Testing the Hypothesis.

      Analyzing the Results.

      Repeating If Necessary.

    Troubleshooting Rules of Thumb.

      Make Only One Change at a Time.

      Keep an Open Mind.

      Get a Second Opinion.

      Stay Focused on Fixing the Problem.

      Don’t Implement a Fix That Further Compromises Your Security.

      The Obvious Problems Are Often Overlooked.

      Document, Document, Document!.

    The Troubleshooter’s Toolbox.

      Application Layer Troubleshooting.

      Other Useful Utilities.

      Transport Layer Troubleshooting.

      Network Layer Troubleshooting.

      Link Layer Troubleshooting.

    Summary.

    References.

22. Assessment Techniques.

    Roadmap for Assessing the Security of Your Network.

    Planning.

    Reconnaissance.

    Network Service Discovery.

      System Enumeration.

      Service Discovery.

    Vulnerability Discovery.

      Nessus.

      ISS Internet Scanner.

      Retina.

      LANguard.

      Vulnerability Research.

    Verification of Perimeter Components.

      Preparing for the Firewall Validation.

      Verifying Access Controls.

    Remote Access.

      Wardialing.

      Wardriving.

      VPNs and Reverse Proxies.

    Exploitation.

    Results Analysis and Documentation.

    Summary.

23. Design Under Fire.

    The Hacker Approach to Attacking Networks.

    Adversarial Review.

    GIAC GCFW Student Practical Designs.

      Practical Design 1.

      Practical Design 2.

    Summary.

    References.

24. A Unified Security Perimeter: The Importance of Defense in Depth.

    Castles: An Example of Defense-in-Depth Architecture.

      Hard Walls and Harder Cannonballs.

      Secret Passages.

      Hiding in the Mist.

      Defense on the Inside.

    Absorbent Perimeters.

      Honeypots.

      Rate Limiting.

      Failover.

    Defense in Depth with Information.

      The Problem of Diffusion.

      Cryptography and Defense in Depth.

    Summary.

V. APPENDIXES

Appendix A. Cisco Access List Sample Configurations.

    Complete Access List for a Private-Only Network.

    Complete Access List for a Screened Subnet Network That Allows Public Server Internet Access.

      Example of a Router Configuration as Generated by the Cisco Auto Secure Feature.

Appendix B. Crypto 101.

    Encryption Algorithms.

      Shared Key: Symmetric.

      Public—Private Key: Asymmetric.

      Digital Signatures and Hash Algorithms.

    References.

Index.

Updates

Submit Errata

More Information

ONE MONTH ACCESS!

WITH PURCHASE


Get unlimited 30-day access to thousands of Books & Training Videos about technology, professional development and digital media If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months.