Building Up Network Security: An Introduction

72
Building Up Network Security Catherine Paquet, MBA (MIS) CCSI, CICSI, CCNP Sec, CCNP R&S

Transcript of Building Up Network Security: An Introduction

Page 1: Building Up Network Security: An Introduction

Building Up Network SecurityCatherine Paquet, MBA (MIS)

CCSI, CICSI, CCNP Sec, CCNP R&S

Page 2: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 2

About the presenter - Catherine Paquet

Cisco security instructorCisco Press authorCisco Systems emerging

countries guest speakerGraduate of Royal Military

College and York UniversityPreviously: DND WAN ManagerLives in Toronto

Page 3: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 3

Topics: Building Up Network Security

Current state of Network SecurityFirewall IPS and Sourcefire Identity Services and Cisco ISENetwork Access ControlGuest Services and BYODProfiling and PosturingVPN and Site-to-SiteRemote Access VPN and AnyConnectEmail and Web Security

Page 4: Building Up Network Security: An Introduction

State of Network Security

FactsEvolution

ROSITopology

Page 5: Building Up Network Security: An Introduction

Facts

Page 6: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 6

Cisco Annual Security Report 2015: Findings

Users unknowingly aiding cyber attacksEmail exploits

250% increase in spam and malvertising exploitsSnowshoe Spam: low volumes of email from a large set of IP addresses

Web exploitsLess common kits usedMalicious combinations: exploit over two files ex: flash + javascript

Source: www.cisco.com/go/securityreport

Page 7: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 7

Cisco Annual Security Report 2015 - Actions

Security must:support the businesswork with existing architecture – and be usablebe transparent and informativeenable visibility and appropriate actionbe viewed as a "people problem"

Source: www.cisco.com/go/securityreport

Page 8: Building Up Network Security: An Introduction

Evolution of Security Philosophy

Page 9: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 9

Recent Shift in Security Approach

Past → role-based control

Present → rule-based control

CONTEXT

Who, What, Where, When, How

Page 10: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 10

CONTEXT IS EVERYTHING

Who: Jane Doe, member of the sales groupWhat: Corporate laptopWhere: HQ 2nd floorWhen: July 16th, 2016 at 13:27How: Wired Ethernet with 802.1X

IF….., THEN….., and sometimes, ELSE…...

User CustomLocationDevice Type TimePosture Access Method

Page 11: Building Up Network Security: An Introduction

Terminology

Page 12: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 12

Glossary

AAA: Authentication, Authorization, Accounting

AD: Active Directory

AES: Advanced Encryption Standard

AMP: Advanced Malware Protection

AP: Access Point

ASA: Adaptive Security Appliance (firewall)

BYOD: Bring Your Own Device

CDA: Cisco Directory Agent

CWA: Centralized Web Authentication

DES: Digital Encryption Standard

DHCP: Dynamic Host Configuration Protocol

DMZ: Demilitarized Zone

DART: Diagnostic And Reporting Tool AnyConnect

DC: Domain Controller

ESA: Email Security Appliance

FSMC: FireSIGHT Mgmt Center (formerly SFDC)

IDS: Intrusion Detection System

IP: Internet Protocol

IPS: Intrusion Prevention System

ISE: Identity Services Engine

ISR: Integrated Services Router

LAN: Local Area Network

LDAP: Light Directory Access Protocol

MAB: MAC Authentication Bypass

MAC: Media Access Control

Malvertising: Malware hidden in advertisement

MD5: Message Digest 5

MDM: Mobile Device Management

NAC: Network Admission Control

NAD: Network Access Device

NIC: Network Interface Card

NGFW: Next Generation Firewall

NGIPS: Next Generation IPS

PKI: Public Key Infrastructure

RADIUS: Remote Authentication Dial-In User Service

ROI: Return on Investment

ROSI: Return on Security Investment

SaaS: Security-as-a-Service

SAML: Security Assertion Markup Language

SSID: Service Set Identifier

SF: Sourcefire

SFDC: Sourcefire Defense Center

SHA: Secure Hash Algorithm

SIO: Security Intelligence Operations (Cisco)

SSL: Secure Session Layer

SYN: Synchronization flag and stage of TCP

TALOS: Cisco SIO + Sourcefire VRT

TCP: Transmission Control Protocol

VPN: Virtual Private Network

VRT: Vulnerability Research Team (Sourcefire)

WAN: Wide Area Network

WLAN: Wireless Local Area Network

WLC: Wireless LAN controller

WMI: Windows Management Instrumentation

WSA: Web Security Appliance

Page 13: Building Up Network Security: An Introduction

Security Roadmap

Topology

Page 14: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 14

Page 15: Building Up Network Security: An Introduction

Firewall

Page 16: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 16

Most Bang for Your Buck: The Firewall

Basic Moderate Comprehensive

Security Expenditure

Ris

k

$

} residual risk

More on the subject of synergistic controls:Business Case for Network Security, The: Advocacy, Governance, and ROIBy Catherine Paquet, Cisco Press, 2005. ISBN ISBN-10: 1-58720-121-6

Page 17: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 17

Page 18: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 18

ASA Firewall Capabilities

Stateful Firewall with AIC Botnet detection IPS built in capability with service module SYN flood protection Scanning threat detection and prevention Decryption and inspection of specific protocols Modular Policy Framework Remote-Access VPN: IPsec and SSL Site-to-Site VPN Identity-Based Firewall

DHCP server and client Dynamic Routing Static Route Tracking Transparent and Routed modes Redundant interfaces EtherChannel Multimode aka virtualization Clustering Strong management with AAA OOB Management Failover Zero Downtime Upgrade

Page 19: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 19

Page 20: Building Up Network Security: An Introduction

Intrusion Prevention Systems

Sourcefire

Page 21: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 21

Page 22: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 22

Sourcefire Acquisition

Mid-2013$2.7BHardware and softwareBased on Snort IPSFile thumbprints, sandboxingProtection beyond point-in-timeVisibility through dashboardsAnalysis of behavioursContainment

Martin Roesch created Snort, on open-based IDS, in 1998 and founded Sourcefire in 2001

Page 23: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 23

Integrated and Standalone Platforms

AMP applianceASA moduleESAWSACWSAMPfire (Desktop: AnyConnect 4.1 AMP Enabler)

Cisco AMP 8140 (hardware)

Cisco WSA with AMP (software)

HQ-ASA# show module sfr details Getting details from the Service Module, please wait... Card Type: FirePOWER Services Software ModuleModel: ASA5515Hardware version: N/ASerial Number: FCH180278XU

Cisco ASA with Sourcefire (software)

Page 24: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 24

The Sourcefire Advantage

AMP* everywhere, with real before, during, after

* Advanced Malware Protection

Page 25: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 25

Sourcefire Visibility and Management

FireSIGHT Management Center*

* formerly Sourcefire Defense Center

Page 26: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 26

Network File Trajectory

Page 27: Building Up Network Security: An Introduction

Identity Services

ISE

Page 28: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 28

Page 29: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 29

ISE Capabilities

Authentication*802.1XMABWeb Authentication

Authorization*Guest Services

BYODMDM

ProfilingPosturingCA server

ISE

Source: Cisco Blog > Security> BYOD Presentations at Cisco Live Cancun 2012* ISE is a RADIUS server

Page 30: Building Up Network Security: An Introduction

Network Access Control

802.1X / MABWeb Authentication

Page 31: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 31

Page 32: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 32

Authentication and Authorization: ISE RADIUS server

ISE

Page 33: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 33

802.1X / MAB Authentication

Page 34: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 34

Centralized Web Authentication

Source: Cisco Identity Services Engine User Guide, Release 1.2

Page 35: Building Up Network Security: An Introduction

Guest Services and BYOD

Page 36: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 36

Page 37: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 37

Guest Services

Page 38: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 38

Guests: Access to Internet

ISE

Page 39: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 39

BYOD: For employees not visitors

Source: Cisco SISE 1.1 Courseware

Before BYOD:

With BYOD - Onboarding:

ISE recognizes that an employee authenticated on AD through Guest Portal1. CA Certificate installation2. Device Registration3. Certificate Enrollment4. WIFI Profile installation

Page 40: Building Up Network Security: An Introduction

Profiling and Posturing

Page 41: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 41

Page 42: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 42

Advantages of Profiling

Discover and locate endpoints Maintain a learnt inventoryDetermine endpoint capabilities and identity group

Attributes are used in authentication and authorization conditions

Source: Cisco SISE 1.1 courseware

Page 43: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 43

Profiling

If Device: Apple-iPad, then apply Authorization Policies: TabletsSource: Cisco SISE 1.1 courseware

Page 44: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 44

Profiling Results: Endpoints database in ISE

Page 45: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 45

Page 46: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 46

ISE Posturing policies

Provisioning

Posturing

Page 47: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 47

MDM: Posturing for Mobile Devices

Source: Cisco Identity Services Engine Administrator Guide, Release 1.4

Page 48: Building Up Network Security: An Introduction

VPN

Site-to-Site

Page 49: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 49

VPN

Confidentiality: EncryptionAES3DES

Integrity: HashingMD5SHA

Authenticity: Authentication Pre-shared KeyPKI

Page 50: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 50

VPN

Site-to-Site

Remote Access IPsec

SSL Client

Clientless

Client VPN Client (legacy)

AnyConnect

Port Forwarding

Plug-ins

Smart Tunnels

Thin client

IPsec*

** AnyConnect 3.x offers IPSec IKEv2

* On Cisco Routers, Site-to-Site VPN can also be achieved with DMVPN and GET

IKEv2

VPN Technologies

Page 51: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 51

Page 52: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 52

Site-to-Site VPN

Source: Cisco SIMOS courseware

Page 53: Building Up Network Security: An Introduction

Remote-Access VPN

AnyConnect

Page 54: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 54

VPN

Site-to-Site

Remote Access IPsec

SSL Client

Clientless

Client VPN Client (legacy)

AnyConnect

Port Forwarding

Plug-ins

Smart Tunnels

Thin client

IPsec*

** AnyConnect 3.x offers IPSec IKEv2* On Cisco Routers, Site-to-Site VPN can also be achieved with DMVPN and GET

IKEv2

VPN Technologies

Page 55: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 55

Page 56: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 56

What comes to mind when you hear AnyConnect?

SSL VPN IPsec

AnyConnect replaces: VPN Client Secure Services Client AnyWhere+ NAC Agent

Host Scan Phone Home DART AMP*

Cloud Web Security

Network Access Manager

ISE Posture NEW: next slide

* Released with AnyConnect 4.1

Page 57: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 57

AnyConnect for ISE Posture

No need for NAC client anymore

Page 58: Building Up Network Security: An Introduction

Email and Web Security

Page 59: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 59

Cisco and Email/Web Security

Cisco is not commonly known for a focus on proxies

In 2007, Cisco paid $830M for IronPort Application Security Gateways:Email Security ApplianceWeb Security Appliance

Page 60: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 60

The Artist Formerly Known as: Ironport

So, why paying so much for server?SenderBase – Reputation Score

SensorBase

SIO

TALOS

Page 61: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 61

Page 62: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 62

Hygiene Pipeline of Cisco ESA

Source: Cisco SESA 2.1 courseware

Page 63: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 63

Page 64: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 64

Web Security

Old adage: HTTP is the new TCP Many applications and services now run overtop HTTP and HTTPS

Filtering and inspecting web traffic is becoming a requirement:CompliancePeace of mind

Page 65: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 65

WSA Acceptable Usage Policies

URL filteringAnti-malware securityBandwidth controlsApplication controls

Identity-based securityHTTPS inspectionData Loss protectionSaaS Access Control

Page 66: Building Up Network Security: An Introduction

Q & A

Page 67: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 67

Page 68: Building Up Network Security: An Introduction

Conclusion

Page 69: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 69

Cisco Security Courses

CCNA Security e-Camp IINS - Implementing Cisco IOS Network Security SAEXS - Cisco ASA Express Security SENSS - Implementing Cisco Edge Network Security

Solutions SIMOS - Implementing Cisco Secure Mobility

Solutions SISAS - Implementing Cisco Secure Access

Solutions SITCS - Implementing Cisco Threat Control Solution

ASA Lab Camp v9.0 SASAA - Implementing Advanced Cisco ASA Security SASAC - Implementing Core Cisco ASA Security ACS - Cisco Secure Access Control System SISAS - Implementing Cisco Secure Access

Solutions

SISE - Implementing and Configuring Cisco Identity Services Engine

SESA - Securing Email with Cisco Email Security Appliance

SWSA - Securing the Web with Cisco Web Security Appliance

Cisco FirePOWER Services and Cloud Web Security Workshop v1.0

SSFAMP - Securing Cisco Networks with Sourcefire FireAMP Endpoints

SSFIPS - Securing Cisco Networks with Sourcefire Intrusion Prevention System

SSFRULES - Securing Cisco Networks with Snort Rule Writing Best Practices

SSFSNORT - Securing Cisco Networks with Open Source Snort

Page 71: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 71

GK Cisco Training Exclusives

6 months of Anytime access to Cisco Practice Labs Anytime Access to Boson Practice Exams On-Demand Access to Searchable Class Recordings of Your Virtual Class Unlimited Retakes of Your Class Free Cisco Certification Exam Voucher

Page 72: Building Up Network Security: An Introduction

© Global Knowledge Training LLC. All rights reserved. 04/15/2023 Page 72

Find Out More

www.globalknowledge.ca

On-demand & live webinars, white papers, blog...

www.globalknowledge.ca/security

Courses