The intent of the cheat sheets in this appendix is to provide the reader with quick supplemental information and quick reference of concepts that are covered in this book. Refer to Chapter 3, “Security Technology and Related Equipment,” for more detailed technical explanations and the Cisco website (http://www.cisco.com) for more comprehensive information.
This appendix contains cheat sheets for the following topics:
• Cheat Sheet 1: Routers
• Cheat Sheet 2: Hubs and Switches
• Cheat Sheet 3: Perimeter Routers and Firewalls
• Cheat Sheet 4: Intrusion-Detection Systems
• Cheat Sheet 5: Virtual Private Networks and Authentication
• Cheat Sheet 6: Comprehensive Security Topology
Routers perform the following tasks:
• Segment logical networks at the IP layer
• Route IP traffic (IP packets) according to routing information kept in their router tables
• Build routing tables manually or, usually, automatically by using routing protocols that exchange routing information between neighboring routers
• Usually keep only optimal paths in their routing tables
R1 Routing table
Network 192.168.1.0 directly connectedout Ethernet 0
Network 192.168.5.0 directly connectedout Ethernet 1
Network 192.168.7.0 via Router 2out Ethernet 1
Network 192.168.14.0 via Router 5out Ethernet 3
Network 192.168.44.0 directly connectedout Ethernet 2
Network 192.168.93.0 via Router 2out Ethernet 1
via Router 4out Ethernet 2
Network 192.168.136.0 via Router 4out Ethernet 2
Network 192.168.229.0 directly connectedout Ethernet 3
For more information regarding hubs and other LAN devices, visit http://www.cisco.com.
• A hub is a physical layer device that connects multiple user stations, servers, and network equipment.
• Devices connect to the hub through dedicated cable, often referred to as network cable or patch cable (which usually connects to a network drop installed in a wall socket).
• Electrical interconnections are established inside the hub.
• Electrical signals emitted from one station are propagated to all stations connected in the same hub.
• Network bandwidth is shared among all devices connected to the hub.
• A wireless hub is also known as a wireless access point.
• A wireless hub operates under the same principle as a wired hub by receiving a signal and propagating it out.
• A LAN switch segments communication between devices of the same physical network, contrary to a hub, which indiscriminately repeats signals to all members of the same physical network.
• For the most part, switches have replaced hubs in wiring closets.
• Network bandwidth is dedicated to each station connected directly to the switch.
• Modern switches are more versatile and accomplish more tasks than the physical segmentation work done by their predecessors.
For more information on LAN switches, visit http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/lanswtch.htm#xtocid2.
For more information regarding perimeter routers and firewalls, refer to Chapter 3.
• The first line of defense
• Performs the following basic security checks:
– Validates source and destination IP addresses on incoming and outgoing network traffic
– By default, performs stateless packet filtering and therefore is easier to hack than a stateful firewall
Some perimeter routers can be upgraded to perform as stateful firewalls. Those upgraded routers/firewalls can also terminate VPN tunnels and perform some IDS tasks. Routers with these extra capabilities are often used by branch offices.
• A firewall is a network appliance dedicated to the meticulous filtering of all network traffic.
• Stateful firewalls meticulously record pertinent information of data streams transiting through it to permit or deny access.
• Default behavior dictates that traffic originating from the outside is denied access.
• Default behavior dictates that traffic originating from the inside is allowed out and that replies are permitted in.
• A firewall can be configured to modify its default behavior, for example, to let incoming outside traffic in, provided that the destination address is the corporate web server and only for the purpose of browsing the corporate web server. However, a hacker’s traffic trying to access the internal network is blocked by the firewall.
• A firewall is commonly configured to perform Network Address Translation (NAT), where inside addresses are never revealed to the outside network.
• NAT translates internal addresses (local addresses) to addresses used only when communicating on the Internet (global addresses).
• NAT is commonly configured on firewalls and perimeter routers.
• NAT provides additional security, because the true addresses of devices are not publicly known.
For more information regarding intrusion-detection systems (IDSs) and intrusion-prevention systems (IPSs), refer to Chapter 3.
• IDSs analyze data streams in real time to detect attacks and viruses.
• A network-based IDS (NIDS) is located on the net-work and analyzes traffic for malicious activities.
• A host-based IDS (HIDS) is installed on a server or workstation and analyzes incoming data for malicious codes.
Upon discovering suspicious activities, an IDS can do the following:
• Logs an alarm
• Resets the IP (TCP) connection
• Blocks (shuns) further traffic from the suspect
• Informational
• Medium
• Low
• High
An IDS analyzes traffic according to the following items:
• Signature—Looks for a match of a data string according to an attack definition database (similar to standard virus-detection software)
• Pattern—Learns what is normal traffic and then analyzes future traffic according to the previously created baseline
• IDS Device Manager—Configures sensors and is the central repository of alarms
• IDS sensor—Captures and analyzes traffic in real time
• Stealth—Captures data without having a logical participation on the network
• Command and control—Announces suspicious activities that were detected as a result of data captured by the stealth interface
Alarms, defined in the following table, are classified as follows:
• True-negative
• False-negative
• True-positive
• False-positive
For more information regarding Virtual Private Networks (VPNs) and authentication, refer to Chapter 3.
A VPN allows data to be sent securely over public networks, such as the Internet, through secure encrypted tunnels.
VPN tunnels from remote offices and telecommuters commonly terminate on VPN concentrators, which are dedicated appliances optimized for this task.
VPN and network security are better served when strong authentication is used.
Money withdrawn from a bank machine requires strong authentication, as follows:
• Something you have: bank card
• Something you know: PIN
IPSec is currently the most readily available VPN protocol. It provides the following features:
• Authenticity through authentication
• Confidentiality through encryption
• Integrity through hashing (integrity checking)
Ideally, encrypting traffic originating from a remote office or a telecommuter would be permitted access through a firewall, terminating at the VPN concentrator.
Strong authentication refers to a minimum two-factor process, where the two methods must be used jointly.
For more information regarding the equipment listed in this figure, refer to Chapter 3.
18.118.210.133