Chapter 11: Secure Network Architecture & Securing Network Components
Know the OSI model layers and which protocols are found in each
- The seven layers, and the protocols supported by each, are as follows:
- Application: HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC and SET
- Presentation: Encryption protocols & format types, such as ASCII, EBCDIC, TIFF, JPEG, MPEG and MIDI.
- Session: NFS, SQL and RPC.
- Transport: SPX, SSL, TLS, TCP and UDP
- Network: ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT and SKIP.
- Data Link: SLIP, PPP, ARP, L2F, L2TP, PPTP, FDDI, ISDN.
- Physical: EIA/TIA-232, EIA-TIA-449, X.21, HSSI, SONET, V.24 and V.35.
- Mnemonics: All People Seem To Need Domino’s Pizza (7-1), Please Do Not Throw Sausage Pizza Away (1-7)
Have a thorough knowledge of TCP/IP
- Know the difference between TCP & UDP.
- Be familiar with the four TCP/IP layers and how they correspond to the OSI model:
- Application (OSI Layers 5-7: Session, Presentation & Application)
- Transport (OSI Layer 4: Transport)
- Internet (OSI Layer 3: Network)
- Link (OSI Layers 1-2: Physical & Data Link)
Know the different cabling types, their lengths and maximum throughput rates (TODO)
- This includes:
- STP
- 10BaseT (UTP)
- 10Base2 (thinnet)
- 10Base5 (thicknet)
- 100BaseT
- 1000BaseT
- Fibre-optic
- You should also be familiar with UTP categories 1 to 7.
Be familiar with the common LAN technologies [TODO]
- The most common LAN technology is Ethernet
- Also be familiar with:
- analog vs digital comms
- synchronous vs asynchronous comms
- baseband vs broadband comms
- broadcast, multicast & unicast comms
- CSMA, CSMA/CA and CSMA/CD [TODO]
- token passing [TODO]
- polling [TODO]
Understand secure network architecture & design
- Network security should take into account:
- IP and non-IP protocols
- network access control
- using security services & devices
- managing multilayer protocols
- implementing endpoint security
Understand the various types & purposes of network segmentation
- Network segmentation can be used to manage traffic, improve performance and enforce security.
- Examples of network segmentations or sub-networks include intranet, extranet & DMZ.
Understand the different wireless technologies
- Mobile phones, Bluetooth (802.15) and Wi-Fi (802.11) are all called wireless technologies, even though they are very different. Be aware of their differences, strengths & weaknesses.
- Understand 802.11, a, b, g, n and ac:
- Original 802.11 (2 Mbps)
- 802.11a (54 Mbps)
- 802.11b (11 Mbps)
- 802.11g (54 Mbps)
- 802.11n (600 Mbps)
- 802.11ac (1+ Gbps)
- The 802.11 standard also defines WEP.
- TKIP (Temporal Key Integrity Protocol) was designed as the replacement for WEP without requiring replacement of legacy wireless hardware. TKIP was implemented as WPA (Wi-Fi Protected Access).
- 802.11i defines WPA2: a new encryption scheme known as the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), which uses AES-128 encryption.
- A captive portal is an authentication technique that redirects a newly-connected wireless Web client to a portal access control page.
- Understand the basics of securing 802.11 networking
- disabling SSID broadcast and/or changing the SSID to something unique
- enabling MAC filtering
- considering the use of static IPs or DHCP reservations
- enabling the highest supported version of encryption
- treating wireless as remote access and employing 802.1x, RADIUS or TACACS
- separating WAPs from the LAN with firewalls
- monitoring all wireless activity with an IDS
- consider requiring wireless clients to connect with a VPN to gain LAN access
Understand Fibre Channel
- Fibre Channel is a form of network data storage solution – i.e. SAN (storage area network)/NAS (network-attached storage) – that allows for high-speed file transfers.
- FCoE (Fibre Channel over Ethernet) is used to encapsulate Fibre Channel communications over Ethernet networks.
Understand iSCSI
- iSCSI (Internet Small Computer System Interface) is a network storage standard based on IP.
Understand EAP, PEAP & LEAP
- EAP (Extensible Authentication Protocol) is an authentication framework rather than a specific mechanism of authentication.
- Effectively, EAP allows for new authentication technologies to be compatible with existing wireless or point-to-point connection techniques.
- PEAP (Protected EAP) encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption.
- LEAP (Lightweight EAP) is a Cisco proprietary alternative to TKIP for WPA. This was developed to address deficiences in TKIP before the 802.11i (WPA2) system was ratified as a standard.
Understand MAC filtering
- A MAC filter is a list of authorised wireless client interface MAC addreses that is used by a WAP to block access to all non-authorised devices.
Understand SSID broadcast
- Wireless networks traditionally announce their SSID on a regular basis within a special packet known as the beacon frame.
- When the SSID is broadcast, any device with an automatic detect & connect feature is not only able to see the network, but can also initiate a connection with it.
Understand antenna types
- A wide variety of antenna types can be used for wireless clients and base antennas.
- These include:
- omni-directional pole antennas
- directional antennas such as Yagi, cantenna, panel & parabolic
Know the standard network topologies
- These are:
- ring
- bus
- star
- mesh.
Know the common network devices
- Common network devices are:
- firewalls
- routers
- bridges
- modems
- repeaters
- switches
- gateways
- proxies.
Understand the different types of firewalls
- There are several types of firewalls:
- Static packet filtering: First-gen. Operates at L3.
- Application-level gateway: Second-gen. Operates at L7.
- Circuit-level gateway: Also second-gen. Operates at L5. Example: SOCKS proxy
- Stateful inspection (aka dynamic packet filtering): Third gen. Operates at L3 & L4.
- Deep packet inspection: Typically operates at Application layer (L7). Often integrated with app-layer and/or stateful inspection firewalls
- Next-gen: Multi-function device which can include IDS/IPS, TLS/SSL proxy, web filtering, QoS, NAT, VPN anchoring etc.
Know the protocol services used to connect to LAN & WAN communication technologies (TODO)
- These are:
- Frame Relay
- SMDS
- X.25
- ATM
- HSSI
- SDLC
- HDLC
- ISDN
Understand problems with cabling, and their countermeasures
- Attentuation: ensure that you don’t exceed length recommendations (otherwise use repeaters)
- Using the wrong category of cable: check the cable specifications against throughput requirements, and err on the side of caution
- Crosstalk: use shielded cables, place cables in separate conduits, or use cables of higher twists per inch
- Cable breaks: avoid running cables in locations where movement occurs
- Interference: use cable shielding, cables with higher twists per inch, or switch to fibre-optic.
- Eavesdropping: maintain physical security over all cable runs
TODO: OFDM, DSSS etc
- Frequency Hopping Spread Spectrum (FHSS)
- Direct Sequence Spread Spectrum (DSSS)
- Orthogonal Frequency-Division Multiplexing (OFDM(