CCNA Security: Chapter Five Implementing Intrusion Prevention

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 23

CCNA Security

Chapter Five
Implementing Intrusion Prevention

© 2009 Cisco Learning Institute. 1


Major Concepts

• Describe the purpose and operation of network-


based and host-based Intrusion Prevention
Systems (IPS)
• Describe how IDS and IPS signatures are used
to detect malicious network traffic
• Implement Cisco IOS IPS operations using CLI
and SDM
• Verify and monitor the Cisco IOS IPS operations
using CLI and SDM

© 2009 Cisco Learning Institute. 2


Common Intrusions

MARS
ACS
VPN
Zero-day exploit
Remote Worker attacking the network
Firewall

VPN

VPN Iron Port


Remote Branch LAN
CSA

Web Email
Server Server DNS

© 2009 Cisco Learning Institute. 3


Intrusion Detection Systems (IDSs)

1. An attack is launched on a network


that has a sensor deployed in
promiscuous IDS mode; therefore
copies of all packets are sent to
the IDS sensor for packet analysis.
However, the target machine will Switch
experience the malicious attack.
1
2. The IDS sensor, matches the
malicious traffic to a signature and
sends the switch a command to 2
deny access to the source of the
malicious traffic.
Sensor
3. The IDS can also send an alarm to
a management console for logging 3
and other management purposes.

Management Target
Console
© 2009 Cisco Learning Institute. 4
Intrusion Prevention Systems (IPSs)

1
1. An attack is launched on a network
that has a sensor deployed in IPS
mode (inline mode).
2. The IPS sensor analyzes the
packets as they enter the IPS
sensor interface. The IPS sensor
matches the malicious traffic to a 2
signature and the attack is stopped Sensor
4
immediately.
3. The IPS sensor can also send an
alarm to a management console for
logging and other management Bit Bucket
purposes.
4. Traffic in violation of policy can be 3
dropped by an IPS sensor.

Target
Management
Console
© 2009 Cisco Learning Institute. 5
Common characteristics of
IDS and IPS

 Both technologies are deployed using sensors.


 Both technologies use signatures to detect
patterns of misuse in network traffic.
 Both can detect atomic patterns (single-
packet) or composite patterns (multi-packet).

© 2009 Cisco Learning Institute. 6


Comparing IDS and IPS Solutions

Advantages Disadvantages
 Response action cannot
 No impact on network stop trigger packets
Promiscuous Mode

(latency, jitter)  Correct tuning required for


 No network impact if there is a response actions
IDS

sensor failure  Must have a well thought-


 No network impact if there is out security policy
sensor overload  More vulnerable to network
evasion techniques

© 2009 Cisco Learning Institute. 7


Comparing IDS and IPS Solutions

Advantages Disadvantages
 Sensor issues might affect
network traffic
Inline Mode

 Sensor overloading
 Stops trigger packets
impacts the network
IPS

 Can use stream normalization


 Must have a well thought-
techniques
out security policy
 Some impact on network
(latency, jitter)

© 2009 Cisco Learning Institute. 8


Network-Based Implementation

CSA MARS

VPN

Remote Worker
Firewall

VPN
IPS

CSA

VPN Iron Port


Remote Branch CSA
CSA
CSA

Web Email
Server Server DNS

© 2009 Cisco Learning Institute. 9


Host-Based Implementation

CSA

CSA MARS

VPN Management Center for

Remote Worker Cisco Security Agents

Firewall

VPN
IPS

CSA

VPN
Agent
Iron Port
Remote Branch CSA
CSA
CSA CSA
CSA
CSA

Web Email
Server Server DNS

© 2009 Cisco Learning Institute. 10


Cisco Security Agent

Corporat
e
Network Application
Server
Agent Agent
Firewall
Untruste
d
Network
Agent Agent Agent Agent

SMTP Agent Agent Agent


Serve
r Web DNS
Server Server
Management Center
for Cisco Security
Agents
video

© 2009 Cisco Learning Institute. 11


Cisco Security Agent Screens

A warning message appears


when CSA detects a Problem.

CSA maintains a log file


allowing the user to
verify problems and
A waving flag in the learn more information.
system tray indicates
a potential security
problem.

© 2009 Cisco Learning Institute. 12


Host-Based Solutions
Advantages and Disadvantages of HIPS

Advantages Disadvantages
 The success or failure of an  HIPS does not provide a
attack can be readily complete network picture.
determined.
 HIPS has a requirement to
 HIPS does not have to worry support multiple operating
about fragmentation attacks systems.
or variable Time to Live (TTL)
attacks.
 HIPS has access to the traffic
in unencrypted form.

© 2009 Cisco Learning Institute. 13


Network-Based Solutions

Corporate
Network

Sensor Firewall
Router
Untruste
d
Network
Sensor

Management
Server Sensor

Web DNS
Server Server

© 2009 Cisco Learning Institute. 14


Cisco IPS Solutions
AIM and Network Module Enhanced

• Integrates IPS into the Cisco 1841 (IPS AIM only), 2800 and 3800
ISR routers
• IPS AIM occupies an internal AIM slot on router and has its own
CPU and DRAM
• Monitors up to 45 Mb/s of traffic
• Provides full-featured intrusion protection
• Is able to monitor traffic from all router interfaces
• Can inspect GRE and IPsec traffic that has been decrypted at the
router
• Delivers comprehensive intrusion protection at branch offices,
isolating threats from the corporate network
• Runs the same software image as Cisco IPS Sensor Appliances

© 2009 Cisco Learning Institute. 15


Cisco IPS Solutions
ASA AIP-SSM

• High-performance module designed to provide additional


security services to the Cisco ASA 5500 Series Adaptive
Security Appliance
• Diskless design for improved reliability
• External 10/100/1000 Ethernet interface for management
and software downloads
• Intrusion prevention capability
• Runs the same software image as the Cisco IPS Sensor
appliances

© 2009 Cisco Learning Institute. 16


Cisco IPS Solutions
4200 Series Sensors

• Appliance solution focused on protecting network


devices, services, and applications
• Sophisticated attack detection is provided.

© 2009 Cisco Learning Institute. 17


Cisco IPS Solutions
Cisco Catalyst 6500 Series IDSM-2

• Switch-integrated intrusion protection module


delivering a high-value security service in the
core network fabric device
• Support for an unlimited number of VLANs
• Intrusion prevention capability
• Runs the same software image as the Cisco IPS
Sensor Appliances

© 2009 Cisco Learning Institute. 18


IPS Sensors

• Factors that impact IPS sensor selection and


deployment:
- Amount of network traffic
- Network topology
- Security budget
- Available security staff
• Size of implementation
- Small (branch offices)
- Large
- Enterprise

© 2009 Cisco Learning Institute. 19


Comparing HIPS and Network IPS

Advantages Disadvantages
 Is host-specific  Operating system
dependent
 Protects host after decryption
HIPS  Lower level network events
 Provides application-level
not seen
encryption protection
 Host is visible to attackers
 Is cost-effective  Cannot examine encrypted
traffic
 Not visible on the network
 Does not know whether an
Network  Operating system attack was successful
IPS independent
 Lower level network events
seen

© 2009 Cisco Learning Institute. 20


Signature Characteristics

• An IDS or IPS sensor


Hey, come look
at this. This matches a signature with
looks like the
signature of a a data flow
LAND attack.

• The sensor takes action


• Signatures have three
distinctive attributes
- Signature type
- Signature trigger
- Signature action

© 2009 Cisco Learning Institute. 21


Signature Types

• Atomic
- Simplest form
- Consists of a single packet, activity, or event
- Does not require intrusion system to maintain state information
- Easy to identify
• Composite
- Also called a stateful signature
- Identifies a sequence of operations distributed across multiple
hosts
- Signature must maintain a state known as the event horizon

© 2009 Cisco Learning Institute. 22


Signature File

© 2009 Cisco Learning Institute. 23

You might also like