ASA 5500 seriesadaptive security appliances.ppt
《ASA 5500 seriesadaptive security appliances.ppt》由会员分享,可在线阅读,更多相关《ASA 5500 seriesadaptive security appliances.ppt(27页珍藏版)》请在麦多课文档分享上搜索。
1、ASA 5500 series adaptive security appliances,Has replaced Ciscos PIX firewalls since 2008 Security services Source: http:/ application-aware firewall SSL and IPsec VPN IPS with global correlation and guaranteed coverage Antivirus Antispam Antiphishing web filtering services,Network Security,1,T. A.
2、Yang,Ciscos Firewall Service Module (FWSM),Network Security,2,http:/ a high-speed, integrated firewall module for Cisco Catalyst 6500 switches and Cisco 7600 Series routers provides the fastest firewall data rates in the industry 5-Gbps throughput, 100,000 CPS (connections per second) 1M concurrent
3、connections,T. A. Yang,Firewall Modes,Routed mode The device is considered a router hop in the network Requires an IP address for each interface The default modeTransparent mode (aka stealth firewalls) The device operates in a secure bridging mode Same subnet on its inside and outside interfaces Has
4、 an IP address assigned to the entire device The appliance continues to perform stateful application-aware inspection and other firewall functionsBenefits: hide its presence from the attackers/intruders,Network Security,3,T. A. Yang,Stealth mode example,Network Security,4,Default gateway for PCs in
5、VLAN 10 is 10.1.1.1 (the upstream router).,T. A. Yang,Example 2,Network Security,5,T. A. Yang,Source: http:/ The default gateway of Host A is not the Internet router (192.168.1.2) but the internal router (192.168.1.3).Scenario: an inside user visits an inside Web server - Host A (192.168.1.5) sends
6、the request packet to the Internet router (since it is a default gateway) through the ASA from the inside to the outside. Then the packet is redirected to the web server (10.1.1.1) through ASA (outside to inside) and the internal router.,Network Security,6,Adaptive Security Algorithm (ASA),An algori
7、thm that defines how traffic passing through the firewall are examined. Basic concepts: Keep track of the connections being formed from the networks behind the PIX to the public network Based on info about these connections, ASA allows packets to come back into the private network through the firewa
8、ll. All other traffic destined for the private network is blocked by the firewall (unless specifically allowed).,T. A. Yang,ASA Operations,Three basic operations ACLs Connections: xlate and conn tables Inspection engines (per RFC standards)Figure 6-5: a scenario where an external host requested a co
9、nnection to an internal server,T. A. Yang,Network Security,7,Network Security,8,ASA,ASA defines how the state and other information is used to track the sessions passing through the PIX.ASA keeps track of the following information: Source and destination info of IP packets TCP Sequence numbers and T
10、CP flags UDP packet flow and timers,T. A. Yang,Network Security,9,ASA and TCP,TCP is connection-oriented, and provides most of the information the firewall needs. The firewall keeps track of each session being formed, utilized, and terminated. ASA only allows for the packets confirming to the state
11、of a session to go through. All other packets are dropped.However, TCP has inherent weakness, which requires ASA to perform additional work managing the sessions SYN flood, session hijacking,T. A. Yang,Network Security,10,ASA and TCP,SYN flooding“The SYN flood attack sends TCP connections requests f
12、aster than a machine can process them.” (Internet Security Systems, http:/ next,T. A. Yang,Network Security,11,Syn Flood,A: the initiator; B: the destination TCP connection multi-step A: SYN to initiate B: SYN+ACK to respond C: ACK gets agreementSequence numbers then incremented for future messages
13、Ensures message order Retransmit if lost Verifies party really initiated connection,T. A. Yang,Network Security,12,Syn Flood,Implementation: A, the attacker; B: the victim B Receives SYN Allocate connection Acknowledge Wait for response See the problem? What if no response And many SYNs All space fo
14、r connections allocated None left for legitimate ones,Time?,T. A. Yang,Network Security,13,ASA vs Syn Flood,(Beginning in version 5.2 and later) When the number of incomplete connections through the PIX reaches a pre-configured limit (the limit on embryonic connections), ASA turns the PIX into a pro
15、xy for connection attempts (SYNs) to servers or other resources sitting behind it.PIX responds to SYN requests with SYN ACKs and continues proxying the connection until the three-way TCP handshake is complete. Only when the three-way handshake is complete would the PIX allow the connection through t
16、o the server or resource on the private or DMZ network.Benefit: Limits the exposure of the servers behind the PIX to SYN floods,T. A. Yang,Network Security,14,PIX: Basic Features,ASAs stateful inspection of traffic Assigning varying security levels to interfaces ACL Extensive logging Basic routing c
17、apability (including RIP) Failover and redundancy Traffic authentication,T. A. Yang,Network Security,15,PIX: Basic Features - ASAs stateful inspection of traffic,PIX uses a basic set of rules to control traffic flow: No packets can traverse the PIX w/o a translation, connection, and state. Outbound
18、connections are allowed, except those specifically denied by the ACLs. Inbound connections are denied, except for those specifically allowed. All ICMP packets are denied unless specifically permitted. All attempts to circumvent the rules are dropped, and a message is sent to syslog.To tighten or rel
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASA5500SERIESADAPTIVESECURITYAPPLIANCESPPT
