19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

156<br />

Part III: Hacking Network Hosts<br />

✓ Use stateful inspection rules that monitor traffic sessions for firewalls.<br />

This can help ensure that all traffic traversing the firewall is legitimate<br />

and can prevent DoS attacks and other spoofing attacks.<br />

✓ Implement rules to perform packet filtering based on traffic type, TCP/<br />

UDP ports, IP addresses, and even specific interfaces on your routers<br />

before the traffic is allowed to enter your network.<br />

✓ Use proxy filtering and Network Address Translation (NAT) or Port<br />

Address Translation (PAT).<br />

✓ Find and eliminate fragmented packets entering your network (from<br />

Fraggle or another type of attack) via an IPS.<br />

✓ Include your network devices in your vulnerability scans.<br />

✓ Ensure your network devices have the latest vendor firmware and<br />

patches applied.<br />

✓ Set strong passwords — better yet, passphrases — on all network systems.<br />

I cover passwords in more detail in Chapter 7.<br />

✓ Don’t use IKE aggressive mode pre-shared keys for your VPN. If you<br />

must, ensure the passphrase is strong and changed periodically (such<br />

as every 6–12 months).<br />

✓ Always use SSL (HTTPS) or SSH when connecting to network devices.<br />

Better yet, don’t even allow access to key devices from the outside.<br />

✓ Segment the network and use a firewall on the following:<br />

• The DMZ<br />

• The internal network<br />

• Critical subnetworks broken down by business function or department,<br />

such as accounting, finance, HR, and research

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!