09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Tftp Trivial File Transfer Pro<strong>to</strong>col UDP 69<br />

Telnet Telnet TCP 23<br />

Time Time TCP 37<br />

Uucp UNIX-<strong>to</strong>-UNIX Copy program TCP 540<br />

X11 X Window system display TCP 6000-6004<br />

Traditionally, it was believed that filtering below TCP/UDP port 1024 would provide<br />

adequate protection from external intruders, so many sites have an inbound packet<br />

filter that looks something like this:<br />

access-list 101 permit tcp any host 192.168.0.5 eq www<br />

access-list 101 permit tcp any 192.168.0.0 0.0.0.255 eq telnet<br />

access-list 101 permit tcp any 192.168.0.0 0.0.0.255 eq domain<br />

access-list 101 permit udp any 192.168.0.0 0.0.0.255 eq domain<br />

access-list 101 permit tcp any host 192.186.0.23 eq smtp<br />

access-list 101 permit tcp any 192.168.0.0 0.0.0.255 eq ftp<br />

access-list 101 permit tcp any 192.168.0.0 0.0.0.255 eq ftp-data<br />

access-list 101 permit tcp any 192.168.0.0 0.0.0.255 gt 1024 established<br />

access-list 101 permit udp any 192.168.0.0 0.0.0.255 gt 1024<br />

NOTE<br />

Named access-lists permit opera<strong>to</strong>r/port-value pair matches <strong>to</strong> be specified for both<br />

<strong>the</strong> source and destination address designation. Only extended named ACLs permit<br />

<strong>the</strong>se matches <strong>to</strong> be performed in conjunction with <strong>the</strong> destination address.<br />

With <strong>to</strong>day's Internet, however, this approach does not quite offer adequate<br />

protection. This list does greatly restrict inbound access, but it does not provide any<br />

defense against denial of service and SMURF attacks, and leaves <strong>the</strong> majority of<br />

service access partially unrestricted, open <strong>to</strong> exploitation. Unfortunately, <strong>the</strong>se<br />

ports need <strong>to</strong> remain unrestricted because <strong>the</strong>y are used randomly <strong>to</strong> initiate<br />

sessions. Even if you only accept inbound traffic from known hosts, <strong>the</strong>re is still <strong>the</strong><br />

possibility of a hacker using address masquerading <strong>to</strong> access your site. For <strong>the</strong>se<br />

reasons, firewalls are often utilized <strong>to</strong> provide a single defense point, which allows<br />

you <strong>to</strong> tailor a security filter ACL around a specific host and address range instead of<br />

<strong>the</strong> entire <strong>network</strong>. Let's take a closer look at <strong>the</strong>se defensive procedures.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!