CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Campus Module in Medium-Sized Networks


    The Campus module of the medium-sized network design provides end-user workstations, corporate intranet servers, management servers, and the associated Layer 2 and Layer 3 functionality that is required by the network.Chapter 13. The new features that appear in the medium-sized network Campus module are a Layer 3 switch and a NIDS sensor.

    Figure 15-4. Medium-Sized Network Campus Module

    Mitigating Threats in the Campus Module


    Expected threats against the Campus module and the mitigation actions to counter them are described in Table 15-7.

    Table 15-7. Threats Against Campus Module and Threat Mitigation

    Threat

    Threat Mitigation

    Application layer attacks

    Mitigated by keeping operating systems, devices, and applications up to date with the latest security fixes and protected by host-based IPSs

    IP spoofing

    Mitigated by using RFC 2827 filtering to prevent source-address spoofing

    Packet sniffers

    Mitigated by using a switched infrastructure to limit the effectiveness of sniffing

    Password attacks

    Mitigated by using an ACS to enforce strong two-factor authentication for key applications

    Port redirection

    Mitigated by using host-based IPSs to prevent port redirection agents from being installed

    Trust exploitation

    Mitigated by using private VLANs to prevent hosts on the same subnet from communicating unless necessary

    Unauthorized access

    Mitigated by using host-based IPS and application access control

    Virus and Trojan-horse applications

    Mitigated by using host-based virus scanning

    The threat-mitigation roles that are performed by the various devices found within the medium-sized Campus module are shown in Figure 15-5.

    Figure 15-5. Medium-Sized Network Campus Module Threat-Mitigation Roles

    Design Guidelines


    The medium-sized network Campus module consists of several key devices that provide the necessary Layer 2 and Layer 3 connectivity and other functional requirements of the corporate campus network. The functionality and connectivity are provided by the following devices:

    • Core switch

    • Access switches

    • IDSs


    Core Switch

    The main purpose of the campus core switch is to provide the following services:

    • Routing and switching for management and production data

    • Distribution layer services for the building access switches

    • Corporate and management server connectivity

    • Traffic filtering


    The Campus module uses a Layer 3 core switch in preference to a Layer 2 core switch for four reasons:

    • The use of multiple VLANs has been implemented in the design, allowing the corporate servers, management servers, user connectivity functions, WAN module, and Corporate Internet module to all reside on individual VLANs.

    • By using separate VLANs with access control, inter-VLAN traffic filtering can be introduced, which can mitigate the chance of users on one VLAN accessing confidential information on another VLAN of the network. For example, a network that contains administration, engineering, finance, and sales departments might segment off the finance server to a specific VLAN and filter access to it, ensuring that only finance staff have access. For performance reasons, it is important that this access control be implemented on a hardware platform that can deliver filtered traffic at near-wire rates. This setup generally dictates the use of Layer 3 switching, as opposed to more traditional dedicated routing devices.

    • To mitigate against trust-exploitation attacks and address spoofing, private VLANs and RFC 2827 filtering should be used on the corporate user and corporate server VLANs.

    • Extensive filtering should be used on the management VLAN to control the flow of management traffic between both local devices and devices located at remote sites. Both Layer 3 and Layer 4 access control should be implemented to restrict traffic flow between managed hosts and the management servers. This filtering should only permit the specific management protocols and services that are required between the managed device and management server.


    Access Switches

    The role of the access or building switches within the Campus module is to provide Layer 2 connectivity to corporate users.

    Because users generally do not require direct host-to-host communication, private VLANs are implemented on the access switches to mitigate against trust-exploitation attacks. To mitigate against virus attacks, host-based virus scanning is implemented on user workstations.

    Intrusion Detection in the Campus Module

    The medium-sized network Campus module supports both host-based IPS and NIDS. A host-based IPS is used on each of the corporate intranet and management servers, and a single NIDS appliance is connected to the core switch. The switch port that connects the NIDS appliance is configured as a monitoring port, which can be used to mirror all VLAN traffic that requires monitoring within the switch. Generally, though, few attacks should be detected by this NIDS appliance because it is looking for potential attacks originating from within the Campus module itself.

    Design Alternatives


    The Campus module discussed in the previous section can have the following alternative designs:

    • If the medium-sized network is small enough, the access or building switches can be removed. The removed Layer 2 functionality is then provided by connecting the devices directly to the core switch. Any private VLAN configuration that is lost with the removal of the access switches is offered by the core switch and still mitigates against trust-exploitation attacks.

    • The external NIDS appliance can be replaced by an integrated IDS module that fits into the core switch. This configuration option offers increased performance benefits because the IDS appliance sits directly on the backplane of the switch.


    If performance is not an issue, it is possible to replace the Layer 3 switch with a Layer 2 switch and provide inter-VLAN routing by use of an external router.

  • / 290