




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
ServeranddomainisolationusingIPsecandgroupPolicy-ByRashmiS.ThakurCS772IntroductionEarlydays,companieshadtoworkwithmainframes---networkaccesssecuritywasnotmuchanissuesincetheonlywaytoaccessthenetworkwastoenteralarge,datacenterandsitdowninfrontofaterminaltodoanything.Notmorepronetoattacksanduntrustedaccess…..PresentScenario…Nomoremainframes.AnyonecanaccessthenetworkfromanywhereLargeorganizationsneededsecuritytoprotecttheirinternalnetworkfromexternalattacksandaccessTheyalsoneededsegmentsofinternalnetworksi.erestrictedaccessfromonepartofthenetworktotheother...Solution!Useoffirewalls!Firewallscouldprotectinternalnetworksfromoutsideattacks.Theycouldalsobeusedtoseparatesegmentsofinternalnetworksbysettingrulesforthefirewall.
Thenwhystudyserveranddomainisolation?Ithasbeenfoundoutthatusingfirewallsforinternalnetworksegmentationdoesn'talwaysworksmoothly.Alsointernalattacksi.eattacksmightcomefrommaliciousemployeeswhocancansubvertotherprotectivemeasures--includingfirewalls--togettothecenterofthenetwork.compromisedPCsmighthavespywareormalware.GoalofLogicalIsolationThegoaloflogicalisolationistoallowtheinternalnetworktobesegmentedandisolatedtosupportahigherlevelofsecuritywithoutrequiringhardphysicalboundariesShouldnotbetootightsuchthatitishardtodoevendailybusinesstasks.Shouldbemanageableandscalable.People,Policies,andProcessPhysicalsecurityPerimeterInternalnetworkHostApplicationDataIsolationServerandDomainIsolationComponents
TrustedHosts–Thehostswithminimumsecurityrequirements.runningasecureandmanagedoperatingsystem,antivirussoftwarecurrentapplicationandoperatingsystemupdatesHostAuthenticationIPsecThe802.1XProtocolHostAuthorization–UsingGrouppoliciestoallow/denyaccesstoservers.StepsindetailSTEP1:Userloginstoaclientontheinternalnetwork(whichiswithinthelogicalisolation)Clientcomputerattemptstoconnecttothetrustedhostusingthefilesharingprotocol.TheclienthasIPsecpolicyassignedaspartofthesolution.TheoutboundTCPconnectionrequesttriggersanIKEnegotiationtotheserver.TheclientIKEobtainsaKerberostickettoauthenticatetotheserver.STEPS2to4:IKEmainmodenegotiation.AftertheserverreceivestheinitialIKEcommunicationrequestfromtheclientcomputer,theserverauthenticatestheKerberosticket.Step4contd…Iftheuseraccounthastherequireduserrightassignment,theprocesscompletes,andtheuserlogontokeniscreated.Afterthisprocessiscomplete,thelogicalisolationsolutionhasfinishedconductingitssecuritychecks.Whatremainsnowistheaccessrightsofthefile,theuseristryingtoaccess.Step5Shareandfileaccesspermissionschecked.Finally,thestandardWindowsshareandfileaccesspermissionsarecheckedbytheservertoensurethattheuserisamemberofagroupthathastherequiredpermissionstoaccessthedatathattheuserrequested.Grouping…Tillnowwedealtwithisolationachievedonahost-by-hostbasisIfanorganizationcontainsalotofhosts,thendoingahost-by-hostmightbetoocostly!Solution:Grouphostsintoagroupsandgiveacessgroup-by-groupThisismuchcheaper.ImplimentingIsolationIdentifyFoundational(basic)IsolationGroups.Eg:IsolationDomain: ThehostsinthisgrouparetrustedanduseIPsecpolicytocontrolthecommunicationsthatareallowedtoandfromthemselves.Eg:BoundaryIsolationGroup Thisgroupcontainstrustedhoststhatwillbeallowedtocommunicatewithuntrustedsystems.Thesehostswillbeexposedtoahigherlevelofriskbecausetheyareabletoreceiveincomingcommunicationsdirectlyfromuntrustedcomputers.WhydoweneedBoundaryIsolationGroupSinceinalmostallorganizations,therewillbeanumberofworkstations,orservers,thatareunabletocommunicateusingIPsecalthoughtheyaregenuinehosts.ExemptionsLists
Keyinfrastructureserverssuchasdomaincontrollers,DNSservers,andDynamicHostConfigurationProtocol(DHCP)serversorotherswhichareusuallyavailabletoallsystemsontheinternalnetworkdonotuseIPSecbutarewidelyused.AllowingthemonlythroughBoundaryIsolationGroupmightresultindecreasingperformanceoftheorganizationduetoheavyrequests.Sol:Createspecialliststoidentifysuchservers.AndallowdirectaccesstothemthroughanyisolationgroupAdditonalIsolationGroupsCouldcreatemoreIsolationGroupsapartfromthefoundationalifwehavedifferentrequirementsforeachgroup.Eg:EncryptionrequirementsLimitedhostoruseraccess requiredatthenetworklevelOutgoingorincomingnetwork trafficfloworprotection requirementsthat fromtheisolationdomain
PlanningTrafficMapping-foundationalIDFromToBidirectionalIPsecFallbackEncrypt1IDExYesNoNoNo2IDBOYesYesNoNo3IDUNNoYesYesNo4BOEXYesYesYesNo5BOUNNoYesYesNo6UNBONoNoNoNo7UNEXYesNoNoNoPlanningTrafficMapping-additionalIDFromToBidirectionalIPsecFallbackEncrypt8ENEXYesNoNoNo9ENIDYesYesNoYes10ENNFYesYesNoYes11ENBONoYesNoYes12NFIDYesYesNoNo13NFEXYesNoNoNo14NFBOYesYesNoNoNetworkaccessgroupsConsidergroup1isrestrictedaccesstgroup2.OnlyExceptionisifahostinGroup1istheManagerthenheisnotrestrictedtoGroup2.Howdowestatethisexplicitrule?NAGsareusedtoexplicitlyallowordenyaccesstoasystemthroughthenetworkNamesreflectfunction—ANAG:allownetworkaccessgroupDNAG:denynetworkaccessgroupCancontainusers,computersorgroupsDefinedindomainlocalgroupsExampleScenariosUn-trustedServerIsolationUnmanagedDevicesActiveDirectoryDomainController(exempted)DomainIsolationOptionaloutboundauthenticationRequiredauthenticationXAuthenticatingHostFirewallsXDomainIsolationDomain
controllerServer:domainisolation
IPsecpolicyActive(requiresIPsecforalltrafficexceptforICMP)Client:
Untrustedor
non-IPseccapablePingsucceedsothersfailUser:
anytypeDomain
controllerServer:domainisolation
IPsecpolicyActive(requiresIPsecforalltrafficexceptforICMP)Pingsucceeds,otherssucceedoverIPsecClient:
WindowsXPSP2TrustedmachineUser:
domainmemberServerIsolationDomain
controllerServer:serverisolation
IPsecpolicyActive(requiresIPsecforalltrafficexceptforICMP)PingsucceedsothersfailbecauseIKEfailsAuthorizationonlyfor
CLIENT1ingrouppolicyvia“Accessthiscomputer
fromnetwork〞rightUser:
domainmemberClient:
WindowsXPSP2
“CLIENT2〞TrustedmachineDomain
controllerServer:serverisolation
IPsecpolicyActive(requiresIPsecforalltrafficexceptforICMP)Client:
WindowsXPSP2
“CLIENT1〞TrustedmachineUser:
domainmemberPingsucceeds,othersucceedoverIPsecAuthorizationonlyfor
CLIENT1andthisuser
ingrouppolicyvia“Accessthisc
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 【正版授权】 ISO 37009:2025 EN Conflict of interest in organizations - Guidance
- 2025年教师招聘之《小学教师招聘》题库必刷100题附答案详解【模拟题】
- 量子精密测量在地质勘探中的创新创业项目商业计划书
- 2025年教师招聘之《幼儿教师招聘》模拟题库及一套答案详解
- 教师招聘之《小学教师招聘》能力提升打印大全及答案详解(基础+提升)
- 2025年教师招聘之《小学教师招聘》考前冲刺测试卷附完整答案详解【夺冠】
- 教师招聘之《小学教师招聘》题库【全优】附答案详解
- 教师招聘之《幼儿教师招聘》模拟考试高能及答案详解【名校卷】
- 教师招聘之《幼儿教师招聘》练习题库含答案详解【研优卷】
- 教师招聘之《幼儿教师招聘》试题(得分题)及参考答案详解(轻巧夺冠)
- 急诊科建设与设备配置标准
- 小学武术社团教学计划
- 急性胃肠炎诊疗规范
- 汉字五千年解说词完整版内容
- 《解密分层教学》读书心得体会(读书心得体会30篇)
- 《锅炉安全技术规程》课件
- 化学检验员职业生涯规划书
- 妇产科课件-子宫内膜息肉临床诊疗路径(2022版)解读
- 厂房建设工程投标方案(技术方案)
- 《药棒穴位按摩》课件
- 全国职工数字化应用技术技能大赛理论练习试题附答案(二)
评论
0/150
提交评论