Network security-border security (1)

Source: Internet
Author: User

Network security-border security (1)

Nowadays, people are increasingly dependent on the Internet, and network security is gradually entering People's Daily vision. Credit card information leaks, house opening records are queried, and trade secrets are leaked; it affects the nerves of a person, a company, or even a country. With the development of technology, network boundaries become more and more complex, such as web applications, wireless access, DCI, VPN and other technology applications, resulting in network boundaries become very complex and difficult to start; however, whether it is layer-Based Reinforcement of boundaries, enhanced security auditing of network entries, or security training for users, you must be aware of your network. Network border devices are generally routers, switches, or firewalls.

 

Border security-ACL

 

When a vro or vswitch acts as a border, the access control list ACL is basically configured. For example, the number of ACLs in some places such as a bank may be very large, reaching thousands or more, generally, devices that use multiple boundaries are nexus7k, cisco7600, cisco6500, Huawei 9300, and huwei cloudengine. The following uses Cisco as an example to describe the ACL of important security measures on the border.


ACL application:

1. Control routing information between neighboring devices.

2. control traffic network access through devices.

3. control console and vty access.

4. Define the streams of interest such as IPSec VPN.

5. implement QoS and other features.

 

ACL Configuration

1. Create an ACL

2. Apply the ACL to an interface.

 

ACL type

 

1. Standard ACL. 1 ~ 99. Only Source IP data packets can be filtered.

2. Extend the ACL. No. 100 ~ 199. You can filter traffic based on the source IP address, destination IP address, protocol, port, and flag.

3. Name the ACL. It can be applied to standard and extended ACLs and replaced with numbers by names to facilitate configuration management and use more.

4. Category ACL. It is generally used for DOS and other security authentication.

5. Other rarely used ACL types. Dynamic ACL, self-reverse ACL, time ACL, and debug ACL.

 

ACL implementation guidelines

 

1. ACL can be used (reused) simultaneously on multiple interfaces ).

2. the same interface can only use one ACL for the same protocol, such as one outbound ACL and One inbound ACL. For different protocols, multiple ACLs and two ACLs can be applied on one interface.

3. Perform sequential processing of ACL matching, Which is precise to the front.

4. Always follow the procedure of creating an ACL first and then applying the ACL to the interface. to modify the ACL, you must first remove the ACL and apply the ACL to the interface after modification.

5. the outbound ACL applied to the router only checks the traffic passing through the router. That is to say, it does not check its own traffic.

6. For the standard ACL, it should be applied to the location closest to the destination of traffic transmission, and the extended ACL should be applied to the location closest to the source.

 

ACL application example

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/40/C6/wKioL1PPYjSgoWzRAADHePtIzts812.jpg "Title =" aclapplication interface .png "alt =" wkiol1ppyjsgowzraadheptizts812.jpg "/>

1. If the border of a data center is a vswitch, only web and DNS applications are provided internally, and ACL control is implemented for security considerations.

Ipaccess test-Sample

Deny IP 10.0.0.0/8 Any ------ reject rfc1918 address

Deny IP 172.16.0.0/21 Any

Deny IP 192.168.0.0/16 Any

Permit TCP any 1.1.1.2/32 eq www ------- open port 80 of Web TCP

Permit UDP any 1.1.1.3/32 EQ 53 -------- open port 53 of DNS UDP

Then, apply the acl to the in direction of the connection exit.

2. If the data center server is under attack and there are no other protection and detection devices, use the ACL for troubleshooting.

 

Access-list 169 permit ICMP any echo

Access-list 169 permit ICMP any anyecho-reply

Access-list 169 permit udp any eq echo

Access-list 169 permit UDP any EQ echo any

Access-list 169 permit TCP any anyestablished

Access-list 169 permit TCP any

Access-list 169 permit IP any

Then, apply the interface to the in direction of the exit, view the matching number through showip access-list, and use Log-input on the ACL entries with large matching data, next, you can view the log to find the IP address of the attack source. (You must add statistics per-entry to the nexus switch to perform the ACL matching count ).


This article from the "the brightest star in the night sky" blog, please be sure to keep this source http://wangxl.blog.51cto.com/621714/1445101

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.