(资深网络安全工程师)课件

上传人:aa****6 文档编号:54315512 上传时间:2018-09-11 格式:PPT 页数:30 大小:1.37MB
返回 下载 相关 举报
(资深网络安全工程师)课件_第1页
第1页 / 共30页
(资深网络安全工程师)课件_第2页
第2页 / 共30页
(资深网络安全工程师)课件_第3页
第3页 / 共30页
(资深网络安全工程师)课件_第4页
第4页 / 共30页
(资深网络安全工程师)课件_第5页
第5页 / 共30页
点击查看更多>>
资源描述

《(资深网络安全工程师)课件》由会员分享,可在线阅读,更多相关《(资深网络安全工程师)课件(30页珍藏版)》请在金锄头文库上搜索。

1、Address Translation,Protocol and Application Issues(一),Applications with Multiple Connections,Protocol and Application Issues(二),Applications and Embedded Addressing Information,Protocol and Application Issues(三),Applications and Security Issues,TCP Connection Example,TCP Connection Example,Parts 1

2、and 2 The appliance compares packet information against the existing connections to the state table to determine if the packet is new or part of an existing connection. Since it is a new connection, it wont be found. The appliance then looks for an ACL applied in-bound in the interface. If one exist

3、s, the packet must match a permit statement in the list of statements to be allowed.If the packet is allowed, the appliance then compares the packet header information with the existing translation entries in the translation table to see if an existing transla-tion can be used, or if a new one needs

4、 to be created. Ill assume, however, that this is the first time the source has sent a packet through the appliance, so no existing translation entries in the xlate table will match.,TCP Connection Example,Parts 1 and 2 Next the appliance compares the information in the packet header with the config

5、-ured translation policiesstatic and dynamicfor a match. If a match is not found, then the packet is dropped. If a match is found, a translation entry is built and added to the xlate table, the TCP sequence number is randomized, and the TCP connection is added o the conn table. The appliance then in

6、crements the embryonic connection counter. An embryonic con-nection is a half-open connection: it hasnt gone through the three-way handshake. The appliance keeps track of this kind of information to limit the effectiveness of TCP SYN flood attacks. If the limit is exceeded, the appliance will implem

7、ent its TCP Intercept feature, discussed later in the chapter. The two idle timers are then started for the con-nection in the conn and xlate tables respectively.,TCP Connection Example,Parts 3 and 4 Once the destination receives the packet, it responds back with a TCP SYN/ACK re-sponse . Upon recei

8、ving the packet, the appliance compares the header information with the conn table to find a match; in this case, since the source initi-ated the connection in part 1, the connection is in the table. The appliance then validates the idle timer to ensure that the entry in the state table hasnt expire

9、d: If the entry has expired, it is removed from the conn table and the packet is dropped. If there wasnt a match in the conn table or the entry had timed out, then the ACL on the interface would be used to validate whether the packet was allowed inbound to the inside interface. therefore, the applia

10、nce then undoes the randomization of the acknowledgment number. This is the sequence number randomization (SNR) feature at work, which is used to defeat ses-sion hijacking attacks.,TCP Connection Example,TCP Connection Example,Parts 5 and 6 In part 5, the source completes the three-way handshake by

11、sending a TCP ACK, shown in Figure 5-5. The appliance first compares packet information to the existing connections to the state table to determine if the packet is a new or part of an existing connection. Since it is an existing connection, it should be in the state table. If you examine the Outsid

12、e Network column above part 2, this shows the packet header as it leaves the appliance. Notice that the source address was changed because of a match on the configured translation policy, and the TCP sequence number was ran-domized. The corresponding idle timers in the conn and state tables are rese

13、t, and the packet is forwarded to the destination, shown in part 6.Again, the appliance keeps track of the packets for the connection and updates the conn table appropriately. If no packets are seen for the duration of the idle timer or the connection is torn down by the source or destination, the e

14、ntry is removed from the conn table.,ADDRESS TRANSLATION OVERVIEW,ADDRESS TRANSLATION OVERVIEW,Private Addresses,ADDRESS TRANSLATION OVERVIEW,Needs for Address Translation:You are merging two networks that have an overlapping address space. You need to make it appear that the overlapping network num

15、bers are unique to the two different sides.Your ISP has assigned you a very small number of public addresses, and you need to provide many of your devices access to the Internet.You were assigned a public address space by your ISP, and when you change ISPs, your new ISP will not support your current

16、ly assigned address space.You have critical services on a single device, and you need to duplicate these resources across many devices. However, you need to make it appear that all of the devices that contain these resources appear as a single entity.,ADDRESS TRANSLATION OVERVIEW,Disadvantages of Ad

17、dress Translation: First, when address translation is performed by your address translation device (like the Cisco security appliances), it will have to change the IP addresses in the IP packet header and possibly even the port numbers in TCP or UDP segment headers. Because of this, the address tran

18、slation device will have to perform additional processing not only to handle the translation process, but also to compute new checksums for the packets. Another problem that address translation introduces deals with troubleshooting net-work problems. Because address translation changes the source an

19、d/or destination IP addresses in the packet headers, it becomes more difficult to troubleshoot network prob-lems. When you examine the addresses in the packet header, you dont know whether you are dealing with the addresses that these machines have assigned on them, or with the addresses that they have been translated to by an address translation device.,

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > PPT模板库 > PPT素材/模板

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号