Rule Firewall Mikrotik. 1 h t t p. : /. / w w w . p a t u s a in s id e . w o r d p r e s s . c
o m. Berikut ini beberapa rule firewall yang bisa ditambahkan didalam ...
Cara kerjanya adalah dengan melakukan copy traffic dari interface asli (Mirror-
Source) ... port yang lain (Mirror-Target). • Port asli dan port mirror harus didalam
...
IP facts. There are no differentiated services available. Each router bases the
transport ... traffic engineering and support of Virtual Private Networks. (VPN) ...
tertentu. Sumber : materi kuliah Teknik Informatika Universitas Bina Nusantara ...
Administrasinya bisa dilakukan melalui Windows Application (WinBox).
Nov 14, 2016 - Very active community (facebook, telegram, forum, etc). â What..? you dont ... Like our facebook page: âGLC networksâ. â Stay tune with our ...
Nov 14, 2016 - ... Certified Training Partner. â Mikrotik Certified Consultant. â Mikrotik distributor. 3 ... and Lecturer at Telkom University. â Personal website: ...
The subject of this project is Knoppix based firewall and router. Knoppix is ... This
project's aim was to develop firewall program for Knoppix live CD. Firewall is ...
AIRMAX5 AND MIKROTIK Connection Guide. 5. Note: Please change the IP
address of AirMax5 and PCs before process. In this document, we use IP address
...
Komputer atau laptop yang sudah terinstal VMWare, jika belum ya install dulu. ...
Klik kanan pada file mikrotik anda, pilih settings maka akan muncul tampilan ...
required, maintenance scripts. ○ designed for dynamic changes. ○ provides
protection for customers/servers. ○ can detect and possibly stop suspicious
traffic.
program.Topics include physical and wireless security, locking down IP services, ... e books free for android MikroTik R
In this lab exercise you will complete the following three tasks: ... the basic PIX
Firewall and the Cisco Router operation and configuration, and adjust the ...
May 1, 2004 - Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other brand and ...
May 1, 2004 - Certificate of the Manufacturer/Importer. It is hereby certified ...... From the Apple menu, select Contro
78-16414-01 .... és ismerkedjen meg a szokásos balesetvédelmi eljárásokkal. ...
Nota Esta documentação destina-se a ser utilizada em conjunto com o manual
de instalação ... Cisco 7600 series router with a Supervisor Engine 1A (Catalyst
operating s
Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices upon request. ... upgradeâ
Faculty of Electrical Engineering and Computing. University of ... rule definition. Developed firewall software must provide not .... system so firewall can work halted â with file systems turned off ... groups based on the protocol type: ⢠ICMP
Aug 9, 2000 - validate the rules, and lookup latency may increase significantly. ... which packets are accepted by a firewall or router, both the security and ...
The VPN 800/2 Firewall Router acts as a DHCP Server for devices on your local. LAN. ...... Just enter your data in the S
traffic logs at tens of enterprise networks managed by a Tier-1 service provider. ... to implement a security policy governing the flow of network traffic between two ...
MikroTik Router OS Network Threats and Countermeasures ... support of
MikroTik Powered Appliances .... Http Proxy can access any Server from a few
clients.
MikroTik Router OS Firewall Strategies
MikroTik Router OS Network Threats and Countermeasures Speaker:
Tom Smyth CTO Wireless Connect Ltd.
Location: Date:
Wroclaw, Poland 1st of March
http://wirelessconnect.eu/ Copyright 2007 -2010
1
Wireless Connect Ltd. ●
Irish Company Incorporated in 2006
●
Operate an ISP in the centre of Ireland.
●
Good Infrastructure Expertise.
●
Certified MikroTik Partners –
Training
–
Certified OEM Integrators
–
Consultants
–
Distributor & Value Added Reseller
http://wirelessconnect.eu/ Copyright 2007 -2010
2
Speaker Profile: ●
●
●
Studied BEng. Mechanical & Electronic Engineering, DCU, Ireland Have been working in Industry since 2000 –
Server Infrastructure Engineer
–
Systems / Network Administrator
–
IS Architect
–
Internet Security Consultant
1st MikroTik Certified Trainer in June 2007 in Ireland
http://wirelessconnect.eu/ Copyright 2007 -2010
3
Ogma Connect ●
●
●
●
A Collaborative Effort involved in the development and support of MikroTik Powered Appliances Ogma Connect's name comes from the Ancient God of Communications and eloquence who's name was Oghma Oghma was credited with the invention of the written language Ogham which is found carved in stones that mark the land of ancient tribes throughout the once vast Celtic world in northern & western Europe We want people to be able to connect with each other eloquently efficiently and elegantly
http://wirelessconnect.eu/ Copyright 2007 -2010
4
Presentation Objectives ●
IP v4 Firewall Systems Concepts
●
Outline what a firewall can and can not do
●
●
●
Discuss Prevalent Network Attacks and Mitigation Strategies Structure the Firewall –
In a security centric manner
–
Create policy based rule sets
Protocol Specific Filtering –
Proxy Specifically Http Proxy
http://wirelessconnect.eu/ Copyright 2007 -2010
5
Sources of Security Information ●
ENISA –http://www.enisa.europa.eu/
●
OWASP http://owasp.org
●
Rits Group – http://www.ritsgroup.com/
●
SANS Institute – http://sans.org
●
CIS Centre for Internet Security – http://cisecurity.org/
Cant Reverse Proxy SSL / TLS Settings :( However one can use Stunnel to decrypt the SSL Traffic before it hits the reverse proxy :)
http://wirelessconnect.eu/ Copyright 2007 -2010
14
Example Http Reverse Proxy
http://wirelessconnect.eu/ Copyright 2007 -2010
15
Web Client Makes Https Request
http://wirelessconnect.eu/ Copyright 2007 -2010
16
Stunnel Decrypts the Request & forwards to Reverse Proxy
http://wirelessconnect.eu/ Copyright 2007 -2010
17
Reverse Proxy Analyses Request
http://wirelessconnect.eu/ Copyright 2007 -2010
18
Proxy Accepts & Relays Request
http://wirelessconnect.eu/ Copyright 2007 -2010
19
Http Server Responds to Proxy Request
http://wirelessconnect.eu/ Copyright 2007 -2010
20
Proxy forwards Response to Stunnel
http://wirelessconnect.eu/ Copyright 2007 -2010
21
Client receives the Webpage
http://wirelessconnect.eu/ Copyright 2007 -2010
22
What if the Proxy Says No?
http://wirelessconnect.eu/ Copyright 2007 -2010
23
Proxy Sends Error Msg To Stunnel
http://wirelessconnect.eu/ Copyright 2007 -2010
24
Client Recieves Error Message
http://wirelessconnect.eu/ Copyright 2007 -2010
25
Http Proxy / Reverse Http Proxy ●
Identical
●
Http Proxy serves to protect clients
●
Http Reverse Proxy serves to protect servers
●
Http Proxy can access any Server from a few clients
●
●
●
Http Reverse Proxy can access few servers and is available to any client. Http Proxy Utilises External DNS Servers for Name Resolution. Http Proxy uses a local DNS for Name Resolution
http://wirelessconnect.eu/ Copyright 2007 -2010
26
Reverse Proxy Setup ●
Same as a standard Proxy Setup Except for the Following Changes
●
Proxy Listens on Port 80 (or redirect to proxy port)
●
Static local DNS entries are setup on reverse proxy
●
External DNS servers point protected hostnames at the external IP of the Reverse Proxy
●
Proxy is heavily firewalled, usual precautions apply
●
Firewall Rules, no outbound connections allowed except for –
Http tcp port 80 to your webserver Network
–
Syslog udp port 514
–
NTP Server Requests udp port 123 http://wirelessconnect.eu/ Copyright 2007 -2010
27
Http Firewall ●
Proxy access list provides option to filter –
DNS names
–
Urls
–
Filetypes
–
Url paths designed to hack http servers
–
Ports
–
IP address
●
You can make redirect to specific pages
●
Home page of your website
●
Custom Error Pages giving as much or as little information as you require http://wirelessconnect.eu/ Copyright 2007 -2010
28
Http Firewall Building Aproach ●
Block Unwanted Requests for telnet, smtp, ftp ports
●
Block Unwanted / Unrequired Http Methods
●
Block URL Paths containing Dangerous Characters
●
Prevent IP Obfuscation Requests
●
Allow White listed Servers
●
Deny access to dissalowed ports
●
Deny Proxying access to Local Networks
●
Deny Proxying access to any other system.
http://wirelessconnect.eu/ Copyright 2007 -2010
29
Block / Allow Selected Http Methods ●
●
Only allow Required Methods (Safest) –
HEAD
–
GET
–
POST
Block potentially dangerous Types of HTTP Methods –
ASCII Character codes are not evaluated by proxy but are by webservers
●
e.g. ros.php =%2F%72%6F%73%2E%70%68%70
●
http://example.com/ros.php
●
=
●
http://example.com%2F%72%6F%73%2E%70%68%70
●
=
●
http://example.com/72%6F%73.%70h%70
●
Solution use Regular expressions :)
http://wirelessconnect.eu/ Copyright 2007 -2010
35
Regular expression example ●
●
●
●
●
●
We want to block any requests containing .. to guard against a infamous flaw in IIS a few years ago. http://poorlyimplementedserver.com/../../WINNT/System32/CMD.exe
We need to block .. and any ascii character codes for the same Required Expression=
(\.|%2E)(\.|%2E)
Regular Expressions are denoted in MTROS by entering a preceeding “:” Path to block = :(\.|%2E)(\.|%2E)
http://wirelessconnect.eu/ Copyright 2007 -2010
36
Block urls containing ..
http://wirelessconnect.eu/ Copyright 2007 -2010
37
Characters required for attacks ●
The Following Characters can be used in attacks against web servers –
(
)
;
^ ,
–
“ Double Quotes
–
' Single Quotes
–
` Grave Accent
–
%0A Line Feed
–
%0D Carrige Return
$ “
`
'
~ * |
\
# !
:
●
http://wirelessconnect.eu/ Copyright 2007 -2010
38
●
The following Combination s of characters can be used in attacks against the web servers –
@@
–
--
–
://
http://wirelessconnect.eu/ Copyright 2007 -2010
39
http://wirelessconnect.eu/ Copyright 2007 -2010
40
IP Address Obfuscation ●
Wirelessconnect.eu IP address can be represented in the following ways –
Decimal
–
89.184.47.93
–
Dword Address
–
1505242973
–
Hex Address
–
0x59.0xb8.0x2f.0x5d
–
Octal Representation
–
0131.0270.0057.0135
–
Why Does this Work? –
89.0xb8.0057.0x5d
http://wirelessconnect.eu/ Copyright 2007 -2010
41
Combating IP Obfuscation
http://wirelessconnect.eu/ Copyright 2007 -2010
42
White Listing Example ●
We want to allow GET, POST & HEAD to the webserver wirelessconnect.eu
●
●
●
●
●
●
Remember to always put url path filtering rules above the host whitelist rules
http://wirelessconnect.eu/ Copyright 2007 -2010
43
Last rules of any reverse proxy ●
Place the following rules below the host whitelists
http://wirelessconnect.eu/ Copyright 2007 -2010
44
POST HTTP Method Analysis ●
Not Possible with MT HTTP Proxy
●
Need web application knowledge.
●
Web application must have built in validation
http://wirelessconnect.eu/ Copyright 2007 -2010
45
Modular Firewall System Example
http://wirelessconnect.eu/ Copyright 2007 -2010
46
Firewall hardening ●
Some of the checks may be duplicated, this is ok, belt and braces.
●
Check for unusual TCP Flags and drop.
●
Drop packets with invalid connection state
●
●
Your Effort will complement and bolster your networking operating software provider's efforts to maintain security Ultimately you are responsible for your networks security
http://wirelessconnect.eu/ Copyright 2007 -2010
47
Firewall Best Practices ●
●
●
●
Populate a Router with the Maximum RAM Configuration Use Connection Tracking to achieve state-full packet inspection & perform fragmented packet reassembly Disable Administration interfaces from External Interfaces Try where possible to use in interfaces rather than source ip address for establishing the level of trust that you have for the
http://wirelessconnect.eu/ Copyright 2007 -2010
48
Firewall System Best Practices ●
Run as few network services on the firewall hardware as possible
●
Turn off all Administration services that are not needed
●
Do not use un-encrypted administration protocols
●
Shore up un-encrypted services with IPSEC policies
●
–
SNMP
–
DNS (internal use not for customer use)
–
Http fetch
Shore up weak encrypted protocols with IPSEC policies
http://wirelessconnect.eu/ Copyright 2007 -2010
49
Disable Un-needed services ●
●
●
●
●
Drastically reduces attack surface of your firewall. If a service has a vulnerability your firewall can be compromised (stability, availability, integrity) Administration Services are particularly risky as they allow for the change of firewall configuration DNS Server services should be offloaded to a Hardened DNS Box NTP Server services should be offloaded to a Hardened NTP Box
http://wirelessconnect.eu/ Copyright 2007 -2010
50
Unencrypted Administration Risk ●
●
●
●
Vulnerable to Sniffing / Replay attacks. Can allow an attacker who can view the traffic to harvest user authentication credentials IPSEC can eliminate this risk by securing the traffic with the best available FIPS grade cryptography protocols IPSEC can be used to increase confidence if encryption quality of an administration service is unknown.
http://wirelessconnect.eu/ Copyright 2007 -2010
51
More RAM – More Connections ●
●
●
●
●
●
NSA Security Guide for Routers suggests that Perimeter routers /firewalls be configured with the maximum available RAM The More RAM you have the harder the device is to Crash due to memory exhaustion (DOS / DDOS attacks) MT ROS Devices are Optimised against RAM Exhaustion Attacks. The firewall can cope better in busy periods. Ogma Connect Routers are always Sold with the maximum Supported RAM available :) Wireless Connect Customers can avail of RAM upgrades for RB1000 & the New and Improved RB1100 :) http://wirelessconnect.eu/ Copyright 2007 -2010
52
Hardware with multiple Physical Interfaces ●
●
●
The More Interfaces the more you can isolate multiple untrusted interfaces. For Clients who require higher levels of Secuity assurance. Please Check Out my colleague Wardner Maia's Presentation on Layer 2 Threats and Countermeasures.
http://wirelessconnect.eu/ Copyright 2007 -2010
53
Hardware fit for the Job :) ●
As you have seen from the My colleague and Friend Patrik Schaub's presentation on Mikrotik Datacentre products.
http://wirelessconnect.eu/ Copyright 2007 -2010
54
RB 1100 ●
13 Interfaces :) so greater control of your network
●
●
●
●
Available from Wireless Connect Shortly.
http://wirelessconnect.eu/ Copyright 2007 -2010
55
Ogma Connect 2500 ●
11 GBE Interfaces by Default
●
Up to 19 GBE with Expansion Cards
http://wirelessconnect.eu/ Copyright 2007 -2010
56
Connection Tracking ●
ConTrack carries out the following essential tasks –
It monitors the state of all connections / requests flowing in the firewall
–
Allows the firewall to dynamically open / close ports according to the connection state in the firewall
–
Performs IP Packet Reassembly before inspection (prevents IP Fragment Attacks)
http://wirelessconnect.eu/ Copyright 2007 -2010
57
Filter Administration Services ●
Minimise Risk from outside attacks
●
Allow Flexibility of management internally
http://wirelessconnect.eu/ Copyright 2007 -2010
58
Firewall Setup Strategy ●
Turn on connection tracking
●
Break down the security policy into functional groups
●
Use chains to define these functional groups
●
Granularly control settings within the chains /groups
●
Make use of Address lists group hosts together
http://wirelessconnect.eu/ Copyright 2007 -2010
59
List Objectives (policies) ●
We want to –
Detect / Block Traffic to / from Invalid Addresses
–
Detect / Block Traffic that have a large packet size
–
Detect / Block Traffic that has unusual characteristics
–
Detect / Block Traffic from Port Scanners
–
Detect / Block Traffic from Brute Force Hackers
–
Once Traffic has been inspected don't keep reprocessing the same connection.
–
Analyse Traffic originating from and Leaving router
–
Protect Traffic Entering and destined for the router.
Block invalid packets with IP Broadcast source address
http://wirelessconnect.eu/ Copyright 2007 -2010
62
Blocking IP Directed broadcast ●
●
In forward chain create a rule with “destination address type” = Broadcast. Example of IP Directed broadcast 192.168.1.255
http://wirelessconnect.eu/ Copyright 2007 -2010
63
Blocking IP Directed Broadcast
http://wirelessconnect.eu/ Copyright 2007 -2010
64
Block Bad People Dynamic updates ●
●
●
Reference Spamhaus DROP List (Dont Route or Peer) updated Weekly Reference SANS ISC Top 10 – 10000(optional if you wish) Bogons (un allocated not special Purpose) Updated a circa every month
http://wirelessconnect.eu/ Copyright 2007 -2010
65
Updating Address Lists automatically ●
●
●
Use a combination of Scheduler and Scripting tools, and Fetch. Fetch is very good because of the ability to use DNS Addresses for ease of management. Security Concerns...Updates traversing untrusted networks –
Use IPSEC Policy for fetch tool,
–
ensure DNS Requests don't traverse untrusted networks
or –
Use Static DNS http://wirelessconnect.eu/ Copyright 2007 -2010
TCP Scans Detected Directly UDP Scans indirectly Drop UDP Scans / Results of UDP Scans (ICMP) Add big offenders to Port Scanners blocking list
http://wirelessconnect.eu/ Copyright 2007 -2010
71
Checking Rate of matches ●
●
For blacklisting obvious UDP Scanners Limit the speed of a scan for 120 ports per minute
http://wirelessconnect.eu/ Copyright 2007 -2010
72
Blocking the UDP Attacker ●
Use Add Dst Address to Address List action
http://wirelessconnect.eu/ Copyright 2007 -2010
73
Brute Force Detection ●
●
●
●
Depends on server disconnection after failed authentication attempts. Requires that any one administration session is maintained as continuous established connection. Based on some cool ideas from the MT User Community –
On First Connection ( First authentication attempt) add src to Management Light Grey List
–
On Second Connection add src to Management Grey List
–
On Third Connection add src to Management Dark Grey List
–
On Fourth Connection add src to Management Black List
Then insert Rule to Block members of the Management Black List this List on the Router http://wirelessconnect.eu/ Copyright 2007 -2010
74
Sending Protocols to bruteforce check ●
Send selected protocols to the Brute Force Check Chain
http://wirelessconnect.eu/ Copyright 2007 -2010
75
Brute Force Detection
http://wirelessconnect.eu/ Copyright 2007 -2010
76
Last Rule in Detection Chain ●
Accept new connection as long as Src Address is not in the management Black List
●
http://wirelessconnect.eu/ Copyright 2007 -2010
77
Further Reading ●
●
●
For more information on firewall rules click on Http://wirelessconnect.eu/layer3_subscriptions Sign up for an account and we will send you instructions for setting up the firewalls and Proxies when they are publicly released after the MUM http://wiki.mikrotikl.com