network security using iptables. topics of discussion network traffic in present scenario !! why we...

10
NETWORK SECURITY NETWORK SECURITY USING IPTABLES USING IPTABLES

Upload: mervyn-bishop

Post on 02-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

NETWORK SECURITYNETWORK SECURITY USING IPTABLESUSING IPTABLES

Page 2: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

TOPICS OF DISCUSSIONTOPICS OF DISCUSSION

NETWORK TRAFFIC IN PRESENT NETWORK TRAFFIC IN PRESENT SCENARIO !!SCENARIO !!

WHY WE NEED SECURITY ?WHY WE NEED SECURITY ? TYPE OF ATTACKS & WAYS TO TACKLE IT TYPE OF ATTACKS & WAYS TO TACKLE IT IPTABLES : HOW & WHERE TO USEIPTABLES : HOW & WHERE TO USE PRACTICAL APPLICATIONPRACTICAL APPLICATION LATEST DEVELOPMENTS & RESEARCH LATEST DEVELOPMENTS & RESEARCH

Page 3: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

online users 2.gif

NETWORK TRAFFIC & INTERNET USERS

Page 4: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

Network Security: An OverviewNetwork Security: An Overview

Any action that compromises the security Any action that compromises the security of information.of information.

four types of attack –four types of attack –

1. Interruption

2. Interception

3. Modification

4. Fabrication

Page 5: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

TOOLS FOR SECURITYTOOLS FOR SECURITY CRYPTOGRAPHY (data)CRYPTOGRAPHY (data) KERBEROS (servers)KERBEROS (servers) PGP (PGP ( E-mails)E-mails) IPSec (rout-net)IPSec (rout-net) SSL (higher level)SSL (higher level) FIREWALLS FIREWALLS IPTABLES IPTABLES

Page 6: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

iptables is the name of the user space tool by which administrators create rules

for the packet filtering and NAT modules

Iptables is often used to refer to the entire infrastructure, including netfilter,connection tracking and NAT, as well as the tool itself. iptables is a standard part of all modern Linux distributions

Page 7: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

Iptables where and how to useIptables where and how to use Ip Iptable “Tables”table “Tables”

actually, multiple tables, each supporting actually, multiple tables, each supporting several chains are used.several chains are used.

each table handles a different purpose each table handles a different purpose (we cannot see these tables).(we cannot see these tables).

1. filter table1. filter table 2. NAT table2. NAT table 3. Mangle table 3. Mangle table

Page 8: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

Iptables setup & loadingIptables setup & loading

each Linux distribution takes different approach each Linux distribution takes different approach to manage firewall.to manage firewall.

in Red-hat linux all rules are stored in the file in Red-hat linux all rules are stored in the file - /etc/sysconfig/iptables- /etc/sysconfig/iptables

To turn on firewall ( as root) To turn on firewall ( as root)

/sbin/service iptables on/sbin/service iptables on

/sbin/service iptables save/sbin/service iptables save

/sbin/service iptables load/sbin/service iptables load

Page 9: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

Firewall policyFirewall policy

to protect the firewall itself we want to to protect the firewall itself we want to restrict communication destined directly to restrict communication destined directly to the firewall very strictly.the firewall very strictly.

to do the above …………….to do the above ……………. (in SSH ) (in SSH ) iptables–A INPUT-s 192.168.50.0/24iptables–A INPUT-s 192.168.50.0/24 -p tcp –dport 22 –j ACCEPT-p tcp –dport 22 –j ACCEPTIptables –A INPUT –j REJECT –reject-with Iptables –A INPUT –j REJECT –reject-with

icmp-hostprohibited icmp-hostprohibited

Page 10: NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE

NOW LET US SEE ………………………….

SOME PRACTICAL IMPLEMENTATION

OF IPTABLES (HOW ONE CAN HACK THE NETWORK

SECURITY) AND HOW IPTABLES ARE EFFECTIVE.