Handbook of Local Area Networks, 1998 Edition:LAN Security
Click Here!
Search the site:
ITLibrary
ITKnowledge
EXPERT SEARCH
Programming Languages
Databases
Security
Web Services
Network Services
Middleware
Components
Operating Systems
User Interfaces
Groupware & Collaboration
Content Management
Productivity Applications
Hardware
Fun & Games
EarthWeb sites
Crossnodes
Datamation
Developer.com
DICE
EarthWeb.com
EarthWeb Direct
ERP Hub
Gamelan
GoCertify.com
HTMLGoodies
Intranet Journal
IT Knowledge
IT Library
JavaGoodies
JARS
JavaScripts.com
open source IT
RoadCoders
Y2K Info
Previous
Table of Contents
Next
Two Networks, One Host
Rather than using a modem to contact an ISP (be it internal or external), it will almost certainly be faster to have genuine LAN connection to the Internet (see Exhibit 8-1-7). One way to do this is to have each Internet-capable machine connected to the Internet and to the production network and to disable IP-forwarding on the machines (i.e., configure each machine that is dually connected so that it does not behave as a router). This has some obvious speed advantages, but will probably be cost prohibitive for most sites. It also makes the network slightly less secure by increasing the chance that the production network and the Internet network could get accidentally connected.
Exhibit 8-1-7. A Dually Connected Host with IP Forwarding Turned Off
The Router-Only Solution
A popular method for connecting to the Internet without additional equipment has been the router-only solution (see Exhibit 8-1-8). As mentioned, most modern routers have a facility for blocking certain ranges of IP addresses and/or TCP ports. Using this solution, an administrator could, for instance, limit SMTP mail to a particular host. The problems with this method of firewalling are that administrators must be certain that the machines that they are giving the outside world access to cannot be used to jump to other machines on the network, and that TCP ports above 1,024 must be left open for outgoing connections. This makes a network vulnerable to holes dug by internal users who have learned the trick of opening a high-numbered port.
Exhibit 8-1-8. Router Filtering Incoming Traffic
Surviving Complete Connectivity
For many sites, particularly those where the users have become accustomed to complete connectivity, no firewall will satisfy them. If using this solution, it is best if administrators also carefully log the IP addresses and the TCP ports on those hosts that are left open. TCP wrappers provide an excellent logging mechanism. TCP wrappers sit between the actual program that the foreign machine is attempting to contact (e.g., telnet) and the network interface. The wrappers can be used to log connections or refuse connectivity based on IP address. They are available for UNIX computers by anonymous FTP.
A Bastion Proxy Host
Many traditional Internet firewalls have been constructed by placing a single machine between a production network and the outside world. This bastion host would run a minimal set of software and more complicated access method.
Commercial Solutions
Several vendors sell and support off-the-shelf firewall systems. These vary significantly. If planning to purchase such a system, administrators should be sure that they thoroughly understand how it operates and exactly what it is firewalling.
TELEPHONY
An aspect of computer network security that is sometimes overlooked is telephony. Telephony, for purposes of this chapter, includes any system in which users need modems to connect into and out of facility. There are some obvious problems. If hackers are able to freely dial into a system, they could compromise the system or use the system as a springboard for breaking into other computers. Telephone numbers cannot be kept secret. Programs that dial through an entire prefix of numbers (called War Games Dialers, named after the movie) have been available for years. This problem should be approached from the viewpoint that modem numbers are well-known.
Dial-Back Only. There are many terminal servers and other systems that can be set to only function in dial-back mode. The following dialogue usually occurs with dialback:
The user dials a special number that is used only to initiate a dialback connection.
The user identifies himself or herself, usually through a username/password pair.
The connection is closed.
The user sets his or her machine for auto-answer.
The foreign machine calls the user at his or her prearranged number.
The user has remote access into his or her system.
This system is not without its drawbacks. First, there must be a prearranged number at which the user will be waiting for the returned phone call. Second, this system can be defeated by call forwarding. Third, and most importantly, this system is difficult if not impossible to administer for users who travel.
Hardware Encryption. Devices exist that can be put on both ends of a telephone connection to encrypt the data. These devices are usually expensive, and may be difficult to export.
Previous
Table of Contents
Next
Use of this site is subject certain Terms & Conditions.
Copyright (c) 1996-1999 EarthWeb, Inc.. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of EarthWeb is prohibited.
Please read our privacy policy for details.