Top Banner
Network Security !"#" $%&#’ ت#&)*%+ ا#-’).)/01 $-*2 ت#-3& ا45. ا678 ;/:س+ ار)=2:. ا>5? 6@40.5? رث#B. اLecture 4 AAA
22

Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Mar 25, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Network Security

جامعة بابل كلية تكنولوجيا ا+علومات

قسم البرامجيات

الدكتور ا+هندس

الحارث عبدالكريم عبدا<

Lecture 4  AAA

Page 2: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

AAA Access Security

Accounting What did you spend it on?

Authentication Who are you?

Authorization which resources the user is allowed to access and which

operations the user is allowed to perform?

Page 3: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Authentication – Password-Only

l  Uses a login and password combination on access lines

l  Easiest to implement, but most unsecure method l  Vulnerable to brute-force attacks l  Provides no accountability

R1(config)# line vty 0 4 R1(config-line)# password cisco R1(config-line)# login

Internet

User Access Verification Password: cisco Password: cisco1 Password: cisco12 % Bad passwords

Password-Only Method

Page 4: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Authentication – Local Database

l  Creates individual user account/password on each device

l  Provides accountability l  User accounts must be configured locally on each

device

R1(config)# username Admin secret Str0ng5rPa55w0rd R1(config)# line vty 0 4 R1(config-line)# login local

Internet

User Access Verification Username: Admin Password: cisco1 % Login invalid Username: Admin Password: cisco12 % Login invalid

Local Database Method

Page 5: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Local and Remote Access

Internet LAN 1 R1

Local Access

Administrator Console Port

LAN 2

R1 Internet

R2 Firewall

LAN 3

Management LAN

Administration Host

Logging Host

Remote Access

Uses Telnet, SSH or HTTP connections to the router from a computer

Requires a direct connection to a console port using a computer running terminal emulation software

Page 6: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Password Security

l  To increase the security of passwords, use additional configuration parameters:

–  Minimum password lengths should be enforced –  Unattended connections should be disabled –  All passwords in the configuration file should be encrypted

R1(config)# service password-encryption R1(config)# exit R1# show running-config line con 0 exec-timeout 3 30 password 7 094F471A1A0A login

line aux 0

exec-timeout 3 30 password 7 094F471A1A0A

login

Page 7: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Passwords

An acceptable password length is 10 or more characters

Complex passwords include a mix of upper and lowercase letters, numbers, symbols and spaces

Avoid any password based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, or biographical information

Deliberately misspell a password (Security = 5ecur1ty)

Change passwords often

Page 8: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Access Port Passwords

R1

R1(config)# enable secret cisco

R1(config)# line con 0 R1(config-line)# password cisco R1(config-line)# login

R1(config)# line aux 0 R1(config-line)# password cisco R1(config-line)# login

R1(config)# line vty 0 4 R1(config-line)# password cisco R1(config-line)# login

Command to restrict access to privileged EXEC mode

Commands to establish a login password on the console line

Commands to establish a login password for dial-up modem connections

Page 9: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Creating Users

Parameter Description

name This parameter specifies the username. 0 (Optional) This option indicates that the plaintext

password is to be hashed by the router using MD5. password This parameter is the plaintext password to be hashed

using MD5. 5 This parameter indicates that the encrypted-secret

password was hashed using MD5. encrypted-secret This parameter is the MD5 encrypted-secret password

that is stored as the encrypted user password.

username name secret {[0]password|5encrypted-secret}

Page 10: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Enhanced Login Features

l  The following commands are available to configure a Cisco IOS device to support the enhanced login features:

1.  login block-for Command. 2.  System Logging Messages.

Page 11: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

login block-for Command

l  All login enhancement features are disabled by default. The login block-for command enables configuration of the login enhancement features.

l  The login block-for feature monitors login device activity and operates in two modes:

1.  Normal-Mode (Watch-Mode) —The router keeps count of the number of failed login attempts within an identified amount of time.

2.  Quiet-Mode (Quiet Period) — If the number of failed logins exceeds the configured threshold, all login attempts made using Telnet, SSH, and HTTP are denied.

Page 12: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

System Logging Messages

l  To generate log messages for successful/failed logins: –  login on-failure log –  login on-success log

l  To generate a message when failure rate is exceeded: –  security authentication failure rate threshold-rate log

l  To verify that the login block-for command is configured and which mode the router is currently in: –  show login

l  To display more information regarding the failed attempts: –  show login failures

Page 13: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Self-Contained AAA Authentication

l  Used for small networks l  Stores usernames and passwords locally in

the Cisco router

Self-Contained AAA

1.  The client establishes a connection with the router.

2.  The AAA router prompts the user for a username and password.

3.  The router authenticates the username and password using the local database and the user is authorized to access the network based on information in the local database.

AAA Router Remote Client

1

2 3

Page 14: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Server-Based AAA Authentication

l  Uses an external database server –  Cisco Secure Access Control Server (ACS) for Windows Server –  Cisco Secure ACS Solution Engine –  Cisco Secure ACS Express

l  More appropriate if there are multiple routers

Server-Based AAA

1.  The client establishes a connection with the router.

2.  The AAA router prompts the user for a username and password.

3.  The router authenticates the username and password using a remote AAA server.

4.  The user is authorized to access the network based on information on the remote AAA Server.

AAA Router (AAA Client)

) Remote Client

1

2 4

Cisco Secure ACS Server

3

Page 15: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

AAA Authorization

l  Typically implemented using an AAA server-based solution l  Uses a set of attributes that describes user access to the

network

1.  When a user has been authenticated, a session is established with an AAA server.

2.  The router requests authorization for the requested service from the AAA server.

3.  The AAA server returns a PASS/FAIL for authorization.

Page 16: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

AAA Accounting

l  Implemented using an AAA server-based solution l  Keeps a detailed log of what an authenticated user

does on a device

1.  When a user has been authenticated, the AAA accounting process generates a start message to begin the accounting process.

2.  When the user finishes, a stop message is recorded ending the accounting process.

Page 17: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Local AAA Authentication Commands

l  To authenticate administrator access (character mode access)

1.  Add usernames and passwords to the local router database

2.  Enable AAA globally 3.  Configure AAA parameters on the router 4.  Confirm and troubleshoot the AAA configuration

Page 18: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

The differences between Local Authentication & Server-Based Authentication

1.  The user establishes a connection with the router.

2.  The router prompts the user for a username and password.

3.  The router passes the username and password to the Cisco Secure ACS (server or engine).

4.  The Cisco Secure ACS authenticates the user. The user is authorized to access the router (administrative access) or the network based on information found in the Cisco Secure ACS database.

Perimeter Router

Remote User

Cisco Secure ACS for Windows

Server 1 2

3

4

Server-Based Authentication

1.  The user establishes a connection with the router.

2.  The router prompts the user for a username and password authenticating the user using a local database.

Local Authentication

Page 19: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

TACACS+ and RADIUS

l  TACACS+ or RADIUS protocols are used to communicate between the clients and AAA security servers.

Perimeter Router

Page 20: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

Comparison between TACACS+/RADIUS

TACACS+ RADIUS Functionality Separates authentication and

authorization . Combines authentication and authorization .

Standard Mostly Cisco supported Open/RFC standard

Transport Protocol TCP UDP

Confidentiality Entire packet encrypted Password encrypted

Page 21: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

TACACS+ Process

l  Provides separate AAA services l  Utilizes TCP port 49

Connect Username prompt?

Username? Use “Username”

Ali Ali

Password?

Password prompt?

“Cisco1” Use “Password”

Accept/Reject

“Cisco1”

Page 22: Network Security - University of BabylonAuthentication – Password-Only! Uses a login and password combination on access lines ! Easiest to implement, but most unsecure method ! Vulnerable

RADIUS Process

l  Works in both local and roaming situations l  Uses UDP ports 1645 or 1812 for authentication and UDP ports

1646 or 1813 for accounting

Username?

Ali Password?

Cisco1

Access-Request (Ali, “Cisco1”)

Access-Accept