What is the difference between a trusted network and an untrusted network?

The example shown in Figure 1 shows a sample NJE network in which some nodes are trusted (see Understanding Mixed Security Environments), some nodes are semi-trusted (verification is done on inbound work), and some nodes are not trusted (no inbound work is allowed to run).

Figure 1. Example: trusted, semitrusted, and untrusted nodes
What is the difference between a trusted network and an untrusted network?

We shall begin with a definition of the three items; an untrusted network is external to an organizations owned and operated network. The organization has no control and or administration of the untrusted networks even though they must traverse them to get to their desired endpoints.  The Firewall is a combination of physical hardware and software built to control network traffic inbound or outbound to networks that have different levels of security postures (National Institute of Standards and Technology (NIST). (2017). NIST Special Publications. Retrieved from NIST Computer Security Division: http://csrc.nist.gov/publications/PubsSPs.html

Both Fast Ethernet and Gigabit Ethernet ports can be set to access or trunk mode. A port is in access mode enabled by default and carries traffic only for the VLAN to which it is assigned. In trunk mode, a port can carry traffic for multiple VLANs.

For a trunk port, specify whether the port will carry traffic for all VLANs configured on the managed device or for specific VLANs only. You can also specify the native VLAN for the port. A trunk port uses 802.1q tags to mark frames for specific VLANs, However, frames on a native VLAN are not tagged.

Classifying Traffic as Trusted or Untrusted

You can classify wired traffic based not only on the incoming physical port and channel configuration, but also on the VLAN associated with the port and channel.

About Trusted and Untrusted Physical Ports

Physical ports on the managed device are trusted and usually connected to internal networks by default, while untrusted ports connect to third-party APs, public areas, or other networks to which you can apply access controls. When you define a physical port as untrusted, traffic passing through that port needs to go through a predefined access control list policy.

About Trusted and Untrusted VLANs

You can also classify traffic as trusted or untrusted based on the VLAN interface and port or channel. This means that wired traffic on the incoming port is trusted only when the port’s associated VLAN is also trusted; otherwise the traffic is untrusted. When a port and its associated VLANs are untrusted, any incoming and outgoing traffic must pass through a predefined ACL. For example, this setup is useful if your company provides wired user guest access, and you want guest user traffic to pass through an ACL to connect to a captive portal.

You can set a range of VLANs as trusted or untrusted in trunk mode. The following table lists the port, VLAN and the trust/untrusted combination to determine if traffic is trusted or untrusted. Both the port and the VLAN have to be configured as trusted for traffic to be considered as trusted. If the traffic is classified as untrusted, then traffic must pass through the selected session access control list and firewall policies.

Combinations of the preceding, or any service that uses PPPoE to provide access, can be used to establish the redundancy desired in this scenario.

To be able to use dual untrust interfaces, the port mode must be set to either dual-untrust or combined. The combined mode is available on the NS-5XT and 5GT models, but functions identically to the two untrust ports. For the remainder of this chapter, dual-untrust is used to refer to either of these two modes.

WARNING

If you change the port mode, the entire configuration will be erased. It is a good idea to back up the existing configuration before you continue. Also, because the configuration is lost (including assigned IP addresses), it is easier to use the CLI via the console port than the Web interface.

Bringing the NetScreen into dual-untrust mode is done using the exec port-mode dual-untrust command from the CLI, or going to Configuration | Port Mode | Port Mode via the Web interface. Any previous configuration will be erased and must therefore be manually reentered after the firewall has rebooted. If you do not know what mode the firewall is in, you can see it by using the get system command from the CLI or by going to Configuration | Port Mode via the Web interface.

Example: Configuration for Dual ADSL Modems

Once in dual-untrust mode, you can add the necessary configuration needed for the two separate untrusted paths. For example, imagine a scenario where the preferred path is via one ADSL modem, and the backup path is via a different ADSL modem (or other service relying on PPPoE authentication), as depicted in Figure 12.1.

What is the difference between a trusted network and an untrusted network?

Figure 12.1. Redundant ADSL Internet Connections

From the CLI:

What is the difference between a trusted network and an untrusted network?

From the Web interface:

1.

Go to Network | PPPoE | New.

2.

Name this instance primary-adsl.

3.

Bind this instance to ethernet3.

4.

Enter the ISP's username and password.

5.

Enable the Clear IP on Disconnect option.

6.

Enable Auto-connect and specify 20 seconds.

7.

Click OK to save.

8.

Return to Network | PPPoE | New.

9.

Name this instance backup-adsl.

10.

Bind this instance to interface ethernet2.

11.

Enter the ISP username and password.

12.

Enable Auto-connect and specify 20 seconds.

13.

Click OK to save.

14.

Go to Network | Untrust Failover | Automatic Failover and click OK.

The clear-on-disconnect option is used to ensure that any old interface IP address or default gateway is removed when the PPPoE session goes down. This ensures that packets are routed correctly after a failover instead of being sent to the now unreachable gateway.

The idle-interval option allows you to automatically disconnect the PPPoE session after a certain period of inactivity. In this case, we do not want to do that. By setting it to zero, this feature is disabled and the PPPoE session will not be dropped due to inactivity.

The auto-connect option enables the NetScreen to attempt to reconnect to the PPPoE session if it is dropped. If this is not set, the connection must be manually brought up via the exec pppoe connect command, or by power-cycling the NetScreen. Clearly, this is not a desirable feature in our case; thus, we use auto-connect.

Another interesting aspect of this option is how it interacts with the automatic failover (if enabled). To give the primary untrust interface a good chance of recovering before a failover is initiated, set the auto-connect value lower than the failover hold-down setting, which is 30 seconds by default. This way, the PPPoE connection on the primary interface is retried before the failover is triggered. This might be enough to prevent a failover altogether depending on the reason for the failure of the PPPoE session.

Example: Advanced Configuration for ADSL Modem Plus ADSL Router

For this example, imagine a setup where the primary link is via an ADSL modem and the backup is via an ADSL router to a different ISP. They are used in this order to get the IP address assigned directly to the NetScreen. This way any NAT can take place on the NetScreen. The NetScreen provides more power and flexibility in this area than most ADSL routers commonly do, so it is the sensible thing to do.

To make matters a bit more interesting in this example, also assume that the primary ISP has assigned a static IP address to us (1.1.1.1) that should always be used, even if the remote end attempts to assign a different IP address during the PPP negotiation. Any decent ISP should be able to assign static IP addresses via PPPoE itself, but for the sake of this exercise, let's assume that this ISP cannot. The ISP's equipment is really bad at responding to the Link Control Protocol (LCP) Echo requests that are used to verify that the link is up. Unless more conservative timings are used on our end, the link will keep getting dropped despite actually being up and working fine. Furthermore, this ISP supports only Password Authentication Protocol (PAP); the considerably more secure Challenge Handshake Authentication Protocol (CHAP) is not supported.

From the CLI:

What is the difference between a trusted network and an untrusted network?

set vrouter trust-vr route 0.0.0.0/0 interface ethernet2 gateway 172.16.32.1

set failover auto

NOTE

Comments can be used in external NetScreen configuration files. They are removed when the configuration is loaded into the NetScreen, but can be very useful for documenting configurations in a noninterfering manner. Full-line comments start with a hash mark followed by a space (#). Half-line comments start with a space followed by a hash mark followed by a space (#).

From the Web Interface:

1.

Go to Network | Interfaces | Edit | ethernet3.

2.

Enter 1.1.1.1/24 for the IP address.

3.

Click OK.

4.

Go to Network | Interfaces | Edit | ethernet2.

5.

Enter 172.16.32.2/30 as the IP Address and Netmask.

6.

Click OK to save.

7.

Go to Network | PPPoE | New.

8.

Name this instance adsl.

9.

Enter the username and password for the ISP.

10.

Bind it to interface ethernet3.

11.

Select PAP as the Authentication type.

12.

Check the Static IP option.

13.

Select the Clear on Disconnect option.

14.

Set Auto-connect to 20 seconds.

15.

Click OK to save.

16.

Go to Network | PPPoE | PPP.

17.

Set LCP Echo Retries to 20.

18.

Set LCP Echo Timeout to 600.

19.

Click OK.

20.

Go to Network | Routing | Routing entries.

21.

Select trust-vr.

22.

Click New to add a new route.

23.

Enter 0.0.0.0/0 as the IP Address and Netmask.

24.

Select ethernet2 as the gateway interface.

25.

Enter 172.16.32.1 as the gateway IP address.

26.

Click OK to save the new route.

27.

Go to Network | Untrust Failover | Automatic Failover and click OK.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491181500149

MCSE 70-293: Planning, Implementing, and Maintaining Internet Protocol Security

Martin Grasdal, ... Dr.Thomas W. ShinderTechnical Editor, in MCSE (Exam 70-293) Study Guide, 2003

IPSec Modes

IPSec in Windows Server 2003 has two different modes: tunnel mode and transport mode. Your choice of which IPSec mode to use depends on your organizational needs. We will take a look at how each of these works and when each is appropriately used.

Tunnel Mode

Tunneling refers to a method of encapsulating a data packet inside another packet and routing the new packet across a network. Tunnels are used to create VPNs that allow data to go across the Internet (or another public or nonsecure network) without compromising security, because the inner packet and its header information are not visible on the public network.

In tunnel mode, IPSec encrypts the IP header and the payload, thereby securing the entire IP packet. It is used primarily when end systems or gateways do not support the L2TP/IPSec or the Point-to-Point Tunneling protocol (PPTP). In other words, tunnel mode allows you to use IPSec to create a tunnel, in addition to encrypting the data within the tunnel, with servers that cannot use the traditional VPN tunneling protocols (L2TP and PPTP). However, Windows Server 2003 does not support using IPSec as the tunneling protocol for remote access VPNs; it is only supported between gateways, routers, and servers. Remote access clients must use PPTP or L2TP for VPN connections.

The entire packet is encrypted by either AH or ESP. These two protocols will be discussed in more detail in the “IPSec Protocols” section. The outer IP header contains the addresses of the tunnel endpoints, and the encapsulated IP header contains the ultimate source and destination addresses, as illustrated in Figure 10.2.

What is the difference between a trusted network and an untrusted network?

Figure 10.2. The IPSec Tunnel Mode

Tunnel mode is used to protect data traveling between different networks that must pass through an untrusted network (such as the Internet). Tunnel mode works in the following configurations:

Gateway to gateway

Server to gateway

Server to server

Transport Mode

Transport mode, the default mode for IPSec, provides for end-to-end security. It can secure communications between a client and a server. When using the transport mode, only the IP payload is encrypted. AH or ESP provides protection for the IP payload. Typical IP payloads are TCP segments containing a TCP header and TCP segment data, User Datagram Protocol (UDP) messages containing a UDP header and UDP message data, and ICMP messages containing an ICMP header and ICMP message data.

EXAM DAY WARNING

Know and understand the differences between tunnel and transport modes in IPSec. Be aware of how each is used to make secure communications possible.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836937500142

Protecting Your Data

Eric Cole, in Advanced Persistent Threat, 2013

Data at Motion

While protecting information at rest is important, it is also critical to protect any information that goes over an untrusted network. Utilizing VPNs when data is sent over an untrusted network is critical to make sure the information cannot be intercepted or compromised. While many organizations typically do a pretty good job of making sure their laptops have VPN clients installed when they communicate over the Internet, the area that we see organizations have trouble is with untrusted clients. More and more people are accessing and connecting to corporate resources from the Web using an untrusted client. Two of the most common examples are personal computers from home and computers at international airports. Many executives travel internationally and many airlines have lounges where people can wait between flights. To make it easier for them to check email or work, many airlines often have computers that can be used to make it easier so someone does not have to turn on their computer between flights. The problem in these cases is the communication is usually encrypted with SSL but there is no protection of the data at rest. When users use the Web and SSL to access sensitive information, information it is often saved to the local hard drive of the untrusted system without the user realizing it. Since the system is untrusted someone else could potentially use the computer and access the sensitive information that the user inadvertently saved to that system. Therefore to provide both data in transit and data at rest protection, SSL VPNs are often used. An SSL VPN is an SSL connection that creates an encrypted RAM drive on the untrusted computer and all of the activity with the session is stored in the encrypted RAM drive. Now any file or information that is saved is in an encrypted area and because it is in memory, it is removed when the system is turned off. Now by using SSL VPNs an organization can ensure that their information is protected when it is going across an untrusted network and when it is stored on an untrusted computer.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978159749949100005X

Separation

Edward G. Amoroso, in Cyber Attacks, 2011

National Infrastructure Firewalls

The most common application of a firewall involves its placement between a system or enterprise to be protected and some untrusted network such as the Internet. In such an arrangement for the protection of a national asset, the following two possibilities immediately arise:

Coverage—The firewall might not cover all paths between the national asset to be protected and the untrusted network such as the Internet. This is a likely case given the general complexity associated with most national infrastructure.

Accuracy—The firewall might be forced to allow access to the national asset in a manner that also provides inadvertent, unauthorized access to certain protected assets. This is common in large-scale settings, especially because specialized protocols such as those in SCADA systems are rarely supported by commercial firewalls. As a result, the firewall operator must compensate by leaving certain ports wide open for ingress traffic.

To address these challenges, the design of national security infrastructure requires a skillful placement of separation functionality to ensure that all relevant traffic is mediated and that no side effects occur when access is granted to a specific asset. The two most effective techniques include aggregation of protections in the wide area network and segregation of protections in the local area network (see Figure 3.4).

What is the difference between a trusted network and an untrusted network?

Figure 3.4. Wide area firewall aggregation and local area firewall segregation.

Aggregating firewall functionality at a defined gateway is not unfamiliar to enterprise security managers. It helps ensure coverage of untrusted connections in more complex environments. It also provides a means for focusing the best resources, tools, and staff to one aggregated security complex. Segregation in a local area network is also familiar, albeit perhaps less practiced. It is effective in reducing the likelihood that external access to System A has the side effect of providing external access to System B. It requires management of more devices and does generally imply higher cost. Nevertheless, both of these techniques will be important in national infrastructure firewall placement.

Effective protection of national infrastructure will undoubtedly be expensive due to the increased management of devices.

A major challenge to national infrastructure comes with the massive increase in wireless connectivity that must be presumed for all national assets in the coming years. Most enterprise workers now carry around some sort of smart device that is ubiquitously connected to the Internet. Such smart devices have begun to resemble computers in that they can support browsing, e-mail access, and even virtual private network (VPN) access to applications that might reside behind a firewall. As such, the ease with which components of infrastructure can easily bypass defined firewall gateways will increase substantially. The result of this increased wireless connectivity, perhaps via 4G deployment, will be that all components of infrastructure will require some sort of common means for ensuring security.

Smart devices have added another layer of complexity to network protection.

Massive distribution of security to smart wireless endpoint devices may not be the best option, for all the reasons previously cited. It would require massive distribution, again, of the security responsibility to all owners of smart devices. It also requires vigilance on the part of every smart device owner, and this is not a reasonable expectation. An alternative approach involves identifying a common transport infrastructure to enforce desired policy. This might best be accomplished via the network transport carrier. Network service providers offer several advantages with regard to centralized security:

Vantage point—The network service provider has a wide vantage point that includes all customers, peering points, and gateways. Thus, if some incident is occurring on the Internet, the service provider will observe its effects.

Operations—Network service providers possess the operational capability to ensure up-to-date coverage of signatures, updates, and new security methods, in contrast to the inability of most end users to keep their security software current.

Investment—Where most end users, including enterprise groups, are unlikely to have funds sufficient to install multiple types of diverse or even redundant security tools, service providers can often support a business case for such investment.

For these reasons, a future view of firewall functionality for national infrastructure will probably include a new aggregation point—namely, the concept of implementing a network-based firewall in the cloud (see Figure 3.5).

What is the difference between a trusted network and an untrusted network?

Figure 3.5. Carrier-centric network-based firewall.

A firewall in the cloud may be the future of firewall functionality.

In the protection of national infrastructure, the use of network-based firewalls that are embedded in service provider fabric will require a new partnership between carriers and end-user groups. Unfortunately, most current telecommunications service level agreements (SLAs) are not compatible with this notion, focusing instead on packet loss and latency issues, rather than policy enforcement. This results in too many current cases of a national infrastructure provider being attacked, with the service provider offering little or no support during the incident. Obviously, this situation must change for the protection of national assets.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123849175000032

Domain 4: Communication and Network Security (Designing and Protecting Network Security)

Eric Conrad, ... Joshua Feldman, in CISSP Study Guide (Third Edition), 2016

Dual-Homed Host

A dual-homed host has two network interfaces: one connected to a trusted network, and the other connected to an untrusted network, such as the Internet. The dual-homed host does not route: a user wishing to access the trusted network from the Internet, as shown in Figure 5.28, would log into the dual-homed host first, and then access the trusted network from there. This design was more common before the advent of modern firewalls in the 1990s, and is still sometimes used to access legacy networks.

What is the difference between a trusted network and an untrusted network?

Figure 5.28. Dual-Homed Host

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128024379000059

Access Analytics

Mark Ryan M. Talabis, ... D. Kaye, in Information Security Analytics, 2015

Remote Access and VPN

What is VPN?

Basically, VPN is a generic term to describe a combination of technologies allowing one to create a secure tunnel through an unsecured or untrusted network, such as public networks like the Internet. This technology is used in lieu of a dedicated connection, commonly referred to as a dedicated line, from which the technology derives its “virtual” name. By using this technology, traffic appears to be running through a “private” network.

How does VPN work?

Data in VPN are transmitted via tunneling. Packets are encapsulated or wrapped in another packet with a new header that provides routing information. The route that these packets travel through is what is considered as the tunnel. There are also different tunneling protocols, but since this is not within the scope of this book, we will not be covering these protocols. Another thing to note about VPNs is that the data are encrypted. Basically, data going through the tunnel, which is passed through a public network, are unreadable without proper decryption keys. This ensures that data confidentiality and integrity is maintained.

What are the Dangers of VPN?

Using VPN in general is considered good practice for remote access. This makes packets going through a public network such as the Internet unreadable without proper decryption keys. It also ensures data are not disclosed or changed during transmission. However, by default, VPN generally does not provide or enforce strong user authentication. Current VPN technologies support add-on two-factor authentication mechanisms, such as tokens and various other mechanisms, which were mentioned earlier. However, by default, it is simply a username and password for gaining access to the internal network. This can present a significant risk because there could be scenarios whereby an attacker gains access to these credentials and subsequently to your internal resources. Here are a few examples:

A user can misplace their username and password.

A user can purposely share their username and password.

A user can fall victim to a spear phishing attack.

A user might be using a compromised machine with malware harvesting credentials.

In any of the above scenarios, once an attacker obtains the user’s credentials, assuming there is no two-factor authentication, the attacker would be able to gain access to all internal resources to which the user currently has access via the user’s remote profiles and access rights. Thus, determining the access rights is a major factor in determining the potential extent of the compromise.

Monitoring VPN

As this chapter is about detecting potential unauthorized remote access, it is important to provide you with a brief background on logging VPN access. Most VPN solutions have, in one form or another, logging capabilities. Although much of the logging capability is dependent on the vendor, at the very least, your VPN logs should contain the following information:

user ID of the individual,

date and time of access,

what resources were accessed, and

the external IP from which the access was made.

There are many VPN solutions, so it would be impossible to outline all the necessary instructions to obtain your organization’s VPN log data, but your network administrator should be able to provide log data to you. For the purposes of this chapter, we will be providing you with a sample data set that contains the aforementioned data.

In general, log data are fairly easy to obtain. However, monitoring the logs to ensure that the people who are logging on are actually employees of your organization is another matter. Let us say your organization has 5000 employees and one-quarter of them are given VPN access. There are still over 1000 connections that you will have to review. Obviously, you will not be able to ask each and every employee if they made the connection, right? We certainly do not lack the data; however, we are limited by our analysis capabilities. This lack of analysis is what we will be focusing on in this chapter.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128002070000058

An Introduction To Cryptography

In Next Generation SSH2 Implementation, 2009

Diffie–Hellman Key Exchange Protocol

Based on public key cryptography, the D-H algorithm is a method for securely exchanging a shared key between two parties over an untrusted network. It is an asymmetric cipher used by several protocols including SSL, SSH, and IPSec. It allows two communicating parties to agree upon a shared secret, which can then be used to secure a communication channel.

The D-H algorithm requires each of the communicating parties to have public/private key pairs. By the sender using a private key and the receiver using a public key, the sender and the receiver compute a shared secret number. If the same public/private key pairs of the same sender and recipient are used, both parties will arrive at the same number.

This number is then used as a shared symmetric cryptographic key and can be used as a key-encryption key (KEK) or to generate a content-encryption key (CEK). The CEK is commonly known as a session key. To prevent the same key from being generated in subsequent communication sessions, a random value is incorporated into the initial KEK generation process. This ensures that the resulting KEK is unique for each communication session.

In IPSec implementations, this uniqueness of keys from one key exchange to another is used to provide perfect forward secrecy. D-H is also used by the Internet Key Exchange (IKE) Protocol during session setup, where the identities of the communicating parties established and preferred encryption methods and shared secrets need to be agreed upon between the two entities.

D-H is used in SSL for authentication of the communicating parties and the negotiation of session keys and encryption methods.

When establishing a communication session, the SSH client and server compute a shared secret using the D-H algorithm. A hash of this shared secret is then generated and used as the session key to encrypt the communication channel.

What are trusted and untrusted networks?

About Trusted and Untrusted Physical Ports Physical ports on the managed device are trusted and usually connected to internal networks by default, while untrusted ports connect to third-party APs, public areas, or other networks to which you can apply access controls.

What does untrusted network mean?

An untrusted network is any network where the network is not soley managed by the group or department that manages the private network. A public network is any network that is soley managed by the group or department that manages the private network but can access devices in the untrusted network.

What is the relationship between the untrusted network the firewall and the trusted network?

-The untrusted network refers to the internet. -The trusted network refers to the privately owned network. -The firewalls filters traffic from the untrusted network to the trusted network to ensure it is legitimate and not harmful.

Is the boundary between the trusted and untrusted network?

In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet.