Cisco Catalyst 9600 Series Switches Running IOS-XE 16.12 Common Criteria Operational User Guidance
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Flexgw Ipsec VPN Image User Guide
FlexGW IPsec VPN Image User Guide Zhuyun Information Technology Co.,Ltd. www.cloudcare.cn Zhuyun Information Technology Co.,Ltd. Contents .......................................................................................................... .................................................................................................................. 1 Introduction 4 1.1 Software Compon.e..n..t.s................................................................................................................... 4 1.2 Login Description ................................................................................................................... 4 1.3 Function Description ....................................................................................................5 1.4 Typical Scenarios Des..c..r..i.p..t..i.o..n......................................................................................................5 1.5 Program Description .................................................................................6 1.6 Software Operation Command Summary ............................... 7 ............................................................................................................... 2 IPSec Site-to-Site VPN User Guide (VPC network scenario) 8 2.1 Start IPSec VPN.s..e..r..v..i.c..e.................................................................................................................8 2.2 Add new tunnel ................................................................................................................. -
Enabling TPM Based System Security Features
Enabling TPM based system security features Andreas Fuchs <[email protected]> Who am I ? ● 13 year on/off TPMs ● Fraunhofer SIT: Trustworthy Platforms ● TCG-member: TPM Software Stack WG ● Maintainer – tpm2-tss: The libraries – tpm2-tss-engine: The openssl engine – tpm2-totp: Computer-to-user attestation (mjg’s tpm-totp reimplemented for 2.0) 2 The hardware stack ● Trusted Platform Module (TPM) 2.0 – Smartcard-like capabilities but soldered in – Remote Attestation capabilities – As separate chip (LPC, SPI, I²C) – In Southbridge / Firmware – Via TEEs/TrustZone, etc – Thanks to Windows-Logos in every PC ● CPU – OS, TSS 2.0, where the fun is... 3 The TPM Software Stack 2.0 ● Kernel exposes /dev/tpm0 with byte buffers ● tpm2-tss is like the mesa of TCG specs ● TCG specifications: – TPM spec for functionality – TSS spec for software API ● tpm2-tss implements the glue ● Then comes core module / application integration – Think GDK, but OpenSSL – Think godot, but pkcs11 – Think wayland, but cryptsetup 4 The TSS APIs System API (sys) Enhanced SYS (esys) Feature API (FAPI) • 1:1 to TPM2 cmds • Automate crypto for • Spec in draft form HMAC / encrypted • TBimplemented • Cmd / Rsp sessions • No custom typedefs U serialization • Dynamic TCTI • JSON interfaces s • No file I/O loading • Provides Policy e • No crypto • Memory allocations language r • No heap / malloc • No file I/O • Provides keystore S p TPM Command Transmission Interface (tss2-tcti) p a Abstract command / response mechanism, • No crypto, heap, file I/O a Decouple APIs -
Master Thesis
Master's Programme in Computer Network Engineering, 60 credits MASTER Connect street light control devices in a secure network THESIS Andreas Kostoulas, Efstathios Lykouropoulos, Zainab Jumaa Network security, 15 credits Halmstad 2015-02-16 “Connect street light control devices in a secure network” Master’s Thesis in Computer Network engineering 2014 Authors: Andreas Kostoulas, Efstathios Lykouropoulos, Zainab Jumaa Supervisor: Alexey Vinel Examiner: Tony Larsson Preface This thesis is submitted in partial fulfilment of the requirements for a Master’s Degree in Computer Network Engineering at the Department of Information Science - Computer and Electrical Engineering, at University of Halmstad, Sweden. The research - implementation described herein was conducted under the supervision of Professor Alexey Vinel and in cooperation with Greinon engineering. This was a challenging trip with both ups and downs but accompanied by an extend team of experts, always willing to coach, sponsor, help and motivate us. For this we would like to thank them. We would like to thank our parents and family for their financial and motivational support, although distance between us was more than 1500 kilometres. Last but not least we would like to thank our fellow researchers and friends on our department for useful discussions, comments, suggestions, thoughts and also creative and fun moments we spend together. i Abstract Wireless communications is a constantly progressing technology in network engineering society, creating an environment full of opportunities that are targeting in financial growth, quality of life and humans prosperity. Wireless security is the science that has as a goal to provide safe data communication between authorized users and prevent unauthorized users from gaining access, deny access, damage or counterfeit data in a wireless environment. -
Microsoft DNS
1 a. Domain Name Service (DNS) encompassing Microsoft DNS From Wikipedia, the free encyclopedia Jump to: navigation, search Microsoft DNS is the name given to the implementation of domain name system services provided in Microsoft Windows operating systems. Contents [hide] 1 Overview 2 DNS lookup client o 2.1 The effects of running the DNS Client service o 2.2 Differences from other systems 3 Dynamic DNS Update client 4 DNS server o 4.1 Common issues 5 See also 6 References 7 External links [edit] Overview The Domain Name System support in Microsoft Windows NT, and thus its derivatives Windows 2000, Windows XP, and Windows Server 2003, comprises two clients and a server. Every Microsoft Windows machine has a DNS lookup client, to perform ordinary DNS lookups. Some machines have a Dynamic DNS client, to perform Dynamic DNS Update transactions, registering the machines' names and IP addresses. Some machines run a DNS server, to publish DNS data, to service DNS lookup requests from DNS lookup clients, and to service DNS update requests from DNS update clients. The server software is only supplied with the server versions of Windows. [edit] DNS lookup client Applications perform DNS lookups with the aid of a DLL. They call library functions in the DLL, which in turn handle all communications with DNS servers (over UDP or TCP) and return the final results of the lookup back to the applications. 2 Microsoft's DNS client also has optional support for local caching, in the form of a DNS Client service (also known as DNSCACHE). Before they attempt to directly communicate with DNS servers, the library routines first attempt to make a local IPC connection to the DNS Client service on the machine. -
Nist Sp 800-77 Rev. 1 Guide to Ipsec Vpns
NIST Special Publication 800-77 Revision 1 Guide to IPsec VPNs Elaine Barker Quynh Dang Sheila Frankel Karen Scarfone Paul Wouters This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-77r1 C O M P U T E R S E C U R I T Y NIST Special Publication 800-77 Revision 1 Guide to IPsec VPNs Elaine Barker Quynh Dang Sheila Frankel* Computer Security Division Information Technology Laboratory Karen Scarfone Scarfone Cybersecurity Clifton, VA Paul Wouters Red Hat Toronto, ON, Canada *Former employee; all work for this publication was done while at NIST This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-77r1 June 2020 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. -
Network Working Group T. Pauly Internet-Draft Apple Inc
Network Working Group T. Pauly Internet-Draft Apple Inc. Intended status: Informational C. Perkins Expires: September 6, 2018 University of Glasgow K. Rose Akamai Technologies, Inc. C. Wood Apple Inc. March 05, 2018 A Survey of Transport Security Protocols draft-pauly-taps-transport-security-02 Abstract This document provides a survey of commonly used or notable network security protocols, with a focus on how they interact and integrate with applications and transport protocols. Its goal is to supplement efforts to define and catalog transport services [RFC8095] by describing the interfaces required to add security protocols. It examines Transport Layer Security (TLS), Datagram Transport Layer Security (DTLS), Quick UDP Internet Connections with TLS (QUIC + TLS), MinimalT, CurveCP, tcpcrypt, Internet Key Exchange with Encapsulating Security Protocol (IKEv2 + ESP), SRTP (with DTLS), and WireGuard. This survey is not limited to protocols developed within the scope or context of the IETF. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on September 6, 2018. -
Sophos Connect Help Contents About Sophos Connect
Sophos Connect help Contents About Sophos Connect............................................................................................................................ 1 How to install Sophos Connect.....................................................................................................1 How to uninstall Sophos Connect.................................................................................................2 Connections................................................................................................................................... 2 Events............................................................................................................................................ 8 Troubleshoot event errors........................................................................................................... 10 General troubleshooting.............................................................................................................. 19 About Sophos Connect Admin...............................................................................................................25 Editing configuration files............................................................................................................ 25 Legal Notices..........................................................................................................................................27 (2021/03/05) Sophos Connect 1 About Sophos Connect Sophos Connect is a VPN client that you can install on Windows and Macs. -
Deploying IBM Spectrum Accelerate on Cloud
Front cover Deploying IBM Spectrum Accelerate on Cloud Bert Dufrasne Nancy Kinney Donald Mathisen Christopher Moore Markus Oscheka Ralf Wohlfarth Eric Zhang Redpaper International Technical Support Organization Deploying IBM Spectrum Accelerate on Cloud December 2015 REDP-5261-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (December 2015) This edition applies to IBM Spectrum Accelerate Version 11.5 © Copyright International Business Machines Corporation 2015. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi IBM Redbooks promotions . vii Preface . ix Authors. ix Now you can become a published author, too . xi Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Introducing IBM SoftLayer and IBM Spectrum Accelerate . 1 1.1 IBM Cloud computing overview. 2 1.2 IBM SoftLayer Cloud overview . 3 1.3 IBM Spectrum Accelerate . 6 1.3.1 IBM Spectrum Accelerate on Cloud . 7 Chapter 2. IBM Spectrum Accelerate on Cloud . 9 2.1 Description of service . 10 2.2 Customer responsibilities . 11 2.3 Configuration types . 11 2.4 Hardware in SoftLayer data centers . 12 2.5 Ordering process. 12 2.5.1 Order process flow . 12 2.6 Changes to the existing configuration . 13 2.6.1 Increasing capacity and performance . 13 2.6.2 Capacity and performance reduction . 13 2.6.3 Termination of service. 13 2.7 Restrictions . 14 2.7.1 Ordering for use in customer SoftLayer account. 14 2.8 Connectivity. -
Automatic Local Area Network Encryption
Vula: automatic local area network encryption Abstract—This paper introduces Vula, a protocol and suite of will benefit from the use of Vula 2. With Vula’s ability to be Free Software tools for automatically protecting network traffic gradually deployed, every host has a notion of cryptographic between hosts in the same Local Area Network (LAN). Without identity, and we think that with this improvement it will be any configuration, or any user awareness, Vula automatically clearer how to solve the problem of Internet-wide end-to-end blinds passive adversaries. With user awareness and a small encryption without resorting to sending unecrypted IP packets, amount of interaction, it also protects connections using .local encrypted but unauthenticated IP packets, or any of the various hostnames, or any other user supplied domain, against active adversaries. The protocol additionally provides protection against Single Points of Failure (SPOFs) as described in SectionII. a passive adversary who is recording traffic today and who may have a quantum computer tomorrow. Vula’s protections A. Motivation persist with network topology changes which occur naturally over time, allowing users to maintain cryptographic assurances Public and private personal networks are commonly de- while roaming between different LANs. The software operates ployed using wired Ethernet (802.3) or wireless LAN (802.11) without requiring centralized administration, specialized network standards without comprehensive protection against surveil- equipment, or significant performance penalties. lance adversaries. Ethernet networks are commonly deployed in consumer and commercial contexts without encryption of any kind. Authentication [2] of end-user’s computers may be combined with a protocol such as MACsec [48] or WPA for I. -
TPM2 Software Community (Slides)
TPM2 Software Community https://github.com/tpm2-software Philip Tricca (Intel) Andreas Fuchs (Fraunhofer SIT) Agenda Intro & Architecture boot: tcti-uefi verify system: tpm2-totp decrypt disk: cryptsetup/clevis vpn: strongswan / openconnect server: openssl learning, experimenting, prototyping develop: Join us TSS2 Design Use-case driven – Support for constrained environments to full OS: Layered design – Separate transport layer from APIs – Both synchronous and async: event-driven programming – Details exposed if needed, “sane defaults” otherwise Lower layers provide data transport & direct access to TPM2 commands – “Expert” applications in constrained environments – Minimal dependencies (c99, libc) Upper layers provide convenience functions & abstractions – Crypto for sessions, dynamic memory allocation, transport layer configuration – More features → more dependencies TSS2 Design System API (tss2-sys) Enhanced SYS (tss2- Feature API (FAPI) • 1:1 to TPM2 cmds esys) • Spec in draft form • Automate crypto for • No implementation yet • Command / Response HMAC / encrypted • File I/O U serialization sessions • Requires heap s • No file I/O • Dynamic TCTI loading • Automate retries e • No crypto • Memory allocations • Context based state r • No heap / malloc • No file I/O • Must support static linking S p TPM Command Transmission Interface (tss2-tcti) a • Abstract command / response mechanism, No crypto, heap, file I/O c • Dynamic loading / dlopen API Decouple APIs from command transport / IPC e K TPM Access Broker and Resource Manager -
Building Secure Channels
Building Secure Channels Kenny Paterson Information Security Group Overview • Why do we need secure channels? • What properties should they have? • Literature on secure channels • Extended Example: TLS 2 Why do we need secure channels? • Secure communications is the most common real- world application of cryptography today. • No, it’s not MPC for sugar beet auctions! • Secure channels are extremely widely-deployed in practice: • SSL/TLS, DTLS, IPsec, SSH, OpenVPN,… • WEP/WPA/WPA2 • GSM/UMTS/LTE • Cryptocat, OTR, SilentCircle,… • (QUIC, MinimalT, TCPcrypt) • Mostly, but not exclusively in the 2-party case. 3 What security properties should they have? • Confidentiality – privacy for data • Integrity – detection of data modification • Authenticity – assurance concerning the source of data • All in the face of active attackers who can modify, delete, inject, re-order network messages. • These three properties are relatively easy to achieve using Authenticated Encryption (AE) or AEAD. • Recall AE notion from Monday. • AEAD: some data encrypted and integrity protected, other data (the header) only integrity protected. • But AE/AEAD were not available at the time many of today’s systems were designed. • Note that authenticated key establishment (AKE) is out-of-scope for this talk. • We assume the keys are already in place. • A major assumption, but a different summer school! 4 What security properties should they have? Less obvious security properties: • Anti-replay – detection that messages have been repeated. • Drop-detection – detection that messages have been deleted by the adversary or dropped by the network. • Particularly acute for the last message on a channel. • Cookie cutter attack. • Prevention of re-0rdering attacks. • Preserving the relative order of messages in each direction. -
Distributed Automatic Configuration of Complex Ipsec
J Netw Syst Manage (2010) 18:300–326 DOI 10.1007/s10922-010-9168-7 Distributed Automatic Configuration of Complex IPsec-Infrastructures Michael Rossberg • Guenter Schaefer • Thorsten Strufe Published online: 30 May 2010 Ó Springer Science+Business Media, LLC 2010 Abstract The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cryptographic tunnels, which grows quadratically with the total amount of IPsec gateways. This way of configuration is error-prone, cost-intensive and rather static. When private addresses are used in the protected subnetworks, the problem becomes even worse as the routing cannot rely on public infrastructures. In this article, we present a fully automated approach for the distributed configuration of IPsec domains. Utilizing peer-to-peer technology, our approach scales well with respect to the number of managed IPsec gateways, reacts robust to network failures, and supports the configuration of nested networks with private address spaces. We analyze the security requirements and further desirable properties of IPsec policy negotiation, and show that the distribution of security policy configuration does not impair security of transmitted user data in the resulting virtual private network (VPN). Results of a prototype implementation and simulation study reveal that the approach offers good characteristics for example with respect to quick reconfigu- ration of all gateways after a central power failure (robustness), or after insertion of new gateways (scalability and agility). M. Rossberg (&) Á G. Schaefer Technische Universita¨t Ilmenau, Telematics and Computer Networks Group, Postfach 100565, 98684 Ilmenau, Germany e-mail: [email protected] G.