sis0 = administrative interface dc0




Download 2,67 Mb.
Pdf ko'rish
bet17/25
Sana14.05.2024
Hajmi2,67 Mb.
#233760
1   ...   13   14   15   16   17   18   19   20   ...   25
sis0
= administrative interface
dc0 
= external device non-verified
dc1
= internal device non-verified
dc2
= external device verified
dc3 
= internal device verified
See the illustration below for an idea of how this system will be connected and 
deployed. Please note, the cable connecting the NIC labeled dc1 to the router's 
interface with an IP address of 192.168.0.3 is a crossover type cable. The rest 
shown in the image are regular straight through cables. As you can see the router 
separates two networks. The first network is a Class C identified by 192.168.0.0/24, 
and the second network is yet another Class C of 192.168.1.0/24. The rest of the 
document will follow the concept of having 192.168.0.0 as the external or non-
trusted network, and 192.168.1.0/24 being considered as the trusted network. 
Make sure to substitute for your needs where appropriate.
Nicholas Pappas
38
@ 2021 SANS Institute
Author Retains Full Rights


© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
Figure 9: Protoype diagram.
Now that we know how to refer to the NIC's we need to create a file for each. To do 
this, commit the following commands, while substituting proper identifiers for your 
NIC's. First make sure these files don't pre-exist (they must only have the word "up" 
in them for our purposes):
rm /etc/hostname.dc0
rm /etc/hostname.dc1
rm /etc/hostname.dc2
rm /etc/hostname.dc3
Next create the files to tell OpenBSD that we want them up with no IP address.
echo up > /etc/hostname.dc0
echo up > /etc/hostname.dc1
echo up > /etc/hostname.dc2
echo up > /etc/hostname.dc3
Nicholas Pappas
39
@ 2021 SANS Institute
Author Retains Full Rights


© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
Now create two bridges. The first bridge is intended to actually filter traffic deemed 
malicious or otherwise unwanted, and the second is to verify the filter.
echo "add dc0" >> /etc/bridgename.bridge0
echo "add dc1" >> /etc/bridgename.bridge0
echo "up" >> /etc/bridgename.bridge0
echo "add dc2" >> /etc/bridgename.bridge1
echo "add dc3" >> /etc/bridgename.bridge1
echo "up" >> /etc/bridgename.bridge1
We should now see the following output from these commands:
cat /etc/bridgename.bridge0
add dc0
add dc1
up
cat /etc/bridgename.bridge1
add dc2
add dc3
up
Reboot the system by typing the following command:
reboot
Upon boot completion you should have the packets traveling over both bridges.
Install these packages for convenience:
cd /usr/ports/net/wget
make install

Download 2,67 Mb.
1   ...   13   14   15   16   17   18   19   20   ...   25




Download 2,67 Mb.
Pdf ko'rish