Notices
Computer & Technology Related Post here for help and discussion of computing and related technology. Internet, TVs, phones, consoles, computers, tablets and any other gadgets.

Remote users.....how'd you protect the LAN's when they come in

Thread Tools
 
Search this Thread
 
Old 22 October 2003, 02:32 PM
  #1  
mega_stream
Scooby Regular
Thread Starter
 
mega_stream's Avatar
 
Join Date: May 2001
Location: Scotland
Posts: 4,580
Likes: 0
Received 0 Likes on 0 Posts
Post

I'm after ideas or suggestions to how to protect from remote office users coming into any office across the country (over 150) and plugging directly into a LAN port and picking up a DHCP address and potentially distributing a DOS attack by a virus they are carrying.

I know there's plenty of solutions to stop the virus in the first place, patch installations etc, but this is on a level where the user has no IT knowledge, probably has no IT support staff looking after his/her system.

Is there any kinda "virtual" firewall products that anyones used to quarantine systems, perhaps locking done to known mac addresses before an IP address is allocated by DHCP.

This would preferably not involve any client software on the PC's, installation on the LAN listening is the solution I'm after.

Thanks in advance for any suggestions!


Old 22 October 2003, 02:55 PM
  #2  
Chris L
Scooby Regular
 
Chris L's Avatar
 
Join Date: May 2000
Location: MY00,MY01,RX-8, Alfa 147 & Focus ST :-)
Posts: 10,371
Likes: 0
Received 0 Likes on 0 Posts
Arrow

Hmmm - not easy this one. You could look at Intrusion Detection Systems that are designed to look for 'unusual' traffic patterns etc. But this isn't going to be cheap if you are going to deploy it across 150 offices.

You could also use intranet firewalls placed at various sites around your network. The idea being to segment the network making it easier to isolate a group of sites. Placing a firewall at every site would, again, be very expensive. Netscreen do some quite clever stuff on their firewalls regarding the use of zones to split up networks.

I'll have a think and see if I can come up with anything else.

Chris
Old 22 October 2003, 02:57 PM
  #3  
Chris L
Scooby Regular
 
Chris L's Avatar
 
Join Date: May 2000
Location: MY00,MY01,RX-8, Alfa 147 & Focus ST :-)
Posts: 10,371
Likes: 0
Received 0 Likes on 0 Posts
Post

A few more thoughts..

Do the users access central databases and servers? Do they actually need to be allowed to go everywhere on the network?

Chris
Old 22 October 2003, 03:53 PM
  #4  
mega_stream
Scooby Regular
Thread Starter
 
mega_stream's Avatar
 
Join Date: May 2001
Location: Scotland
Posts: 4,580
Likes: 0
Received 0 Likes on 0 Posts
Talking

Chris

Users access servers from anywhere to anywhere!

Nothings easy
Old 22 October 2003, 04:12 PM
  #5  
IWatkins
Scooby Regular
 
IWatkins's Avatar
 
Join Date: Mar 2000
Location: Gloucestershire, home of the lawnmower.
Posts: 4,531
Likes: 0
Received 0 Likes on 0 Posts
Post

Hardware solution ?

I've seen little locks that plug into network access points to stop people plugging in their own cables. I've also seen locks that lock authorised cables into the wall sockets and PC at other end. Mind you, try as I might, I can't actually find any online at the moment.

Might work out cheaper than going for a software option ?

Cheers

Ian
Old 22 October 2003, 04:28 PM
  #6  
SiCotty
Scooby Regular
 
SiCotty's Avatar
 
Join Date: Jan 2001
Posts: 442
Likes: 0
Received 0 Likes on 0 Posts
Post

The best solution I can think of is using 802.1x authentication. This is built into winXP and can be added to win2k using a simple service pack. You use 802.1x to authenticate to the switch when you log into your domain on the network. The switch then authenticates the user and grants access to the rest of the network. All switch ports will be placed in a guest vlan before being assigned to the correct vlan on loggin. As an additional security step the port is also locked down to the MAC address of the client to prevent the use of local hubs to circumvent port level authentication security.

This complete operation is totaly transparent to the user, they just log onto the network as usuall.

The only snag is your switch needs to support 802.1x.

Si
Old 22 October 2003, 04:37 PM
  #7  
stevencotton
Scooby Regular
 
stevencotton's Avatar
 
Join Date: Jan 2001
Location: behind twin turbos
Posts: 2,710
Likes: 0
Received 1 Like on 1 Post
Post

This should be part of your Acceptable Use Policy rather than looking for a solution Microsoft-style.
Old 22 October 2003, 04:54 PM
  #8  
Gedi
Scooby Regular
 
Gedi's Avatar
 
Join Date: Jan 2003
Posts: 932
Likes: 0
Received 0 Likes on 0 Posts
Post

Try elaborating on tools like arpwatch.
I hardcode all the mac addressses we have into the DHCP server. An unknown mac address will not be assigned an IP. Its very quick to do. Write a quick perl script to broadcast arp requests to all machines currently on the different subnets (making sure you know no 'alien' machines are connected at the time) and store the output in a regex'd file.

I know there are issues of people spoofing macs, and I do have other tricks implemented to stop this. Unfortunatly, I can't tell you how I go about this as I am not willing / at liberty to release these methods for security purposes.
Related Topics
Thread
Thread Starter
Forum
Replies
Last Post
KAS35RSTI
Subaru
27
04 November 2021 07:12 PM
Mattybr5@MB Developments
Full Cars Breaking For Spares
28
28 December 2015 11:07 PM
Mattybr5@MB Developments
Full Cars Breaking For Spares
12
18 November 2015 07:03 AM
InTurbo
ScoobyNet General
21
30 September 2015 08:59 PM
Sub-Subaru
General Technical
1
28 September 2015 12:47 PM



Quick Reply: Remote users.....how'd you protect the LAN's when they come in



All times are GMT +1. The time now is 03:18 AM.