throbber
Global Information Assurance Certification Paper
`
`Copyright SANS Institute
`Author Retains Full Rights
`
`This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.
`
`Interested in learning more?
`Check out the list of upcoming events offering
`"Security Essentials Bootcamp Style (Security 401)"
`at http://www.giac.org/registration/gsec
`
`Microsoft Ex. 1018, p. 1
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`
`
`
`
`
`
`
`
`Access Control Lists to Protect a
`Network from Worm/DoS Attacks
`
`By Dennis Eck CCNA
`
`December 4, 2003
`GSEC Practical Assignment
`Version 1.4, Option 1
`
`
`
`1
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 2
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`Table of Contents
`
`
`1. Abstract………………………………………………………………………………..3
`
`2.
`
`Introduction……………………………………………………………………………3
`
`3. Major Internet Worm Attacks………………………………………………………..5
`
`4. Network Impact…………………………………………………………………….....8
`
`5. Ports to Monitor or Block………………………………………………………...…..9
`
`6. ACL Basics…………………………………………………………………………..11
`
`7. ACL Development and Implementation……………………………………….….13
`
`8. Finding and Blocking Infected Hosts with ACL’s…………………………..…….18
`
`9. Conclusion.…………………………………………………………………………..19
`
`10. References…………………………………………………………………….……..20
`
`2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 3
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`1. Abstract
`
`Internet worms and Denial of Service (DoS) attacks have had a significant impact on
`businesses and governments in recent years. The damage caused by these attacks is
`measured in billions of dollars. Corporate productivity and government functioning are
`significantly impaired during these attacks.
`
`Network security requires a Defense in Depth solution that is implemented at the client
`and server level as well as the network level. Solutions at the network level can include
`stateful firewalls, private virtual LAN’s at the switch level, and packet filtering at the
`router level.
`
`Five major Internet worms are reviewed in this paper: Code Red, Nimda, Slammer,
`Blaster, and Nachi. The network specific behavior of each virus is discussed along with
`research demonstrating that DoS attacks have the ability to completely overwhelm a
`network infrastructure.
`
`The use of access control lists (ACL’s) at the router level is a critical network security
`practice to safeguard a network infrastructure from worm/DoS attacks. ACL’s should be
`implemented at several key points within a network. These locations include the
`network edges, including the Autonomous System (AS) boundaries and connection to
`the Internet, WAN links that connect geographically separate sites, and LAN access
`points to individual systems and end users.
`
`This paper presents a variety of examples of ACL entries that can be used on a daily
`basis to protect a network from worm/DoS attacks. Examples of ACL entries are
`presented for general monitoring and blocking of malicious traffic, logging of potentially
`malicious traffic, blocking infected hosts, filtering out malicious traffic from mission
`critical systems, and an emergency stop ACL to block a significant worm/DoS attack.
`
`Network administrators are encouraged to keep up to date with known vulnerabilities on
`the Internet and keep ACL’s ready on their routers to implement at a moment’s notice to
`protect their infrastructure.
`
`2.
`
`Network security has become serious business in the past few years. Internet worms
`and Denial of Service (DoS) attacks impact almost every user on the Internet, especially
`businesses and governments. While end users may experience slowness
`in
`connections or inaccessibility of certain websites, businesses and governments
`experience a significantly greater impact.
`
`Introduction
`
`The financial impact sustained as a result of worm/DoS attacks is alarming. Code Red I
`and II cleanup costs totaled nearly $2.62 billion. The most expensive virus ever to hit
`was the Love Bug virus, which rang up $8.75 billion in damages by itself. Computer
`Economics, a research company that keeps a track of IT costs, published several
`
`
`
`3
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 4
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`estimates on the economic damage caused by major computer viruses. The figure
`below provides their estimates for years 1995 to 2001. Data for the year 2002 was not
`available to the public as of this writing.
`
`Analysis by Year
`
` Year
`2001
`2000
`1999
`1998
`1997
`1996
`1995
`
`Worldwide
` Economic Impact
` ($ U.S. Billions)
`$13.2
`17.1
`12.1
`6.1
`3.3
`1.8
`0.5
`
`Figure 1. Economic Impact of Malicious Code Attacks1
`
`In addition to the financial impact, corporate productivity and a variety of critical
`government services have been significantly impacted by worms released on the
`Internet. The following list illustrates some of the documented damage:
`
`•
`
`• The Pentagon had to take down a number of its web sites
`• The White House had to change its IP address
`• Bank of America and Canadian Imperial Bank reported that many customers could
`not withdraw money from ATMs
`Internet congestion prevented consumers from contacting Microsoft over the Internet
`to download patches
`• Millions of South Korean users lost Internet access when Korea Telecom Freetel
`and SK Telecom service failed
`• Networks at the U.S. departments of State, Agriculture, Commerce were disrupted
`• Some Associated Press news services and several newspapers were temporarily
`interrupted
`• Trading volume at the Korea Stock Exchange fell to a 13-month low as a result of
`investors avoiding submission of orders to buy
`• Continental Airlines reported widespread computer problems including delays at
`several major airports
`• Operations were disrupted within a number of high-profile companies such as Qwest
`Communications, AT&T, FedEx, and Intel.
`
`
`1 Waite, “Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001.”
`
`
`
`4
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 5
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`The solution to protect networks in the current inter-networked world requires a
`Defense-In-Depth approach. This approach uses a layered design that involves multiple
`systems, devices, and strategies that function together to minimize security holes and
`vulnerabilities. At the server and PC level, most major vendors have defined a common
`set of defense measures to prevent infection and hacker attacks. The following list
`outlines these standard defense measures:
`
`Install antivirus software and keep scan engine and virus definition files current
`•
`• Keep OS and software patch levels current
`• Enable a firewall that is native to the OS or install a personal third party firewall
`• Disable or remove any unnecessary services
`• Filter or delete email that contains .vbs, .bat, .exe, .pif or .scr file attachments
`since these attachments are known to be used as a vehicle to spread viruses
`Instruct employees not to open emails with attachments from unknown sources
`Implement a strong password policy
`
`•
`•
`
`In addition to the security measures in place at the client and server level, there are
`several defense methods that can be employed at the network level to protect against
`worms/DoS attacks. These security measures can include stateful firewalls, separating
`traffic at the switch level into private virtual LANs (VLAN), and packet filtering at the
`router level. This paper will focus on implementing access control lists on Cisco routers
`control worm/DoS attacks.
`
`3. Major Internet Worm Attacks
`
`There have been a handful of major Internet worms released on the Internet in the past
`few years. These worms created such a volume of traffic that network pipes became
`severely congested and network devices were overloaded to the point where they were
`unable to forward legitimate traffic, or the network devices may have literally crashed
`under the load. The result of these worms on the Internet was a Denial of Service attack
`against many ISP’s and business networks, even though this may not have been the
`original intent of the attack.
`
`In July 2001, the Code Red Worm was released on the Internet. According to data
`collected by the Cooperative Association for Internet Data Analysis (CAIDA):
`
`
`…more than 359,000 computers connected to the Internet were infected with the
`Code-Red worm in less than 14 hours… Even without being optimized for spread
`of infection, Code-Red infection rates peaked at over 2,000 hosts per minute.2
`
`
`Code Red affected Microsoft Index Server 2.0 and the Windows 2000 Indexing service
`on computers running IIS 4.0 and 5.0 Web servers. The worm sent its code as an HTTP
`request on port 80 which exploited a known buffer-overflow vulnerability. The worm also
`attempted a Denial of Service (DoS) against www.whitehouse.gov (198.137.240.91) if
`the date was between the 20th and 28th of the month.
`
`2 Moore, “Code-Red: a case study.” p.1.
`
`
`
`5
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 6
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`
`Code Red used a random number generator to get new IP addresses to attack. The
`initial revision of Code Red hit the same machines over and over again which limited the
`worm’s ability to spread. Code Red II used a better random number generator to create
`more target IP addresses by keeping the network portion of the IP address, and then
`choosing a random host portion of the IP address. This allows the worm to spread itself
`faster within the same network.
`
`A few months after Code Red was released, the Nimda worm surfaced. It took
`advantage of some similar vulnerabilities as Code Red, however, it was a hybrid attack
`that contained both worm and virus characteristics. As a more advanced attack, it could
`infect more systems and could infect systems in multiple ways. Nimda could infect any
`computer running Microsoft Windows software by exploiting a flaw in Outlook Express
`and known vulnerabilities in Microsoft's Internet Information Services software (IIS) 4 or
`5, including the security hole left by Code Red II.
`
`Nimda used randomly generated IP addresses to target vulnerable IIS servers using
`TCP 80 (HTTP). It copied itself to the vulnerable web server as a DLL using TFTP (UDP
`port 69), then created a listening port ready to transfer the copy of the worm . The
`transfer of the worm used NetBIOS TCP ports 137-139 or TCP port 445. Nimda then
`searched for all open network shares using Network Neighborhood. Nimda also used
`TCP port 25 (SMTP) for sending email to other systems using addresses taken from the
`infected system.
`
`The Slammer worm was released in January 2003. The primary impact of Slammer was
`a consumption of network bandwidth. It infected systems at a rate not seen before and
`saturated networks quickly. The worm created a Denial of Service attack due to the
`large number of packets it sends. In some cases, networks experienced 100% packet
`loss.
`
`Slammer targeted systems running Microsoft SQL Server 2000 and Microsoft Desktop
`Engine (MSDE) 2000. It took advantage of a buffer overflow vulnerability that allowed a
`part of system memory to be overwritten, then ran in the same security context as the
`SQL Server service. Slammer used UDP for connection setup so it did not have the
`overhead of the connection setup and m anagement required by TCP-based services.
`Code Red and Nimda took advantage of flaws in TCP-based services, which required a
`full three-way handshake before exchanging data. Slammer flooded the network by
`continuously sent traffic consisting of 376 byte packets to UDP port 1434 of randomly
`generated IP addresses.
`
`In August 2003, the Blaster worm hit the Internet, targeting Microsoft Windows 2000
`and XP systems in an attempt to take advantage of a recent published Microsoft
`Windows RPC DCOM vulnerability. The Distributed Component Object Model (DCOM)
`allows Microsoft software to communicate. This includes communication with Internet
`protocols such as HTTP. A flaw in the RPC code was exploited to cause a buffer
`overflow and the RPC service would fail. This allowed an attacker to run code with
`
`
`
`6
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 7
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`System privileges which included the ability to install programs, change data and create
`accounts with administrator rights.
`
`Blaster used several ports on compromised systems as listening ports or to execute
`commands. It scanned a random IP range looking for systems to infect on TCP port
`135, which is the port that the RPC process listens on. The traffic created by Blaster
`saturated subnets with port 135 requests. TCP port 4444 was also a listening port that
`allowed an attacker to issue remote commands through a hidden shell process. UDP
`port 69 listened for requests to transmit the virus from computers that were
`compromised by the RPC DCOM vulnerability. The worm also sent 40 byte HTTP
`packets on port 80 to windowsupdate.com at the rate of 50 packets per second. If it was
`unable to find a DNS entry for windowsupdate.com, Blaster used a broadcast address
`of 255.255.255.255.
`
`About one week after the Blaster worm was released, the Nachi worm surfaced with
`some interesting features for a virus or worm. While it took advantage of the same RPC
`DCOM vulnerability that Blaster did, it attempted to remove Blaster, then download and
`install the RPC DCOM patch from Microsoft.
`
`Nachi selected potential victims either by random IP addresses, or it searched starting
`with an IP address range using the same first two octets of the infected system’s IP
`address. It sent an ICMP echo request (PING) to find active machines on the network.
`The most visible network activity from Nachi was high volumes of 92 byte ICMP echo
`request (PING) packets.
`
`Once it found a machine, it either used TCP port 135 to exploit RPC DCOM
`vulnerability, or it used TCP port 80 to exploit the WebDav vulnerability. World Wide
`Web Distributed Authoring and Versioning (WebDAV) is implemented when IIS is
`installed. If an excessive amount of data was sent to WebDAV, the data was forwarded
`to the ntdll.dll, which failed to perform proper checks on the data
`
`
` and
`allowed a buffer to be overrun. The resulting buffer overflow allowed for execution of
`code in the IIS service, which runs with System level privileges.
`
`After it invades a system, a remote shell was created, and the system reconnected to
`the attacking system using a TCP port between 666 and 765. Commonly, it used port
`707. The port was used to establish a control channel to issue commands for
`downloading svchost.exe and dllhost.exe from an infected system. The actual
`downloads occurred using TFTP, which runs on UDP port 69.
`
`
`
`7
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 8
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`4. Network Impact
`
`Denial-of-service (DoS) attacks, such as those Internet worms discussed above,
`present a significant problem for networks. They can shut an organization off from the
`Internet or seriously disrupt both LAN access and site-to-site WAN communications.
`The CERT Coordination Center has reported that DoS attacks are increasingly being
`directed against network components:
`
`
`Windows end-users and Internet routing technology have both become more
`frequent targets of intruder activity…Bandwidth, processing power, and storage
`capacities are all common targets for DoS attacks…the most common DoS
`attack type reported to the CERT/CC involves sending a large number of packets
`to a destination causing excessive amounts of endpoint, and possibly transit,
`network bandwidth to be consumed. Such attacks are commonly referred to as
`packet flooding attacks. 3
`
`The severe demand placed on network equipment during a DoS attack was studied by
`David Moore with the Cooperative Association for Internet Data Analysis (CAIDA).
`Moore’s research quantified the amount of traffic that can be seen during a DoS attack:
`
`Half of the uniform random attack events have a packet rate greater than 250,
`whereas half of all attack events have a packet rate greater than 350. The fastest
`uniform random event is over 517,000 packets per second, whereas the fastest
`overall event is over 679,000 packets per second…In our trace, 38% of uniform
`random attack events and 46% of all attack events had an estimated rate of 500
`packets per second or higher. 4
`
`The increased traffic load placed on networking equipment during a DoS attack can
`severely impact the device’s ability to handle legitimate traffic. The common conditions
`seen on a router during a DoS attack include:
`
`
`• High CPU usage
`• Routing protocol drops
`• Packet loss
`• ARP storms
`• Excessive memory use.
`
`The ultimate result is that the router may reload itself, and may continue to reload itself
`until the DoS attack subsides.
`
`Additionally, firewalls can be overwhelmed by the amount of traffic they receive.
`Moore’s research with CAIDA further demonstrates that DoS attacks have the ability to
`compromise firewalls:
`
`
`3 Houle, “Trends in Denial of Service Attack Technology.” p.1-3
`4 Moore, “Inferring Internet Denial-of-Service Activity.” p.8.
`
`
`
`8
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 9
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`Recent experiments with SYN attacks on commercial platforms show that an
`attack rate of only 500 SYN packets per second is enough to overwhelm a
`server…The same experiments show that even with a specialized firewall
`designed to resist SYN floods, a server can be disabled by a flood of 14,000
`packets per second. In our data, 0.3% of the uniform random attacks and 2.4% of
`all attack events would still compromise these attack-resistant firewalls. We
`conclude that the majority of the attacks that we have monitored are fast enough
`to overwhelm commodity solutions, and a small fraction are fast enough to
`overwhelm even optimized countermeasures. 5
`
`
`In addition to the impact to a particular network device, an attack against one site may
`also affect network resources that serve multiple sites. A downstream site may
`experience increased network latency, packet loss, backed up mail queues, or possibly
`a complete outage. Even though the downstream site may not have been the original
`target of the attack, the upstream connections and routers may not have the ability to
`handle legitimate traffic destined for that site. The network impact of a DoS attack grows
`significantly if there are a large number of infected systems that have a large amount of
`outbound bandwidth.
`
`
`
`5. Ports to Monitor or Block
`
`There are several common ports with known vulnerabilities that have been targets for
`worm attacks in recent years. These ports will always require monitoring, some will
`need traffic filtering, and some will need to be blocked completely at certain points
`within the network.
`
`TFTP (Trivial File Transport Protocol, UDP port 69) can be used by infected systems to
`transfer files from an infected system to a newly exploited machine. Examples include
`the msblast executable from the Blaster worm and svchost and dllhost executables from
`Nachi. The spread of these worms can be prevented by blocking UDP port 69.
`However, installation of software images or configurations to networked devices will be
`impacted, since this is a primary use of TFTP.
`
`HTTP (HyperText Transport Protocol, TCP port 80) is primarily used for access to the
`Worldwide Web. The HTTP daemon on a web server uses port 80 to listen for traffic
`from a web client. Multiple worms attempt to exploit various known vulnerabilities in
`Microsoft’s Internet Information Services (IIS) to create buffer overflows on vulnerable
`systems and gain system level access. Blocking port 80 can prevent initial infections
`and their spread, but it will block access to a variety of web-based applications.
`
`The Microsoft RPC protocol uses TCP port 135 to allow RPC clients to determine the
`port number currently assigned to a particular RPC service. When trying to connect to a
`service, the client goes through the Endpoint Mapper to discover where the service is
`located. Applications such as WINS, DHCP, and DNS depend on the RPC protocol.
`Port 135 is also essential to the functionality of Active Directory and Microsoft Exchange
`
`
`5 Moore, “Inferring Internet Denial-of-Service Activity.” p.8.
`
`
`
`9
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 10
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`mail servers. This port is where the MS RPC DCOM vulnerability is initially exploited to
`start the sequence of events that fully infects a machine with Blaster or Nachi. Blocking
`port 135 can prevent infections by these worms, but may impact email and file access
`within the local network.
`
`NetBIOS functions (TCP and or UDP ports 137-139) have known vulnerabilities that
`leave hosts open to exploitation. There is no need for these ports to be directly
`accessible from the Internet. These ports are needed for file sharing on the internal
`network, but they should be blocked at both the ingress and egress points at edge
`networks to prevent remote exploitation.
`
`Microsoft Domain Service uses TCP port 445 uses for SMB (Server Message Block)
`over TCP. Similar to NetBIOS services, this protocol is also used for file sharing in
`Windows NT/2000/XP. Prior to Windows 2000/XP, Windows NT ran NetBIOS over
`TCP/IP (ports 137-139). Windows 2000/XP provides the ability to run SMB directly over
`TCP/IP without using NetBIOS. TCP port 445 is being targeted by a variety of recent
`worm attacks.
`
`TCP port 707 is used by the Nachi worm to open a control channel between an infected
`system and a vulnerable system. This channel is used to pass commands between the
`systems to download the svchost and dllhost executables from the infected system.
`Blocking port 707 can prevent the spread of Nachi by interfering with the worm’s ability
`to communicate between infected and vulnerable systems.
`UDP port 1434 is used by Microsoft SQL Server as a listener service that allows a client
`to query the SQL server for a list of named instances and related network configuration
`information. After the client establishes a TCP/IP connection, the client opens a source
`port and sends traffic to a destination port, which is TCP port 1433 by default. The
`source port on the client may vary, but it is greater than 1024. Firewalls or perimeter
`routers should be configured to block unsolicited traffic to and from UDP port 1434.
`Remote connections to local SQL databases should be blocked unless the connection
`attempts originate from trusted hosts and networks. Blocking UDP port 1434 in this
`manner will prevent the spread of any Slammer infections.
`
`TCP port 4444 is used for Kerberos authentication and Oracle9i communication. The
`Blaster worm uses this port to open a command shell on the infected machine so that it
`can be remotely controlled. Blocking this port will prevent a system from being used to
`launch attacks on other systems, however it can disrupt Kerberos authentication or
`Oracle9i communications.
`ICMP protocol type 8 is the PING utility used for connectivity testing within a netw ork.
`The ICMP protocol is quite different from the TCP/IP and UDP/IP protocols. No source
`and destination ports are included in its packets, so the normal packet-filtering rules for
`TCP/IP and UDP/IP are different. Blocking this protocol can prevent the spreading of
`worms such as Nachi that uses ICMP echo requests, but it will create problems with
`network diagnostics.
`
`
`
`
`10
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 11
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`6. ACL Basics
`
`Access Control Lists (ACL’s) are used in routers to identify, manage, and filter traffic in
`a network. They filter the packet flow coming in or going out of router interfaces to
`control network traffic and restrict network use to certain users or devices. ACL’s act on
`traffic that is going through the router but do not act on packets that originate from the
`router itself.
`
`Standard ACL’s are used to control network access by specific hosts or networks.
`These ACL’s control access based on the source address of the IP packets. Standard
`ACL’s commonly use identification numbers from 1 to 99, but they can also use names
`instead of numbers. When ACL’s use names instead of numbers, they are referred to as
`Named ACL’s. The basic syntax for a standard access control list is:
`
`
`access-list <1 to 99> <permit or deny> <source IP address> <mask>
`
`Extended ACL’s are used to filter specific types of traffic to and from s pecific locations.
`These ACL’s control traffic by protocol, source address, and destination address of the
`IP packets. Extended ACL’s use identification numbers from 101 to 199. Like Standard
`ACL’s, Extended ACL’s can also use names instead of numbers. The basic syntax for
`an extended access control list is:
`
`access-list <100 to 199> <permit or deny> <protocol> <source IP address> <source
`mask> <destination IP address> <destination mask>
`
`Additional information can be added to an extended access list to filter traffic using
`specific ports and service, such as FTP, telnet, etc. Operators such as eq (equals), gt
`(greater than), and range (of port numbers) are added to the syntax to determine how
`the traffic will be filtered in relation to the port or service. The syntax for an extended
`ACL using port or service is:
`
`access-list <100 to 199> <permit or deny> <protocol> <source IP address> <source
`mask> <operator> <port or service> <destination IP address> <destination mask>
`<operator> <port or service>
`
`Remarks can be added before or after an entry in an access control list to describe the
`function of the ACL entry. The basic syntax for an ACL remark is:
`
`
`access-list <1 to 99> remark <purpose of the deny or permit statement>
`
`
`Masks used in ACL statements are known as inverse or wildcard masks. These masks
`are similar to standard IP address subnet masks, but they are actually written in a
`reverse format. ACL masks specify what traffic should be permitted and denied. When a
`mask is converted into binary ones and zeros, it determines which bits of the IP address
`in the ACL should be used in processing the traffic. A zero in the inverse mask indicates
`
`
`
`11
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 12
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`that the bits in the IP address must match; a one indicates that the address bit will be
`ignored.
`
`For example, a wildcard mask of 0.0.0.0 would be used to identify a specific host since
`all bits in the mask will be matched with the specified IP address. The keyword host is
`now commonly substituted by the router in front of the IP address when a wildcard mask
`of 0.0.0.0 is used. Wildcard masks of 0.255.255.255, 0.0.255.255, or 0.0.0.255 would
`be examples of wildcard masks used to filter standard class A, B, or C networks in an
`ACL. A source address and wildcard mask of 0.0.0.0 255.255.255.255 will include all
`hosts and networks and can be specified as any in the ACL syntax.
`
`The most frequently hit entries should appear first in an access list. This saves the
`router from additional processing that occurs as a result of checking unnecessary lines
`in an ACL. There is an implicit deny statement built into the end of all access lists even
`if it is not listed. Therefore, an ACL must have at least one permit statement, or it will
`block all traffic.
`
`ACL’s can be added to a router’s configuration but will not have any impact until applied
`to a specific interface. After an access list is applied to a router interface, the router will
`check all packets coming into that interface and compare them in the order that the
`entries occur in the access list. The router will check all entries in the access list until it
`finds a match. If the packet does not match an entry, it will be discarded based on the
`implicit deny statement.
`
`Each interface can have only one access list applied for each protocol (e.g. IP, IPX) and
`for each direction- in and out. Input access lists save processing on the router since the
`router does not have to perform routing table lookups to find which interface ha ndles the
`traffic for the destination address. For best efficiency in a routed network, ACL’s should
`be applied to the interface closest to the source of the traffic. The figure below from
`Cisco illustrates where the ACL should be applied (Router A, interface E0) in relation to
`the traffic source and destination.
`
`
`
`
`Figure 2. Location to Apply ACL’s for Best Efficiency 6
`
`
`Packet filtering using ACL’s should be done as early as possible in a network.
`Discarding traffic as close to the source as possible has several benefits:
`
`
`• The impact of any DoS attack is limited to the perimeters of the network
`• Systems are protected from being overloaded
`• Attackers are restricted from using internal systems to attack other sites
`
`6 “Configuring IP Access Lists.”
`
`
`
`12
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2004,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2004, Author retains full rights.
`
`Microsoft Ex. 1018, p. 13
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`• Regular operations can continue uninterrupted
`• Network resources are not tied up processing undesirable traffic.
`
`7. ACL Development and Implementation
`
`ACL’s should be developed proactively in anticipation of a potential attack rather than
`trying to develop completely new ACL’s during a crisis. Network security administrators
`should always be aware of the latest reported vulnerabilities and viruses so that they
`can effectively develop and update ACL’s to protect their networks before an attack
`begins. The ACL’s can remain in the router’s configuration without impacting the
`router’s performance or acting to filter any packets. Until the ACL’s are actually applied
`to a router interface, they have no effect.
`
`The ACL entry examples listed in this section are presented as a starting point to
`protect a network from worm/DoS attacks.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket