F IREWALL
F IREWALL
F IREWALL
Auditing Firewalls
Module 1:
Understanding Firewalls
● Hackers
● Corporate Espionage
● Terrorists
● Common Thieves
Basic Firewall Components
● Policy
● Advanced authentication
● Packet inspection
● Application gateways
Common Internet Threats
● Denial of service attacks
– Specific attacks that can cause a server crash
– Flooding the server with traffic to disrupt or deny
service
● Intrusion threats
● Attacks on services/exploits
– The backend server may not be hardened enough for
adequate protection, but the firewall can block external
attacks
● Information threats
● “Viral” threats
● Defacement
How Vulnerable are Internet
Services?
● E-mail or smtp – Simple Mail Transfer Protocol
– TCP/IP based port 25 (POP 110)
– Risks Include
● E-mail bombing (stalking)
– Anonymous harassment
– Large amounts of e-mail to a single user address
● Spamming
– Messages sent to numerous different users from a host
● Virus download mechanism
– Code Red
– Nimda
● Not always traceable
– POP and IMAP can be very insecure
How Vulnerable are Internet
Services?
● FTP - File Transfer Protocol
– TCP/IP based port 20/21
– Risks Include
● Unencrypted authentication and data transfers
– Usernames and passwords can be”sniffed”
● Unencrypted data transfers
– Data can be viewed
● Often part of default installations
● Anonymous ftp is possible
● Privilege escalation
How Vulnerable are Internet
Services?
● Telnet
– TCP/IP based port 23
– Risks include
● Unencrypted authentication
● Session hijacking
– Risks include
● No “user”authentication
– Software
– Hardware
● Packet filters consider only the most basic attributes of each packet, and they don't need to
remember anything about the traffic since each packet is examined in isolation. For this reason
they can decide packet flow very quickly.
● Because every packet of every connection is checked against the access control rules, larger,
complex rule bases decrease performance. And because packet filters can only check low-level
attributes, they are not secure against malicious code hiding in the other layers. Packet filters are
often used as a first defense in combination with other firewall technologies, and their most
common implementation today is seen in the access control lists of routers at the perimeters of
networks.
● For simple protocols or one-sided connections, like ICMP or SNMP traps, it is still useful to use
packet filtering technology.
Packet Filtering Firewalls
● Products
– Cisco Pix
– Typically routers
● Simple Firewall
● Multi-Legged firewall
● Firewall Sandwich
Questions?
Network Firewall Security
Auditing Firewalls
Module 2:
Security Operations
Administrative Access
Administrative Access
● What is Administrative access?
– Administrative Access refers to a group’s need to gain
control over a system for the purpose of discharging
their chartered duties. This access includes, but is not
limited to: Monitoring, Log Analysis, Break fix support,
User administration, Rule/Policy implementation, OS
configuration , software/hardware implementation, and
patch/upgrade implementation.
● Certifications
– Support contracts
● Up to date
● Who is responsible
Logging
Logging
● Logging is very important
– Provides history of access
– Provides attack information
– Provides for Policy audit checking
– Provides trending analysis for capacity
planning
– Provides evidence for events
Logging
● Firewall Logging Problems
– Many firewalls do not log effectively
– Extremely large files
– Difficult to manage and review
– Products have logs written to different files
– Access to many logs requires root access to firewalls
– Log analysis products are add-on and expensive
– Few organizations log effectively
Logging
● Logging Methods
– Local
● Directed to files (poor from a security perspective)
– Remote
● Syslog
– Udp protocol is not reliable or secure (new syslog is better)
– Cannot be used as evidence: not credible
● Separated management network
– Some products are managed and logged in an isolated network
– Logging can be reliable and separate from firewall system
– Firewall products often account for good logging
● Ask good questions
Policy/Rule set Administration
● General security Policy Guidelines
– Least Privilege Concept
● Allow least amount of access to allow someone to
Auditing Firewalls
Module 3:
Security Policy
– Others optional
Specifics Necessary in Policy
● Sensitive data storage/transportation
– Rule sets
– System Backup
– Logs
● Physical security of systems
– Good network security will not help if the firewall has
unrestricted physical access
– On premises
– Off premises
– Transit
Module 3:
Security Policy
● Blocking Sites/Ports
● Staged
● Access points
Backup/Restore
● Media
– Tape
– Mainframe
– Another host
● Frequency of backups
– Consider the type of data
– Consider frequency of changes to the environment
● Restoration
– Contingencies for types of problems
● Hacking
● Loss of hardware
● Loss of network
● Loss of data center
Module 3:
Security Policy
● Password
● Operating system
● Software configuration
● Logs
Auditing Firewalls
Module 4:
Understanding Firewalls