Firewall Implimentation - Recomendations


 
Thread Tools Search this Thread
Special Forums Cybersecurity Firewall Implimentation - Recomendations
# 1  
Old 09-21-2006
Firewall Implimentation - Recomendations

Hello, as i mentioned in my hello thread, i am working on a project to implement a Unix Firewall server for our network.

Obviously there are some basics that would need to be ironed out before i can think of doing this right. Now distro of Unix aside for now, this is what i am thinking for first steps.

Obviously, deciding i want a fire wall.
Figure out topography. Know where the server will sit when it comes to the network topography.
Decide if i want exclusive or inclusive (I am planning on Inclusive so it is more secure, yes i know it will require a lot of checking up on in the beginning.)

Essentially, at this point, what i am looking for is some advice. what do you all recommend?

Any questions you may have to assist in a good implementation of said Software Firewall? Any advice at this time would help a great deal. I figure one this is all ready to go, then i will be ready to worry about the scripting and setup of the firewall protocols and so on. Which is going to be a task in of itself. At least i have used Linux before, so i have SOME idea what i am doing.

-Path
# 2  
Old 09-21-2006
SO, me and my LACK of experience have just been schooled.

We are going to have a server, 2 NIC's. SO now here comes the BIG picture, which is actually really small.

We will have the internet coming through to the modem which will proceed to the Firewall (Hardware) then fomr there to the UNIX Firewall server, then out to the network. So i will need to figure out how to route, have the signal come in on eth0 and then go back out on eth1. Then setup my rules in between.

Now, i was thinking of using FreeBSD, for testing purposes, can not beat the price. And if it works then possibly purchasing a UNIX Distro. I am all for companies who provide good product to get recognition for it.

Does anyone have any tips that i should know when embarking on this endeavor? Things i should know about FreeBSD that will make this process, easy or harder to accomplish?
# 3  
Old 09-22-2006
Quote:
Originally Posted by pathological
We will have the internet coming through to the modem which will proceed to the Firewall (Hardware) then fomr there to the UNIX Firewall server, then out to the network. So i will need to figure out how to route, have the signal come in on eth0 and then go back out on eth1. Then setup my rules in between.
Without wanting to start a flame war, for what you have described I would use OpenBSD, not FreeBSD. OpenBSD has an excellent track record for security, and it comes with a built-in firewall called "pf" which is highly configurable and allows all manner of traffic manipulation. OpenBSD is free to download and runs on many architectures including i386 and sparc. To enable routing on an OpenBSD box, read this.

OpenBSD Project Homepage
OpenBSD FAQ
OpenBSD pf FAQ

Can you clarify your network config? Is it really:

INTERNET -> Modem -> Hardware Firewall -> New Firewall -> LAN ?

If you're going to be doing any hosting or public access boxes (e.g. web server) these should be situated between your two firewalls in a DMZ or alternatively hand off a seperate interface.

HTH
Nick
# 4  
Old 09-22-2006
Actually, ya... we, the current IT Team, inherited this mess from another guy. We used to have ONLY a soft firewall, MS Internet security or some such crap like that. Oh ya this network was a huge mess. At least NOW we have a hardware firewall in place.

But yes, it does go from Internet > Modem > Firewall (Hardware) > *.*.2.* Network. we have 2 outs form the firewall, the other one goes into another 2 network switch. (Replication).

You can see why it is we need some better security in this place.

What i want is to have an inclusive system. Sort of a redundant soft backup, what ever gets through the exclusive Hardware firewall, can be stopped one it hits the Unix Firewall in the way. That is the plan anyway. I am hoping with the tips and tricks people like yourself offer, this company can tight up security something fierce. We get blasted with viruses like nobodies business, well we are BETTER now that we have some new firewall policies in place. we went form like 10K in a week to 20 even.

Security is a nightmare in this place. they have been so used to being open that the idea of closing them off is a threat to them for some reason. So we have to do things slowly, bit by bit we have cleaned things up nicely. Things are running a LOT smoother now than they used to be, that is for DAMN sure.

so OpenBSD you say? Hmmm. And i agree no flam warring, facts only, opinions are important, but statics are more important, that is what my Bosses care about when they sign off on buying this stuff Smilie

I look forward to more replies, and i will give those links a look see.

thanks.
# 5  
Old 09-22-2006
Quote:
Originally Posted by pathological
But yes, it does go from Internet > Modem > Firewall (Hardware) > *.*.2.* Network. we have 2 outs form the firewall, the other one goes into another 2 network switch. (Replication) ... We get blasted with viruses like nobodies business, well we are BETTER now that we have some new firewall policies in place ... statics are more important, that is what my Bosses care about when they sign off on buying this stuff.
Well, OpenBSD is free so that price is always a winner in my book! As for hardware, this is of course dependent on the number of packets / size of the pipe you've got connected. An old pentium box will handle T1 speeds with relative ease. After you're read up on the basics of OpenBSD and pf, check out CARP - this allows you to have redundant OpenBSD firewalls which failover in the event of a problem, and it is very configurable.

From what you described above, it sounds like you're trying to achieve redundancy through a partial mesh... it is worth remembering that the "hardware firewall", modem and link to the ISP are all single points of failure which could make all your other efforts moot. BTW, what is this other hardware firewall? Diagram below shows how you might get OpenBSD/pf/CARP in place... but it also shows your single points of failure!

Image

Also, what measures are you taking to inspect traffic for malicious types? Are you running some form of mail/web inspection (MAILSweeper/WEBSweeper or maybe squid/postfix with clamav?)

Nick
# 6  
Old 09-22-2006
We use MS EXchange and Active Directory *Cries*. We have Norton 9 Pro on the exchange server which does active scans of workstations throughout the network as well as in coming e-mails. We have recently had the Firewall scan all incoming traffic for certain types of files. We made the scan inclusive for certain common file types example Excell. No excel files of ANY sort get in unless they fit the rules.

When i said "Statics are more important" i am sorry i meant Statistics are more important.

Anyway, so that image is an idea of how it should all be run then? Now to give you an idea of our rack setup... *cries some more*.

To give you an idea of our topology...

we have 1 server rack. with 20 servers (Various sizes) which all plug directly into our Switch stacks.

Our switches hehe. we have 8 patch panels with 24 ports each, these plug directly into the switch stack as well. we have 3 fiber boxes which connect the back (warehouse) to the front, and int he back we have more switches and work stations we are running off of. I can create a visio quick diagram of our server rack and switch/modem stack if that would help with the advice in setup. I will start working on one, it won't take long, and i am sure it would help everyone understand things a bit better.


Question... i am assuming that if OpenBSD 1 fails, signal is still coming from OpenBSD 2, which will allow the network to remain online. Obviously if Hardare firealla fails it all goes down, but nothing we can do about that at presant. And when you say switch 1 and 2 that is just generic names, since they are all on the 2 network right? No matter how we look at it, there is redundat signal coming in PAST the first hardware firewall point. (Looks good, nice and clean).

BTW i like the cloud :-P
# 7  
Old 09-22-2006
Quote:
Originally Posted by pathological
We use MS EXchange and Active Directory *Cries*. We have Norton 9 Pro on the exchange server which does active scans of workstations throughout the network as well as in coming e-mails ... Question... i am assuming that if OpenBSD 1 fails, signal is still coming from OpenBSD 2, which will allow the network to remain online. Obviously if Hardare firealla fails it all goes down, but nothing we can do about that at presant. And when you say switch 1 and 2 that is just generic names, since they are all on the 2 network right? No matter how we look at it, there is redundat signal coming in PAST the first hardware firewall point. (Looks good, nice and clean).
Windows/AD/Exchange does not have to be a security nightmare - provided you patch, configure and administer the boxes properly (and that advice goes for ALL systems). You would benefit from checking that you have a secure baseline build for your Win2k/2k3 boxes (maybe use the NSA SNAC hardening guides?) and a proper patching mechanism in place (e.g. SUS or SMS). Configuration change management and proper documentation should be order of the day across ALL corporate systems.

If you're sending/receiving mails to/from outside, you should be running an SMTP proxy in a firewalled DMZ - this allows you to trap mails and scan them for the nasties, before they reach your exchange server. Again, OpenBSD running Postfix, ClamAV and SpamAssasin would be well placed here. Same goes for your web traffic - setup Squid on another box in the DMZ and inspect all traffic - ban your prohibited file types there. Log mails/web traffic which violates policy and set the systems to mail your admin team.

The diagram I attached above was how I saw what you described. It isn't necessarily the best way to go. Personally, I would remove the "hardware firewall" and let the OpenBSD boxes be your firewalls/routers to the outside world, then configure some DMZs for the semi-public services such as web servers and mail/web proxies. If you're on dialup, attach a modem to each OpenBSD firewall yourself and let it handle the dialup needs during failover. If you have DSL/leased line, speak to your ISP and see if they can supply you with some sort of redundancy at that point (maybe even an ISDN backup for your fixed link) with an upgraded device. Also consider two separate ISPs to provide services, in case one goes belly up.

Nick
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Cybersecurity

Firewall

Hey Guys, I am looking for a good firewall software to implement in medium/large office, with at least 150 users. I was hopping you guys could help me on this one. Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies

2. Linux

Firewall?

Dear All I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step? Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies

3. SuSE

Firewall

Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies

4. AIX

Firewall

:b:Hi,, How do configure firewall in aix.. similar to linux iptable. Rgards, k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies

5. Cybersecurity

help with firewall

hi everyone I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables. anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies

6. Shell Programming and Scripting

crone job implimentation

I wanted to enable one shell script in the cronetab,how to do crone tabe enabling pl help me:( regards, ramesh (1 Reply)
Discussion started by: Ramesh Vellanki
1 Replies

7. UNIX for Dummies Questions & Answers

Firewall Box

I am a novice to linux and unix and command line, I am willing to jump in head first. I have a couple older computers, one is a dell XPS with a P2 Proccessor and th other is a old old sony VIAO. I have a small home network 3 computers...i have my DSL modem then thats connected to my wireless... (2 Replies)
Discussion started by: Tabryan07
2 Replies

8. Cybersecurity

Looking Out from Behind a Firewall

Would it be possible to restrict access to internet pages in the following way? A machine: IP = 128.1.17.123 Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable. B machine: IP = 128.1.17.146 Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies

9. Cybersecurity

What Firewall do you use?

Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall. Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW? I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies
Login or Register to Ask a Question