Firewall Wizards mailing list archives

Re: firewall-wizards Digest, Vol 20, Issue 13


From: "Boni Bruno" <bbruno () dsw net>
Date: Thu, 27 Dec 2007 09:39:46 -0800

The 3rd line in your dmz access-list will not deny traffic from the
inside when communication is initiated from the inside.  

By default, a higher security zone can access a lower security zone and
the state information maintained by the Pix firewall will allow for the
return traffic to go back to the inside network.  

That being said, many companies deny traffic out from the inside network
as a best practice.  If you are denying traffic from the inside out
(which you should be doing), then you need to make sure you permit the
traffic you need from the inside to the dmz before any of your deny
statements in your acl.

-boni bruno

.
.
.
Ok, I think I understand this a little better now. Say my private
network is 192.168.1.0/24 and my dmz is 192.168.2.0/24. I already have
the static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
which is required in 6.3(3). So, in order to make this work i.e the
inside network has access to everything on the dmz network and the dmz
network can access the internet and I only allow specific communication
from the dmz to the inside I need to do the following:

access-list dmz permit udp host 192.168.2.2 host 192.168.1.202 eq domain
access-list dmz permit tcp host 192.168.2.2 host 192.168.1.203 eq smtp
access-list dmz deny ip 192.168.2.0 255.255.255.0 192.168.1.0
255.255.255.0 access-list dmz permit ip 192.168.2.0 255.255.255.0 any

I will also need to add the nonat statements as was suggested by
Brandon:

access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.2.0
255.255.255.0 access-list nonat permit ip 192.168.2.0 255.255.255.0
192.168.1.0 255.255.255.0 nat 0 (inside) access-list nonat nat 0 (dmz)
access-list nonat

My only concern here is the 3rd line in the dmz access-list and whether
it will deny communication from the inside network to the dmz (except
dns and smtp), but I will test that when I get home tonight.

Thank you for everyone's help.

Brian


-----Original Message-----
From: firewall-wizards-bounces () listserv cybertrust com
[mailto:firewall-wizards-bounces () listserv cybertrust com] On Behalf Of
firewall-wizards-request () listserv cybertrust com
Sent: Thursday, December 27, 2007 9:00 AM
To: firewall-wizards () listserv cybertrust com
Subject: firewall-wizards Digest, Vol 20, Issue 13

Send firewall-wizards mailing list submissions to
        firewall-wizards () listserv icsalabs com

To subscribe or unsubscribe via the World Wide Web, visit
        https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
or, via email, send a message with subject or body 'help' to
        firewall-wizards-request () listserv icsalabs com

You can reach the person managing the list at
        firewall-wizards-owner () listserv icsalabs com

When replying, please edit your Subject line so it is more specific than
"Re: Contents of firewall-wizards digest..."


Today's Topics:

   1. Re: PIX access-list help (Brian Blater)
   2. Re: Anyone have any informed opinions on the      Watchguard
      product line? (Jim Seymour)


----------------------------------------------------------------------

Message: 1
Date: Wed, 26 Dec 2007 13:07:37 -0500
From: "Brian Blater" <brb.lists () gmail com>
Subject: Re: [fw-wiz] PIX access-list help
To: "Firewall Wizards Security Mailing List"
        <firewall-wizards () listserv icsalabs com>
Message-ID:
        <7743536a0712261007ic01f92fm562685817ecd9e0a () mail gmail com>
Content-Type: text/plain; charset=ISO-8859-1

On Dec 25, 2007 12:25 AM, Paul Melson <pmelson () gmail com> wrote:
On Dec 21, 2007 11:02 AM, Brian Blater <brb.lists () gmail com> wrote:
So, my main question, is there an access list command I can have 
that basically says "allow all communication from the dmz to the
internet"
and one that says "allow communication from the inside to the dmz"? 
I know I can add "access-list dmz permit ip host 192.168.1.1 any" 
and that solves the problem of getting to the internet, but then it 
opens all communication to the inside from this host and I don't 
want to do that. Since this is version 6.3(3) I can't use an out 
access-list which I think might solve the problem. I have enough 
memory to run version 7.x on this PIX, but I'm trying to tackle one 
problem at a time and I'm a little hesitant about doing the 7.x
upgrade just yet.

The short answer to your question is that PIX access-lists are read, 
per-interface, top-to-bottom:

access-list dmz_in deny ip 192.168.1.0 255.255.255.0 10.0.0.0 
255.0.0.0 access-list dmz_in permit ip 192.168.1.0 255.255.255.0 any 
access-group dmz_in in interface dmz

If your internal network is 10.0.0.0/8 and your DMZ is 192.168.1.0/24,

this will prevent traffic from the DMZ to the inside, but allow 
everything else.

PaulM

Ok, I think I understand this a little better now. Say my private
network is 192.168.1.0/24 and my dmz is 192.168.2.0/24. I already have
the static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
which is required in 6.3(3). So, in order to make this work i.e the
inside network has access to everything on the dmz network and the dmz
network can access the internet and I only allow specific communication
from the dmz to the inside I need to do the following:

access-list dmz permit udp host 192.168.2.2 host 192.168.1.202 eq domain
access-list dmz permit tcp host 192.168.2.2 host 192.168.1.203 eq smtp
access-list dmz deny ip 192.168.2.0 255.255.255.0 192.168.1.0
255.255.255.0 access-list dmz permit ip 192.168.2.0 255.255.255.0 any

I will also need to add the nonat statements as was suggested by
Brandon:

access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.2.0
255.255.255.0 access-list nonat permit ip 192.168.2.0 255.255.255.0
192.168.1.0 255.255.255.0 nat 0 (inside) access-list nonat nat 0 (dmz)
access-list nonat

My only concern here is the 3rd line in the dmz access-list and whether
it will deny communication from the inside network to the dmz (except
dns and smtp), but I will test that when I get home tonight.

Thank you for everyone's help.

Brian


------------------------------

Message: 2
Date: Wed, 26 Dec 2007 11:23:14 -0500 (EST)
From: jseymour () linxnet com (Jim Seymour)
Subject: Re: [fw-wiz] Anyone have any informed opinions on the
        Watchguard      product line?
To: firewall-wizards () listserv icsalabs com
Message-ID: <20071226162314.E4BC9E158 () jimsun linxnet com>


"Richard Golodner" <rgolodner () infratection com> wrote:

[snip]
      There was also a nice GUI interface ...
[snip]

Is that still limited to running on a Windows PC?

I believe their management GUI once ran on both Windows and Linux.
Then, later, on Windows only, I was told.  I tend to shun network
infrastructure products that require Windows to configure and administer
them.

Jim
--
Note: My mail server employs *very* aggressive anti-spam filtering.  If
you reply to this email and your email is rejected, please accept my
apologies and let me know via my web form at
<http://jimsun.linxnet.com/contact/scform.php>.


------------------------------

_______________________________________________
firewall-wizards mailing list
firewall-wizards () listserv icsalabs com
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards


End of firewall-wizards Digest, Vol 20, Issue 13
************************************************
_______________________________________________
firewall-wizards mailing list
firewall-wizards () listserv icsalabs com
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards


Current thread: