Firewall Wizards mailing list archives
Re: firewall-wizards Digest, Vol 20, Issue 13
From: Chris Myers <clmmacunix () charter net>
Date: Sat, 5 Jan 2008 16:29:14 -0600
Hello,May I ask why you are going to the inside for the internet access for your dmz? Do you have a proxy server or something that the dmz needs on the inside to get to the internet? If not, you will need a nat policy for the dmz because it will have to nat outbound to traverse the internet. By the standard configuration your security level for the dmz is higher than the outside interface. If it is not then just raise the security level above the outside interface (default 0), but below the inside (default 100), say 90 maybe. There is an implicit deny from the outside, but due to the nat you have access to all lower security levels. As mentioned before you should not want complete access outbound on all ports, but I am just creating a mental picture for your traffic to simplify this.
Hang tight, because the above configuration becomes more complicated if you want access to the inside from the dmz.
You do not need any ACL's on the inside interface to reach the dmz because the security level is higher on the inside than on the dmz.
Remember ACL's applied to interfaces are for initiated traffic from IP's behind the interface it has been applied to. You only need an ACL on an interface if the traffic is originating with a SYN packet from an IP behind that interface. The state of a packet is maintained in the state table for all initiated traffic, and all acknowledgements are completed. If you need hosts on the dmz to initiate connectivity to the inside, then be stingy with what gets access and lock it down to hosts and specific services. Once you have determined that you need an ACL that has gone beyond the security level requirements, then you now need ACL's for all traffic regardless of security levels. If you determine that you need RDP port 3389 from the dmz to the inside, then once you apply an ACL for it then you will need an ACL to all other interfaces due to the implicit deny now on the interface for explicit traffic. Remember you don't have to give access in the static statements for whole subnets. You can lock them down to hosts, but deny statements will work with the interface ACL's, although unnecessary if you have good security planning.
example: nat (inside) 0 access-list nonat access-list nonat permit tcp host 192.168.2.1 192.168.1.1 eq 3389nat (dmz) 1 192.168.2.0 255.255.255.0 0 0 (this causes a global many to one and nat as the outside address of the firewall) access-list dmz permit tcp host 192.168.2.1 192.168.1.1 eq 3389
access-list dmz permit tcp 192.168.2.0 255.255.255.0 any eq 80static (inside,dmz) 192.168.1.1 192.168.1.1 255.255.255.0 0 0 ( you are only announcing the host for rdp to the dmz)
On Dec 27, 2007, at 11:39 AM, Boni Bruno wrote:
The 3rd line in your dmz access-list will not deny traffic from the inside when communication is initiated from the inside.By default, a higher security zone can access a lower security zone and the state information maintained by the Pix firewall will allow for thereturn traffic to go back to the inside network.That being said, many companies deny traffic out from the inside networkas a best practice. If you are denying traffic from the inside out (which you should be doing), then you need to make sure you permit the traffic you need from the inside to the dmz before any of your deny statements in your acl. -boni bruno . . . Ok, I think I understand this a little better now. Say my private network is 192.168.1.0/24 and my dmz is 192.168.2.0/24. I already have the static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 which is required in 6.3(3). So, in order to make this work i.e the inside network has access to everything on the dmz network and the dmznetwork can access the internet and I only allow specific communicationfrom the dmz to the inside I need to do the following:access-list dmz permit udp host 192.168.2.2 host 192.168.1.202 eq domainaccess-list dmz permit tcp host 192.168.2.2 host 192.168.1.203 eq smtp access-list dmz deny ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list dmz permit ip 192.168.2.0 255.255.255.0 any I will also need to add the nonat statements as was suggested by Brandon: access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 access-list nonat permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 nat 0 (inside) access-list nonat nat 0 (dmz) access-list nonatMy only concern here is the 3rd line in the dmz access-list and whetherit will deny communication from the inside network to the dmz (except dns and smtp), but I will test that when I get home tonight. Thank you for everyone's help. Brian -----Original Message----- From: firewall-wizards-bounces () listserv cybertrust com [mailto:firewall-wizards-bounces () listserv cybertrust com] On Behalf Of firewall-wizards-request () listserv cybertrust com Sent: Thursday, December 27, 2007 9:00 AM To: firewall-wizards () listserv cybertrust com Subject: firewall-wizards Digest, Vol 20, Issue 13 Send firewall-wizards mailing list submissions to firewall-wizards () listserv icsalabs com To subscribe or unsubscribe via the World Wide Web, visit https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards or, via email, send a message with subject or body 'help' to firewall-wizards-request () listserv icsalabs com You can reach the person managing the list at firewall-wizards-owner () listserv icsalabs comWhen replying, please edit your Subject line so it is more specific than"Re: Contents of firewall-wizards digest..." Today's Topics: 1. Re: PIX access-list help (Brian Blater) 2. Re: Anyone have any informed opinions on the Watchguard product line? (Jim Seymour) ---------------------------------------------------------------------- Message: 1 Date: Wed, 26 Dec 2007 13:07:37 -0500 From: "Brian Blater" <brb.lists () gmail com> Subject: Re: [fw-wiz] PIX access-list help To: "Firewall Wizards Security Mailing List" <firewall-wizards () listserv icsalabs com> Message-ID: <7743536a0712261007ic01f92fm562685817ecd9e0a () mail gmail com> Content-Type: text/plain; charset=ISO-8859-1 On Dec 25, 2007 12:25 AM, Paul Melson <pmelson () gmail com> wrote:On Dec 21, 2007 11:02 AM, Brian Blater <brb.lists () gmail com> wrote:So, my main question, is there an access list command I can have that basically says "allow all communication from the dmz to theinternet"and one that says "allow communication from the inside to the dmz"? I know I can add "access-list dmz permit ip host 192.168.1.1 any" and that solves the problem of getting to the internet, but then it opens all communication to the inside from this host and I don't want to do that. Since this is version 6.3(3) I can't use an out access-list which I think might solve the problem. I have enough memory to run version 7.x on this PIX, but I'm trying to tackle one problem at a time and I'm a little hesitant about doing the 7.xupgrade just yet.The short answer to your question is that PIX access-lists are read, per-interface, top-to-bottom: access-list dmz_in deny ip 192.168.1.0 255.255.255.0 10.0.0.0 255.0.0.0 access-list dmz_in permit ip 192.168.1.0 255.255.255.0 any access-group dmz_in in interface dmzIf your internal network is 10.0.0.0/8 and your DMZ is 192.168.1.0/24,this will prevent traffic from the DMZ to the inside, but allow everything else. PaulMOk, I think I understand this a little better now. Say my private network is 192.168.1.0/24 and my dmz is 192.168.2.0/24. I already have the static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 which is required in 6.3(3). So, in order to make this work i.e the inside network has access to everything on the dmz network and the dmznetwork can access the internet and I only allow specific communicationfrom the dmz to the inside I need to do the following:access-list dmz permit udp host 192.168.2.2 host 192.168.1.202 eq domainaccess-list dmz permit tcp host 192.168.2.2 host 192.168.1.203 eq smtp access-list dmz deny ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list dmz permit ip 192.168.2.0 255.255.255.0 any I will also need to add the nonat statements as was suggested by Brandon: access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 access-list nonat permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 nat 0 (inside) access-list nonat nat 0 (dmz) access-list nonatMy only concern here is the 3rd line in the dmz access-list and whetherit will deny communication from the inside network to the dmz (except dns and smtp), but I will test that when I get home tonight. Thank you for everyone's help. Brian ------------------------------ Message: 2 Date: Wed, 26 Dec 2007 11:23:14 -0500 (EST) From: jseymour () linxnet com (Jim Seymour) Subject: Re: [fw-wiz] Anyone have any informed opinions on the Watchguard product line? To: firewall-wizards () listserv icsalabs com Message-ID: <20071226162314.E4BC9E158 () jimsun linxnet com> "Richard Golodner" <rgolodner () infratection com> wrote:[snip]There was also a nice GUI interface ...[snip] Is that still limited to running on a Windows PC? I believe their management GUI once ran on both Windows and Linux. Then, later, on Windows only, I was told. I tend to shun networkinfrastructure products that require Windows to configure and administerthem. Jim --Note: My mail server employs *very* aggressive anti-spam filtering. Ifyou reply to this email and your email is rejected, please accept my apologies and let me know via my web form at <http://jimsun.linxnet.com/contact/scform.php>. ------------------------------ _______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards End of firewall-wizards Digest, Vol 20, Issue 13 ************************************************ _______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
_______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Re: firewall-wizards Digest, Vol 20, Issue 13 Chris Myers (Jan 07)