nanog mailing list archives

RE: Re: Checkpoint IPS


From: "Darden, Patrick" <Patrick.Darden () p66 com>
Date: Fri, 6 Feb 2015 14:27:25 +0000

IPSes are like any security technology, they are only as good as their implementor/administrator.  I've seen some 
installations just set up defaults and leave them that way without any maintenance nor much oversight of alarms.  I've 
even seen some that do 0-day implementation of new signatures, and get some legitimate or even ALL traffic blocked by a 
bad signature (Astaro/Sophos UTM) update back in ~2004.  

On the other hand, I've seen some great implementations--some of which did a FANTASTIC job of making a network 
auditable, some of which made a network less liable legally and financially, and quite a few that made a network more 
secure.

To me, the big drawback of an IPS is, no matter how well integrated, implemented, and maintained--it's fundamental 
nature is flawed.  Instead of default-deny with white lists, it is default-allow with black lists.  It will always lag 
behind.  It will always allow infinitely large holes.  That's why I prefer an OSI complete firewall instead, or else an 
IPS in detect mode only, or in certain cases an IPS used in a specific case, e.g. a WAF or SAF for a 
server/application/zone that is specifically fuzzy or will not adhere to security principles (vendor demilitarized 
zones, enclaves, whatever the buzz-word is at the moment).

I understand the whole argument against state, and dismiss it.  That's throwing the baby out with the bathwater.  It 
isn't perfect, it can be overcome via DDOS and saturation, so we should get rid of it.  Tanks can be destroyed by 
bazookas, whatever.  Tanks are still useful in the battlefield if utilized properly.  Firewalls and IPSes are the same 
way.

--p

Current thread: