Penetration Testing mailing list archives
Re: firewall auditing/testing
From: Rod Seney <rodseney () yahoo com>
Date: Fri, 16 Jun 2006 11:14:35 -0700 (PDT)
Rocky, I would just write ACL lines to prevent all traffic from your "public" network addresses with a destination to your two "private" networks addresses. I would put it inbound on the "public" network's FE interface. Rod Rod Seney - CCNP, CCSP IT Manager Butler Automotive Group --- Rocky <pixscreenpoint () gmail com> wrote:
Thank you again for very helpful inputs. my network is very simple, i make it simple :) Internet---T3/3845 IOS FW/IPS-----Three FE interfaces(internal net). the 3 FE interfaces are totally independent to each other with their own MS Server2003 AD with different application running on each and also different sets of private ip address on each network. One FE interface network is public access with 3 wireless AP and it should not access the 2 other network and vice versa. Most of our heavy traffic came from this network(public access) which mostly http traffic that i can see through NBAR and MRTG..P2P clients are blocked from all internal network. Our deeply concerned is the public access network which might or has a potentials to access the 2 other internal networks.Thats what my director is scared of, and he is concerned that someone is accessing the workstations inside the 2 network. Using NMAP,Nessus to penetrate the 2 internal network and servers are not giving me any responses that is why i'm pretty sure that the 2 network is secured. ICMP traffic is deny from all interfaces and each network are also define in my ACL to deny, i just permit one workstation for troubshooting purposes. As i said i cannot fathom my director of what he wanted coz he doesn't much understand about network security technology. Is there any way to segregate this public access interface from the other 2 interfaces? do you think this designed is not appropriate? Thanks again, Rocky
------------------------------------------------------------------------------
This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
__________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- firewall auditing/testing Rocky (Jun 14)
- Re: firewall auditing/testing killy (Jun 14)
- RE: firewall auditing/testing Richard Zaluski (Jun 14)
- RE: firewall auditing/testing Robert J. Kraus (Jun 14)
- RE: firewall auditing/testing Ralph Forsythe (Jun 14)
- Re: firewall auditing/testing Rocky (Jun 14)
- Re: firewall auditing/testing Rod Seney (Jun 16)
- Re: firewall auditing/testing Rocky (Jun 20)
- Re: firewall auditing/testing freed0m (Jun 14)
- Re: firewall auditing/testing Serg B. (Jun 14)
- RE: firewall auditing/testing Michiel Baurichter (Jun 14)
- Re: firewall auditing/testing Rocky (Jun 14)
- RE: firewall auditing/testing Chad (Jun 14)
- Re: firewall auditing/testing Andrea Barisani (Jun 15)
- Re: firewall auditing/testing Paul Robertson (Jun 15)
- <Possible follow-ups>
- RE: firewall auditing/testing Eric Pinkerton (Jun 22)
- RE: firewall auditing/testing Ralph Forsythe (Jun 23)