Penetration Testing mailing list archives

Re: firewall auditing/testing


From: Rod Seney <rodseney () yahoo com>
Date: Fri, 16 Jun 2006 11:14:35 -0700 (PDT)

Rocky,

I would just write ACL lines to prevent all traffic
from your "public" network addresses with a
destination to your two "private" networks addresses. 
I would put it inbound on the "public" network's FE
interface.

Rod

Rod Seney - CCNP, CCSP
IT Manager
Butler Automotive Group
--- Rocky <pixscreenpoint () gmail com> wrote:

Thank you again for very helpful inputs.

my network is very simple, i make it simple :)

Internet---T3/3845 IOS FW/IPS-----Three FE
interfaces(internal net).

the 3 FE interfaces are totally independent to each
other with their
own MS Server2003 AD with different application
running on each
and also different sets of private ip address on
each network.

One FE interface network is public access with 3
wireless AP and it
should not access the 2 other network and vice
versa.

Most of our heavy traffic came from this
network(public access) which
mostly http traffic that i can see through NBAR and
MRTG..P2P clients
are blocked from all internal network. Our deeply
concerned is the public
access network which might or has a potentials to
access the 2 other
internal networks.Thats what my director is scared
of, and he is
concerned that someone
is accessing the workstations inside the 2 network.

Using NMAP,Nessus to penetrate the 2 internal
network and servers
are not giving me any responses that is why i'm
pretty sure that the
2 network is secured. ICMP traffic is deny from all
interfaces and each
network are also define in my ACL to deny, i just
permit one
workstation for troubshooting purposes.

As i said i cannot fathom my director of what he
wanted coz he doesn't
much understand about network security technology.

Is there any way to segregate this public access
interface from
the other 2 interfaces? do you think this designed
is not appropriate?

Thanks again,
Rocky


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only
one to win the Analyst's 
Choice Award from eWeek. As attacks through web
applications continue to rise, 
you need to proactively protect your applications
from hackers. Cenzic has the 
most comprehensive solutions to meet your
application security penetration 
testing and vulnerability management needs. You have
an option to go with a 
managed service (Cenzic ClickToSecure) or an
enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how
a managed service can 
help you:
http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit
for you to confirm your 
results from other product. Contact us at
request () cenzic com for details.

------------------------------------------------------------------------------




__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: