There is one interesting problem in Cisco access-lists and logging:
when you add log or log-input to access-list rules 
not all packets are written to log. so you can not really knows which packet
was dropped .... :( 
and I don't know way how to log it .... :(

        If you interested - you can find discussion with
                Subject: ip accounting and syslog 
        on deja.com
        
        but unfortunately with no answer .....


> -----Original Message-----
> From: Joe Dauncey [mailto:[EMAIL PROTECTED]]
> Sent: Friday, June 16, 2000 9:29 AM
> To: David Leach
> Cc: <
> Subject: Re: CISCO Firewall Feature Set
> 
> 
> David,
> 
> From the work I have done looking at it, the hub of the 
> Firewall Feature Set (Or CiscoSecure Integrated Software as 
> they now call it) is basically access control lists. The 
> access control lists are quite good, because they'll stop all 
> packets bang dead, but it is kind of scary that they seem to 
> be the hub of the 'feature'.
> 
> The main problem we have seen from our concerns is that the 
> logging on the router is awful. You need to allocate 
> sufficient buffer space, and you could easily lose it. 
> However, if you have a local UNIX box you can bung all your 
> logging straight to it using syslog. It's not too bad when 
> you do that. You can log all denies on the access list, and 
> you can also log all CBAC connections. However, I
> am not sure what you would need to do to log other traffic. I 
> guess set an access list up as a 'permit all log', or to some 
> lesser degree.
> 
> One of the other main issues is the current limitations of 
> CBAC, which doesn't really handle a lot of protocols. The 
> application filtering is trivial in some cases. For example, 
> SMTP is hardcoded to allow EXPN and VRFY straight through as 
> permitted commands, even though they can lead to information 
> leaks. There is no way to change that. It is also limited to 
> UDP and TCP traffic, which means
> that if you want to allow ICMP or anything else you have to 
> start poking holes in your access lists, which can be dodgy ! 
> CBAC is supposed to check outgoing packets and then open a 
> hole in your access list to allow their responses back in. It 
> does this very well, and very responsively.
> 
> There are also some anti-DoS measures, which are quite good. 
> They've got some fairly flexible rules to govern inbound SYN 
> connections and the like.
> 
> To sum it up I have two main issues. As a router with a 
> firewall feature I think it is really good. As a firewall on 
> a router I am not so impressed. Too much is hardcoded with no 
> chance to see what is really going on. My second issue is 
> more to do with the people who support it. A few times now I 
> have seen router people trying to do firewall security with a 
> Cisco router, but without really a
> clue. As the firewall world and the router world have always 
> been slightly different there are a lot of vital security 
> skills that have not yet permeated across to the router world 
> (the case is also vice versa, but not an issue here). The 
> router people tend to think that if they can do routers then 
> they can do firewalls, and so if they know IOS then they can 
> configure a secure IOS firewall. I
> do both, and I deal with both, so I have seen it a lot, and I 
> have seen, time after time, router people get it wrong. That 
> is not to say that there aren't a lot of people who can sit 
> in the middle, but I would be very hesitant about asking a 
> load of router configurators to take over my firewalls !!
> 
> Anyway, I hope this bit of personal opinion is of some use. 
> The IOS is really much better a firewall that I ever 
> expected, but I am still testing it and forming a final opinion.
> 
> Cheers,
> Joe
> 
> (personal opinions, represent only myself, etc....)
> 
> David Leach wrote:
> 
> > Has anyone used the FFS or can give recommendations for or 
> against?  A router engineer I'm trying to work with has 
> suggested replacing all the firewalls in a proposed design 
> with routers and Access control lists.  I feel confident that 
> I have the information necessary to make the argument against 
> doing that.  However, I don't want to be caught off guard by 
> somehting I don't know much about.
> >
> > Any help is greatly appreciated.
> >
> > Dave Leach, MCSE+ I
> > Systems Security Engineer
> > EWA, Information and Infrastructure Technologies
> >
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Talk to your friends online with Yahoo! Messenger.
> http://im.yahoo.com
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to