At 12:32 PM 3/23/2001 -0500, [EMAIL PROTECTED] wrote:

William,

My opinion is both!  There are several different factors involved.  The 
primary one is to protect the router itself from attack (internal or 
external) and the secondary is to dump erroneous packets the router doesn't 
need to process.  Here's some other possibilities:

1. Cisco IOS vulnerabilities may require you to filter inbound traffic on 
the external interfaces (See IOS security info)
 >> Specific to organization

2. Applying filters on external and internal interfaces provides better 
logging capabilities.
and can increase CPU utilization

3. If one of your internal systems gets compromised, using it to attack 
other systems is more difficult.

If you have done a good job of designing your internal IP numbering scheme 
you can keep the lists short using masks.  For example, I try to keep all 
my network devices in the 1-16 IP range, my network printers and servers in 
the 17-64 IP range.  This allows me to permit or deny the entire block of 
devices with one or two ACL entries.  It also allow me to cutdown list 
processing time but putting "jump" enties at the beginning of the list.

For example, if all my PC addresses are 128-254 I can put an "established" 
entry near the beginning of my ACL that will "jump" out of the list before 
processing all the host specific entries.

I also recommend naming your host in the router config instead of using DNS 
to look entries up.  It takes more time to maintain but eliminate the 
possibility that a corrupt DNS would cause an ACL to be bypassed.

disable DNS, limit the folks who have access to router configs, and don't 
allow high priced security consultants log on to the routers.. :)


I know this wasn't the simple answer you were hoping for but I hope it helps

-- Bill Stackpole, CISSP




William Kupersanin <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]

03/24/01 06:18 AM

         To:        [EMAIL PROTECTED]
         cc:
         Subject:        Access lists



Hello,

I am working with someone designing access control lists on a router and I 
wanted
the groups opinion on ACL design. The scenario is that the router basically 
has two
external interfaces (one leading to the world at large and one leading to 
dialin
devices) and a few internal interfaces. We pretty much want unfettered 
communication
between the two external interfaces but we want to protect the internal 
interfaces.
My initial thought was to put the "permits" (and implicit as well as explicit
"denys") on the internal interfaces which are directly related to the 
service in
question. In other words, if one of the internal segments hosts a web server, I
would think it would be better to put the "permit tcp any host webserver eq 
www" on
the internal interface. She suggests that we put the rules protecting the 
internal
services on both the external interfaces.  Her reasoning is that the router 
itself
is less vulnerable if the packet never makes it over any interface to begin 
with. My
feeling is that the rulesets should be kept as straight forward as possible.

So what does the group think? Does stopping the packet at the external 
interface
make sense from a denial of service or some other perspective, or should I 
keep my
rulesets simple with the thought that convoluted rulesets are a detriment to
security?

Thanks in advance,
-- Willie

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]




-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to