Use a negated internal object instead.  For example, lets say this is
your current Internet access rule:

SRC             DEST            PROTOCOL
internal-net    ANY             HTTP,FTP,HTTPS,SMTP

Change it to something more like:

SRC             DEST                    PROTOCOL
internal-net    NOT(internal-net)       HTTP,FTP,HTTPS,SMTP

I know it seems trivial, but it does make a difference in the way that
the exploits abuse the state table as well as multicast broadcasts.  

Also, it's very important that you don't give outbound Internet access
to machines that don't need it.  For example, www.yourdmzwebsite.com
should have no reason to need to use HTTP/FTP/IRC/etc. TO the Internet. 
A lot of people make the mistake of allowing outbound access from web
servers, etc. that really don't need it, and this can be significantly
abused by an attacker.  Another common mistake would be to use an
outbound internet rule that blindly allows all protocols out.  That can
get you into huge amounts of trouble as well.  Hope this helps (sorry
for the rant...), let me know if I can be of further assistance.

Jason


Cedric Amand wrote:
> 
> Hello Jason,
> 
> JW> have spoof protection enabled, never allow "ANY" objects in your source
> JW> or destination fields,
> 
> How do you do a service accessible to anyone then ?
> 
> ================================================================================
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
> ================================================================================


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to