-
ACL Rule Issues
-
Shadowed Rules
- Rules that will never be executed because of improper rulebase design.
- Firewalls perform pattern-matching from the top down. If a match is found in a previous rule, a subsequent rule to matching traffic will have no effect on it.
-
Orphaned Rules
- Rules that have become unnecessary because of a change to the system.
- Orphaned rules may present a security risk if the IP address associated with an orphaned rule is reused, granting unintended access to the target system.
- They also add to the complexity of a firewall rule set and degrade device performance.
-
Erroneous Rules
-
Typographical Errors
- Incorrect Input
-
Specification Errors
- Poor Design
-
Firewall Logs
- The firewall log has information on every allowed and blocked connection crossing the network boundary.
- After ensuring that this information is of use to your organization through proper configuration, review and auditing of these logs will provide valuable insight into activities that have occurred.
-
Consider using the firewall as a proactive monitoring tool that can alert administrators immediately if any of the following occur:
- Repeatedly blocked traffic from a single-source IP address or network, indicating a potential intrusion attempt
- Single rule violations from extremely sensitive sources, such as an outbound connection attempt from a database server
- Sudden bursts in traffic to one or more hosts, which should be investigated by system administrators
- Sudden decreases in traffic to one or more hosts, which may indicate a service outage
-
Update Outdated Software or Firmware
- Security updates should be implemented to fix critical issues on devices and applications.
- Patches and Hotfixes often defend against found exploits and vulnerabilities that would otherwise go unchecked.
-
Weak Cryptographic Algorithms
- Systems depend upon cryptographic algorithms and hashes to provide confidentiality, integrity, authentication, and non-repudiation.
-
Avoid using these algorithms:
- RC4
- DES
-
Avoid using these hash functions:
- MD4
- MD5
- SHA-1 is weaker than SHA-2, but SHA-2 is not as widely supported. If your infrastructure supports it, you should use SHA-2.
-
Wireless Access Points (WAPs)
-
Authentication Issues
-
A single user cannot log into any network:
- Check authentication information
- Check device settings
-
A single user cannot log into the wireless network, but can log into other systems:
- Check authentication information
- Check wireless logs
-
Multiple users cannot log into the network:
- Check network hardware
-
Signal Strength and Propagation Issues
- Gaps in coverage
- Interference
-
Content Filters
- Manage Site-Based Policy Exceptions
- Manage User-Specific Policy Exceptions
- Manage Group-Based Policy Exceptions