Worried about potential security gaps? Follow these seven steps to make sure your installation won’t melt under fire.

Set Up a Flame-Proof Firewall

Worried about potential security gaps? Follow these seven steps to make sure your installation won’t melt under fire.

I can still remember when most people thought a firewall was a special wall placed in a building to prevent the spread of fire. Now it’s just what the doctor ordered to protect your company from those heinous hacker homies, and sooner or later it’s going to be your job to put one into operation. Are you up to the job? Do you know how to install a flame-proof firewall? Here are seven sure-fire tips on how to set up a firewall right the first time.

1. Know Why You’re Installing the Firewall

Was this your choice? Been fighting for a firewall? Has it just become company policy? The consultants who brought in the Web site insisted on a firewall? Your boss handed you a box and said, “Here, go install this?” If you know what a firewall is and why you’re installing it, this can help dictate which features to choose during installation and configuration, and even where you place the firewall in your network. So that we’re on the same page, I define a firewall as a service that limits access between the Internet and a private network, between pairs or groups of private networks, or between sensitive and less-sensitive parts of private networks.

More than any other system you’ll configure, a firewall has only one purpose in life, and its purpose may seem to be opposite that availability/usability/ease-of-use credo you’ve had hammered into your head all this time. After all, by definition, a firewall blocks information flow. So ask the question, why are we installing this firewall? You don’t want to make it harder for people to get information, do you?

Time to wake up. Information flow has to be controlled like everything else. The peace, free love, and freedom of information banner just doesn’t fly well in corporate America. Just as we don’t want our precious laptops and automobiles to be “borrowed” by someone else, information in your company is critical to its survival. As rapidly as we expand the boundaries of information access to include our suppliers and customers, we must protect our private information (and theirs).

The Proxy Server Connection
Proxy services are applications that run on a firewall. User requests for Internet services such as FTP, telnet, and http are received and forwarded, according to security policy. Proxy servers, therefore, act as gateways and replace connections. The client doesn’t “talk” directly to the service. In fact, use of a proxy service is usually transparent to the user. Proxy services are implemented via software and thus should be used with a mechanism that physically prevents or restricts direct communication between internal and external systems. Examples of such mechanisms are a dual-homed host (a host with two network interfaces) and/or packet filtering. Proxy servers require proxy clients. Web browsers can be configured to act as proxy clients.

But again, why are you installing a firewall now? Are you setting up a perimeter defense for your corporate network? Creating a DMZ (demilitarized zone) where Web servers and other systems that need to be accessed by your business partners or customers can reside? Putting up a wall around sensitive areas of your company to assure only the select, authorized, vetted few can get in? Firewalls are often used for all these purposes. Knowing who’s supposed to get in, and who’s not, will help you properly configure the firewall, as well as monitor how well it’s performing.

Understanding the type of systems that sit on either side of the firewall helps you determine which ports to open or close. After all, not all access is determined by user ID. Understanding the way services and applications communicate machine-to-machine can help us control access. Most communication relies on connection to a standard port number (see “Consider These Weaknesses”). Block the wrong port and authorized work can’t continue; leave the wrong ones open and your firewall’s got holes large enough for dragons to fly through.

Take the time to ask:

  • What are you trying to protect against? Denial of service? Information theft? Intrusion?
  • Who’s likely to be attacking your systems? Vandals? Joyriders? Braggarts? Information spies? Inexperienced users doing stuff they shouldn’t?” (Stupidity is hardly an attack, but the results are the same.)

2. Read the Docs—Know All about Your Firewall

You know the old adage… if all else fails, read the documentation. But you can’t wait for all else to fail here. Fail to fasten your seat belt and hit a brick wall head on—it’s a little to late to read the instructions. Fail to configure your firewall correctly, and you may be open to an attack that can precipitate corporate meltdown. So grab those docs and a good cup of latte and head for a quiet place. All firewalls are not created equal. They don’t even work the same way. Knowing what your firewall is supposed to do, and how to make it do so, can give you the edge you need to set it up right the first time. Firewalls are complex and chances are you don’t set them up every day. Would you try to pilot a jet with your knowledge of driving an automobile?

I wish I had a quarter for every time someone has said to me he found the answer to the problem he spent hours trying to figure out in the documentation. The first firewall I installed had a printout of a sample configuration for very close to my exact needs. Although the documentation was a little unclear, the screenshots showed me how to enter appropriate information and made it easier to add additional features. If the documentation is unintelligible, get some help. Often the manufacturer has updated docs, FAQs, newer versions of utilities, forums, and direct support links on its site.

By the way, this isn’t the time to question anyone’s judgment in choosing this particular firewall. While this intense study of its features (or lack of them), ease of use, and the ability of its publisher to produce usable documentation may make you aware of its shortcomings and make you wish you or the powers that be had chosen another firewall, chances are you’re not going to get anywhere by grumbling. Put the system together, do the best with what you have, and document the need for other things to occur to make your system safe.

A good practice is to make a list of the things the firewall can do, such as blocking services, blocking systems, controlling who can transfer files across the firewall, and recording information about accesses and attempted access. This helps you with the next step.

3. Match Features of the Product to Your Company Security Policy

Your company security policy will tell you which features of the firewall you’ll need to implement—and let you know the things that the firewall can’t do. See No. 6. Don’t know what your corporate security policy is? Find out. Implementing a flame-proof firewall isn’t so hot if what the company really wants to do is to toast marshmallows. Typical implementations require you to:

  • Set up filters to block services. Does your company allow Internet Relay Chat (IRC)? Probably not. IRC servers can be used to access IRC client machine files, processes, and programs. Don’t let IRC users apply these features against the unsuspecting. Do you want ping, telnet, FTP , traceroute, or http services to enter your network? How about providing internal users use of these services across the Internet? Fortunately, firewalls are usually set up on the “least privilege” security principle and the “that which isn’t expressly permitted is prohibited” proverb—all ports are blocked. You don’t have to close down those with possible malicious use; you have to open those that you want to allow. Your security policy will tell you which ones to choose.
  • Insist that your company establish a security policy. Somebody got a great big dose of security awareness somewhere, or the money wouldn’t have been spent. Tell the powers-that-be that a policy is required for proper setup. If no one will write one, do it yourself. Having a written policy—title it, “This is how I’m going to configure the firewall”—starts the conversation. And, oh, get it approved. Can’t get it approved? Well, they did tell you to set up the firewall, didn’t they? You were going to have to make the choices anyway. Now you’re documenting what you did and allowing management to pass on it.
  • Monitor log activity. Once you know which logs are activated or able to be activated and what’s being logged, you can decide how much of this information is necessary to fulfill policy requirements. However, don’t forget another good use of logs: maintenance. You may want to start out logging more information than you think you need and reducing it if you don’t feel it adds anything to the picture. Once again, this may be part of your security policy.

4. Get the Advice of Peers; Take a Class; Hire an Expert

If you haven’t already joined security lists, now’s the time to do it. A good one is ntbugtraq (www.ntbugtraq.com). These lists provide you with an endless stream of inane chatter about risks and perceived risks of OSs and other products, including firewalls. You’re going to have to filter the information, but it does provide a ready source, and a place for you to ask specific information about your firewall and its perceived features, benefits, and holes.

Visit your vendor’s Web site for the latest information and for responses to security-list tirades and public media reviews. In our “new world,” vendors take a proactive approach and alert users to possible holes and fixes for their products. Visit other Web sites as well and see what holes, fixes, and features they offer. Remember, don’t bemoan your boss’ lack of sophistication for picking this product; instead find out how best to implement and use it to protect your network. A frying pan can knock out an intruder as efficiently as a can of mace; you just have to get a little closer.

Talk to your co-workers, talk to your friends. Attend a seminar, meeting, conference, or class. Talk to your fellow attendees; you may find that one of them has experience with this product too. Get the advice of peers, but be sure to follow the advice of experts.

At this point you’re in a great position to judge whether or not a class will help you. If a vendor or third-party instruction is available on your product, check it out. Since you’ve done your homework, you stand a better chance of finding one that fits. Ask for a curriculum outline and match it against your requirements. Don’t be afraid of extra topics. You’re the learner here, right? You’ll also be better prepared for class. You know the features you need to implement—if they aren’t covered, ask why. Many instructors can give additional help that’s not part of the official curriculum, but some may not. The time to ask is before you plunk down your money.

Should you hire an expert to install the system for you? It depends. You now should be in a better position to judge if this is necessary and/or advisable. After all, you need to manage the firewall when it’s up. Don’t isolate yourself from the initial installation and configuration process. If you feel you want to hire an expert, or if you’ve been told to do so, now you’ll be able to judge better the type of expert to get. Make sure that transfer of knowledge is required. You don’t want to have to call the expert back for every change you make. You also want to be able to monitor the system. Although it should be obvious by now that security policies may vary with the company and an external expert should ask you for this type of advice, some may not. Find out your so-called experts’ willingness to follow your rules before they’re hired.

Packet-Filtering Firewall vs. Screening Router
A packet-filtering system selectively routes packets between hosts in a way that implements a network’s security policy. A packet encapsulates data sent across a network. Each packet contains a set of headers with information necessary for its passage. Header information includes:
  • IP source address 
  • IP destination address
  • Protocol (TCP, UDP, ICMP)
  • TCP or UDP source
  • Destination port
  • ICMP message type

Routers also know the interface the packet arrived on and which interface the packet will go out on. A regular router looks at the destination address of each packet and picks the best way to get that packet to its destination. Either the router knows how to send the packet and thus sends it on or it doesn’t and returns it with a “destination unreachable” message.

A screening router examines the packet more thoroughly. It asks the question, “Should I send this packet on its way?” Since Internet services (http, telnet, ping, and so on) reside at standard port numbers, the router can be configured to block or allow Internet connections by specifying the port number. A screening router may be configured, for example, to block all connections from the Internet except SMTP. (You do want to receive email, don’t you?) Or you could configure it to block all connections from certain systems, or allow email and FTP, but block TFTP, RPC, IRC, and the like.

A screening router can’t be configured to let some operations of a service pass but block others. It’s an all-or-nothing approach.

5. Isolate, Install, Test

Ready to go for it? Don’t immediately set the firewall in its chosen place on the network. Even an attack dog needs to be tested for his response to your commands. Place the system in a test lab. Don’t have one? Make a temporary lab with minimum configuration, say, one client, the firewall, and the Internet access line. Keep the rest of the network out of the picture for now. Armed with your policy, notes, and extensive knowledge, install and configure the system.

Now test it. If it’s supposed to block external users from telnet access to internal hosts, come at it from outside and use the telnet command. If you can get to the internal host, you probably configured the system wrong. Find out why and correct it.

Do all users have unlimited access to the Internet? Create some typical user accounts, one with each type of access you’ve designed. Then log on as those users and test.

Not sure what services applications cutting across barriers need to use? Run them and test as well. You’ve got the idea now. You must intimately document each feature once again and develop test scenarios, then apply them. As you tweak your firewall configuration, retest using each test scenario once again. Check the firewall logs for information gathered and lessons learned.

When your system passes your rigorous testing, it’s time to move it to the real world. You may want to allow access a little at a time to make sure all applications, users, and services have access, but only the access they should have.

6. Monitor the Firewall and Network Access

Once you’re up and running, the rule is to monitor constantly. Don’t just monitor the firewall, monitor network access as well. Remember, a firewall is really just a perimeter defense. It can’t protect against all types of attack, and it’s not the only soldier in your arsenal. A firewall can’t protect your network from access that doesn’t go through its system. Many current attack exploits were carried out with social engineering and the use of viruses or Trojans—things that firewalls usually can’t examine packets to detect.

Firewall Architectures
  • Dual-homed host. A computer with at least two network interfaces. To use this architecture in a firewall implementation, routing between these interfaces is disabled. Therefore, packets from the Internet interface can’t be routed directly to the internal, private network. Systems on either network can communicate with the dual-homed host, but not with each other. When accessing either the external from the internal or vice-versa is necessary, proxy services are used.
  • Screened host or bastion host. This host sits on the internal network. Packet filtering at the screening router is set up to allow external hosts (Internet) to access the bastion host and no other systems on the internal network. The typical use of this system might be an email server. The bastion host is also allowed to make certain types of connections to the external world. Internal systems can connect directly to the bastion host.
  • Screened subnet or perimeter network. This architecture implements a perimeter network to isolate the internal network from the Internet. The bastion host can easily come under attack since it’s accessible from the Internet. Conquering the bastion host can mean wide-open access to your internal network. Thus, a screened subnet can provide further protection. A minimum of two screening routers are used to implement this solution—one router between the internal network and the perimeter network, the other between the perimeter network and the Internet.

7. Lather, Rinse, Repeat!

You’ve heard the joke about the programmer who was found dead in the shower? He had a bottle of shampoo with him and it said, “Lather, rinse, repeat.” As you should know by now, network defense never ends.

Consider These Weaknesses

Internet Service Description Port Exploit
SMTP Electronic mail 25 Mail spoofing, penetrating your network with mail exploits
FTP File transfer 20/21 Access to internal information, no strong authentication
NNTP Usenet news 119 Denial of service
telnet Remote terminal access 23 No authentication
http World Wide Web access 80 Access to improperly protected files
DNS Host name address lookup 53 Information about your internal network
Gopher Text-based, menu-oriented tools help users find information 70 Information
WAIS Wide area information service, allows multiple queries such as for documents that contain a phrase; www.ai.mit.edu/the-net/wais.html is a site that provides a WAIS gateway 210 Information
Archie Indexes of anonymous FTP servers for file and directory names, service via telnet and email, and Archie clients pp or Web browsers at http-Archie gateways; www.archie.emnet.co.uk/ 1525 Allowing access to Archie might allow access directly to NFS and mis/yp servers
Finger Looks up info about a user who has an account on the machine being queried: real name, login phone number, office location, when and where most recently logged in 79 Information
POP, POP2, POP3 Internet mail 109,110 Password in clear issues
whois Information about hosts, networks, domains, and administrators 43 Information
talk Two people to hold conversation 517 No authentication, so easy way to do social engineering
IRC IRC Internet relay chat; IRC user uses IRC client or telnet; IRC services many people at the same time 6667 Many servers means access to client files, processes, programs
MBONE Multicast backbone; expanding real-time conference services for audio, video, and electronic whiteboard; uses: Internet Engineering Task Force meetings, space shuttle flight operations Protocol number a, filter by this Can the tunnel be used as a backdoor?
Name services Used over TCP/IP to establish identity, locate a systems, and notify network that NetBIOS system has shut down 137,138 Find easily accessed hosts on system, learn what services are used on hosts
ICMP Internet control message Filter by message code Information source, denial of service attack
Ping Check if can reach host; uses ICMP   Verify there is such a host
Traceroute or tracert Sees route packet takes on way to destination; uses ICMP; find location, names of routers, SNMP; manages routers, bridges, concentrators, hubs, hosts   Find location, names of routers.
SNMP Manages routers, bridges, concentrators, hubs, hosts 161,162 Control these devices
Network Time Protocol NTP—important in synchronizing time, preventing playback attack; Kerberos depends on time synchronization 37 Lack of use of or spoofing the NTP could result in denial of service attacks
NFS Network file system 2049 Clients can read and change files stored on server without having to log in to the server or enter a password; also does log transactions
lpr and lp Print to printer   No reason to do this across the Internet; allows removal of information by printing it remotely from your servers

Once you install the firewall, you can’t rest. In fact, it’s not a bad idea to pull out this list periodically and make sure you’re still following these steps to a flame-proof firewall.

Featured

  • Microsoft Starts Countdown to Dynamics GP End-of-Support

    Dynamics GP, Microsoft's venerable enterprise resource planning (ERP) solution for midsized businesses, is set to lose support in four years.

  • Image of a futuristic maze

    The 2024 Microsoft Product Roadmap

    Everything Microsoft partners and IT pros need to know about major Microsoft product milestones this year.

  • Windows Recall Preview Starts Rolling Out with Windows 11 24H2

    Microsoft on Tuesday began rolling out Windows 11 version 24H2, describing the update as a "full OS swap that contains new foundational elements required to deliver transformational Al experiences and exceptional performance."

  • An image of planes flying around a globe

    2024 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.