Intrusion Detection Systems mailing list archives
IDS on y2k ... good luck 2Uall =]
From: FMartins () pt imshealth com (Martins, Fernando (Lisbon))
Date: Thu, 30 Dec 1999 11:55:41 +0100
Hi2all For the 'lucky guys' (arghhh) like me that starting today sleeping is just a dream, in bored hours take a look at http://www.sans.org/y2k.htm where some interesting information (also) about IDS is being posted. 'Sun Tzu said: We come now to the question of encamping the army, and observing signs of the enemy. Pass quickly over mountains, and keep in the neighborhood of valleys.' Kind Regards Fernando Martins fmartins () pt imshealth com http://www.imshealth.com (from http://www.sans.org/y2k/firewall.htm) Global Incident Analysis Center - Special Notice - © 1999 - 2000 SANS Institute SonicWall Firewall We have had a really large number of detects by SonicWall, so I asked someone to write up what it was and how they liked it. Scott Jarriel provides the following: Here are my thoughts on the SonicWall firewall products, having used them now for almost a year and having gone through 2 major firmware upgrades. The SonicWall firewall appliance is a relatively inexpensive, hardware-based firewall device (the base model which 'protects' up to 10 IP addresses will cost $408 via e-mail order). It is different from most 'conventional' firewalls, in that it does not perform 'routing' (unless you turn on the NAT features). It is actually more of a 'switch' type of device, which uses a form of stateful packet inspection and a rules engine to determine whether to forward packets from one port (a LAN port) to the other port (a WAN port). The device does not require additional network address space, but rather uses a single IP address within the current address space that exists on the LAN side of your router. This IP address provides the interface to an embedded, web based management console. This management interface can only be accessed from connections that come through the LAN port (so even if the IP address is determined by the black-hats, they cannot manage the device unless they have access to your LAN network). The 'rules' are very simple to create/administer through the web interface. The device has predefined 'services' for about a dozen of the most commonly used IP protocols (both TCP and UDP), specified by both port number and transport type. In addition, you can create your own 'custom' services, by simply providing a name, port number and transport type (TCP, UDP or ICMP). Once a 'service' is defined, you create rules by 'Allowing' or 'Denying' a specific service from a given IP address (or range of addresses, with wild cards for all addresses) to a given IP address (or addresses). The logic within the web interface will put the rules in the correct hierarchy (most specific to most general), so there is little chance of creating rules that do not perform as you expect them to. The device provides NAT and DHCP services, can proxy http traffic, and supports NTP (with firmware rev. 4.x and beyond) for time synchronization. There is logging of pretty much any network activity that violates the rules, and these logs can be e-mailed to a given address based upon one of several circumstances (time of day, log full, etc.). The device will also send alerts to a given e-mail address if it 'detects' a circumstance that it is firmware programmed to block (denial of service attacks of several types, port scans, etc.). All of this logging can also be reported to a local syslog daemon if desired. There are other features that I'm sure I'm overlooking in this description, but the single most appealing aspect of the device is its simplicity of setup and maintanance. By default, it comes with rules of 'allow' all outbound traffic, and 'deny' all in-bound traffic (that is not a direct response of outbound traffic). It blocks IP source-spoofed traffic coming from the WAN port in as well. With the setup 'wizard' (a Java applet the runs the first time you access the management interface), a novice can install this device with little or no understanding of IP networking. All that is needed is a single valid IP address (which could be DHCP supplied from an ISP, or part of an assigned address space that is currently being used) and answering a handful of questions (which are in plain english terms). I can't recommend this device strongly enough for anyone who is considering a DSL or cable modem connection to the internet. The embedded OS does not lend itself to exploitation (beyond denial of service attacks that it may not have been tested against) or remote logins (except through the web management interface via the LAN port only). The device has been tested and 'certified' by the ICSA group. My view is that this device is to internet computing, as condoms are to 'safe sex'.
Froma consultants point of view, if someone were to come to me with a request to put a firewall in place in the next 8 hours, I would simply drop one of these devices onto their existing network, between their internet router and the rest of the network. I'd also put a sniffer in place to monitor network traffic for about 24 hours and see what shows up on the sniffer traces and the log files (with the default rules in place). Even if I wasn't planning to use this as the long term solution for a firewall, it would provide a VERY effective short term solution with minimal invasiveness to the existing network topology, while a more thorough analysis could be rendered. I can't say that about any other firewall appliance or software solution that I've seen to date.
Oh, about performance. The basic device family comes with 10Mb ethernet ports for LAN, WAN (and DMZ on the one particular model), and the firewall performance appears to be pretty close to line speed. For those who need 100Mb throughput, there is a Pro model that provides Fast Ethernet ports for LAN, WAN and DMZ. The Pro model also comes with built-in support for VPN's, using IPsec. This is an option on the base models, but is not recommended if there is a need for significant throughput (probably anything beyond ISDN type speeds is my guess). If I were planning to use a 10Mb/sec interface at near full bandwidth and wanted to do VPN with the device, I would choose the Pro model. This is still not a bad choice, as the Pro model can be purchased for about $2500 by e-mail order.
Current thread:
- IDS on y2k ... good luck 2Uall =] Martins, Fernando (Lisbon) (Dec 30)
