|
Table Of Contents
The Cisco IOS Firewall Solution
The Cisco IOS Firewall Feature Set
Creating a Customized Firewall
Other Guidelines for Configuring Your Firewall
Cisco IOS Firewall Overview
This chapter describes how you can configure your Cisco networking device to function as a firewall, using Cisco IOS Firewall security features.
This chapter has the following sections:
• The Cisco IOS Firewall Solution
• Creating a Customized Firewall
• Other Guidelines for Configuring Your Firewall
About Firewalls
Firewalls are networking devices that control access to your organization's network assets. Firewalls are positioned at the entrance points into your network. If your network has multiple entrance points, you must position a firewall at each point to provide effective network access control.
Firewalls are often placed in between the internal network and an external network such as the Internet. With a firewall between your network and the Internet, all traffic coming from the Internet must pass through the firewall before entering your network.
Firewalls can also be used to control access to a specific part of your network. For example, you can position firewalls at all the entry points into a research and development network to prevent unauthorized access to proprietary information.
The most basic function of a firewall is to monitor and filter traffic. Firewalls can be simple or elaborate, depending on your network requirements. Simple firewalls are usually easier to configure and manage. However, you might require the flexibility of a more elaborate firewall.
The Cisco IOS Firewall Solution
Cisco IOS software provides an extensive set of security features, allowing you to configure a simple or elaborate firewall, according to your particular requirements. You can configure a Cisco device as a firewall if the device is positioned appropriately at a network entry point. Security features that provide firewall functionality are listed in the " Creating a Customized Firewall" section.
In addition to the security features available in standard Cisco IOS feature sets, Cisco IOS Firewall gives your router additional firewall capabilities.
The Cisco IOS Firewall Feature Set
The Cisco IOS Firewall feature set combines existing Cisco IOS firewall technology and the Context-based Access Control (CBAC) feature. When you configure the Cisco IOS Firewall on your Cisco router, you turn your router into an effective, robust firewall.
The Cisco IOS Firewall features are designed to prevent unauthorized external individuals from gaining access to your internal network and to block attacks on your network, while at the same time allowing authorized users to access network resources.
You can use the Cisco IOS Firewall features to configure your Cisco IOS router as one of the following:
•An Internet firewall or part of an Internet firewall
•A firewall between groups in your internal network
•A firewall providing secure connections to or from branch offices
•A firewall between your company's network and your company's partners' networks
The Cisco IOS Firewall features provide the following benefits:
•Protection of internal networks from intrusion
•Monitoring of traffic through network perimeters
•Enabling of network commerce via the World Wide Web
Creating a Customized Firewall
To create a firewall customized to fit your organization's security policy, you should determine which Cisco IOS Firewall features are appropriate, and configure those features. At a minimum, you must configure basic traffic filtering to provide a basic firewall. You can configure your Cisco networking device to function as a firewall by using the following Cisco IOS Firewall features:
•Standard Access Lists and Static Extended Access Lists
•Lock-and-Key (Dynamic Access Lists)
•Reflexive Access Lists
•TCP Intercept
•Context-based Access Control
•Cisco IOS Firewall Intrusion Detection System
•Authentication Proxy
•Port to Application Mapping
•Security Server Support
•Network Address Translation
•IPSec Network Security
•Neighbor Router Authentication
•Event Logging
•User Authentication and Authorization
In addition to configuring these features, you should follow the guidelines listed in the " Other Guidelines for Configuring Your Firewall" section. This section outlines important security practices to protect your firewall and network. Table 17 describes Cisco IOS security features.
Other Guidelines for Configuring Your Firewall
As with all networking devices, you should always protect access into the firewall by configuring passwords as described in the chapter "Configuring Passwords and Privileges." You should also consider configuring user authentication, authorization, and accounting as described in the chapters in the "Authentication, Authorization, and Accounting (AAA)" part of this guide.
You should also consider the following recommendations:
•When setting passwords for privileged access to the firewall, use the enable secret command rather than the enable password command, which does not have as strong an encryption algorithm.
•Put a password on the console port. In authentication, authorization, and accounting (AAA) environments, use the same authentication for the console as for elsewhere. In a non-AAA environment, at a minimum configure the login and password password commands.
•Think about access control before you connect a console port to the network in any way, including attaching a modem to the port. Be aware that a break on the console port might give total control of the firewall, even with access control configured.
•Apply access lists and password protection to all virtual terminal ports. Use access lists to limit who can Telnet into your router.
•Do not enable any local service (such as SNMP or NTP) that you do not use. Cisco Discovery Protocol (CDP) and Network Time Protocol (NTP) are on by default, and you should turn these off if you do not need them.
To turn off CDP, enter the no cdp run global configuration command. To turn off NTP, enter the ntp disable interface configuration command on each interface not using NTP.
If you must run NTP, configure NTP only on required interfaces, and configure NTP to listen only to certain peers.
Any enabled service could present a potential security risk. A determined, hostile party might be able to find creative ways to misuse the enabled services to access the firewall or the network.
For local services that are enabled, protect against misuse. Protect by configuring the services to communicate only with specific peers, and protect by configuring access lists to deny packets for the services at specific interfaces.
•Protect against spoofing: protect the networks on both sides of the firewall from being spoofed from the other side. You could protect against spoofing by configuring input access lists at all interfaces to pass only traffic from expected source addresses, and to deny all other traffic.
You should also disable source routing. For IP, enter the no ip source-route global configuration command. Disabling source routing at all routers can also help prevent spoofing.
You should also disable minor services. For IP, enter the no service tcp-small-servers and no service udp-small-servers global configuration commands.
•Prevent the firewall from being used as a relay by configuring access lists on any asynchronous Telnet ports.
•Normally, you should disable directed broadcasts for all applicable protocols on your firewall and on all your other routers. For IP, use the no ip directed-broadcast command. Rarely, some IP networks do require directed broadcasts; if this is the case, do not disable directed broadcasts.
Directed broadcasts can be misused to multiply the power of denial-of-service attacks, because every denial-of-service packet sent is broadcast to every host on a subnet. Furthermore, some hosts have other intrinsic security risks present when handling broadcasts.
•Configure the no ip proxy-arp command to prevent internal addresses from being revealed. (This is important to do if you do not already have NAT configured to prevent internal addresses from being revealed.)
•Keep the firewall in a secured (locked) room.
Posted: Mon Jul 24 02:20:21 PDT 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.