<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New Firewall Build - New Firewall Rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206525#M875092</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally this is not the way to go about it.  Before you install a firewall with an allow all - you should already know the topology of the network and what is required/what should be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally speaking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Mar 2009 10:36:22 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2009-03-13T10:36:22Z</dc:date>
    <item>
      <title>New Firewall Build - New Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206524#M875091</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am about to build a new firewall'd infrastructure in which a significant amount of traffic will be running through it.  I need to lock this firewall down as quickly as possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since there are no rules in place I will enable a â&amp;#128;&amp;#156;permit ip any any logâ&amp;#128;&amp;#157; until all the infrastructure is in place and logg all matches to syslog.  As soon as the infrastructure is in place - deny ip any any log!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I know I can go through the syslog server and identify all the traffic building rule by rule, creating object groups where applicable but I am looking for a method of easily identifying the required traffic rather than going through log by log?  Any recommendations? Looking forward to your responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206524#M875091</guid>
      <dc:creator>87305</dc:creator>
      <dc:date>2019-03-11T15:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: New Firewall Build - New Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206525#M875092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally this is not the way to go about it.  Before you install a firewall with an allow all - you should already know the topology of the network and what is required/what should be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally speaking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Mar 2009 10:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206525#M875092</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-03-13T10:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: New Firewall Build - New Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206526#M875093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the response.  I completely agree that the best way to do it is not insert a permit ip any any and I also agree that the required traffic should be identified prior to the install.  Unfortunately, I am walking into a large organization and the SME's are not aware of there own applications, both commercial and in house.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I have no choice.  I have been forewarned that I must first identify the customer's traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Mar 2009 12:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206526#M875093</guid>
      <dc:creator>87305</dc:creator>
      <dc:date>2009-03-13T12:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: New Firewall Build - New Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206527#M875094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Man that is a tough one....in that case I would configure a permit ip any any log, and capture everything.  Then document the apps/protocols you see - take it to the customer and compare it with the network topology.  Then decide what should be allowed and blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Mar 2009 12:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206527#M875094</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-03-13T12:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: New Firewall Build - New Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206528#M875095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best tool for this is NetFlow data.  I don't know how good the ASA5580 netflow data is compared to IOS netflow data.  Never had any experiences with Netflow on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're talking about non-cisco firewalls like checkpoint, then the answer is very simple.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Mar 2009 13:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206528#M875095</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2009-03-13T13:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: New Firewall Build - New Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206529#M875096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"permit ip any any log" will get you non-tcp/udp stuff that might be interesting (gre, etc.), but is really not good for analyzing your tcp and udp traffic, which will be the bulk of you traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better would be promote the tcp/udp connection build and teardown messages to whatever level your using to log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging message 302015 level errors&lt;/P&gt;&lt;P&gt;logging message 302014 level errors&lt;/P&gt;&lt;P&gt;logging message 302013 level errors&lt;/P&gt;&lt;P&gt;logging message 302016 level errors&lt;/P&gt;&lt;P&gt;(substitute whatever level your "logging trap" command specifies for errors)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "permit ip any any" will probably record more hostile than legitimate traffic, and you'll have no basis to tell the good from the bad.  A compromised host with a backdoor being used by lots of remote hosts will look as legitimate as smtp to your mail server based on the acl log data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the tcp connection teardown messages, you'll have the reason the connection was torn down.  You can immediately throw out anything with a SYN timeout, and most stuff with Reset-I that has a very small byte count.  Most UDP connections that timeout at *exactly* 2:00 are bogus, too (your mileage may vary).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will, of course, generate a lot of stuff, so you'll probably need to write a script to massage the log files, extract "interesting" fields", and create a csv to stuff into a spreadsheet.  You can then sort the spreadsheet in various ways, which makes certain patterns obvious (hundreds of connections to tcp/80 from hundreds of sources *probably* indicates a legitimate website; connections to the same port on every machine in your address space from the one remote machine is almost certainly a scan).  After you've thrown out all the obvious crap, it's still the application/system "owners" that will have to make the call on legitimate vs illegitimate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also at least beg for permission to block some stuff (very low tcp/udp ports, MS NET ports, probably SQL, etc.) right out of the gate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Mar 2009 13:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-firewall-build-new-firewall-rules/m-p/1206529#M875096</guid>
      <dc:creator>lowen</dc:creator>
      <dc:date>2009-03-13T13:51:06Z</dc:date>
    </item>
  </channel>
</rss>

