19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

from<br />

internal mail server<br />

internal DNS server<br />

to<br />

<strong>IT</strong> system with<br />

IP address 1.2.3.5<br />

<strong>IT</strong> system with<br />

IP address 1.2.30.7<br />

<strong>IT</strong> system with<br />

IP address 1.2.5.*<br />

<strong>IT</strong> system with<br />

IP address 1.20.6.*<br />

Appl. Gateway<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Ä<br />

Ä<br />

TCP > 1023<br />

ÄÄÄÄÄÄ<br />

TCP: 20,21<br />

TCP > 1023<br />

ÄÄÄÄÄÄ<br />

TCP: 23<br />

TCP > 1023<br />

ÄÄÄÄÄÄ<br />

TCP: 23, 80<br />

TCP > 1023<br />

ÄÄÄÄÄÄ<br />

TCP: 80<br />

Screend-Subnet<br />

external DNS<br />

server<br />

Ä<br />

UDP: 53<br />

ÄÄÄÄÄÄ<br />

UDP: 53<br />

Ä<br />

Ä<br />

Ä<br />

Ä<br />

external mail<br />

server<br />

TCP > 1023<br />

ÄÄÄÄÄÄ<br />

TCP: 25<br />

This means that the internal mail server with TCP from a port with a port<br />

number > 1023 has access to port 25 (SMTP) of the external mail server in<br />

the screened sub-net. Ports with a port number > 1023 are also named as<br />

non-privileged ports, as opposed to ports with lower port numbers, which<br />

are named as privileged, as only privileged users (those with root<br />

authorisations) are entitled to establish connections with these ports.<br />

This table must then be transformed into appropriate filter rules. This is<br />

frequently not simple and must therefore be checked precisely. On the basis of<br />

regular tests, it should be ensured that all filter rules have been correctly<br />

implemented. In particular, it must be ensured that only the services set out in<br />

the security policy are permitted.<br />

For the rules of an application gateway, similar tables must be established.<br />

<strong>The</strong>se tables are to be implemented in rules.<br />

Example:<br />

User name service command Authentication<br />

Mrs. Example FTP RETR, STOR one-time password<br />

Mr. Smith FTP RETR chip card<br />

Ä<br />

Ä<br />

Ä<br />

Ä<br />

Ä

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!