22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

and applications are not compatible with certain firewall functions; for example,<br />

using IPSec across a NAT firewall is highly dependent on the IPSec protocol<br />

being used and the NAT device. We realize that in most organizations, the<br />

decision to deploy an application is driven by the business departments, not the<br />

IT department. There needs to be IT security involvement in the planning stages<br />

of new applications to identify potential application dependencies that may have<br />

compatibility issues if the application access takes place across various firewall<br />

defense technologies. It is the responsibility of the IT security administrators to<br />

minimize potential security exposures and limit overall risk to business<br />

application owners and the organization.<br />

Before we get into some detailed firewall specifications, we first provide a list of<br />

general firewall configuration specifications that we recommend. We hope you<br />

will incorporate the specifications in the following list into your organization’s<br />

security policy. Note that each recommendation can easily be converted to a<br />

policy statement by simply changing the word “should” to “will”:<br />

– When utilizing multiple firewalls, a naming scheme should be in place to<br />

avoid conflicts with host names.<br />

– Firewalls acting on Internet zone traffic should have vulnerability scanning<br />

and penetration-testing services performed on a frequent, regular basis.<br />

– Intranet zone firewalls may have firewall interfaces enabled with approved<br />

monitoring protocols for use by IT firewall management teams.<br />

– Logging and security violations should be handled according to the<br />

security policy’s Security Incident Management processes and<br />

procedures.<br />

– Anti-spoofing filters should be enabled.<br />

– Firewalls should be configured with “deny all” as the default rule set.<br />

Now that we have described the recommended firewall configuration policies, we<br />

will begin describing a “best practices” set of firewall functionality that is broken<br />

down into mandatory functions, and recommended functions:<br />

Mandatory firewall functions<br />

► IP filtering capabilities to port, host, and network specifications<br />

► Network Address Translation (NAT)<br />

► Logging and alert notification services<br />

► Support Virtual Private Network (VPN) tunneling services<br />

– SSH tunneling services (as preferred support for administration and<br />

maintenance activity)<br />

– High-availability support for load-balancing and fail-over configurations<br />

Chapter 4. Security components and layers 143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!