Solved

Inbound Access List Help

Posted on 2007-03-22
7
188 Views
Last Modified: 2010-04-08
My ISP gives me the ability to use a managed firewall on their router. I can use a web interface provided to manipulate it. However, my attempts to utilize it have ended up with some bad results. My end goal is to lock down all incoming traffic except for the few things I am using.


The basic look of the firewall interface I have access to is:

//These are the main headings.
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES

//These are the options for each heading

ACTION: (permit | deny)
PROTOCOL: (TCP | UDP | IP)

//The application, ports, and addresses or split into two parts: Source and destination
//For each part they have the following options

APPLICATION: (ANY | DNS | HTTP | etc...)
PORTS: Two Textboxes for range
IP ADDRESSES:
               ( ANY | HOST | NETWORK) //depending on what you select here, you input more shown below
               One Textbox for what I assume is an IP address if you specify "host" above
              Drop Down list  (ex: /24) I believe this is for subnet if you specify "network" above



My needs are as follows:
Web Server
VPN Server (IPsec)
Remote Desktop
Everything Else Blocked

The public IP Addresses of the Web and VPN servers are for example: 69.69.69.69 (mask 255.255.255.248)
The rest of the network are privately addressed for example: 10.0.1.3 (mask 255.255.255.0)

We use the VPN to connect to the network and then use remote desktop to connect directly to any given computer.


Any guidance would be helpful. I am also aware that the order of entry is kind of important.

There is also the following note on the interface. I'm not sure if it matters.
PLEASE NOTE: In order to prevent inadvertent restrictions to network access, each Access Control List ends with a statement which permits all traffic which does not have a specific rule associated with it. Please refer to the help documentation for information on how to override this rule.

0
Comment
Question by:pricerage
  • 3
  • 3
7 Comments
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
WWW Server = 10.0.1.3
Remote desktiop directly to 10.0.1.4
IPSEC VPN server = 10.0.1.5
PPTP VPN server = 10.0.1.6
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
Permit               TCP                  WWW                 80     80            10.0.1.3
Permit               TCP                  RDP                     3389 3389        10.0.1.4
Permit               UDP                 VPN-ISAKMP        500  500            10.0.1.5
Permit               UDP                 VPN                    4500 4500          10.0.1.5
Permit               TCP                 PPTPVPN             1723  1723         10.0.1.6
0
 

Author Comment

by:pricerage
Comment Utility
Thanks. This all makes sense. However, on the interface, each entry looks similar to the setup below. You have to enter the source and destination. Is what I have here correct?

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3

0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
Source need to be any port >1024
Destination port = 80
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:pricerage
Comment Utility
"Source need to be any port >1024" Can you explain that?  How would a request made to port 80 be included in that? This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4



This is what it sounds like you are saying to do:

This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 1024     (max port?)            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 175 total points
Comment Utility
Source ports are always ephemeral, meaning random between 1024 - 65535. only the destination port is static.
Permit source 1024 - 65535 any
Destination    80 - 80  - 10.0.1.3
 
0
 

Author Comment

by:pricerage
Comment Utility
Thanks for the help.
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now