Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

clean-up rule netscreen firewall

Posted on 2016-11-15
3
Medium Priority
?
125 Views
Last Modified: 2016-11-22
Hello everyone.
I'm still looking for your precious help on writing a best practice on "hardening netscreen firewalls".
My supervisor is asking to write down about cleanup rules so could you please tell me if the following is correct or how I can Improve it .
Thank you


Firewall administrators implements the cleanup rule in order to log the traffic which is being dropped.
The logs produced by the cleanup rule are normally used to perform troubleshooting activities or can then be fed into event analysis systems like a SIEM to improve visibility into network activity.

A cleanup rule should  be placed at the end of a policy zone to zone
ns-> set policy id 100 name "Clean-up Rule" from "ZONE-A" to "ZONE-B"  "Any" "Any" "ANY" deny log 
ns-> set policy id 100

Open in new window

0
Comment
Question by:carlettus
3 Comments
 
LVL 18

Accepted Solution

by:
Sanga Collins earned 1600 total points
ID: 41887889
This is the correct rule

ns-> set policy id 100 name "Clean-up Rule" from "GLOBAL" to "GLOBAL"  "Any" "Any" "ANY" deny log
ns-> set policy id 100

Global - global allows you to log all traffic that does not match and existing security policy. It is the first policy I add after trust to untrust
0
 
LVL 27

Assisted Solution

by:skullnobrains
skullnobrains earned 400 total points
ID: 41888179
so called "cleanup rules" are rather useless unless
- a huge deal of traffic is NOT logged because nobody cares about robots checking for open smtp, ftp, ssh, or whatever since you basically cannot do anything to prevent random scans and they will produce so much output they will hide useful stuff
- someone actually analyses the logs ( and the previous is mandatory in order to achieve that goal )

most of what is interesting to monitor will be internal traffic because you know precisely what to expect and anything that is not expected need to be dealt with.

this is not specific to netscreen.
0
 

Author Closing Comment

by:carlettus
ID: 41897552
Thank you
Carletus
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

963 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question