Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

clean-up rule netscreen firewall

Posted on 2016-11-15
3
Medium Priority
?
129 Views
Last Modified: 2016-11-22
Hello everyone.
I'm still looking for your precious help on writing a best practice on "hardening netscreen firewalls".
My supervisor is asking to write down about cleanup rules so could you please tell me if the following is correct or how I can Improve it .
Thank you


Firewall administrators implements the cleanup rule in order to log the traffic which is being dropped.
The logs produced by the cleanup rule are normally used to perform troubleshooting activities or can then be fed into event analysis systems like a SIEM to improve visibility into network activity.

A cleanup rule should  be placed at the end of a policy zone to zone
ns-> set policy id 100 name "Clean-up Rule" from "ZONE-A" to "ZONE-B"  "Any" "Any" "ANY" deny log 
ns-> set policy id 100

Open in new window

0
Comment
Question by:carlettus
3 Comments
 
LVL 18

Accepted Solution

by:
Sanga Collins earned 1600 total points
ID: 41887889
This is the correct rule

ns-> set policy id 100 name "Clean-up Rule" from "GLOBAL" to "GLOBAL"  "Any" "Any" "ANY" deny log
ns-> set policy id 100

Global - global allows you to log all traffic that does not match and existing security policy. It is the first policy I add after trust to untrust
0
 
LVL 27

Assisted Solution

by:skullnobrains
skullnobrains earned 400 total points
ID: 41888179
so called "cleanup rules" are rather useless unless
- a huge deal of traffic is NOT logged because nobody cares about robots checking for open smtp, ftp, ssh, or whatever since you basically cannot do anything to prevent random scans and they will produce so much output they will hide useful stuff
- someone actually analyses the logs ( and the previous is mandatory in order to achieve that goal )

most of what is interesting to monitor will be internal traffic because you know precisely what to expect and anything that is not expected need to be dealt with.

this is not specific to netscreen.
0
 

Author Closing Comment

by:carlettus
ID: 41897552
Thank you
Carletus
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question