News: This forum is now permanently frozen.
Pages: [1]
Topic: detecting removed firewall  (Read 1334 times)
« on: December 10, 2008, 08:51:44 »
john99 *
Posts: 44

Hello,

some of our power users (out in small remote offices) did in the past temporarily removed their firewall-box in order to be able to bypass restrictive  firewall rules (e.g. for the use of p2p).

Question:
How can this firewall removal be detected ?
(we are soon going to implement OSSEC, a HIDS which is able to produce active responses if a certain condition occurs. Nevertheless some kind of a daemon would be required on m0n0wall for such a setup)


Thank's a lot for any feedback!

John


PS
I am aware that this is mainly an organisational problem and not really a technical one.
« Reply #1 on: December 10, 2008, 10:44:22 »
markb ****
Posts: 331

I presume that you are talking about a setup with a DSL router/modem in front of the Monowall and they effectively plugged straight into this thus bypassing the Monowall rules.

There are several measures that I can think of to combat this, although their effectiveness does depend on your network setup.  For monitoring, I might suggest setting up a cacti server to monitor the snmp of the monowall.  There is a good virtual appliance I can point you in the direction of if you are interested.  Although if they leave the Mono box plugged in and just plug into the router/modem this will not be enough. Are you using IPSec VPN between sites? If you are, monitoring the existence of this like would be fairly easy.

In addition, consider the tightening up of the setup at the office end.  If you have any funds available, you could consider getting a DSL ethernet modem like the Dratek Vigor 100/110 which is a true PPPoE to PPPoA converter. this will eliminate the weak link in the chain at the router/modem.  Another option would be to tighten the configuration of the router/modem.  If you turn DHCP off and configure the mono with a static IP address and then only allow that IP through the router/modem that should at least make it more difficult to bypass the mono box.

In addition to all of this, I would suggest that you make sure you have a good Acceptable Use Policy and get the relevant management on board to enforce it.  The actions of these power users was potentially very damaging to your corporate network and such deliberate actions should have consequences for them.
« Reply #2 on: December 11, 2008, 07:56:41 »
john99 *
Posts: 44

Thank's a lot for the help markb,

I learned a lot of your comments and we are going to think over the whole thing.


John
 
Pages: [1]
 
 
Powered by SMF 1.1.20 | SMF © 2013, Simple Machines