1 Planning and Overview
14
Planning Your Conļ¬guration
A number of issues need to be considered and resolved before you actually install and
conļ¬gure EFW in your network. This section walks you through each planning stage to
help ensure smooth integration of EFW into your network.
Determine Your Security Goals
Every organization has different security needs. With EFW, you can customize your system
to protect as much or as little as you want. EFW is shipped with a number of pre-deļ¬ned
policies. Depending on your security needs, you can tailor pre-deļ¬ned policies to suit your
needs, or create your own using the Management Console. For details on creating and
managing policies, see Chapter 4, "Managing Policies."
The following general security goals will help you determine what security goals are
important for your organization.
ā Prevent the launch of untraceable attacks from a computer on your network.
This goal is for administrators who want to prevent users from launching an attack
from inside the network while modifying their source IP addresses (that is, spooļ¬ng).
To prevent spooļ¬ng from a speciļ¬c computer, you may use the āNo Snifļ¬ng, No
Spooļ¬ngā pre-deļ¬ned policy for that computer, or you may select or create any other
policy, and select the āNo Spooļ¬ng, No Routingā policy setting.
ā Prevent a launch of attacks using network capabilities that are rarely needed
for legitimate purposes within your network.
A system is most secure when only necessary capabilities are allowed on the network.
For instance, most computers in your organization have no legitimate need for
sending and receiving fragmented packets through your network. Therefore, you can
conļ¬gure a policy for those computers to disallow fragmented packets, preventing a
possible attack that uses packet fragments to ļ¬ood your system.
Network capabilities you may limit for machines that have no legitimate use for them
include:
ā Fragmented packets
ā Non-IP trafļ¬c
ā Packet snifļ¬ng (receiving packets not addressed to the machineās IP address)
ā Any unnecessary protocols
To prevent an attack from using unnecessary capabilities on your network, you ļ¬rst
have to determine what capabilities you need and donāt need. After you have
determined these capabilities, you can simply conļ¬gure the policy to allow or disallow
the various capabilities within your network. For example, if you want to create a
policy that prevents fragmented packets from entering your system, you would simply
de-select the āAllow Fragmented IP Packetsā policy setting. To prevent the use of a
protocol, add a rule to the Policy ACL to deny the protocol between all IP addresses.
ā Restrict access to some servers containing sensitive data to selected sets of
workstations or limit the applications a workstation can access or both.
Most organizations have certain servers which contain information that only
speciļ¬c people should be allowed to access, such as information speciļ¬c to a
human resources department. You can create a policy to ensure that only authorized
workstations are allowed to access a particular server on your system. To restrict
access, build a custom policy for the protected server that deļ¬nes the IP addresses
of all workstations which are allowed access to that server and denies all other access
attempts. You will also need to ensure that no workstation is allowed to spoof its IP
address and masquerade as one of the āacceptableā workstations which are allowed
to access the server.