The "No Network is 100% Secure" series
- Firewalls -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
![]()
Why are firewalls needed?: Firewalls have been around for decades. However it was 
not uncommon to visit a data center that did not have firewall protection 
as recently as 2004 or so. Prior to around 2000, hackers, crackers, virus attacks
and so on were typically viewed by IT Managers as more of a nuisance than as a 
serious threat to the safety, security, reliability and integrity of their 
enterprise.  Dealing with 
these activities was (and still is, to some degree) viewed as "unproductive" 
work, since blocking unwanted access to a network is generally related more to
revenue protection than it is to revenue generation.  However, these days, the 
decision of whether to assign resources and spend money to protect against 
hackers, crackers, viruses, denials of service and so on is no longer open to 
discussion.  Once the 
realm of so-called "script kiddies", hacking, phishing and other illegal activities 
is now big business.  Serious criminal organizations are now involved in many of 
these attacks. Consequently, IT Managers have been forced to allocate much more 
money and resources for network and data center security than ever before.
Current estimates are that about one third of today's IT budget goes towards 
protecting the network from illegal intrusions and attacks.
Helping IT Managers select and deploy enterprise security mechanisms and best practices
has kept Consultants like myself quite busy in recent years.
What is a firewall?: In it's simplest form, a firewall is a mechanism that  
prevents unauthorized access to or from a computer or a computing network.  This 
methodology is typically implemented by placing a firewall computer, appliance, 
device or capabilities at the entry point into the IT data center. The firewall 
is typically set to block ports and services that are not allowed anywhere within
the enterprise.  For example, most IT organizations do not allow Telnet access to 
anything.  Therefore, port 23 (Telnet) would typically be blocked from any IP address 
to any address.  Some Data Centers, such as remote colo, have the need for 
Administrators to be able to connect to servers remotely, so the main firewall 
might be set to allow SSH (port 22), but only for packets originating from specific 
IP addresses belonging to authorized Admin computers.  Many IT Organizations will 
also block all UDP packets, no matter where they originate from.  This type of 
firewall methodology is very effective
in keeping the meteor sized chunks of mal-intended traffic out of a network.
There are, however, some services that simply cannot be blocked at the border.
An example would be SMTP (port 25) which is used to transmit e-mail.  There are 
ways to get around this that are beyond the scope of this paper, but for now, 
suffice it to say that blocking all incoming SMTP packets is not realistic. So 
networks have all of these SMTP packets running around looking for vulnerabilities to
exploit and ads for Viagra looking for e-mail addresses to spam. This is an over-
simplified example, to be sure.  But the way to effectively block unwanted traffic 
on a computer 
to computer basis is with an "on the box" firewall.  This would be implemented 
using IPF, IP Tables, IP Chains or in the case of a PC, with something like
Zonealarm. The "on the box" firewall" in our example case would be set to block 
everything except for 
required services such as port 25, port 22 and possibly POP (port 110), IMAP 
Webmail and so forth.
In this way, even if a hacker was able to get past the main firewall, the intrusion 
attempt would be blocked further down the line.  Of course the best strategy is to 
block bad people as soon as possible so that's where "best practices", Intrusion
Detection Systems (IDS), utilizing a "DMZ" and things of that nature come in.
As an example, a very simple but often overlooked best practice is to turn off 
all services that are not needed on every computer and server in the network.
There are literally thousands of "port scans" going on at any given time, looking 
for vulnerabilities in your network to exploit.  Firewall port blocking and turning off 
unneeded services will greatly reduce your risk of having a vulnerability 
exploited.
However, all of that aside, in our simple, one 
mail server network example, the objective would be to set the on the box firewall 
rules so tight that even if the main firewall wasn't there, the mail server would 
still be protected.  It would also be a wise best practice to keep the e-mail 
application service patched to the latest revision and to protect against having 
a lax server configuration setup that begs to be exploited by a clever hacker.
Will implementing firewalls as described protect my network 100%?: 
Unfortunately, no.  Not even
close, although this was a common misperception when IT Managers first started 
deploying firewalls some ten years ago. Installing a firewall is sort of like 
putting a "kill switch" in your car.  It's still easy enough to steal the car...
it's just that the crooks have to work a little to do so.  Even with aggressive
firewall deployment, networks are still beaucoup exposed. 
This issue is further clouded by sales people, in some cases.  IT Managers are 
sometimes led to believe that security is an issue that technology alone can 
solve.  Spend enough money (buying products that this salesman sells) and poof! 
The problem goes away!  Consider this:  you can purchase the biggest and very best 
firewall product that's out there.  But if it's installed haphazardly and if it is 
configured with a silly, ineffective rule set, you're pretty much as 
vulnerable as if you had no firewall at all! In my opinion, IT managers would 
do better investing in making sure that the core security fundamentals are in 
place before pulling out their checkbook.
So then what?: IT managers need to understand the problem before they can fix 
the problem.  I would recommend doing an audit and testing the network for 
vulnerabilities as a first step.  Once management understands where the biggest 
holes are, a responsive and sensible project plan can be developed to address 
the greatest areas of weakness.  If a comprehensive testing methodology is in 
place, it will be a lot easier to measure how effective various security 
initiatives have been in tightening up the network.  Laying solid groundwork is 
key to implementing projects that deliver effective results.
Other White Papers in this "No Network is 100% Secure" series delve into this issue 
further.
White papers are being written to include best practices, trojans, virus attacks, 
bots, denial of service (DoS) attacks, phishing, phlashing and other security topics 
of interest 
to IT Managers and others.  We welcome your feedback.  We can also put on security 
oriented seminars for interested groups and organizations.  These are done in 
conjunction with our Partner, Tektel In Beaverton, Oregon.  IT Organizations are 
also welcome to engage 
Easyrider LAN Pro 
to do security assessments and best 
practice consulting to look at specific problems and concerns that you might have.
Easyrider LAN Pro
is also a premier Network Operation Center (NOC) design 
consultancy, having designed and deployed many of the area's enterprise class
NOCs.  No matter how careful you are and no matter how secure your network is, it's 
just a question of when, not if, your data center gets hacked.  So then it becomes 
a question of how long will it take your Administrators to notice the virus, bot, 
trojan, DoS or whatever was done?  With a comprehensive, proactive, professionally 
staffed NOC and professional grade monitoring software, the answer is: probably not 
very long (as in seconds/minutes).  With a NOC designed and built by 
Easyrider LAN Pro
the answer is usually: 
your NOC Techs should see the attack in progress and will probably be able to stop it 
before any serious damage is done. Please feel free to contact 
Easyrider LAN Pro if you'd like to
discuss deploying a NOC or upgrading your existing monitoring capabilities.
Next in the security white paper series: 
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
More 2009 hacks in the news
Still more 2009 hacks in the news
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
ISO/IEC 27005:2008 Standard for Security Risk Management
Virus White Paper
GhostNet White Paper
Password White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Outsourced IT White Paper
Shelfware White Paper
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro