- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-27-2012 02:28 PM
All,
We recently migrated from Checkpoint to PANOS (via the conversion tool) and so far things are looking pretty good. The next step of our project is to convert port based rules to app type rules and I wanted to get some feedback, tips, etc from others that have done the same thing..
We have about 550 security rules and would love to be able to consolidate, and generally rework everything going forward..
So, what do you think? What should we make sure we do or don't do? Any custom reports we should create to help with the task? Anything else ??
Any and all help is greatly appreciated!
Thanks much!
-Steve
03-27-2012 03:00 PM
In my opinion you shouldnt rely entirely on appid but rather appid + service (service is the PAN name for ports). Preferly using custom service but using "default" should be fine too.
The point here is to setup your PA device like a SPI firewall and then add application identification to go into the NGFW mode.
The reason for this is that in order to successfully identify an application the firewall must let some (or more) packet(s) through. If you set "service:any" this means that ALL ports will be forwarded to your device you try to protect and if you are really unlucky this single packet (or these few packets before the flow is successfully identified) will do bad stuff to your device.
At first it might seem like climbing mount everest in order to go through 550 rules but I think its still doable. Take them in batches and take short breaks in between and you should be able to go through them all in a day or two 🙂
To make it easier to maintain in future a good idea might be to organize your rules by destination ip/network. So rules regarding server X are bundled close to each other. This also means that, depending on taste, it might be good to avoid aggregate too many rules into one.
For example
src:NMS
dst: server1, server2, server3
appid: snmp
service:default
src:Admins
dst: server1, server2, server3
appid: ssh
service:default
vs.
src:NMS
dst: server1
appid: snmp
service:default
src:Admins
dst: server1
appid: ssh
service:default
src:NMS
dst: server2
appid: snmp
service:default
src:Admins
dst: server2
appid: ssh
service:default
src:NMS
dst: server3
appid: snmp
service:default
src:Admins
dst: server3
appid: ssh
service:default
03-30-2012 03:05 PM
So there isn't really a need to turn services off once you have an app rule, more so just add the app rule to your existing service rules, you could remove the service rules later, but it might be better just to leave them in there.. I got ya..
What about reports that were helpful for you to get that stuff under control?
Or anything else I need to start looking at?
Thanks much!
-Steve
03-30-2012 03:25 PM
Depends on how well documented your environment already is.
A way to (hopefully) need to convert less rules could be to ask each server owner if the rules you currently got in your CP is still valid.
Perhaps some servers have been removed or some port/protocols is no longer in use.
This is for example how I would setup security rules for a webserver running TCP80 (http) and TCP443 (https):
Instead of a single rule which says something like:
1)
dstzone: DMZ
dstip: <serverip>
appid: web-browsing, ssl
service: any
action: accept
log option: log on session-end
2)
srczone: any
srcip: any
dstzone: any
dstip: any
appid: any
service: any
action: deny
log option: log on session-end
I would go for:
1)
dstzone: DMZ
dstip: <serverip>
appid: web-browsing
service: TCP80
action: accept
log option: log on session-end
2)
dstzone: DMZ
dstip: <serverip>
appid: ssl
service: TCP443
action: accept
log option: log on session-end
3)
srczone: any
srcip: any
dstzone: any
dstip: any
appid: any
service: any
action: deny
log option: log on session-end
But again its a matter of taste along with how strict you wish to protect your golden eggs.
Regarding log-option the last "log and deny" rule will only need "on session-end" (since the session ends with the deny ) however the accept rules might need "on session-start" aswell (good for troubleshooting otherwise the client will show up in the logs only after the connection is reset or fin/acked). You need "on session-end" in order to get transmitted volume and some other parameter which I always forgets (appid?).
Another methology is to place your PA inline (using virtual wire) or in tap-mode (spanned port on the router/switch in front of your current CP setup) for a week or two (or even a month) and then generate reports to see which traffic you actually have in your network and from that build your ruleset (of course at the same time comparing with the old ruleset but this way you will see which ports/protocols (applications) is still in use today in case the server owners isnt helpful regarding documenting what their servers are doing to the network).
04-05-2012 12:26 PM
Well, we've already migrated to the PAs which has been in place for about 2 weeks now.. We're running various reports to see what rules are hit, then the thought was to enter an App rule above then, then disable the service rule... Although you mentioned keeping the service rule in place even after the App has been enaled... That's something else we're looking at too..
Lots to do!
Thanks a bunch for the pointers!
-Steve
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!