Page 126 / 249 Scroll up to view Page 121 - 125
Firewall
121
Web lists
Access will be denied to any web address (URL) that contains text entered in the
Block
List
,
e.g. entering
xxx
will block any URL containing
xxx
, including
or
www.test.com/xxx/index.html
.
The
Allow List
also enables access to URLs containing the specified text.
Figure 6-11
Page 127 / 249
Firewall
122
Content
Note
Content filtering is only available after your have registered your CyberGuard SG
appliance and activated your content filtering license (sold separately) through
www.cyberguard.com/snapgear/my/
.
Content filtering allows you to limit the types of web based content accessed.
Check
Enable Content Filtering
enter your activated
License key
then continue on to
set reporting options and which categories to block.
Click
Apply
once these options
have been set up to enable content filtering.
Note
Content filtering will not be performed for addresses specified in
Web Lists
or
IP Lists
.
Figure 6-12
Checking
Enable Cache
will store recently accessed pages’ ratings locally, to lower the
response time the next time the page is accessed.
It is recommended that you leave this
checked.
Page 128 / 249
Firewall
123
Reports
Warning
The correct time/date must be set on your CyberGuard SG appliance for reporting to
work.
The most effective way to do this is by using an NTP time server.
See the
Time
and Date
section in the chapter entitled
Advanced
for details.
Blocked requests are submitted to the central content filtering server.
The user
attempting to access blocked content can be identified either through
User Accounts
(see
User Authentication earlier
in this chapter) or the IP
Address of their machine
.
Click
View Reports
to connect to the central content filtering server.
You will be
prompted to enter your
Customer ID
,
Username
and
Password
that were issued with
your content filtering license.
Note
This username and password is not the same as the one used to access your
CyberGuard SG appliance.
Categories
Select which categories you wish to block.
Selecting
Unratable
will block pages that the
central content filtering database has not yet categorized.
Figure 6-13
Page 129 / 249
Firewall
124
ZoneAlarm
This facility denies Internet access to machines your LAN that are not running the
ZoneAlarm Pro personal firewall software.
Running personal firewall software on each
PC offers an extra layer of protection from application level, operating system specific
exploits and malware that abound on the Internet.
Policy enforcement
This access control module allows a site's security policy to be partially actively enforced.
Hosts which do not adhere to their defined policy will be automatically denied access
through the firewall.
A number of security groups can be defined where each group contains a number of host
IP addresses or IP address ranges.
Each group is aditionally given a number of
permitted and denied services which they are allowed to offer.
Each host in each group
will be periodically actively scanned for the services they are not allowed to offer and if a
connection to one of these services is successful, the host is black listed until such time
as the offending service is no longer offered.
Scans are never performed against
permitted services.
A number of predefined allow and deny service lists are provided,
however, these should really be considered a guideline only as they are not a
replacement for a well thought out and designed security policy.
In addition to enforcing the services aspect of security groups, it is possible to include a
number of NASL (
Nessus Attack Scripting Language
) scripts in
/etc/config
on the unit and
to define some or all of these to be run against the target hosts.
Typically, one would use
attack scripts from the Nessus suite to scan for specific vulnerabilities and exploits on a
host.
If any script detects such a vulnerability, Internet access will again be blocked.
The
list of available scripts is automatically populated from the files ending with
.nasl
in
/etc/config
.
Security groups may overlap with respect to hosts within them.
In this case, a single
allow service overrides any number of denies of that same service.
However, NASL
scripts and overlapping groups do not interoperate particularly and should be avoided.
The top level page has a checkbox
Block Unscanned Hosts
which defines the
behaviour for a host which hasn't been scanned or is not defined to be scanned.
The
Minimum Inter Probe Delay
specifies a minimum number of seconds between
scans of a single host.
It also specifies the maximum time for changes to take effect.
The
Simultaneous Probes
setting specifies the maximum number of different hosts that
should be scanned together.
Page 130 / 249
Intrusion Detection
125
7. Intrusion Detection
Note
Advanced Intrusion Detection
is available on the SG565, SG575, SG580, SG635 and
SG7xx series only.
Other models offer
Basic Instrusion Detection and Blocking
only.
The CyberGuard SG appliance provides two intrusion detection systems (IDS).
The
lightweight and simple-to-configure
Basic Intrusion Detection and Blocking
, and the
industrial strength
Advanced Intrusion Detection
.
Basic and Advanced Intrusion Detection take quite different approaches.
Basic Intrusion
Detection offers a number of dummy services to the outside world, which are monitored
for connection attempts.
Clients attempting to connect to these dummy services can be
blocked.
Advanced
Intrusion Detection uses complex rulesets to detect known methods
used by intruders to circumvent network security measures, which it logs to a remote
database for analysis.
To guard against intrusion attempts, use Basic Intrusion Detection
and Blocking
.
For
highly detailed diagnostic reports of intrusion attempts, use Advanced Intrusion
Detection.
You can choose to use Basic and Advanced simultaneously.
Read on to find out how using an IDS can benefit your network’s security, or skip ahead
to the
Basic
or
Advanced Intrusion Detection
section for an explanation of configuration
options.

Rate

4 / 5 based on 3 votes.

Popular SnapGear Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top