Firewall Audit Checklist

Firewall Audit Checklist10 minute read, Published: October 18, 2024

Auditing your firewall is a critical step in maintaining a secure network environment. This generic checklist can be used regardless of the vendor, focusing solely on the technical aspects of firewall management. As you conduct your audit, it's also essential to consider manual elements, such as the physical security of the firewalls

Key Information to Gather Before the Audit

Before completing the audit, there are a few key pieces of information that need to be collected:

  • Firewall Vendor Information: Gather all relevant details, including OS version, latest patches, and default configuration.
  • Security Policies: Obtain copies of relevant security policies.
  • Firewall Logs: Access logs that can be analyzed against the firewall rule base to understand which rules are actively being used.
  • Network Diagrams: Ensure you have an accurate diagram of the current network and firewall topologies.
  • Previous Audit Reports: Review reports and documents from previous audits, including firewall rules, objects, and policy revisions.
  • ISP and VPN Identification: Identify all Internet Service Providers (ISPs) and Virtual Private Networks (VPNs) in use.
  • Critical Asset Understanding: Familiarize yourself with key servers and information repositories in the network and assess their value.
  • Port Restrictions: Before recommending which ports to block, ensure that the services associated with those ports are not critical to business operations.
  • Internal Modems: Check for any modems within the internal network, as they can pose a threat by bypassing firewall protections.
  • Application-Level Firewalls: Ensure that the operating system for any application-level firewalls is as secure as possible, since their effectiveness relies on both components.
  • Defense in Depth: Recognize that firewall implementation is part of a broader security strategy. Assess the security of additional components, such as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
  • Remote User Security: For users connecting to the corporate network via VPN, verify the security of their end devices to maintain network integrity.

Firewall Audit Checklist

No. Checklist Item Description Action
1 Ruleset Review Ensure the ruleset follows the proper order:
1. Anti-spoofing (block private addresses and internal addresses appearing from the outside).
2. User Permit (e.g. allow HTTP to public webserver).
3. Management Rules (e.g. SNMP traps to network management server).
4. Noise Drops (e.g. discard OSPF and HSRP chatter).
5. Deny and Alert (alert systems administrator about suspicious traffic).
6. Deny and Log (log remaining traffic for analysis).
2 Application-Based Firewalls Monitor attempts to violate security policy; block specific SMTP and FTP commands. Implement monitoring and blocking
3 Stateful Inspection Review rules for source/destination IPs, ports, and timeouts. Adjust rules and timeouts
4 Logging Enable logging and regularly review logs for potential attack patterns. Check logging configuration
5 Patches and Updates Apply latest patches and updates; ensure update sources are trusted. Verify and apply updates
6 Location – DMZ Ensure two firewalls are in place: one to the internet, one to the internal network. Verify firewall placement
7 Vulnerability Assessments/Testing Establish a process for testing open ports; ensure unnecessary ports are closed. Conduct regular vulnerability scans
8 Compliance with Security Policy Confirm that the ruleset complies with the organization's security policies. Review compliance
9 Block Spoofed, Private, and Illegal Addresses Ensure specific addresses are blocked (e.g., unroutables, private). check the Spoofed Illegal Address List section Configure address filtering
10 Source Routing Block and log loose and strict source routing. Update firewall settings
11 Block Specific Ports Check and block specified ports based on security needs. check the Ports That Should Be Blocked section Implement port blocking
12 Remote Management Use SSH instead of Telnet for remote management. Configure remote access
13 FTP Server Segmentation Ensure the FTP server is on a separate subnet. Verify server placement
14 ICMP Filtering Implement rules to block ICMP echo requests and replies. Adjust ICMP settings
15 Zone Transfers Ensure proper filtering for DNS to prevent unauthorized zone transfers. Configure DNS filtering
16 Egress Filtering Allow only traffic originating from internal IPs; log external traffic. Set up egress filtering
17 Critical Servers Deny traffic directed at critical internal addresses from external sources. Implement deny rules
18 Personal Firewalls Provide training on personal firewalls and review settings. Conduct user training
19 Distributed Firewalls Ensure consistent security policy distribution and integrity controls during transfer. Review policy distribution
20 Stealth Firewalls Reset default usernames and passwords; review access control lists. Secure firewall configuration
21 ACK Bit Monitoring Establish monitoring to prevent remote systems from initiating TCP connections. Implement ACK monitoring
22 Continued Availability of Firewalls Ensure there is a hot standby for the primary firewall. Set up redundancy

Ports That Should Be Blocked

To enhance network security, it is essential to block certain ports that are not in use. The following ports are known for vulnerabilities and should be restricted to prevent unauthorized access and potential exploits.

Service Description Port Type Port Number
DNS Zone Transfers (except from external) TCP 53
TFTP Daemon UDP 69
Link TCP 87
SUN RPC TCP & UDP 111
BSD UNIX TCP 512 – 514
LPD TCP 515
UUCPD TCP 540
Open Windows TCP & UDP 2000
NFS TCP & UDP 2049
X Windows TCP & UDP 6000 – 6255
Small services TCP & UDP 20 and below
FTP TCP 21
SSH TCP 22
Telnet TCP 23
SMTP (except external mail relays) TCP 25
NTP TCP & UDP 37
Finger TCP 79
HTTP (except to external web servers) TCP 80
POP TCP 109 & 110
NNTP TCP 119
NTP TCP 123
NetBIOS in Windows NT TCP & UDP 135
NetBIOS in Windows NT UDP 137 & 138
NetBIOS TCP 139
IMAP TCP 143
SNMP TCP 161 & 162
SNMP UDP 161 & 162
BGP TCP 179
LDAP TCP & UDP 389
SSL (except to external web servers) TCP 443
NetBIOS in Win2k TCP & UDP 445
Syslog UDP 514
SOCKS TCP 1080
Cisco AUX port TCP 2001
Cisco AUX port (stream) TCP 4001
Lockd (Linux DoS Vulnerability) TCP & UDP 4045
Cisco AUX port (binary) TCP 6001
Common high order HTTP ports TCP 8000, 8080, 88

Spoofed Illegal Address List

Ensure that the following spoofed, private (RFC 1918), and illegal addresses are blocked:

Standard Unroutables

  • 255.255.255.255
  • 127.0.0.0

Private (RFC 1918) Addresses

  • 10.0.0.0 – 10.255.255.255
  • 172.16.0.0 – 172.31.255.255
  • 192.168.0.0 – 192.168.255.255

Reserved Addresses

  • 240.0.0.0

Illegal Addresses

  • 0.0.0.0

Additional Considerations

  • UDP Echo
  • ICMP Broadcast (RFC 2644)

Ensure that traffic from the above addresses is not transmitted by the interface.

References


October 18, 2024

Tags: audit firewalls