Remote firewall administration
Firewalls are the first line of defense visible to an attacker. By design, firewalls are generally difficult to attack directly, causing attackers to often target the administrative accounts on a firewall. The username/password of administrative accounts must be strongly protected.
The most secure method of protecting against this form of attack is to have strong physical security around the firewall host and to allow firewall administration only from an attached terminal. However, operational concerns often dictate that some form of remote access for firewall administration be supported. In no case should remote access to the firewall be supported over untrusted networks without some form of strong authentication. In addition, to prevent eavesdropping, session encryption should be used for remote firewall connections.
Low
Any remote access over untrusted networks to the firewall for administration should use strong authentication. This would consist of one-time passwords and/or hardware tokens.
Medium
The preferred method for firewall administration is directly from the attached terminal. Physical access to the firewall terminal is limited to the firewall administrator and backup administrator.
Tip When remote access for firewall administration must be allowed, it should be limited to access from other hosts on the organization's internal network. Such internal remote access requires the use of strong authentication, such as one-time passwords and/or hardware tokens. Remote access over untrusted networks such as the Internet requires end-to-end encryption, such as VPN tunneling, as well as strong authentication.
High
All firewall administration must be performed from the local terminal. No access to the firewall operating software should be permitted via remote access. Physical access to the firewall terminal should be limited to the firewall and backup administrators.
User accounts
Firewalls should never be used as general-purpose servers. The only user accounts on the firewall should be those of the firewall administrator and any backup administrators. In addition, only these administrators should have privileges for updating system executables or other system software.
Tip Only the firewall and backup administrators should be given user accounts on the organization firewall. Any modification of the firewall system software must be done by the firewall administrator or backup administrator and requires approval of the network services manager.
In this tutorial:
- Firewall Security Policy
- Firewall protection
- Firewall architectures
- Multi-homed host
- Screened host
- Screened subnet
- Types of firewalls
- Packet-filtering gateways
- Application gateways
- Hybrid or complex gateways
- Routing versus forwarding
- IP spoofing
- DNS and mail resolution
- Intranet
- Network trust relationships
- Virtual private networks
- Qualification of the firewall administrator
- Remote firewall administration
- Firewall backup
- System integrity
- Physical firewall security
- Firewall incident handling
- Upgrading the firewall
- Revision/update of firewall policy
- Examples of service-specific policies