[c-nsp] what type of firewall/ids
Voll, Scott
Scott.Voll at wesd.org
Tue Jul 11 10:49:45 EDT 2006
And if your looking for Day Zero protection, you might want to look at
Cisco's CSA client. Has done a very good job of keeping worms / viruses
off servers for us.
Scott
-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net
[mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Mike Butash
Sent: Tuesday, July 11, 2006 2:47 AM
To: Shaun
Cc: cisco-nsp at puck.nether.net
Subject: Re: [c-nsp] what type of firewall/ids
Depends what kind of capacity, connections, and throughput you need
really. I've found the Cisco FWSM's are about the highest capacity
firewall out there in terms of sheer connections, new connection
setup/teardown, and overall throughput capability. Nothing else on the
market touches their capacity that we found, and they offer some
built-in management though object-group use if you get creative.
Pix/FWSM gui via pdm/adsm is limited (read worthless) for advance users,
but I'm not a gui person so take it for what you will. The fwsm's are a
preference when nothing less than several gigs are required, and when
paired to the cat6500's are capable of some very cool things. I've run
them with 50k+ ace's (compiled) under significant ddos's and not seen
them blink. Of course, this is somewhat variable on pps, new connection
setups, etc, so caveat emptor. ;)
I've used netscreens in the past and found their cli configuration
somewhat hokey with use compared to pix/fwsm equivalents, though I hear
since the juniper acquisition they've gotten better. I could only stand
using them via their gui at the time, which was about 4 years ago. Of
course, take this with a grain of salt from an old cisco guy... Can't
much attest to much else with the NS's short of their own reps telling
us they couldn't touch a FWSM in terms of capacity and connections.
Riverhead/Cisco Anomaly Guards were a godsend as far as ddos protection
if you see a lot of it, though they are quirky and require some constant
babysitting. Overall the appliances will take a full gig a piece
without issue, their only limitation is protecting a large footprint of
disparate hosts/ip's. As with anything, they have quirks, bugs, things
they do better than others, etc, but overall they are an excellent
product if you are prone to random internet drive-by rapings in the form
of DDoS's. They do not handle layer 5 and higher exploits, don't expect
them to...
As far as IDS, can't really go wrong with snort/sourcefire with
commodity server hardware and good nics. Snortcenter makes a pretty
good aggregator of multiple sensor hosts as well. I'd recommend using
passive/regeneration optical taps over span sessions (netoptics brands
work well though experience). Monitor/span sessions come with a lot of
caveats you'll want to avoid, although your physical fiber plant will
get somewhat complex with taps in place - document the runs and test
failover situations twice. You'll save yourself something like
overrunning the cat6500 buffers if you ever push more traffic through
the src port than the dst ports allocated to the monitor sessions and
crashing the box.
As far as IPS, we've used tipping points, but really have to question
overall what an IPS offered other than pretty reports to managers of 5yr
old exploits noted and *defended against* en masse. I think there was
only one situation they ever presented actual usefulness under a ddos
situation, and it was very niche. They added a LOT of complexity and
overall limitations to our network infrastructure that put serious
question to their overall usefulness and purposefulness. For instance,
in normally fully meshed routed environments, their stateful nature
requires them to see full two-way conversations, which limit your
network to active/passive paths maintained though IGP costs or some
such. If you are running less than a gig of throughput in a simple
routed environment, you're probably fine to use them to your
satisfaction, but when facing anything that requires multiple
port-channeled gige's/10G (don't think TP's can do 10G yet) and
multipath full-mesh routing is impossible with these beasts in-line.
IMHO, you're better off maintaining a good security posture and patch
regiment with your hosts that are internet facing and keeping your
firewalls locked down tightly. If zero-day windoze attacks hit, you're
likely to still be screwed before someone updates the IPS, but they
might save you grief if M$ decides to wait a month to release patches as
they've been known to do. More possible protection generally means
better, but with their network integration complexity and overall
limiting of network capacity for the IPS throughput, I think the only
reason they are still in use is the CISO didn't want to admit he wasted
capex on them... ;)
-mb
Shaun wrote:
> What brand/model firewall/ids hardware are you guys out there using to
block
> incomming/outgoing attacks, port scans, brute force attempts, etc.
>
_______________________________________________
cisco-nsp mailing list cisco-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
More information about the cisco-nsp
mailing list