Firewall Audit Check List
Firewall Audit Check List
Checklist
Checklist
1. Review the rulesets to ensure that they follow the order as follows:
anti-spoofing filters (blocked private addresses, internal addresses
management server)
Deny and Alert (alert systems administrator about traffic that is
suspicious)
Firewalls operate on a first match basis, thus the above structure is important
3. Stateful inspection
Review the state tables to ensure that appropriate rules are set up in terms of source and
destination IP’s, source and destination ports and timeouts. Ensure that the timeouts are
appropriate so as not to give the hacker too much time to launch a successful attack.
For URL’s
If a URL filtering server is used, ensure that it is appropriately defined in the firewall
software. If the filtering server is external to the organisation ensure that it is a trusted source.
If the URL is from a file, ensure that there is adequate protection for this file to ensure no
unauthorised modifications.
Ensure that specific traffic containing scripts; ActiveX and java are striped prior to being allowed into
the internal network.
If filtering on MAC addresses is allowed, review the filters to ensure that it is restricted to the
appropriate MAC’s as defined in the security policy.
5. Logging
Ensure that logging is enabled and that the logs are reviewed to identify any potential
patterns that could indicate an attack.
5. Patches and updates
Ensure that the latest patches and updates relating to your firewall product is tested and
installed.
If patches and updates are automatically downloaded from the vendors’ websites, ensure that
the update is received from a trusted site.
In the event that patches and updates are e-mailed to the systems
administrator ensure that digital signatures are used to verify the vendor and
6. Location – DMZ
Ensure that there are two firewalls – one to connect the web server to the
internet and the other to connect the web server to the internal network.
In the event of two firewalls ensure that it is of different types and that dual
NIC’s are used. This would increase security since a hacker would need to
The rulesets for both firewalls would vary based on their location e.g. between
web server and the internet and between web server and the internal network.
Ascertain if there is a procedure to test for open ports using nmap and whether
Ensure that the ruleset complies with the organisation security policy.
9. Ensure that the following spoofed, private (RFC 1918) and illegal addresses
are blocked:
Standard unroutables
255.255.255.255
127.0.0.0
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
Reserved addresses
240.0.0.0
Illegal addresses
0.0.0.0
UDP echo
Ensure that traffic from the above addresses is not transmitted by the
interface.
10. Ensure that loose source routing and strict source routing (lsrsr & ssrr) are
Link TCP 87