Firewall Audit Work Program
Firewall Audit Work Program
1 Source: www.knowledgeleader.com
EXECUTIVE SUMMARY
A firewall is a system or group of systems that enforces an access control policy between two or more networks.
Firewalls are important since they can provide a single “choke point” where security and audit can be imposed.
They also provide an important logging and auditing function because they provide summaries about what kinds
and amount of traffic have passed through, how many penetration attempts there were, and more.
For a firewall to work properly, it must be a part of a consistent overall organizational security architecture.
Policies regarding firewalls must be realistic and reflect the entire network’s level of security.
Furthermore, it is imperative that the rules concerning the configuration of every component in the firewall
(internet router, firewall, proxy server, virus software) are properly understood, fully documented and carefully
implemented.
Independent testing of the firewall on a regular basis, and especially immediately after installation, is essential.
Most successful hacking attempts are due to inadequate or faulty configuration of one or more firewall
components. Attacks on the firewall by a firm specializing in such services, using reputable testing software,
should be carried out immediately after implementation and on a regular (preferably monthly) basis thereafter.
Given the sensitive roles firewalls play in network infrastructure, how they are administered and maintained is
critical. One of the most common methods for breaking into a firewall is to take advantage of tools made available
for the remote administration of the firewalls. This can include exploiting access to the operating system consoles
and or access to graphical management interfaces.
For all these reasons, access to these administrative tools and firewalls administration must be monitored and
controlled and regular audits must be performed.
With this tool, you get four separate sample work programs that were designed to provide guidance for your next
firewall audit.
Audit objectives for these work programs include obtaining network diagrams illustrating firewall connections and
segmentation on the network; obtaining network diagrams from the network administrator to gain an
understanding of the network environment; determining if the expectations/goals/strategies of the firewall have
been identified and are sound; meeting with the systems manager to define the functional purpose of each
firewall; and verifying that the firewalls have been configured to match their functional purpose.
This document should be used as a general guide to understand and review this business process. Organizations
should customize this tool to ensure that it reflects their business operations and continuously monitor the
process to ensure that the steps described are accurate.
2 Source: www.knowledgeleader.com
FIREWALL AUDIT WORK PROGRAM: SAMPLE 1
0B0B Planning
Fieldwork
AUDIT OBJECTIVES
Documentation
Logical Access
Ensure that logical access to the various components (routers, firewall software,
etc.) of the firewall solution is appropriately restricted to the individuals with
authorized need for such access.
Test Step: Obtain a list of individuals who have access to change configurations
to routers and firewalls.
Ensure that justifications for firewall rules are documented to identify the purpose
of the rules.
Test Step: Obtain firewall rule sets and review for appropriate rule justification
and purpose.
3 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
4 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Configuration
Obtain the firewall operating system configuration for rejecting and logging
activities. Review to determine that the following system activities are logged:
• Login (unsuccessful and successful)
• Logout (successful)
• Use of privileged commands (unsuccessful and successful)
• Application and session initiation (unsuccessful and successful)
• Use of print command (unsuccessful and successful
• Control permission modification for users and security parameters
5 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Documented logging results are monitored, and follow-up actions are performed.
Test Step: Meet with a manager and a firewall administrator and inquire about
the monitoring of logs and the incident response, if needed.
System and firewall logs are rotated to reduce disk space problems. Rotation
should be automatic. Document the retention period.
Test Step: Meet with the systems manager and inquire about the retention of
firewall logs.
When ports or services are needed to administer the firewall and rules exist that
6 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Firewall Test
Attempt to port scan the firewall from both the internal network and the internet,
scanning for internet control message protocol (ICMP), user datagram protocol
(UDP) and TCP. There should be no open ports and the firewall should not be
able to be pinged.
Test Step: Attempt to port scan the firewall from both the internal network and
the internet, scanning for ICMP, UDP and TCP. There should be no open ports
and the firewall should not be able to be pinged.
A lockdown rule has been placed at the beginning of the rule base. The lockdown
rule protects the firewall, ensuring that whatever other rules you put in later will
not inadvertently compromise your firewall. If administrative access is required,
then a rule should be placed before the lockdown rule. All other rules should go
after the lockdown rule going from most restrictive to general rules. Review the
remaining rules.
Test Steps:
• Obtain the IS router and firewall standard from (Insert name). Review the
policy to verify the reasonableness of baseline firewall rules.
• Review the rule set to verify the appropriate use of a lockdown rule.
Obtain and review the connections table for timeout limits and the number of
connections.
• Timeout should be no longer than X minutes (X seconds).
• The firewall's automatic notification alerting features are utilized and
information about the breach/intruder is archived for analysis.
Test Steps:
• Obtain firewall configurations from the firewall administrators.
• Review the configurations and verify:
− Connections time out after an appropriate length of time.
− Connection tables are properly set.
− Automatic notifications are enabled in the event of a security breach.
Application Logs
Separate partitioning for firewall logging is considered. This may be in the form of
a separate partition on the same server, a second server drive, mirroring to the
disaster recovery site or a centralized logging facility.
Test Step: Meet with the systems manager and firewall administrators and
inquire about the location of where the logs are stored.
7 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Physical Security
Physical access to the various components (routers, firewall software, etc.) of the
firewall solution is appropriately restricted to individuals with an authorized need
for access.
• Lines connected to the firewall hardware are reasonable.
− Obtain a schematic of the lines connected to the applicable firewall
hardware.
− Discuss the purpose of each line with the appropriate staff.
Test Steps:
• Meet with the systems manager and firewall administrators and verify that all
firewalls are physically inside of a data center.
• Inspect the firewall network diagrams to verify that the connected lines are
appropriate.
Continuity of Operations
Fault tolerance (e.g., mirroring of data) has been implemented for the firewall
server.
Redundant components are installed where critical failure points exist, or spare
parts should be on site.
• Use the hardware and software configuration information to identify hardware
and software in place, which provides redundancy and backup.
If single points of failure exist, plans to address the situation(s) exist.
Obtain and review a schedule of the retention periods for the firewall's software
components and a schedule of the rotation cycle of the firewall's software. The
disaster recovery plan includes the firewall server.
Test Steps:
• Meet with the systems manager and firewall administrators and discuss the
failover and point of failure strategies of the firewalls.
• Discuss the life expectancy of the firewall software.
• Verify that the disaster recovery plan takes firewalls into account.
8 Source: www.knowledgeleader.com
FIREWALL AUDIT WORK PROGRAM: SAMPLE 2
1B1B Planning
Fieldwork
Report Issuance
Ensure that the application gateway firewalls host operating system (usually
Unix) has been properly modified to disable services that could be used to
subvert the security of the firewall software program:
• Review startup files to ensure that all standard network services have been
9 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Review the configuration of the firewall software. Often, a configuration file can
be printed out and reviewed.
• Identify all supported and active network application proxies along with the
indication of where connections may be initiated. (This may be noted as a
“trusted network” for connections initiated from the internal network and an
“untrusted network” for connections initiated from the external network–the
internet.) Compare this to the internet policy description of authorized
services. Investigate any deviations from the policy. Further, ensure that the
firewall is not configured to automatically trust any outside network.
• For all proxies that allow network connections to be initiated from the
internet (telnet, FTP, etc.), ensure that strong password authentication
controls are implemented (challenge-response, encryption) or that third-
party security schemes have been implemented (SecureID and S/key).
• For all proxies that allow network connections to be initiated from the
internet, there should normally be restrictions (based on IP addresses or
host names) on the source of such connections and the systems on the
internal network that an internet user may access. Assess the need for
these restrictions and review the configuration of such access controls.
• Review the firewall documentation to ensure that the IP source routing
functionality is disabled in the firewall product.
• Review ID and password controls – authorizations for IDs, password format
and aging controls.
• Review and assess the use of groups to assign services and access
capabilities to users.
• For generic proxy programs that may be in use, review the port number and
IP source and destination restrictions to ensure that they are correctly
designed to restrict this traffic. Assess the need for and implementation of
compensating controls, such as router filters.
• For each proxy, determine that adequate logging mechanisms have been
activated and that logs are reviewed timely. Further, determine who has
access to the logs and ensure that this access is appropriate.
• Review port settings and ensure that all unused ports are disabled. Further,
any active ports must have Cisco Discovery Protocol (CDP), trunking and
spanning tree explicitly disabled.
• Determine whether audit alerts have been adequately designed to alert
10 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Determine all remote access mechanisms that are allowed through the firewall.
Ensure that anonymous FTP access is not allowed through the firewall.
• Ensure that the firewall is configured to log off idle user sessions after a set
timeout period.
Ensure that internet control message protocol (ICMP) packets are controlled
inbound and outbound on the firewall.
Ensure that the IP frag guard protects the firewall from IP fragmentation
attacks.
Ensure that RIP or OSPF is disabled so that the firewall does not accept any IP
routing table updates.
Ensure that the SNMP community string on the router has been changed from
public to a password key value.
Ensure that mail guard is enabled in the firewall to provide a safe conduit for
simple mail transfer protocol (SMTP) connections from the outside to an inside
electronic mail server.
11 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Review the configuration change log (many firewall products support this) and
investigate a sample of changes from the population with the administrator to
ensure that they are authorized changes.
Determine the process of how software upgrades and security patches are
applied to firewalls and routers. Further, determine how administrators are
notified of available updates.
Ensure that third-party penetration tests were performed. Review the testing
results and determine if vulnerabilities were discovered. Follow up with IT
management to determine what action plans were implemented to remediate
the vulnerabilities if any.
12 Source: www.knowledgeleader.com
FIREWALL AUDIT WORK PROGRAM: SAMPLE 3
PRELIMINARY ASSESSMENT
• Determine who has overall responsibility for the firewall.
• Request documentation as follows:
− Wide area network (WAN) diagrams showing all network locations, including WAN transmission methods
used (X.25, frame-relay, T – 1, dial-up, etc.)
− Detailed network diagrams for all local area networks within the audit scope, including all significant nodes
such as routers, firewalls, gateways, file servers, host processing systems (Unix, mainframe, etc.), with
network and node IP addresses and link transmission methods (ethernet, token ring, etc.)
− Printouts of firewall configuration files
13 Source: www.knowledgeleader.com
Remarks:
− Review the/etc/passwd file to ensure that only the root account and one firewall administration account are
active (not including log-in-disabled system accounts, bin, wheel, etc.). Assess control (passwords, logging
and review) overuse of these accounts.
Remarks:
− Review the directory structure to ensure that no other application programs, language compilers,
interpreters or other utilities are loaded on the system.
Remarks:
• Review the configuration of the firewall software. Often, a configuration file can be printed out and reviewed.
− Identify all supported and active network application proxies along with the indication of where connections
may be initiated. (This may be noted as a “trusted network” for connections initiated from the internal
network and an “untrusted network” for connections initiated from the external network–the internet.)
Compare this to the internet policy description of authorized services. Investigate any deviations from the
policy.
Remarks:
− For all proxies that allow network connections to be initiated from the internet (telnet, ftp, etc.), ensure that
strong password authentication controls are implemented (challenge-response, encryption) or that third-
party security schemes have been implemented (SecureID and S/key).
Remarks:
− For all proxies that allow network connections to be initiated from the internet, there should normally be
restrictions (based on IP addresses or host names) on the source of such connections and the systems on
the internal network that an internet user may access. Assess the need for these restrictions and review the
configuration of such access controls.
Remarks:
− Review ID and password controls – authorizations for IDs, password format and aging controls.
Remarks:
− Review and assess the use of groups to assign services and access capabilities to users.
Remarks:
− For generic proxy programs that may be in use, review the port number and IP source and destination
restrictions to ensure that they are correctly designed to restrict this traffic. Assess the need and
implementation of compensating controls such as router filters.
Remarks:
− For each proxy, determine that adequate logging mechanisms have been activated and that logs are
reviewed on a timely basis.
Remarks:
− Determine whether audit alerts have been adequately designed to alert management on a real-time basis of
security events that require prompt attention (alerts such as SNMP traps, email messages, pagers, etc.).
Remarks:
− Identify and assess the appropriateness of administrators’ access to view and modify the firewall
configuration.
14 Source: www.knowledgeleader.com
NETWORK MONITORING AND INTRUSION DETECTION
Determine whether network traffic is monitored to detect availability issues or security events.
• Determine if a third-party service is used for intrusion prevention and intrusion detection services to monitor
internet and wide area network traffic for security events such as denial of service attacks.
Remarks:
• Determine if the network is monitored to detect issues such as availability, high CPU utilization or system
errors.
(Insert Text)
15 Source: www.knowledgeleader.com
FIREWALL AUDIT WORK PROGRAM: SAMPLE 4
AUDIT STEP
F.1.1 Ensure that processes and procedures are documented to ensure the most up-to-date (or one release
behind) security patches for the firewall application are installed and updated.
The operating system for the (Insert Location) internal and DMZ firewalls is (Insert System). The operating system
for the (Insert Location) firewall is (Insert System).
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.1.1
AUDIT STEP
F.1.2 Ensure that processes and procedures are in place to ensure that security updates and advisories (such as
CERT or CIAC) are reviewed and implemented.
16 Source: www.knowledgeleader.com
(System Administrator): The firewall administrator receives some security alerts via email, but they are mostly
reviewed on an ad-hoc basis. If updates are needed on the firewall, (System Administrator) updates one of the
failover firewalls first, and once it has been established that the update is safe, it is added to the other firewalls.
Conclusions
(Insert Text)
AUDIT STEP
F.1.3 Ensure that adequate network scanning of the firewall is occurring regularly. Results are reviewed and
changes are implemented in response to discovered security flaws.
Conclusions
(Insert Text)
AUDIT STEP 2
F.1.4 Ensure that (Insert System) TCP session timeouts are set to an appropriate timeout value.
Conclusions
(Insert Text)
AUDIT STEP
17 Source: www.knowledgeleader.com
F.1.5 Ensure that SNMP community strings have been changed from default values to a "strong" password that
has eight characters minimum and is alphanumeric.
Conclusions
(Insert Text)
AUDIT STEP
F.1.6 Determine if there are appropriate OS hardening procedures in place before firewalls are implemented.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.1.6
Business Risk
(Risk Level)
AUDIT STEP
F.1.7 Determine if a firewall integrity checker is in use and firewall administrators are notified when changes are
made to critical files.
18 Source: www.knowledgeleader.com
Control Procedures in Place at (Insert Company)
A firewall integrity checker is not being used to monitor the status of critical files on the firewall.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.1.7
(Insert Text)
AUDIT STEP
F.1.8 NTP is enabled on firewalls and synchronized with a valid (Insert Company) timeserver. NTP is restricted in
the (Insert System) security policy rule-base to a valid (Insert Company) timeserver.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.1.8
19 Source: www.knowledgeleader.com
Issue: NTP
AUDIT STEP
F.1.9 Ensure that a firewall policy exists or that a network policy that entails firewall policies and procedures is
being followed.
A firewall policy exists at (Insert Company) (D.2.1.3). The policy describes acceptable services that are allowed
into (Insert Company) through the firewall and policy for remote administration. Though the policy is very limited to
what it addresses, the policies that are defined are adhered to. The policy does not establish rules for traffic
between the DMZ and the internal and external network.
The firewall policy that was given to us was reviewed by (Insert Name 2) (D.2.1.3). The firewall rule-set (F.1.4.1)
was then reviewed to ensure that the firewall policy was being adhered to. Remote administration was discussed
with (System Administrator).
Conclusions
(Insert Text)
AUDIT STEP
F.1.10 Verify that the anti-spoofing property under the “Host Properties” window is checked in the GUI.
Anti-spoofing has been enabled on all (Insert Company) firewalls to prevent IP spoofing. This is a process by
which a host sends IP packets with source addresses different from its own in order to evade filtering or to
pretend to be another, trusted host.
Screenprints (F.1.10.1) showing that anti-spoofing has been turned on for the firewall were reviewed.
Conclusions
(Insert Text)
AUDIT STEP
20 Source: www.knowledgeleader.com
F.2.1 Ensure that a login message is displayed to users logging into the firewall operating system warning them of
the consequences of unauthorized use.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.2.1
AUDIT STEP
F.2.2 Ensure that only administrators that need to access the firewall can log in to the firewall via the operating
system or the firewall application ([Insert System] FW – 1). Users who need administrative access to either the
(Insert System) GUI have separate IDs for accountability purposes.
The only (Insert System) GUI account is the default fwadmin account (F.2.2.1).
21 Source: www.knowledgeleader.com
the firewall were reviewed.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.2.2
AUDIT STEP
F.2.3 Ensure that there is appropriate backup for the administration of the firewall and that administration
procedures are properly documented.
(System Administrator) is the administrator for the firewall. (System Administrator) indicated that (Insert Name)
could be a backup, but he/she has very little experience administering the firewall and currently doesn’t even have
an account through the (Insert System) GUI (F.2.2.1) or the Solaris operating system (F.1.1.1 – F.1.1.4).
(Insert Name) has put together a manual on the firewall build (F.2.3.1), but the information is somewhat outdated
and it is very little on how to administer it.
(System Administrator) was interviewed about backup administration in an interview. He provided the firewall
manual for review (F.2.3.1). We spoke with (Insert Name) about her experience with the (Insert System) firewalls
and to confirm that she does not have a (Insert System) GUI account (F.2.2.1). We also reviewed the Solaris
password file (F.1.1.1 – F.1.1.4) to confirm that (Insert Name) does not have a separate account on the Solaris
operating system.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.2.3
22 Source: www.knowledgeleader.com
Issue: Backup Support for Firewall Administration
AUDIT STEP
F.2.4 Ensure that (Insert System) administrative sessions are encrypted with a protocol such as HTTPS, SSH or
kerberos-encrypted Telnet.
The firewall GUI client creates an encrypted session between it and the firewall. The GUI is used for most of the
firewall administration. Telnet access and HTTP access to port 900 are also available on the firewall. Neither of
these sessions is encrypted.
Telnet and HTTP connections were made to the separate firewalls to verify that they existed (see Audit Step
F.2.1).
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.2.4
AUDIT STEP
F.2.5 Ensure that password settings for Sun and (Insert System) GUI administrator IDs have appropriate controls.
23 Source: www.knowledgeleader.com
Control Procedures in Place at (Insert Company)
There are no set password policies for the firewall GUI client or the Solaris operating systems where the firewall
resides. Passwords are changed on an ad-hoc basis. The last password change for the firewalls was around a
year ago according to (System Administrator).
An interview with (System Administrator) was conducted in which he told us that there were no defined or
automated password policies or controls for the (Insert System) GUI or the Solaris operating system.
Conclusion
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.2.5
AUDIT STEP
F.2.6 Ensure that a change control procedure exists and is followed for all changes to the firewall.
(Insert Company) follows a defined change control procedure (B.1.1.1). All changes that are made to the firewall
are put through the change control process.
An interview was conducted with (Insert Name 4) to go over the change control procedures for (Insert Company).
An interview with (System Administrator) was also done to discuss how changes are made to the firewall. A
firewall change control ticket (B.1.2.1) was reviewed to determine if appropriate procedures were followed for
making the change.
Conclusions
(Insert Text)
AUDIT STEP
24 Source: www.knowledgeleader.com
F.2.7 Review the physical security of the firewall to ensure that it is stored in an environmentally safe locked room,
with only a select number of individuals having physical access to these rooms.
Conclusions
(Insert Text)
AUDIT STEP
F.3.1 Ensure that backups for the firewalls are made regularly.
25 Source: www.knowledgeleader.com
Internal Audit Test Work
An interview with (System Administrator) was held where he/she discussed the backup and restore procedures for
the firewall.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.3.1
AUDIT STEP
F.3.2 Determine if backups have been tested to ensure that the firewall can quickly and successfully be restored
to the most up-to-date configuration.
Recently, (System Administrator) tested a complete rebuild of one of the redundant firewalls that included the
management console. If a firewall needs to be restored, a standard copy of the Solaris OS would have to be
restored and then the default (Insert System) firewall and then the backed up configuration files that are kept on
one of the (Insert Company) file servers and on (Insert Name 1)’s PC. A restore of a corrupted rule-base was
performed with the help of (Insert System) engineers about a year ago, which took approximately five hours.
An interview was conducted with (System Administrator) that included a discussion of firewall backup and
restoration.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.3.2
26 Source: www.knowledgeleader.com
Issue: Restoring the Firewall
AUDIT STEP
F.3.3 Ensure that firewalls are redundant and set up as a cluster that provides failover capabilities in the event of
primary failure of a business-critical firewall.
Conclusions
(Insert Text)
AUDIT STEP
F.3.4 Determine if load balancing is being performed on the firewall.
Conclusions
(Insert Text)
F.4 Appropriate logging and website filtering is occurring on the firewall and is reviewed in a timely manner.
27 Source: www.knowledgeleader.com
AUDIT STEP
F.4.1 Determine if website content filtering is occurring at the firewall (or some other device) to limit employee
access to internet sites that are consistent with business needs.
(Insert Company) had been using the WebSense application to filter offensive and nonproductive websites, but
there were many problems with the WebSense application code. The problems with the code caused all internet
traffic to be blocked from time to time, so it was eventually removed. (Insert Company) is currently looking at an
IDS/web filtering product called eTrust by Computer Associates to replace the WebSense application.
Conclusions
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.4.1
Issue
Website Content Filtering: (Insert Company)’s security policy states “Site blocking software will be in place to
block inappropriate sites from being viewed,” but there is no site blocking software being used at (Insert
Company). (Insert Company) had been using WebSense for content filtering, but had problems with the software
and disabled it. (Insert Company) is in the process of reviewing site-blocking software to replace the WebSense
application, but there is no timeline for selecting a content filtering application.
AUDIT STEP
F.4.2 Ensure that appropriate Internet logging is occurring and being monitored for suspicious activity.
28 Source: www.knowledgeleader.com
We reviewed the firewall rule-set (F.1.4.1) for information under the track column and interviewed (System
Administrator) about firewall logging and monitoring.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.4.2
AUDIT STEP
F.4.3 Ensure that Sun and (Insert System) are logging unsuccessful login attempts for review periodically.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.4.3
29 Source: www.knowledgeleader.com
Issue: Monitoring of Unsuccessful Login Attempts
AUDIT STEP
F.4.4 Determine how log files are handled in the database and if their size is being monitored.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.4.4
F.5 The rules, network objects and NAT translations for the firewall are appropriately configured to allow least
privilege access only.
30 Source: www.knowledgeleader.com
AUDIT STEP
F.5.1 Review the firewall rule-base to determine if services are limited to appropriate IP addresses.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.5.1
AUDIT STEP
F.5.2 Review network address translation (NAT) tables to determine if appropriate NAT mappings have been
created.
Conclusions
31 Source: www.knowledgeleader.com
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.5.2
AUDIT STEP
F.5.3 Review the firewall object definitions to determine if all objects are current.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.5.3
32 Source: www.knowledgeleader.com
Management Action Plan
The action plan must be completed by management.
AUDIT STEP
F.6.1 Ensure that only services needing an internet presence are housed in the DMZ.
Conclusions
(Insert Text)
Audit Step
F.6.2 Determine if incoming internet traffic is making connections with servers or network devices on the (Insert
Company) internal network.
Conclusions
(Insert Text)
NETWORK AUDIT
Firewalls and Internet DMZ Design and Composition: POS
WP No. F.6.2
33 Source: www.knowledgeleader.com
Recommendations (Resolution Effort = Low)
(Insert Text)
34 Source: www.knowledgeleader.com
APPENDIX A: RULE-BASE RECOMMENDATIONS
35 Source: www.knowledgeleader.com
APPENDIX B: POSSIBLE UNNEEDED NETWORK ADDRESS TRANSLATION MAPPINGS
NAT
From Local IP To Local IP Router IP From NAT IP To Nat IP
Redundancy
36 Source: www.knowledgeleader.com
APPENDIX C: POSSIBLE UNNEEDED FIREWALL OBJECTS
(Insert Text)
37 Source: www.knowledgeleader.com