Betting Sites Not On Gamstop UK 2025Betting Sites Not On GamstopCasino Not On GamstopNon Gamstop Casinos UKBest Casinos Not On Gamstop
NSS Group logo

The Checkmark firewall certification is designed to ensure that firewalls achieve a basic level of protection against a number of common hostile attacks, both from inside and outside the realm of protection.�

Configuration

  • The firewall is to be configured to provide the various services and enforce the various restrictions specified in this document
  • Firewalls can be provided either as a complete turnkey hardware and software solution, or as software only to be installed on our own PC (the specification of which will be provided on request)
  • All firewalls are to be provided initially with an “out of the box” configuration. This is to allow us to form an objective opinion on (a) the amount of effort needed to configure the product from scratch, and (b) the likelihood that an end user may mis-configure the product
  • Software-based firewalls will be installed on a “clean” version of the native operating system. The firewall machine will be “wiped” and returned to a steady state after each test. Firewalls from different vendors will not be installed side by side on the same machine
  • Firewall vendors will be encouraged to provide advice on the most appropriate means to achieve the necessary configuration. If no such advice is forthcoming, NSS Group staff will attempt to provide the best configuration possible from information contained in the manuals.
  • Firewall vendors will be encouraged to visit the testing lab to effect the necessary configuration under direct supervision of NSS Group laboratory staff
  • In the event multiple methods of achieving the same result are available, the vendor should advise on the most secure option
  • It is assumed that the underlying OS will be “hardened” and/or have the latest security fixes applied during firewall installation. No patches or configuration options will be allowed which are not available to the general public either in a current release or via a recognised and generally available support source

Test Environment

NSS Network Testing Laboratories maintains a dedicated test network for firewall accreditation (network diagram can be viewed here).�

  • The test environment consists of three distinct networks – the external (Internet), DMZ and internal (protected)
  • The external network consist of a Telnet host, Web server, FTP server, DNS server, SMTP/POP3 server and a “hacker” client
  • The DMZ network consists of a Telnet host, Web server and FTP server
  • The internal network consists of a Telnet host, DNS server, SMTP server, file/print server, Web server and a “hacker” client
  • Machines on the internal and DMZ networks are not configured in a secure manner – they rely totally on the protection of the firewall
  • The firewall is the only link between the DMZ, internal and external networks
  • Firewalls that support DMZ services internally rather than on a separate subnet are also allowed. Vulnerabilities in the actual services will not be deemed cause for failure of the certification process unless those vulnerabilities provide external access to the protected network in some way.
  • The link between the firewall and the external network is via a simple router. No packet filtering will be configured on this router – all protection must be provided by the firewall
  • A network monitor, protocol analyser and security monitor is installed on the external, DMZ and internal networks
  • The configuration of all machines remains constant between tests. The machine designated as the firewall will be “wiped” and returned to a steady state after each test.

Services

The firewall is to be configured to allow the following services, typical of most installations:

  • Telnet (outbound, no restrictions)
  • Telnet (inbound denied)
  • FTP (inbound to DMZ (or equivalent) only)
  • FTP (outbound, no restrictions)
  • HTTP (inbound to DMZ (or equivalent) only)
  • HTTP (outbound, no restrictions)
  • SMTP (inbound to corporate mail server only)
  • SMTP (outbound, no restrictions)
  • DNS (internal clients to be able to resolve both internal and external addresses freely)
  • DNS (no internal addresses to be resolved from the external network)
  • POP3 (internal clients to be allowed to retrieve POP3 mail from the external network)
  • POP3 (no external POP3 access to internal servers is allowed)
  • ICMP (inbound denied)
  • ICMP (outbound denied)
  • “Stealth mode” (if available) should be enabled
  • No other traffic of any description to be allowed onto the protected network or DMZ

Management

Management of the firewall will be evaluated using the following criteria:

  • Local console must be secure
  • Management console should not be open to the external network
  • The firewall configuration should be fully protected and tamper proof (except from an authorised management station)
  • Full authentication is required for the administrator for local administration
  • Full authentication and an encrypted link is required for remote administration. If the remote link cannot be encrypted, there should be the ability to disable it.

Tests

A range of tests will be carried out using commonly-available firewall scanning tools (NAI CyberCop Scanner and ISS Internet Scanner) as well as custom-built in-house utilities. All tools will be configured with full knowledge of both the firewall and network configuration:�

  • Check that firewall management console is not available to any users unless authenticated
  • Check that the remote management link (if available) is encrypted or can be disabled
  • Check that the firewall configuration is fully protected and tamper proof
  • Check that the firewall is resistant to a range of known Denial Of Service (DOS) tests
  • Check that the firewall has no known vulnerabilities.
  • Check that the underlying OS is hardened and not vulnerable to known OS-specific attacks
  • Check that all specified outbound services (and no others) are available from internal clients
  • Check that all specified inbound services (and no others) are available to external clients
  • Check that the firewall does not allow uncontrolled access to either the internal or DMZ networks
  • Check that DNS names can be resolved from internal clients
  • Check that external DNS queries do not reveal information about the internal network
  • Check that the firewall does not pass mis-configured packets to the internal network or DMZ

Tests will be repeated in the following manner:

  • Stage 1: Probe the firewall from the Internet
  • Stage 2: Probe the protected network from the Internet
  • Stage 3: Probe the DMZ from the Internet
  • Stage 4: Probe the firewall from the protected network
  • Stage 5: Probe the Internet from the protected network (test security policy)
  • Stage 6: Probe the DMZ from the protected network
  • Stage 7: Probe the firewall from the DMZ (if available)
  • Stage 8: Probe the protected network from the DMZ (if available)

Results

Protocol analysers, network monitors and advanced security monitoring tools are used during initial firewall configuration and throughout the testing, both to validate the configuration and confirm the test results.

  • No access to protected servers is permitted
  • No internal data is to be allowed outside the protected network
  • No “illegal” traffic is to be permitted on any protected segment
  • No access to the management console or firewall configuration files is to be allowed
  • Firewall log files to log all rejected packets and port scans
  • Firewall is to remain running through DOS attacks (both generic IP and OS-specific attacks). Where it is recognised that a particular DoS attack has no defence, the firewall should terminated “gracefully” (leaving connections securely closed).
  • Log files to remain intact through any log flood or DOS attacks
  • The management console must remain available and secure

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2004 The NSS Group Ltd.
All rights reserved.

Featured sites