Global Data Center Objects, Policies, and Actions
- If your data center application inventory includes proprietary custom applications, then create custom applications for them so that you can specify them in Security policy.
- Configure tight data center best practice Security profiles to prevent threats from disrupting your data center network.
- On the DNS Signatures tab, change theActionon DNS Queries tosinkholeif the firewall can’t see the originator of the DNS query (typically when the firewall is north of the local DNS server) so that you can identify infected hosts. DNS sinkhole identifies and tracks potentially compromised hosts that attempt to access suspicious domains and prevents them from accessing those domains. Enable extended packet capture on the sinkholed traffic.
- Configure the best practice Vulnerability Protection profile by cloning the predefined strict profile and changing the Packet Capture setting for every rule exceptsimple-client-informationalandsimple-server-informationaltosingle-packet. If the firewall identifies a large volume of vulnerability threats and that affects performance, disable packet capture for low-severity events.
- The predefined strict File Blocking profile is the best practice profile. If supporting critical applications prevents you from blocking all the file types the strict profile blocks (you can identify the file types used in the data center from data filtering logs at), clone the strict profile and modify it as needed. If files don’t need to flow in both directions, use theMonitorLogsData FilteringDirectionsetting to restrict the file type to only the required direction.
- Configure tight data center best practice Decryption profiles to prevent unknown traffic from entering your data center.
- SSL Protocol Settings: Set theMin VersiontoTLSv1.2, theMax VersiontoMax, and uncheck theSHA1Authentication Algorithm. (The weak 3DES and RC4 Encryption Algorithms are automatically unchecked when you select TLSv1.2.)
- SSL Forward Proxy: ForServer Certificate Verification, block sessions with expired certificates, untrusted issuers, and unknown certificate status, and restrict certificate extensions. ForUnsupported Mode Checks, block sessions with unsupported versions, unsupported cipher suites, and client authentication. ForFailure Checks, blocking sessions if resources aren’t available is a tradeoff between the user experience (blocking may negatively affect the user experience) and potentially allowing dangerous connections. If you have to consider this tradeoff, also consider increasing the decryption resources available in the deployment.
- Configure traffic blocking rules to deny traffic you know is malicious or isn’t needed for business purposes.Logging and monitoring block rules may reveal users and applications you didn’t know were on your network and that may be legitimate or may indicate an attack. The rule order in the Security policy rulebase is critical to preventshadowing(traffic matching an allow or block rule before it can match the rule you intend the traffic to match). Some rules are almost the same but enable separate reporting for standard and non-standard ports or for user applications and applications from other sources. For each rule, configureLog at Session Endon theActionstab and set up Log Forwarding to track and analyze rule violations.
- Block all applications from user zones on theapplication-defaultport. Place this ruleafterthe rules that allow legitimate application traffic from user zones to identify unknown or unexpected user applications on standard ports.
- Block all applications from user zones onanyport to catch user traffic attempting to use non-standard ports. Place this rule after the precedingapplication-defaultblock rule to identify unknown or unexpected user applications on non-standard ports, which may be custom applications or evasive applications.
- Blacklist applications youneverwant in your data center, such as evasive and commonly exploited applications and applications not required for business. Place this rule after the application whitelist rules so that, for example, you allow sanctioned file sharing applications before theFilesharing-Appfilterblocks all other file sharing applications.
- Block all applications fromanyzone on theapplication-defaultport to identify unexpected applications on standard ports. Rule matches may indicate potential threats or application changes that require modifying a whitelist rule. Place this rule after the application whitelist rules and the preceding block rule.
- Block all applications from any zone onanyport to identify unexpected applications on non-standard ports. Don’t allow unknown-tcp, unknown-udp, or non-syn-tcp traffic. Place this rule after the application whitelist rules and the preceding block rule.
- Blockunknownusers attempting to run applications on any port to discover unknown users (gaps in User-ID coverage or attackers) and identify compromised devices (including embedded devices such as printers, card readers, and cameras). Place this rule after the application whitelist rules and the preceding block rule.
- In addition to blocking unwanted potentially malicious traffic, block the Quick UDP Internet Connections (QUIC) protocol unless, for business reasons, you want to allow encrypted browser traffic. Chrome and some other browsers establish sessions using QUIC instead of TLS, but QUIC uses proprietary encryption that the firewall can’t decrypt, so potentially dangerous traffic may enter the network as encrypted traffic. Block both the QUIC application and UDP ports 80 and 443 to force the browser to use TLS.
Recommended For You
Recommended videos not found.