MSS FW Best Practices: Security Services

Description

CAUTION: These documents are intended to provide partners with firewall configuration recommendations ONLY. They contain examples and caution should be exercised when making changes to your firewall as unplanned changed could result in downtime based on the complexity of the environment and/or configuration. 


MSS Recomended SonicWall Firewall Best Practices Index


Excluding Devices from Security Services

  • Each security service has a spot to specify an “Exclusion Group”.
  • There are 2 ways to exclude local devices from Security Services:
    • Create a “Security Exclusion Group” and exclude it from all security services.
    • Create an “Address Object Exclusion Group” for each security service and exclude them from the applicable security service. (This is recommended as it’s more secure and retains the most control)
  • Only exclude devices if absolutely necessary.
  • Excluded devices will NOT be protected.

Security Services Enhanced Security Setting

All generation 7 firewalls come set to Performance Optimized by default which is the recommended setting.

  1. To enable what was formally known in Gen 6/6.5 as Maximum Security, enable Enhanced Security (Not recommended).

image-20240117-142929.png


Gateway Anti-Virus (GAV)

GAV best practices and recommended configuration

  1. Under the Gateway Anti-Virus tab:
    1. Enable all options.
    2. Note on TCP Stream: If you do not enable, DPI will only scan listed protocols (HTTP, FTP, SMTP, etc.) on default port(s)

image-20240117-143250.png

  1. Under the Cloud Anti-Virus tab:
    1. Enable Cloud Anti-Virus Database

image-20240117-143333.png

  1. Click Configure for each protocol (HTTP, FTP, etc.):
    1. Enable: Restrict Transfer of password-protected ZIP files
    2. Enable: Restrict Transfer of MS-Office type files containing macros (VBA 5 and above)
    3. Enable: Restrict Transfer of packed executable files (UPX, FSG, etc.)

image-20240117-143506.png

  1. Keep in mind this might cause challenges or inconveniences for users.

To report False Positives to SonicWall: How can I report false positives or Virus/Trojan/Malware samples to the Gateway AntiVirus team? | SonicWall


Anti-Spyware

Anti-Spyware best practices and recommended configuration

  1. Enable all options.

image-20240117-143616.png


Intrusion Prevention Service (IPS)

IPS best practices and recommended configuration

  1. For High & Medium Priority Attacks
    1. Enable Prevent + Detect boxes.
  2. For Low Priority Attacks
    1. Don’t enable either..
  3. Ensure Log Redundancy Filter is set for 60 Seconds for each signature group.

image-20240117-143847.png


Botnet Filter

Botnet Filter best practices and recommended configuration

  • DO NOT use the “Default GEO IP & Botnet Filter Exclusion Group”! Always create your own!
  1. Enable “Block connections to/from Botnet Command and Control Servers”
  2. Enable “Dynamic Botnet List”
  3. Enable “Logging”

image-20240117-144351.png


App Control

App Control best practices and recommended configuration

  1. Enable “App Control”
  2. Enable “Logging for all Apps”
  3. Ensure that the Global Log Redundancy Filter Interval is set to 60.

image-20240117-144554.png

  1. Block & Disable Logging for MSS Recommended App Signatures below:

Category

MSS Recommendation

APP-UPDATE

Nothing

BACKUP-APPS

Log

BROWSING-PRIVACY

Log

BUSINESS-APPS

Log

DATABASE-APPS

Log

DOWNLOAD-APPS

Log

EMAIL-APPS

Log

FILETYPE-DETECTION

Log

GAMING

Block & Log

IM

Log

INFRASTRUCTURE

Nothing

IoT-APPS

Log

MINERS

Block & Log

MISC-APPS

Log

MOBILE-APPS

Log

MULTIMEDIA

Log

P2P

Block & Log

P2P\ Non-SSL traffic over SSL port

Nothing

PROTOCOLS

Nothing

PROXY-ACCESS

Block & Log

PROXY-ACCESS\ Encrypted Key Exchange

Nothing

REMOTE-ACCESS

Log

REMOTE-DEBUG

Log

SCADA-APPS

Log

SOCIAL-NETWORKING

Block & Log

SRC-CTRL-APPS

Log

STOCK-TRADING

Log

VoIP-APPS

Log

VPN

Log

WEB-BROWSER

Nothing

WEB-CONFERENCING

Log

WEBMAIL

Log


Content Filtering (CFS)

CFS best practices and recommended configuration

To view SonicWall’s rating for a URL: SonicWALL Content-Filter Website Rating Review

On the Content Filter page under the “Security Service” page:

Enable Content Filtering Service

Disable Exclude Administrator

image-20240117-144728.png

Below are Best Practices/Recommendations when it comes to configuring your individual CFS policies on the Content Filter page under the “Profile Objects” page:

Security Risk

Block All

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Entertainment

Allow All

Keyloggers and Monitoring

Block

Arts/Entertainment

Allow

Malware

Block

Multimedia

Allow

Phishing and Other Frauds

Block

P2P

Allow

Proxy Avoidance and Anonymizers

Block

Games

Block

Spyware and Adware

Block

Music

Allow

Bot Nets

Block

Lifestyle

Allow All

SPAM URLs

Block

Travel

Allow

Open HTTP Proxies

Block

Home and Garden

Allow

Human Resource Protections

Block All

Religion

Allow

Drugs/Illegal Drugs

Block

Hunting and Fishing

Allow

Pornography

Block

Society and Lifestyle

Allow

Sex Education

Block

Sports

Allow

Intimate Apparel/Swimsuit

Block

Fashion and Beauty

Allow

Gross

Block

Recreation and Hobbies

Allow

Nudism

Block

Humor/Jokes

Allow

Alcohol/Tobacco

Block

Business/Government/Services

Allow All

Adult/Mature Content

Block

Real Estate

Allow

Personals and Dating

Block

Computer and Internet Security

Allow

Internet Watch Foundation CAIC

Block

Online Banking

Allow

Questionable/Legal

Block All

Business and Economy

Allow

Cult/Occult

Block

Information Technology/Computers

Allow

Gambling

Block

Military

Allow

Marijuana

Block

Online Brokerage and Trading

Allow

Hacking

Block

Training and Tools

Allow

Weapons

Block

Online Personal Storage

Allow

Pay to Surf Sites

Block

Government

Allow

Questionable

Block

Content Delivery Networks

Allow

Hate and Racism

Block

Vehicles

Allow

Violence

Block

Web Hosting

Allow

Cheating

Block

Restaurants and Dining

Allow

Illegal Skills/Questionable Skills

Block

General Information

Allow All

Abortion/Advocacy Groups

Block

Legal

Allow

Radicalization and Extremism

Block

Local Information

Allow

Social Media/Internet Communication

Allow All

Job Search

Allow

Social Networking

Allow

Translation

Allow

Personal Sites and Blogs

Allow

Reference

Allow

Online Greeting Cards

Allow

Political/Advocacy Groups

Allow

Search Engines and Portals

Allow

Education

Allow

Advertisement

Allow

Kid Friendly

Allow

E-Mail

Allow

News and Media

Allow

Web Communications

Allow

Health

Allow

Dynamic Content

Allow

Image and Video Search

Allow

Chat/Instant Messaging (IM)

Allow

Cultural Institutions

Allow

Usenet News Groups

Allow

Other

Allow

Shopping

Allow All

Uncategorized

Allow All

Internet Auctions

Allow

Not Rated

Allow

Shopping

Allow

Dead Sites

Allow

Freeware/Software Downloads

Allow

Parked Domains

Allow

 

 

Private IP Addresses

Allow


Capture ATP (If purchased):

CATP best practices and recommended configuration

Under the Basic tab:

Enable Capture ATP

Select all under FILE TYPES FOR CAPTURE ATP ANALYSIS

image-20240117-145159.png

Under the Advanced tab:

Select “Block file download until a verdict is returned”

This may cause delays in download times for my users and may require users to retry the download.

image-20240117-145230.png


DNS Security (If purchased):

Introducing the latest enhancement to SonicOS – centralized DNS management powered by DNS proxy, featuring advanced DNS security functionalities such as DNS Filtering, DNS Sinkhole service, and DNS Tunnel Detection. While bearing a resemblance to the Content Filtering Service (CFS), it's important to note that CFS relies on the completion of the full firewall inspection process before taking action. In contrast, DNS Security operates at the DNS layer, intercepting and halting malicious domains even before they reach the firewall, let alone undergo inspection.

A key distinction lies in the frequency of database updates – CFS databases are refreshed every 12-24 hours, whereas DNS updates occur every few minutes. This real-time update advantage positions DNS filtering as a proactive measure against potential risks. Acting as a critical shield, it intercepts users' DNS requests, cross-referencing them with a database of known malicious domains. This preemptive approach effectively blocks users from accessing suspicious websites, ensuring protection from potential harm.

Furthermore, DNS filtering delivers a positive impact on network performance. By preventing access to unnecessary or undesirable websites, it reduces bandwidth consumption and optimizes internet speeds. This proves particularly advantageous in corporate environments where inadvertent access to sites can compromise both network performance and security.

In conclusion, supported by robust SonicWall capabilities, DNS filtering emerges as a cornerstone in maintaining a secure and productive online environment. Its role in safeguarding against malicious websites, filtering inappropriate content, and enhancing network performance positions DNS filtering as a valuable asset for individuals and organizations alike.

DNS Filtering

Neustar is a public DNS Server which has intelligence of domain name categorization. By integrating Neustar DNS service with SonicWall firewall, we obtain domain categorization service along with DNS for SonicWall customers. SonicWall support profiles to take different actions on different categories, then the DNS Packet will process according to the action. Neustar support 19 pre-defined categories and SonicWall support 4 actions. For more information, see: About DNS Filtering

It is important to note that this feature requires you to point network client’s DNS server to the firewall. The firewall will act as the network’s DNS server in this case.

DNS Filtering best practices and recommended configuration:

Prerequisite

To use DNS Filtering, user has to do the following configurations:

Ensure DNS Filtering is licensed under Gateway Services in the license page

Add/Edit/Delete DNS policy manually in the Policy > Rules and Polices > DNS Rules. For more information on adding DNS policy, refer to the SonicOS Rules and Policies guide

Add/Edit/Delete DNS Profile in the Object > Profile Objects> DNS Filtering. For more information on adding DNS policy, refer to the SonicOS Objects guide

Set the DHCP DNS Server Lease Scopes interface as the interface IP of firewall in the Dynamic Range Configuration. For more information on adding Dynamic, refer to the SonicOS system guide

Enable Enforce DNS Proxy For All DNS Requests at DNS Proxy settings in the Network > DNS > DNS Proxy

To configure Global settings

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Filtering tab.

image-20240117-145454.png

Click the Global Settings tab. Enable the option Enable White List.

White List can be used for both DNS Sinkhole Service and DNS Filtering.

Configure both Forged IPv4 Address and Forged IPv6 Address.

Click Accept.

To configure Custom Domain

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Filtering tab.

Click the Custom Domain tab.

Under Category Information, you can find the different type of categories and the categories explanation.

image-20240117-145502.png

For each domain name you want to add as a custom domain name under the Config Custom Domain section:

Click +Add. The Add DNS filter Custom Domain dialog displays.

Enter the custom domain name in the Domain Name field.

Select the category type from the drop-down in the Category field.

Click Save.

image-20240117-145507.png

DNS Sinkhole Service

A DNS sinkhole also known as a sinkhole server, Internet sinkhole, or Blackhole DNS — is a DNS server that gives out false information to prevent the use of the domain names it represents. DNS sinkholes are effective at detecting and blocking malicious traffic, and used to combat bots and other unwanted traffic.

SonicOS provides the ability to configure a sinkhole with black- and whitelists.

DNS Sinkhole Service best practices and recommended configuration:

To configure DNS Sinkhole settings

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Sinkhole Service tab.

Select Enable DNS Sinkhole Service under the Settings tab. This option is not selected by default.

Click the Global Settings tab. Enable the option Enable White List.

From the Action drop-down menu, select what the service should do:

Dropping with Logs

Dropping with Negative DNS reply to Source

Dropping with DNS reply of Forged IP

Ensure the IPv4 address and IPv6 address, Current Detection, and Malicious Domain in the fields.

Click Accept.

To configure Custom Malicious Domain Name List

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Sinkhole Service tab.

Click the Custom Malicious Domain Name tab.

For each domain name you want to add as a malicious domain name:

Click +Add. The Add One Domain Name dialog displays.

Enter the malicious domain name in the Domain Name field.

Click Save.

Deleting Entries in the Custom Malicious Domain Name List

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Sinkhole Service tab.

Click the Custom Malicious Domain Name tab.

Select an entry to delete or select the top checkbox next to the Domain Name column to select all of the items in the list.

Click Delete.

DNS Tunnel Detection

DNS tunneling is a method of bypassing security controls and exfiltrating data from a targeted organization. A DNS tunnel can be used as a full remote-control channel for a compromised internal host. Capabilities include Operating System (OS) commands, file transfers, or even a full IP tunnel.

SonicOS provides the ability to detect DNS tunneling attacks, displays suspicious clients, and allows you to create white lists for DNS tunnel detection.

When DNS tunneling detection is enabled, SonicOS logs whenever suspicious DNS packets are dropped.

DNS Tunneling settings can be made at the group or unit level.

DNS Tunnel Detection best practices and recommended configuration:

To configure DNS tunnel detection

Navigate to POLICY | DNS Security > Settings.

Click the DNS Tunnel Detection tab.

Under Settings, select Enable DNS Tunnel Detection to enable DNS tunnel detection.

To block all the DNS traffic from the detected clients, select Block All the Clients DNS Traffic.

Click Accept.

Detected Suspicious Client Information

SonicOS displays information about all hosts that have established a DNS tunnel in the Detected Suspicious Clients Info table.

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Tunnel Detection tab.

Click on the Detected Suspicious Clients Info tab.

This table is populated only if DNS tunnel detection is enabled. Hosts are dropped only if blocking clients DNS traffic is enabled.

IP Address

IP address of the suspicious client

MAC Address

MAC address of the suspicious client

Detection Method

DNS type used to detect suspicious clients:

  • Normal DNS Type: A, AAAA, CNAME
  • Corner DNS Type: such as TXT, NULL, SRV, PRIVATE, and MX

Interface

Interface on which the host establishing the DNS tunnel was detected.

Block

Indicates whether the host was blocked.

Creating White list for DNS Tunnel Detection

You can create white lists for IP address you consider safe. If a detected DNS tunnel IP address matches an address in the white list, DNS tunnel detection is bypassed.

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Tunnel Detection tab.

Click on the White List for DNS Tunnel Detection tab.

For each IP address you want to add to the white list:

Click +Add. The Add One White Entry dialog displays.

In the IP Address field, enter the IP address of the domain to be added to the whitelist.

Click Save.

Deleting White List Entries for DNS Tunnel Detection

Navigate to POLICY | DNS Security > Settings.

Hover over to the DNS Tunnel Detection tab.

Click on the White List for DNS Tunnel Detection tab.

Select an entry to delete or select the top checkbox next to the IP Address column to select all of the items.

Click Delete.

White List

DNS Security White List best practices and recommended configuration:

You can create white lists for IP address you consider safe.

The default URLs on White List is deleted by design. Now it displays No data as default.

To create a white list

Navigate to POLICY | DNS Security > Settings.

Click the White List tab.

For each domain name you want to add to the white list:

Click +Add. The Domain Name dialog displays.

In the Domain Name field, enter the white list domain name.

Click Save.

To delete all white list

Navigate to POLICY | DNS Security > Settings.

Click the White List tab.

Select an entry to delete or select the top checkbox next to the IP Address column to select all of the items.

Click Delete.


Geo IP

Geo-IP best practices and recommended configuration

  • DO NOT use the “Default GEO IP & Botnet Filter Exclusion Group”! Always create your own!
  1. Enable “Block connections to/from countries selected in the Countries tab”
  2. Enable “Logging”

image-20240117-144133.png

  1. In the Countries tab:
  2. Enable “Block all Unknown countries”
  3. Block MSS Recommended Countries below:

Country

MSS Recommendation

Afghanistan

Block

Aland Islands

Block

Albania

Block

Algeria

Block

American Samoa

Block

Andorra

Block

Angola

Block

Anguilla

Block

Anonymous Proxy/Private IP

Block

Antarctica

Block

Antigua and Barbuda

Block

Argentina

Block

Armenia

Block

Aruba

Block

Asia/Pacific Region

Block

Australia

Allow

Austria

Allow

Azerbaijan

Block

Bahamas

Block

Bahrain

Block

Bangladesh

Block

Barbados

Block

Belarus

Block

Belgium

Block

Belize

Block

Benin

Block

Bermuda

Block

Bhutan

Block

Bolivia

Block

Bonaire, Saint Eustatius and Sa

Block

Bosnia and Herzegovina

Block

Botswana

Block

Bouvet Island

Block

Brazil

Block

British Indian Ocean Territory

Block

Brunei Darussalam

Block

Bulgaria

Block

Burkina Faso

Block

Burundi

Block

Cambodia

Block

Cameroon

Block

Canada

Allow

Cape Verde

Block

Cayman Islands

Block

Central African Republic

Block

Chad

Block

Chile

Block

China

Block

Christmas Island

Block

Cocos (Keeling) Islands

Block

Colombia

Block

Comoros

Block

Congo

Block

Congo, The Democratic Republic

Block

Cook Islands

Block

Costa Rica

Block

Cote d'Ivoire

Block

Croatia

Block

Cuba

Block

Curacao

Block

Cyprus

Block

Czech Republic

Block

Denmark

Block

Djibouti

Block

Dominica

Block

Dominican Republic

Block

Ecuador

Block

Egypt

Block

El Salvador

Block

Equatorial Guinea

Block

Eritrea

Block

Estonia

Block

Ethiopia

Block

Europe

Allow

Falkland Islands (Malvinas)

Block

Faroe Islands

Block

Fiji

Block

Finland

Block

France

Allow

French Guiana

Block

French Polynesia

Block

French Southern Territories

Block

Gabon

Block

Gambia

Block

Georgia

Block

Germany

Allow

Ghana

Block

Gibraltar

Block

Greece

Block

Greenland

Block

Grenada

Block

Guadeloupe

Block

Guam

Block

Guatemala

Block

Guernsey

Block

Guinea

Block

Guinea-Bissau

Block

Guyana

Block

Haiti

Block

Heard Island and McDonald Islan

Block

Holy See (Vatican City State)

Block

Honduras

Block

Hong Kong

Block

Hungary

Block

Iceland

Block

India

Block

Indonesia

Block

Iran, Islamic Republic of

Block

Iraq

Block

Ireland

Allow

Isle of Man

Block

Israel

Block

Italy

Block

Jamaica

Block

Japan

Block

Jersey

Block

Jordan

Block

Kazakhstan

Block

Kenya

Block

Kiribati

Block

Korea, Democratic People's Repu

Block

Korea, Republic of

Block

Kuwait

Block

Kyrgyzstan

Block

Lao People's Democratic Republi

Block

Latvia

Block

Lebanon

Block

Lesotho

Block

Liberia

Block

Libyan Arab Jamahiriya

Block

Liechtenstein

Block

Lithuania

Block

Luxembourg

Block

Macao

Block

Macedonia

Block

Madagascar

Block

Malawi

Block

Malaysia

Block

Maldives

Block

Mali

Block

Malta

Block

Marshall Islands

Block

Martinique

Block

Mauritania

Block

Mauritius

Block

Mayotte

Block

Mexico

Block

Micronesia, Federated States of

Block

Moldova, Republic of

Block

Monaco

Block

Mongolia

Block

Montenegro

Block

Montserrat

Block

Morocco

Block

Mozambique

Block

Myanmar

Block

Namibia

Block

Nauru

Block

Nepal

Block

Netherlands

Block

Netherlands Antilles

Block

New Caledonia

Block

New Zealand

Block

Nicaragua

Block

Niger

Block

Nigeria

Block

Niue

Block

Norfolk Island

Block

Northern Mariana Islands

Block

Norway

Block

Oman

Block

Other Country

Block

Pakistan

Block

Palau

Block

Palestinian Territory

Block

Panama

Block

Papua New Guinea

Block

Paraguay

Block

Peru

Block

Philippines

Block

Pitcairn

Block

Poland

Block

Portugal

Block

Puerto Rico

Block

Qatar

Block

Reunion

Block

Romania

Block

Russian Federation

Block

Rwanda

Block

Saint Helena

Block

Saint Kitts and Nevis

Block

Saint Lucia

Block

Saint Martin

Block

Saint Pierre and Miquelon

Block

Saint Vincent and the Grenadine

Block

Samoa

Block

San Marino

Block

Sao Tome and Principe

Block

Satellite Provider

Block

Saudi Arabia

Block

Senegal

Block

Serbia

Block

Seychelles

Block

Sierra Leone

Block

Singapore

Block

Sint Maarten

Block

Slovakia

Block

Slovenia

Block

Solomon Islands

Block

Somalia

Block

South Africa

Block

South Georgia and the South San

Block

Spain

Block

Sri Lanka

Block

Sudan

Block

Suriname

Block

Svalbard and Jan Mayen

Block

Swaziland

Block

Sweden

Allow

Switzerland

Allow

Syrian Arab Republic

Block

Taiwan

Block

Tajikistan

Block

Tanzania, United Republic of

Block

Thailand

Block

Timor-Leste

Block

Togo

Block

Tokelau

Block

Tonga

Block

Trinidad and Tobago

Block

Tunisia

Block

Turkey

Block

Turkmenistan

Block

Turks and Caicos Islands

Block

Tuvalu

Block

Uganda

Block

Ukraine

Block

United Arab Emirates

Block

United Kingdom

Allow

United States

Allow

United States Minor Outlying Is

Allow

Uruguay

Block

Uzbekistan

Block

Vanuatu

Block

Venezuela

Block

Vietnam

Block

Virgin Islands, British

Block

Virgin Islands, U.S.

Block

Wallis and Futuna

Block

Western Sahara

Block

Yemen

Block

Zambia

Block

Zimbabwe

Block

Related Articles

  • CS : Child CID Provisioning
    Read More
  • Cylance - Uninstalling Agent
    Read More
  • Cylance - Support Collection Tool
    Read More
not finding your answers?
was this article helpful?