Skybox FirewallAssurance UsersGuide V9!0!80
Skybox FirewallAssurance UsersGuide V9!0!80
User Guide
9.0.800
Revision: 11
Proprietary and Confidential to Skybox Security. © 2019 Skybox Security,
Inc. All rights reserved.
Due to continued product development, the information contained in this
document may change without notice. The information and intellectual property
contained herein are confidential and remain the exclusive intellectual property of
Skybox Security. If you find any problems in the documentation, please report
them to us in writing. Skybox Security does not warrant that this document is
error-free.
No part of this publication may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means—electronic, mechanical, photocopying,
recording, or otherwise—without the prior written permission of Skybox Security.
Skybox®, Skybox® Security, Skybox Firewall Assurance, Skybox Network
Assurance, Skybox Vulnerability Control, Skybox Threat Manager, Skybox
Change Manager, Skybox Appliance 5500/6000/7000/8000/8050, and the
Skybox Security logo are either registered trademarks or trademarks of Skybox
Security, Inc., in the United States and/or other countries. All other trademarks
are the property of their respective owners.
Contact information
Contact Skybox using the form on our website or by emailing
[email protected]
Customers and partners can contact Skybox technical support via the Skybox
Support portal
Contents
Intended audience .................................................................................... 6
How this manual is organized ..................................................................... 6
Related documentation .............................................................................. 6
Technical support ..................................................................................... 7
Related documentation
The following documentation is available for Skybox Firewall Assurance:
Technical support
You can contact Skybox using the form on our website or by emailing
[email protected]
Customers and partners can contact Skybox technical support via the Skybox
Support portal
When you open a case, you need:
In this chapter
Skybox platform ................................................................... 8
Highlights of Skybox Firewall Assurance ................................ 10
Basic architecture ............................................................... 11
Skybox platform
Skybox® Security arms security professionals with the broadest platform of
solutions for security operations, analytics, and reporting. By integrating with
more than 100 networking and security technologies organizations, the Skybox
Security Suite merges data silos into a dynamic network model of your
organization’s attack surface, giving comprehensive visibility of public, private,
and hybrid IT environments. Skybox provides the context needed for informed
action, combining attack vector analytics and threat-centric vulnerability
intelligence to continuously assess vulnerabilities in your environment and
correlate them with exploits in the wild. This makes the accurate prioritization
and mitigation of imminent threats a systematic process, decreasing the attack
surface and enabling swift response to exposures that truly put your organization
at risk.
Highlights
Basic architecture
The Skybox platform consists of a 3-tiered architecture with a centralized server
(Skybox Server), data collectors (Skybox Collectors), and a user interface
(Skybox Manager). Skybox can be scaled easily to suit the complexity and size of
any infrastructure.
For additional information, see the Skybox architecture topic in the Skybox
Installation and Administration Guide.
Data collection
The 1st step in analyzing firewalls using Skybox is to add their data to the
Skybox database. You can collect firewall data online (by connecting to the
firewall) or import it offline (by importing saved configuration files from the file
system). Whenever there are changes to the firewall configuration, including
new, modified, or deleted access rules (and, for Palo Alto Networks firewalls,
changes to IPS signatures), you should reimport the firewall data.
You can import data from firewalls interactively (using a wizard) or by using a
Skybox task that you can schedule to run at regular intervals.
For additional information about collecting data, see the Quick reference for data
collection chapter in the Skybox Reference Guide.
In this chapter
Quick reference for data collection ........................................ 12
Using the wizard for online import......................................... 14
Using the wizard for import from the file system ..................... 15
Viewing and validating imported firewalls ............................... 16
Working with tasks ............................................................. 18
1 Click .
2 Select a device type, select the Import from Firewall method, and click
Next.
3 Fill in the necessary connection and authentication fields, as described in the
following topics in the Skybox Reference Guide:
• Check Point FireWall-1
• Cisco IOS
• Cisco PIX/ASA/FWSM
• Cisco Nexus
• Fortinet FortiGate
• Juniper Junos
• Juniper NetScreen
• Nortel Passport
• Palo Alto Networks
4 Click Next.
Note: If the import fails, click the link to the details log to see whether the
reason for the failure is explained there. Go back to the details of the
import (that is, the device type and the properties) and make corrections.
6 Click Next.
7 In the Select Firewalls page, from the list of imported devices, select the
devices that you want to add to Skybox (other devices are lost). Existing
devices are automatically updated.
Note: The number of devices that you can include in the model is limited
by your Skybox license.
8 Click Next.
9 (Optional) Use the Scheduling page to specify whether this import is to run on
a regular basis by creating a Skybox task to run on a specific schedule:
a. Select Add this import as a scheduled task.
b. (Optional) Change the name of the task.
c. Select a schedule for the task.
10 Click Next.
The Finish page lists the added and updated devices.
By default, all new and updated devices are analyzed for Rule Compliance and
shadowed and redundant rules when the wizard finishes.
11 Click Finish.
1 Click .
2 Select a device type, select the Import configuration files method, and
click Next.
3 Specify the location of the files to import.
4 For Check Point devices only, fill in the additional fields:
• (Optional) Modules List: Type a comma-separated list of the names of
the specific devices (modules) to import.
• Rulebase: Specify the policy (rulebase) to import:
— Use active policy: If you select a statuses file (in the Statuses field),
import the active policy as specified in that file. Otherwise, import the
most recently edited policy as specified in the objects file.
— Use Specific Policy: The name of the policy to import.
5 Click Next.
6 In the Import Firewall Configuration page, click Start Import.
The status of the import and any warning messages are displayed.
Note: If the import fails, click the link to the details log to see whether the
reason for the failure is explained there. Go back to the details of the
import (that is, the device type and the other properties) and make
corrections. If the import fails again, contact Skybox Support.
7 Click Next.
8 In the Select Firewalls page, from the list of newly imported devices, select
the devices that you want to add to Skybox (other devices are lost). Existing
devices are automatically updated.
Note: The number of new devices that you can include in the model is
limited by your Skybox license.
9 Click Next.
The Finish page lists the added and updated devices.
By default, all new and updated devices are analyzed for Rule Compliance and
shadowed and redundant rules when the wizard finishes.
10 Click Finish.
• For a new device (a device that was imported for the 1st time), check
whether the imported device is now listed in the All Firewalls tree.
If the firewall is part of a firewall management system, it is listed
underneath that server rather than directly under All Firewalls.
2 Check that the network interfaces were imported correctly:
a. At the top of the device summary page, click Firewall Map.
You can see all the network interfaces and the networks to which they are
connected.
5 For Palo Alto Networks firewalls, make sure that the IPS rules were imported
correctly:
a. In the Table pane, right-click the device and select Manage IPS Rule
Groups.
b. Double-click each rule group to view its rules.
c. Verify that the rules appear in the Skybox Vulnerability Dictionary (that is,
a check mark appears in the Dictionary column of the table).
d. If many of the rules are not in the Vulnerability Dictionary, you might be
using an outdated version of the Dictionary.
— For information about updating your Vulnerability Dictionary, see the
Dictionary updates chapter in the Skybox Installation and
Administration Guide.
e. Verify that the rule groups of the device in Skybox match the rules groups
of the actual device.
To create a task
› Click .
Task sequences
You can create task sequences, which group tasks together in a specific order.
This is useful when you have tasks that must run at the same time or
consecutively. For example, you can update all the firewalls at a location at
specific intervals and then analyze the updated firewalls. For additional
information, see Task sequences (on page 109).
Policy compliance
Skybox checks each firewall for:
› Rule Compliance: Whether the firewall access rules comply with specific
syntactic rules (for example, whether any of the firewall Allow rules contain
“Any” in the source, destination, or services)
› Access Compliance: Whether the access enabled by the firewall access rules is
in accordance with a standard (NIST 800-41 or PCI DSS) or organization-
specific Access Policy
› Configuration Compliance: Whether there are weaknesses in the firewall
configuration (for example, the default account uses the default password or
the version of the firewall is outdated)
We recommend that you start by examining Rule Compliance and Configuration
Compliance. Afterwards, you can move on to Access Compliance, which requires
that you select a policy and map the firewall interfaces to it.
In this chapter
Rule Compliance ................................................................. 20
Access Compliance .............................................................. 29
Configuration Compliance .................................................... 56
Rule Compliance
Rule Compliance involves comparing the existing access rules of a firewall to a
list of syntactic Rule Checks that consist of basic standards for access rules. For
example:
› “Any” must not appear as the source, destination, or service of any access
rule that defines permitted traffic
› The number of ports accessible using 1 access rule must be limited to a
maximum of 1024
This set of syntactic checks is a Rule Policy.
Skybox checks the access rules of each firewall for compliance with the Rule
Policy and shows the access rules that violate the policy.
If you also select Access Policy (above the list of rules), you can see the
access rules that violate the Rule Policy and the Access Policy.
4 Click the Rule Compliance tab.
You can see the Rule Checks applied to the firewall and their pass/fail status.
When you select a Rule Check, you can see its details in the Details pane or
view its violating access rules.
Rule Policies
› To make changes to an existing Rule Policy or to export it, right-click the Rule
Policy.
› To create or import a Rule Policy, right-click the Rule Policies node.
Rule Checks
Some Rule Checks might not be relevant for all firewalls; to disable (or enable)
any Rule Check for a specific firewall, right-click the Rule Check in the Rule
Compliance tab of the firewall and select Disable Rule Check in this Firewall
(or Enable Rule Check in this Firewall).
› You are working with multiple Servers and want to copy the policy between
them.
› Skybox is upgraded and there are changes to the predefined Rule Policy.
The predefined policy is not upgraded automatically. Rather, the new policy is
available as an import so that you can look at both policies and select the
policy that better meets your requirements.
› You want to make changes to the policy; exporting generates a backup file.
You can export a single Rule Policy or all policies in your Rule Policies folder.
The result of the export is always a single file.
When you import policies from a file, each selected Rule Policy from the file is
saved separately in the selected folder. Multiple policies with the same name are
saved separately; they are not merged.
Note: These Rule Checks are only run on Check Point firewalls.
Risky Applications
Risky Applications Rule Checks test for applications, source zones, and
destination zones that are vulnerable to attacks. It is good security practice to
limit access to these entities to essential access only.
You can customize the following fields in these Rule Checks:
› Applications
› Source Zones
› Destination Zones
Entities must be comma-separated.
Risky Ports
Risky Ports Rule Checks test for services (ports) which are vulnerable to attacks.
It is good security practice to limit access to these services to essential access
only.
When you create a Risky Ports Rule Check, specify:
EXCEPTIONS
Rule Checks can have multiple violations, where each violation is a single access
rule that violates the Rule Check.
In some cases, you want to label these violating rules as exceptions to the Rule
Checks—they should not be reported as violations because they do not affect the
status of the Rule Check. When a violating rule is to be labeled as an exception,
you create an exception for it. You can create exceptions from the following
locations:
› Specific firewall > Policy Compliance > List of violating access rules in the
Table pane
› Specific firewall > Policy Compliance > Rule Compliance tab (with the
desired Rule Check selected) > Violating Rules tab in the Details pane
› Rule Policies > Specific Rule Policy > Specific Rule Check > Analyzed
Firewalls tab (with the desired firewall selected) > Violating Rules tab of
the Details pane
Exception expiration
Rule exceptions can expire in 2 ways:
› Rule Modification: When the access rule (for which the exception was created)
is modified
› Date Expiration: According to a specific date
After an exception expires, the violation reappears. Sometimes an exception is
required even after it expires. For example, if an access rule was modified, but it
continues to violate the Rule Check.
To reactivate an exception
1 Open the Rule Exception Properties dialog box for the expired rule.
2 You can change the expiration method or expiration date.
Note: If the expiration method is Access Rule Modification, you must
clear and then reselect the check box to ‘set’ the change.
3 Click Activate.
Exception management
You can view, modify, and delete existing exceptions using the Exceptions dialog
box. You can export the list of exceptions to a CSV file.
Note: You can only add new exceptions as explained in the preceding section (by
selecting a specific access rule and, optionally, also a specific Rule Check).
Properties of exceptions
The properties of exceptions are described in the following table.
Property Description
Firewall Name (Read-only) The name of the firewall with which this
exception is associated.
Violating Rule# (Read-only) The original rule ID of the access rule with
which this exception is associated. If there is no original
rule ID, the violating rule number is shown.
Rule Policy Scope The Rule Checks with which this exception is associated.
Access Policy The Access Checks with which this exception is
Scope associated.
Max. Severity (Read-only) The maximum severity of all the violations of
the access rule associated with this exception.
Expiration Specifies when the exception expires. By default, the
exception expires when the access rule is modified; you
can select a specific date.
Note: After the exception expires for either reason, the
violation reappears.
Tag Enables you to categorize the exception according to your
organization’s requirements; use this field to search for
the exception.
Ticket ID (Read-only) If the exception was created by approving
risk in Change Manager, this is the ID of the relevant
ticket.
Comment Enables you to add comments.
Comment History (Read-only) A listing of added user comments.
Access Compliance
Access Compliance simulates the traffic that can pass through a firewall by
examining its access rules. It checks access between the network interfaces of
individual firewalls. Access Compliance enables you to audit your firewall access
rules based on PCI, NIST, or specific organizational guidelines, to see whether
the traffic in your organization is in accordance with the selected guidelines.
3 Navigate to the main node for the Access Policy and click Analyze on the
toolbar.
Skybox applies the Access Policy to the firewall, checking the traffic between
the interfaces.
4 Review the results of the analysis to see whether the firewall is compliant with
the Access Policy. If it is non-compliant, check which access rules are causing
the problems.
• For information about these results, see Access Compliance and violation
management (on page 38).
5 Make all necessary changes (see Handling policy violations (on page 45)).
6 Generate and send Access Compliance reports (see page 117).
Note: Use the firewall map to see the network to which each interface is
connected. This can help you to understand the network interfaces that map to
each zone.
To select an Access Policy for a firewall and map its interfaces to zones
1 In the Firewall Assurance tree, right-click the Policy Compliance node of the
desired firewall and select Manage Access Policy.
2 In the Manage Access Policy dialog box, select the desired Access Policy.
3 For each network interface:
a. Select the network interface.
b. Click Mark as Zone.
c. Change or add the zone type. (The zone name is optional.)
Note: Alternatively, you can map the network interfaces to zones using
the firewall map (right-click the interface in the map and select Mark as
Zone).
4 To check traffic to or from a network interface, select the interface and click
Access from Interface or Access to Interface.
• For information about these results, see Access analysis.
5 Click OK.
Each folder contains a set of policy sections that define the relationships between
different zones.
Each policy section includes a source, a destination, and Access Checks that
define the access between them. The Access Checks define the access that is
permitted between the source and destination zones of the policy section—access
that must be blocked completely and access that can be permitted in a limited
way.
Policy sections
The source and destination of a policy section are defined by their scope. The
scope of the source specifies the source points for access analysis; the scope of
the destination specifies the destination points for access analysis. Usually, the
source and destination are zone types, but they can be specific network
interfaces.
› Right-click the policy section in the Access Policies tree and select
Properties.
› Service Access Checks test access between the source and the destination
over specific protocols (services):
• Limited Services: Services (protocols) that are limited to a specific
number of IP addresses (to prevent excessive permissions)
• Risky Services to Block: Services that are blocked completely
• All Other Services: Services that are not specified by the previous 2 sets
and whose access is defined manually
If the Limited Services and Risky Services to Block Access Checks
cover all services, there cannot be an All Other Services Access Check.
• Number of ports per destination IP: Limits the number of ports that
can be accessed for each destination IP address
› A specific number of IP addresses that must not be exceeded for each service.
For example, “No more than 5 SMTP servers in each DMZ zone may be
accessible from an External zone.” If there are 6 or more SMTP servers in the
DMZ that are accessible from an External zone through the firewall, the
firewall is not compliant with the Access Check.
› A list of networks or devices in the destination that are permitted from the
source through the firewall. If other networks or firewalls are accessible, the
tested firewall is not compliant with the Access Check.
› A limit: Not all IP addresses are accessible for each service, although no
specific numeric limit or list of permitted entities is set. For example, “HTTP
traffic between External zones to the DMZ must be filtered.” If all IP
addresses in the DMZ are accessible via HTTP through the firewall, it is non-
compliant.
This limit is useful for making sure that there are no Any-Any rules in the
tested firewall.
› A specific number of ports that must not be exceeded for each destination IP
address. For example, “No more than 5 ports on any DMZ server may be
available to an External zone.”
› A limit: For each destination device (that is, for each destination IP address),
some ports are inaccessible from the source, although no specific numeric
limit is set. If all ports on a single destination IP address are accessible, the
tested device is non-compliant.
Skybox version 9.0.800 36
Chapter 3 Policy compliance
Access tests
Each Access Check in a policy section is divided into separate access tests, where
each test checks access (and compliance) from a specific source to a specific
destination. The entities in the source and destination of the policy section
control the breakdown of the Access Check into access tests—each entity in the
source or destination is considered a separate source or destination instance and
a separate access test is created from each source instance to each destination
instance.
In this way, you can define an Access Policy using zone types, but analyze the
access using actual network interfaces that are added to and deleted from the
zone types dynamically when firewalls and network interfaces are added and
removed.
When you select an Access Check in the tree, you can view these tests in the All
Access Tests tab of the workspace.
› NI1 to NI3
› NI1 to NI4
› NI2 to NI3
› NI2 to NI4
› NI_Partner1 to NI_Users1
› NI_Partner1 to NI_Users2
› NI_Partner2 to NI_Users1
› NI_Partner2 to NI_Users2
Note: Tests are created only for firewalls whose network interfaces match those
in the policy section.
Reminder: To view the zone types for a firewall network interfaces, select the
firewall under the All Firewalls node of the Firewall Assurance tree, right-click
the Policy Compliance node and select Manage Access Policy, and look in the
Zone Type column.
› Right-click the test in the All Access Tests tab of the Table pane and select
Disable or Enable.
Disabled tests are listed in a light gray font in all tables that list access tests
and violations.
The overall Access Compliance status for the selected firewall is at the top. Under
that, there is a link specifying the number of violating rules and a list of the top
violating policy sections.
Click the link to open the Violating Rules tab. If it is clear from the list of
violating access rules that only a few of them caused most of the violations, you
can drill down directly into those access rules (see page 39). Otherwise, in the
Access Compliance tab, review the policy sections 1-by-1 (see page 39),
starting with the top violating sections.
Reviewing the violating access rules
Sometimes, many violations are caused by a single access rule. It is easy to view
the list of violations and decide whether to fix the access rule or whether the
policy is incorrectly defined.
The Violating Rules tab shows all the violating access rules of the firewall.
› If you sort the list by number of violations, you can see the access rules that
cause the most violations. The Details pane lists the attributes of the 1st
access rule or the selected access rule, and the list of violations that it causes.
› If you sort the list by source or destination, you can review the access rules
with wider exposure before those that specify only 1 network or asset.
When you select an access rule, the Details pane includes a tab listing the
violations for that access rule and a tab with read-only information about the
access rule. When you select a violation, the Details pane shows detailed
information about the selected violation.
For additional information about violations, see Viewing violations (on page 40).
Viewing the policy sections
The Access Compliance tab of each firewall shows all policy sections in the
Table pane. You can see the compliance percentage of this firewall against each
policy section and how many violations there are. If you select a policy section,
the Details pane lists the violating access rules for the selected policy section and
the access tests that were run.
You can click the link of any policy section with violations to view more details
about the violating access rules and the violations of that policy section.
Skybox version 9.0.800 39
Skybox Firewall Assurance User Guide
Viewing violations
A violation is an access test that was analyzed and found to be non-compliant—
the amount of access between the source and the destination of the access test
does not match the expected access (of the Access Check).
For each violation, you can see the following tabs in the Details pane:
› Details: Details about the access test (Access Check information with the
source and destination of this specific instance).
› Violation Explanation: An explanation of why this access test (that is, this
violation) does not comply with the Access Check.
For example:
On the device main_FW, too many destination ports are accessible in the
destination int2809 (DMZ).
The limit in the Access Check specifies that no more than 10 destination
ports should be accessible for each IP address in the destination.
The following IP addresses exceeded the limit by being accessible on too
many destination ports:
192.170.1.96-192.170.1.111 - accessible on 197119 destination ports
192.170.33.0-192.170.36.255 - accessible on 197119 destination ports
2 Click the Access Results tab in the Details pane and expand the results tree.
The entities are displayed and grouped according to the type of Access Check
and the compliance results. For example, for violations, the default view is
Accessible Destinations; for a successful access test, the default view is
Blocked Destinations.
You can change the information in the results tree by changing the value of the
Show field:
Note: The content of each view depends on the display filters (see page 41) that
you select.
If destinations are displayed, you can expand a destination asset node to see
accessible or blocked services on that asset. If source points are displayed, you
can expand a destination network node to see the gateways that enable or block
access.
Display filters
The toolbar at the top of the Access Results tab of the Details pane includes the
following display filters:
› Group By: Toggles between grouping the entities displayed in the results
tree by services or by network interfaces
› Authentication:
• No: Unauthenticated traffic
• Yes: Authenticated traffic
• N/A: All traffic, whether authenticated or unauthenticated
› Save Results:
2 Click .
The Access Route Details dialog box displays every potential route for the
selected entity.
Each Access Route shows how many routes are available from a specific source
to a specific destination through the firewall; multiple routes are displayed one
after the other. For each route:
› Address translation rules (if any) and access rules on the firewall that enables
the access are listed in a table.
Rules are shown with their direction, rule number, ruleset name, and rule
action. Click the link in a rule to open the Access Control List Editor for easier
viewing of the rule.
Inaccessible entities
Sometimes, an access rule blocks access between the source network interface
and the destination network interface. The rule might block access to all IP
address ranges behind the destination network interface or only to some of
them.
Use the Show Blocked Destinations filter to discover which IP address ranges
behind the destination network interface are blocked.
Note: The value in the Detail Level field is irrelevant when checking
access for single devices; there is always only one blocking rule.
4 Click the link on the access rule to view the rule in the Rule Match Details
dialog box.
› The Access Check is usually relevant but there is business justification for
granting exceptional permission in specific cases (for example, from a specific
source)
When you are working to solve policy violations, consider all these possibilities
for each violation. After the Access Policy is debugged and the firewall is up-to-
date, most violations are caused by problems in the firewall configuration.
› In the Table pane, right-click the violation and select Edit Access Check.
Property Description
If you create an exception by clicking on a test result, the
default scope includes only the relevant Access Check.
However, you can extend the scope.
Test The access test with which this exception is associated.
Test ID (Read-only) The test ID of the selected access test. If you
select an Access Check, Access Policy, or policy section or
folder, this field is empty.
Source The source to use for the exception.
Destination The destination to use for the exception.
Services The services to use for the exception.
Rule Applications The applications to use for the exception.
Expiration Date Specifies the date after which the exception expires.
Note: After the exception expires, the violation
reappears.
Tag Enables you to categorize the exception according to your
requirements; use this field to search for the exception.
Ticket ID The ticket ID of the Change Manager ticket associated
with this exception (when available).
User Comments Enables you to add comments.
User Comments (Read-only) A list of all the previous user comments for
(History) this exception.
› For information about PCI Firewall Compliance reports, see PCI Firewall
Compliance reports (on page 128).
› For information about the properties and sections of these reports, see the
PCI Firewall Compliance reports topic in the Skybox Reference Guide.
Note: The predefined NIST 800-41 Policy is used by Skybox Firewall Assurance
and Skybox Network Assurance. If you are using both products, keep this in
mind when making changes to this Access Policy.
› Adding exceptions: Excluding specific entities from the definition of the Access
Check
› Deleting or disabling Access Checks, policy sections, or policy folders that are
not relevant for your organization from the predefined policy
› Changing the severity of Access Checks
› Reorganizing the hierarchy of the policy: For example, adding or deleting
policy folders or moving Access Checks between folders
We recommend that you add your organization’s best practice guidelines to the
Skybox Access Policies, to ensure continued compliance to industry and
organizational standards.
You can generate an Access Checks report (see page 116) that lists all the policy
sections and Access Checks in a specified Access Policy scope.
By default, the policy section includes an Access Check for all other services
and an Access Check for number of ports per destination IP address. Even if
you do not define other Access Checks for this policy section, each service is
limited to 50 destination IP addresses and each destination IP address is
limited to 50 ports.
2 Define the source and the destination (see page 50).
3 Define or copy the Access Checks (see page 51).
4 If necessary, change the value of the All Other Services Access Check and
the Number of ports per destination IP Access Check.
Note: Each policy section can have only a single Access Check that deals
with all services or all other services. For example, if the policy section
blocks access to all services, the All Other Services Access Check is
disabled.
5 Click OK.
2 If necessary, change the scope type. To define a policy section for a specific
firewall, use Network Interfaces.
3 To define the source:
• In the Available Entities field, select all entities that are part of the scope
and click to move them to the Selected Source field.
• In the Selected Source area, click the Browse button next to the Use IP
Ranges field to select specific IP address ranges for the scope.
If you select an entity and then specify IP address ranges, the analysis
starts from the selected entities, but Skybox uses the specified IP
addresses instead of the entity IP addresses.
If you specify IP address ranges without selecting any source entity, you
must select entities in Destination Scope. In this case, Skybox uses the
specified IP addresses as source addresses for analyzing access to the
Selected Destination entity.
4 To define the destination:
• In the Available Entities field, select all entities that are part of the scope
and click to move them to the Selected Destination field.
• In the Selected Destination area, click the Browse button next to the Use
IP Ranges field to select specific IP address ranges for the scope.
5 Click OK.
The default name of the policy section is based on the source and the
destination.
Adding Access Checks
You can add Access Checks to a policy section:
› By copying Access Checks from existing policy sections and making necessary
changes
› By creating new Access Checks
2 Fill in the fields according to the table in Access Check properties (see page
53).
At a minimum, specify values for the fields Services, Limitation, and
Description.
3 Click OK.
2 Fill in the fields according to the table in Access Check properties (see page
53).
At a minimum, specify values for the fields Services or Applications, and
Description.
3 Click OK.
Access Check properties
The properties of Access Checks in Skybox Firewall Assurance are described in
the following table.
Property Description
Name A name for the Access Check.
Source (Read-only) The source point for access analysis (taken
from the policy section).
Destination (Read-only) The destination point for access analysis
(taken from the policy section).
Type (Read-only) The type of the Access Check:
• Limited Access: Confirms that the access between 2
points does not exceed a specified limit.
• No Access: Verifies that all routes between the source
and the destination (via the selected services or
applications) are blocked.
Severity The severity of the Access Check.
Authentication • No: Block or limit traffic by using only regular access
rules (without authentication).
• Yes: (Limited Access Checks only) Limit traffic for
authenticated users. That is, access for authenticated
users is limited to a specific number of IP addresses or
ports.
• N/A: Block or limit all traffic (whether authenticated
or not).
NAT (No Access Checks only)
• None
• No Source NAT
• No Destination NAT
Services (Service No Access Checks and Limited Access Checks
only) The services on the source zones to use to analyze
access. Click the Browse button to select services.
• Not: Analyze access on all services except those
selected.
Applications (Application No Access Checks only) The applications on
the source zones to check for access. Click the Browse
button to select applications.
• Not: Check access for all applications except those
selected.
Property Description
Limitation on (Limited Access Checks only) The amount and type of
Destination IP permitted access:
addresses • Number of IP addresses per service: For each
accessible destination port, the maximum number of
IP addresses that can be accessed from that port.
• Not all IP addresses can be reached: For each
accessible destination port, there must be inaccessible
IP addresses.
• Limit to a specific scope: For each accessible
destination port, only the selected IP addresses are
accessible.
Limitation on (Limited Access Checks only) The amount and type of
Source IP permitted access:
addresses • Number of IP addresses per service: For each
accessible destination port, the maximum number of
source IP addresses permitted.
• Not all IP addresses can be reached: For each
accessible destination port, there must be source IP
addresses that are blocked.
• Limit to a specific scope: Source IP addresses must
match the selected IP addresses.
Description A free text description of the Access Check.
Advanced
Routing Rules • Use All: Use all routing rules.
• Ignore All Rules: Ignore routing rules—route each
packet through all available interfaces. This option is
useful for connectivity testing and model verification.
• Ignore Dynamic Rules Only: Use only static routing
rules; packets that do not match the static routing
rules are routed through all available interfaces.
Note: This option has no effect on assets and gateways
without routing rules. For such assets, packets are routed
through all available interfaces.
Routes per The number of routes to analyze for each service.
Service If the displayed route is incomplete, increase this value to
provide a more complete result.
Note: Increasing the value of this property increases the
analysis time for the Access Check.
Note: The default value is controlled by the
AccessAnalyzer_max_routes_for_service property in
<Skybox_Home>\server\conf\sb_server.properties
Simulate IP Specifies whether access is analyzed from any IP address
Spoofing During (to simulate IP address spoofing).
Analysis
Create as Single Specifies whether to create a single access test for all
Test sources and destinations together.
If cleared, a separate access test is created for each
source-destination pair.
Note: If you change any value after the Access Check is analyzed, you must
reanalyze the Access Check for the changes to take effect.
To map PCI Access Policy folders to the appropriate sections of the PCI
requirement
1 In the Access Policies tree, locate the PCI Access Policy to map.
2 Right-click the policy and select Map PCI Access Policy Folders.
3 Make sure that the correct PCI DSS policy version is selected.
4 For each subsection of the PCI requirement, click Browse and select the
appropriate policy folders.
Note: If a subsection is not mapped, the details for that subsection
contain the text “Tests for this requirement are unavailable”.
If multiple folders are mapped to a single requirement, consider the mapped
folders together as input for that requirement in the structure of the report.
5 Click OK.
› You are working with multiple Servers and want to copy the policy between
them.
› Skybox is upgraded and there are changes to the predefined Access Policy.
The predefined policy is not upgraded automatically. Rather, the new policy is
available as an import so that you can compare the policies and select the one
that better meets your requirements.
› You want to make changes to the policy; exporting generates a backup file.
You can export a single Access Policy or all the Access Policies in your Public
Policies or Private Policies folder. The result of the export is always a single
file.
When you import, each selected Access Policy from the file is saved separately in
the selected folder. Multiple policies with the same name are saved separately;
they are not merged.
Configuration Compliance
Configuration Compliance enables you to audit the platform security of your
firewalls and understand weaknesses in a firewall configuration (for example,
whether the firewall can be accessed using the default password, whether
logging is enabled, and whether the management protocol is encrypted).
To analyze Configuration Compliance, import firewalls and then check their
configuration data against a Configuration Policy (a set of Configuration Checks)
to see if the firewalls’ configurations comply with the policy. After Skybox
analyzes the information, you can view any failed Configuration Checks, with
details about each failure.
› Standard
A set of Configuration Policies that check device configuration files against
known best practice guidelines for various platforms.
This set can be applied to most firewalls automatically. Each Configuration
Policy applies to a specific firewall type.
› STIG
A Security Technical Implementation Guide (STIG) is a cybersecurity
methodology for standardizing security protocols to enhance overall security.
This set is intended for firewalls in organizations that must comply with STIG
standards used by the Department of Defense (DoD). The set includes those
STIG standards that can be verified by analyzing device configuration files.
Other standards require manual verification or can be verified by analyzing
the access rules.
Note: This set includes Configuration Checks for Cisco firewalls and Cisco
IOS routers. You can customize the set of Configuration Checks to be
applied to the firewalls, see Customizing a Configuration Policy (on page
61).
› Per firewall
› For all analyzed firewalls
5 (Optional) Select a violation in the Table pane and view it in the configuration
file (see page 59).
The Configuration Files Viewer shows the expected results and the actual
results of the tested Configuration Check. The Viewer also displays the
configuration file in which the violation is found. If possible, the 1st violation
instance in the file is highlighted in the file.
2 As required:
• Use the Find field to search in the file for the violating string (or any other
string).
Note: The Find field searches for simple strings, not for strings
expressed as regular expressions.
• Use the Go to line field to navigate to a specific line in the file.
• If there are multiple violations of this Configuration Check in the file, use
Browse Violations to move between them.
Configuration Policies
Configuration Checks
2 Define the policy according to the properties described in the following table.
Property Description
General
Name A name for the Configuration Policy.
Description A description of the Configuration Policy.
Scope
Firewall Type The type of device that this Configuration Policy checks.
Platform The device platforms that this Configuration Policy checks.
Operating System The device operating systems that this Configuration
Policy checks.
Firewall Scope The firewalls and firewall folders that are checked by this
Configuration Policy.
Exclude from Firewalls and firewall folders that match the policy scope
Scope but are not to be checked against this Configuration
Policy.
Property Description
Escape Special Sets all special characters (“[”, “\”, “^”, “$”, “.”, “?”, “*”,
Characters “+”, “(”, “)”, and “{”) in the selected part of the search
pattern to literal by adding a “\” before each of them.
Reset Special Resets all escaped special characters (“[”, “\”, “^”, “$”,
Characters “.”, “?”, “*”, “+”, “(”, “)”, and “{”) in the selected part of
the search pattern, by deleting the “\” before each of
them.
View Specifies the display mode for the Search field:
• Full mode (editable): View the regular expression as
is, including the “\” preceding special characters that
are escaped. Use this view to edit the search pattern.
• Readable mode: (Read-only) View the regular
expression as it appears in the configuration file,
without the preceding “\” in front of special characters
that are escaped.
Violation When Specifies whether to create a violation of the
Configuration Check when the search pattern is found or
when it is not found.
Violate if the Specifies whether to create a violation of the
block isn't found Configuration Check if the specified block is not found in
the configuration.
Note: This option is only available when the Search
Scope type is For Each.
Test Opens an additional section of the dialog box where you
can test the regular expression. For additional
information, see Testing a Configuration Check (on page
67).
Limit Check to Specifies whether the Configuration Check runs only on
Version specific versions of the device. You must write the version
numbers as a regular expression. For information about
regular expressions, see Regular expressions (see page
66).
Note: The device type is specified in the Configuration
Policy.
To define a block
1 Click Create New Block.
2 Type a name for this block.
You can reuse block definitions in other Configuration Checks.
3 For contiguous blocks:
a. Select Separate Blocks.
b. Type the Start Pattern and End Pattern that define each block of this
type, using regular expressions as necessary.
4 For blocks defined by a common prefix:
a. Select Set of commands with common prefix.
b. Type the Command Prefix that defines each line of blocks of this type,
using regular expressions as necessary.
› If you know the length of the input string, write \d{<length>}. This
expression is internally optimized so that if the input string is not <length>
characters long, the engine reports a failure without evaluating the entire
regular expression.
› To retrieve everything between one a and the next a in an input string, it is
much more efficient to use a([^a]*)a than a(.*)a.
› [^a]*+a is much more efficient than [^a]*a. The former fails faster because
after it has tried to match all the characters that are not a, it does not
backtrack; it fails immediately.
› Consider using lookaround constructions:
• Positive lookahead: (?=X)
• Negative lookahead: (?!X)
• Positive lookbehind: (?<=X)
• Negative lookbehind: (?<!X)
3 To test the regular expression against text: Type or paste the desired text in
the text box below the Find field.
4 Click .
The validity of the regular expression is tested. If it is not valid, an error
message is displayed in the Test Results field. If it is valid, the regular
expression is tested against the selected text, and the results are shown in
the Test Results field. If the regular expression is found in the tested file, it
is highlighted in the file data.
5 If necessary, change the search scope and the search string, and keep testing
until the expected results are achieved.
You can use the Find field to look for specific patterns in the configuration
file. This can be useful to make sure that the absence of the expected pattern
is not the reason that the regular expression does not work or to see if you
are searching for the correct pattern in the regular expression.
For example, you create a Configuration Check to test for the existence of the
pattern “set interface mgmt manage web” in the configuration files of specific
device types. If this pattern exists in the configuration file, it is a violation—
HTTP is used for web management. You test the pattern against a
configuration file that does contain the pattern, but the test result shows that
the pattern is not found. You then examine the regular expression to make
sure that you copied the pattern correctly. Upon careful examination of the
regular expression, you find that you misspelled “interface” or typed “mgt”
instead of “mgmt”. You can then fix the mistake in the dialog box, test again,
and if it works, fix the Configuration Check.
› You are working with multiple Servers and want to copy the policy between
them
You can export a single policy folder (that is, a single set of Configuration
Policies) or all policy folders in your model. The result of the export is always a
single file.
When you import, each selected Configuration Policy is saved separately in the
selected folder. Multiple policies with the same name are saved separately; they
are not merged.
Note: The default export format is XMLX (encrypted XML). However, if you must
make changes to a specific policy outside of Skybox, you can save the file in XML
format. To do this, change the value of db_xml_backup_mode to true in
<Skybox_Home>/server/conf/sb_server.properties. Then, for the export,
change the format of the output file to XML.
Note: For Check Point firewalls, the hotfix collection task must be run
after the configuration import. See the Check Point Firewall-1 hotfix
collection tasks topic in the Skybox Reference Guide.
In this chapter
Shadowing and redundancy analysis ..................................... 70
Rule usage analysis ............................................................. 74
Exporting optimization and cleanup data to CSV files............... 83
› When you are auditing a firewall: You can identify inconsistencies in the policy
(for example, Allow rules that exist in a rule chain but are shadowed by a
Deny rule higher in the chain)
› When you are trying to optimize or clean up a firewall: You can identify
shadowed and redundant access rules and decide whether to delete them
A shadowed rule is a rule that is never reached because its scope is completely
covered by rules above it in the rule chain.
For example, if you have the following access rules in a rule chain, the 1st rule
grants more access than the 2nd rule, so the 2nd rule is never reached by any
packets:
Exceptions
Implied firewall rule (rules not added explicitly by a user) are not reported as
shadowed or redundant.
Any-Any Deny rules at the end of a rule chain are not used in the analysis of
redundant rules, as redundancy caused by such rules is usually not an issue.
› For information about Analysis – Rule Optimization Status tasks, see the
Rule optimization status tasks topic in the Skybox Reference Guide.
3 Click Explain to open a dialog box that displays the shadowed rule next to
the shadowing rules in separate panes, to help you to understand how the
scope of the shadowed rule is covered by the shadowing rules.
When you click a node in one pane, what covers (or shadows) that node is
highlighted in the other pane. The icons in the Causes Shadowing pane
indicate the coverage (identical, containing, or partial coverage) for that node.
4 Close the dialog box.
5 To view the shadowed rule and the rules that shadow it in the context of the
rule chain, click Open in ACL Editor.
3 Click Explain to open a dialog box that displays the redundant rule next and
the rules that cause the redundancy in separate panes, to help you to
understand how the scope of the redundant rule is covered by the rules that
cause it to be redundant.
When you click a node in one pane, it lists what covers (or is covered by) that
node in the other pane. The icons in the Causes Redundancy pane indicate the
coverage (identical, containing, or partial coverage) for that node.
› Traffic from all cluster members is processed together to provide the hit
counts and usage data.
› All cluster members show the same hit counts and usage data.
› Each data collection for a device adds the new data to all cluster members.
Note: You can collect logs from up to 3 months (100 days) ago.
Note: New rule usage data is shown for the devices the next time the online
collection task runs and new data is collected.
Usage types
The following usage types are assigned to access rules (for hits during the
analysis period):
Note: This usually refers to objects that are referenced by implicit rules
only or by rules for which logging is disabled.
You can change the minimum usage thresholds for rules and objects so that
Unused means that the number of hits is less than a specified threshold (rather
than meaning no hits). These thresholds are specified in the Rule-base
analysis properties section of
<Skybox_Home>\server\conf\sb_server.properties, as described in the
following table.
Property Description
rule_unused_thre The threshold of number of hits; less than this number of
shold hits, access rules are considered unused. You can specify the
threshold as a percentage of the total rule hit count (for
example, rule_unused_threshold=10%).
The default value is 0.
object_unused_th The threshold of number of hits, less than this number of
reshold hits, firewall objects are considered unused. You can specify
the threshold as a percentage of the total object hit count
(for example, object_unused_threshold=10%).
The default value is 0.
3 Click a link in a table to view the selected data in the Rule Usage tab (for
rule links) or the Object Usage tab (for object links). You can also switch to
these tabs directly.
• The Rule Usage tab shows the firewall access (and NAT) rules grouped by
usage type.
This tab includes a Shadowed column that specifies whether an access
rule is unused is because it is shadowed (completely covered) by a rule
that is above it in the rule chain.
Note: Shadowing information is not displayed until you run an
Analysis – Rule Optimization Status task (see Shadowing and
redundancy analysis (on page 70)).
• The Object Usage tab shows the firewall’s firewall objects grouped by
object type and then by usage type.
4 When you select a rule in the Rule Usage tab, you can see the objects used
by that rule in the Object tree in the right-hand pane.
5 To toggle the grouping in the Rule Usage and Object Usage tabs, right-click
a column heading and select Group by Column or Don’t Group by Column.
› In the Object Usage tab, right-click the firewall object and select Show
Referencing Rules.
The list of access rules for the firewall appears. Rules that reference the
selected object (whether the object is used or not) are in boldface. Select an
access rule to see its objects in the Object tree.
To view the referencing rules when the firewall object is not used
› In the Object Usage tab, right-click the firewall object and select Show
Unused Rules.
The list of access rules for the firewall appears. The rules that reference the
selected object but in which the object had no hits are in boldface.
The information is displayed in the Actual Rule Usage column and is available
for used rules and rules containing unused objects.
The Actual Rule Usage column shows the percentage of the addresses and
ports included in the access rule that were used (that is, the percentage of
addresses and ports out of all those used in the rule that had hits). The icons
indicate how critical the rule is in terms of actual usage. Best practice for access
rules is that they expose the minimum possible number of addresses and ports.
Rules that have very little usage are good candidates for tightening (changing
the rule to permit access only via addresses and ports used). Rules that have
wider usage might need tightening, but not as much.
Viewing object usage within a rule
if you view a rule with actual usage data, the Object tree shows the hit counts of
objects for the selected rule.
Usage data is available for source, destination, and port objects. For firewalls
that support users and applications, usage data is also available for user and
application objects.
You can click an object in the Object tree to view additional information about
that object in the Details pane.
Viewing actual rule usage details
When you select a rule in the Rule Usage tab, the Details pane shows the actual
usage, according to addresses in the access rule’s source and destination, and
ports in the services, as found in the firewall activity log. The objects are listed in
hierarchical order. For firewalls that support applications and users, these are
also displayed in the Details pane.
You can show all actual usage or filter the display to show only poor usage (that
is, rules that probably need more urgent tightening).
› The collection periods differ, because rule usage data is collected on a regular
basis, while collection of actual usage data is often less frequent
› The methods used for counting the hits are different
› With the Rule Usage or Object Usage tab selected, click the Missing
Collection Dates link at the top-right side of the workspace.
The Coverage of RUA Collection dialog box appears.
Unloggable rules
Unloggable rules are not enabled for logging on the firewall. You should enable
logging for most rules, so that Skybox can analyze their usage patterns. If
logging many rules on a regular basis is too resource intensive, enable them at
least 2 weeks before each audit or optimization session, so that you have enough
data for an accurate analysis.
3 You can change the analysis period for the report and the format of the
report.
4 Click Generate Now.
The report is generated and displayed in a separate window.
You can generate Rule Usage Analysis reports manually in the Reports workspace
or on a specific schedule using a Report – Auto Generation task.
Manual export
You can export optimization and cleanup data manually by creating a report of
data that interests you.
› Any table: With the table open, select File > Export Table to CSV
See Exporting model data (on page 130)
› Rule usage data, Rule usage data and trace data, or shadowed and redundant
rules: Right-click the Optimization and Cleanup node, and select an Export
to CSV option
› Unreferenced Objects: Produces a list of all the objects that are not
referenced by any of the following fields in any access rule in the selected
firewall scope:
• Source
• Destination
• Service
• Application (AKA rule application)
• Translated Source
• Translated Destination
• Translated Service
The following object types are relevant for this report:
• Firewall address related objects (e.g. host, address range, network, group)
• Firewall service objects (e.g. service, service group)
• Firewall application objects (e.g. application, application group)
For each report type, you can use the CSV Columns field to define the columns
to display. If no columns are selected in this field, all the possible columns are
shown.
For additional information, see CSV optimization and cleanup export tasks, in the
Skybox Reference Guide.
Change tracking
Change tracking in Skybox helps you to keep track of changes implemented on
firewalls. When you use change tracking, Skybox saves the changes so that you
can review the history of access rules when necessary.
Users can sign up for alerts on new changes and can receive reports on changes
that occurred during a selected period.
In this chapter
Change tracking overview .................................................... 85
Setting up change tracking .................................................. 86
Viewing changes ................................................................. 87
Viewing the history of an access rule ..................................... 89
Change Tracking reports ...................................................... 90
Recovering lost changes ...................................................... 91
Reviewing and reconciling changes ....................................... 92
› Cisco PIX/ASA/FWSM
› Fortinet FortiGate
› Fortinet FortiManager
› Juniper Networks Junos
› Juniper Networks NetScreen
› Palo Alto Networks
› Palo Alto Panorama
These tasks create a partial change record for every change event reported by
syslog. These partial change records provide near real-time change tracking but
contain only the minimal information available in syslog about each change
(including the timestamp for the change and who made the change).
After additional data collection, the next time that you run an Analysis –
Change Tracking task, the partial change records are completed with access
rule information from the configuration files—each change record now includes
the change time and changed by information from syslog and the other
information available from the configuration file.
Note: If the GUID of an access rule is changed, it cannot be matched to the full
change record. In some devices (for example, Palo Alto Networks and Junos), the
rule name is used as the GUID.
For additional information about Change Tracking Events – Syslog Import
tasks, see the Syslog change events collection tasks topic in the Skybox
Reference Guide.
Change tracking for Check Point devices using audit log events
You can use a Change Tracking Events – Check Point Audit Log Collection
task to import changes to access rules and objects on Check Point devices. These
tasks create a partial change record for every change event reported by the audit
log. These change records provide near real-time change tracking but contain
only the minimal information available in the audit log about each change
(including the timestamp for the change and who made the change).
After additional data collection, the next time that you run an Analysis –
Change Tracking task, the partial change records are filled in with full access-
rule before and after views from the configuration files. At this point, each
change record includes the accurate change time and changed by information
and all the other information available from the configuration file.
For additional information about Change Tracking Events – Check Point
Audit Log Collection tasks, see the Check Point FireWall-1 change events
collection tasks topic in the Skybox Reference Guide.
Viewing changes
After firewall changes are analyzed, you can view the changes.
Note: If you are using the Change Reconciliation feature, the Change
Tracking section also includes a breakdown of authorized, unauthorized,
and pending changes. For information about change reconciliation, see
Reviewing and reconciling changes (on page 92).
2 The change tracking period is the period for which changes are displayed.
Depending on what you want to see and the frequency of data collection and
change tracking, you can change the tracking period (see page 89).
3 View a graph of the changes by expanding the Change Tracking area (click
). You can change the graph’s frequency using the drop-down list.
4 Click the link in the Total Changes field to see a list of all the changes.
The Details pane contains information about the selected change. For new or
deleted access rules or objects, their properties are displayed. For changed
entities, there is a before-and-after view of the change.
• If the changed entity is an object, you can see its affected access rules (in
the Affected Access Rules tab).
• If the change was originally detected via syslog, you can see the original
syslog messages (in the Syslog Messages tab).
To view all the changes between the current and previous configurations in the
context of the raw configuration files, right-click the firewall Change Tracking
node and select Compare Current Configuration to Previous.
› Click the link in the change tracking summary section, in its expanded view.
› Right-click a folder or firewall and select Change Tracking > Change
Tracking Period.
› Right-click the Change Tracking node of a firewalls and select Change
Tracking Period.
Note: For firewalls where the access rules do not have a unique ID (for example,
Cisco firewalls), no history is available. No history is available for implied rules
(displayed with a green background in the Access Control List Editor) either, for
the same reason.
You can generate Change Tracking reports manually from the Reports workspace
or on a specific schedule using a Report – Auto Generation task.
For information about creating report definitions and working with reports, see
the Working with reports section in the Skybox Reference Guide.
For information about the properties of Change Tracking reports, see the Change
Tracking reports topic in the Skybox Reference Guide.
› Manually (right-click the Change Tracking node and select Export to CSV –
Change Tracking Data)
› By scheduling a CSV – Change Tracking Export task
Example
› Reconcile the changes with Skybox tickets (on page 95), providing
documentation for each change.
• This step requires Skybox Access Change tickets. You can create these
tickets using Skybox Change Manager or by importing external tickets to
Skybox (see Prerequisite for change reconciliation (on page 94)).
• Reconciling changes enables you to associate tickets with changes, so that
you can see the ticket that caused each change.
The goal of reviewing the firewall changes in Skybox is to check that each change
was authorized (and provide supporting documentation, if required), and to
report any unauthorized changes.
found) extracts this number as the ticket ID. If there is a different way of
representing ticket IDs in your organization, change the regular expression
in the Ticket ID Regex field.
3 To enable automatic matching between firewall changes and change requests
in Skybox tickets, select Enable Change Reconciliation.
4 Set reconciliation options, as required:
• Specify how the matching is done and whether changes are only
authorized if they have matching Skybox tickets.
• Specify the number of days to leave changes in the Pending state. After
this, the status of Pending changes becomes Unauthorized.
• Specify the number of days after which Pending changes that are not even
partially reconciled are marked as Unauthorized.
• Specify whether change tracking analysis attempts to match change
requests and Skybox tickets by external ticket IDs.
• Specify whether change tracking analysis attempts to match change
requests and Skybox tickets by IP addresses and ports.
For additional information, see the Change Tracking Settings topic in the Skybox
Installation and Administration Guide.
Note: If Expiration Date is selected in Tools > Options > Server Options >
Change Manager Settings, the expiration date is included in the reconciliation
formula. New rules whose expiration date differs from that specified in the
change request have a lower reconciliation score than those with a matching
expiration date.
› Pending: This is the default status for new changes before any matching
› Authorized: Changes that are authorized by an Analysis — Change
Tracking task or by a user
Changes that have 100% coverage from Skybox tickets are authorized by the
task.
2 For each pending change, see if you can tell whether it is authorized or
unauthorized.
3 If the change includes a specific ID in the Extracted Ticket ID field, you can
look up the change request in your organization’s ticketing system and see
whether the change made is the same as the change requested.
4 Update the status of a reviewed change:
• Right-click the change and select Set Status; change the status and add a
comment; click OK.
› Skybox using Skybox Change Manager (see the Submitting change requests
section in the Skybox Change Manager User Guide).
› An external system and added to the model using the API (see the Tickets API
chapter in the Skybox Developer Guide).
COVERAGE OF CHANGES
Skybox provides information about:
› How much of the change (recorded in the change record) is fulfilling a change
request in the system
This is important information for auditors, because changes to access rules
should only be made if they are requested. Changes that are much wider than
the request might leave your organization’s network at unnecessary risk.
For example, if the change permits access from a partner’s network to a
specific network in your organization but the change request is limited to 10
machines in the partner’s network, then only a small percentage of the
change is fulfilling the change request.
› How much of the requested change (in the ticket) is covered (fulfilled) by the
actual change (as recorded in the change record)
For example, if the requested change is access to specific internal servers
from a partner network over a specific port and the actual change only
provided this access to 2 of the partner’s machines rather than all of them,
only part of the request is fulfilled by the change.
The Ticket Coverage icon shows how the change and the change requests
relate to each other.
Note: It is possible that several changes were made that, taken together,
implement the change request.
RECONCILING CHANGES
Automatic reconciliation
If the automatic matching options for change tracking are enabled (see Setting
up change review and reconciliation (on page 92)), matching between change
records with Pending status and Closed or Resolved tickets (that is, tickets
whose change requests were already made) is done automatically:
Manual reconciliation
a. Click .
Information about the change record is displayed at the top of the
Reconcile dialog box; all relevant change requests from Closed or
Resolved tickets whose most recent change is within the time frame
specified in Date Filter are listed at the bottom. The best matches are at
the top of the list and change requests that are matched with this change
are marked.
In this chapter
Overview of rule review and recertification ............................. 97
Reviewing a rule ................................................................. 98
Marking rules for review ...................................................... 99
Business attributes ............................................................ 100
Recertification ...................................................................101
Starting the recertification process manually ......................... 101
Automatic update of next review dates ................................. 102
Automatic ticket creation for rules needing review ................. 103
Reviewing a rule
The Rule Review table includes:
› Next Review Date: The next time that each rule needs to be reviewed. Sort
on this field to find items that have passed their review date.
Updating the next review date can be automated—you can create rules to
automatically provide new review dates (see page 102).
› Last Certified Date: When each rule was most recently certified. Rules with
no certified date were never certified in Skybox.
› A Recertification Status for each access rule, where you can track the ticket
progress, even if it is managed in Skybox Change Manager. Statuses include:
• None: This rule has never been through the recertification process
• In Progress: This rule has an open ticket and is waiting for recertification
• Rejected: This rule was a candidate for recertification, but was rejected
• Certified: This rule was recertified
Note: There can only be a single recertification process (that is, ticket)
open on an access rule at any time. However, you can request another
round of recertification on a rule that was rejected or certified.
When you select an access rule in the Rule Review table, you can view the
highlights of the rule’s compliance in the Highlights tab of the Details pane.
Click a link in the Compliance section of the highlights to display the details in
the Access Rule Properties dialog box. This dialog box provides the information
that you might need when reviewing the rule. For information about the fields of
an access rule, see the Access rule properties: Rule review section in the Skybox
Reference Guide.
The Business Attributes section displays the rule’s business attributes (see page
100) (if the information was added), including the owner, business function, and
next review date.
Notifications
You can create a trigger that sends notifications when changes are made to rules
marked as ‘For Review’.
Business attributes
Business attributes are business information about access rules that can be
stored with the access rule in the model. Business attribute information must be
added manually, but you can add the information to multiple rules. This
information is useful when reviewing the access rules for certification.
Note: Business attributes are accessible anywhere access rules are displayed in
Firewall Assurance.
Skybox includes the following business attributes for access rules:
› Owner
› Email
› Business Function
› Next Review Date
› Comment
› Ticket ID
Administrators can create additional (custom) business attributes for their
organization (on page 100).
› In a list of access rules, right-click the desired rule and select Set Business
Attributes.
Note: You can view attributes for multiple rules, but if the rules have
different values for any of the attributes, those values are not visible
when you view them together.
Note: If any rules have different values for any attribute, you cannot see
the values for that attribute. If any rules have a different Next Review
Date, you cannot change the review date value until you click X in this
field.
Recertification
Skybox Firewall Assurance supports a scalable process for rule recertification.
When you recertify rules:
You can initialize all firewalls with the same date, or use different dates for
specific firewalls and folders. You can initialize to the current date or to any
earlier date.
If the model includes vulnerability occurrences, these groups list protected and
detected signatures that are relevant to your organization, and there is a 3rd
group that shows enabled (protect or detect) signatures that are not relevant to
your organization.
The right-hand side of the pane shows coverage of new threats (Vulnerability
Definitions) by active signatures in the device. You can modify the time frame to
view and the CVSS threshold of the Vulnerability Definitions.
Clicking a link opens the relevant list of Vulnerability Definitions. For each
Vulnerability Definition, you can see information about the Vulnerability Definition
itself, the IPS status (Active Prevent, Active Detect, or Disabled) of the
signatures covering the Vulnerability Definition, and the signature or list of
signatures that cover it.
If the organizational model does not include vulnerability occurrences, the left-
hand side of the pane shows coverage of new threats (Vulnerability Definitions)
by active signatures in the device. You can modify the time frame to view and
the CVSS threshold of the Vulnerability Definitions.
Clicking a link opens the relevant list of Vulnerability Definitions. For each
Vulnerability Definition, you can see information about the Vulnerability Definition
itself, the IPS status (Active Prevent, Active Detect, or Disabled) of the
signatures covering the Vulnerability Definition, and the signature or list of
signatures that cover it.
Signature Coverage
The right-hand side of the pane displays:
Auditing firewalls on a
continuous basis
You can use task sequences to automate the audit process when the firewall
configuration is imported directly from the firewall (or management system) by
running the online collection tasks and the analysis on a regularly scheduled
basis to keep the information up-to-date.
You can also set up collection and analysis of recently changed firewalls.
In this chapter
Triggered collection and analysis ......................................... 108
Task sequences .................................................................109
Scheduling tasks and task sequences ................................... 112
Monitoring task results ....................................................... 114
Triggers ............................................................................ 114
› Change tracking
• See the full firewall change tracking events on a regular basis
• Authorize changes quickly using change reconciliation
› Policy compliance
• Have an up-to-date picture of your firewall compliance level
› For firewalls for which logs are collected, Skybox starts by collecting the logs
from the specified firewalls. In the next step, Skybox can check each firewall
to see if there are changes in the firewall log, and only collect configuration
data from firewalls with configuration changes (found in the logs). Afterwards,
the firewall analysis tasks (change tracking, policy compliance, and shadowed
and redundant rules) can be set to analyze only firewalls with recent changes.
This type of task sequence is much faster than running the tasks on all the
firewalls and can be run as often as needed.
› For nightly collection and analysis tasks, firewall management collection tasks
can be set to collect and analyze only new firewalls.
For additional information, see Creating triggered collection and analysis task
sequences (on page 110).
Task sequences
You can define task sequences, where each task in the sequence runs as soon as
a previous task ends. This is useful when you often want to run a set of tasks in
a specific order.
You can use separate task sequences for different purposes, different parts of the
system, and different frequencies.
A task sequence can include task groups. The tasks in a task group are run in
parallel.
For information about tasks, see the Tasks part of the Skybox Reference Guide.
Note: Before you create a task sequence, you must define the tasks to run in the
sequence.
b. In the Add Task dialog box, select a task to add to the sequence and click
OK.
A dependency is created so that this task runs after the previous task (in
the list) finishes.
c. To change either the triggering task or the exit codes of the triggering
task, click the task in the list and click .
Note: A single task can only be used once per task sequence. However,
you can use different tasks of the same type in a task sequence.
5 Click Next.
The Firewall Filters page enables you to change the firewall filter values of the
firewall collection or analysis tasks in your task sequence. If there are no
tasks of these types, all the parameters are disabled. If there are any tasks,
you can keep the original firewall filters for the tasks or change the set of
firewalls on which the tasks are to run (to recently changed firewalls or new
firewalls).
6 If your task sequence includes any firewall collection or analysis tasks, you
can modify the values.
7 Click Next.
8 Schedule the task sequence (see page 112) to run as often as necessary.
9 Click Finish.
Note: The original filters in the tasks are not changed. When the tasks are
run individually, Skybox uses the original filters.
14 Click Next.
15 In the Firewall Analysis page, select the analysis tasks to run as part of the
sequence.
16 Type a name for the group of firewall analysis tasks.
17 Click Add and select the desired tasks.
18 Define the exit codes for the firewall collection task group that cause the
firewall analysis task group to run.
19 Define the firewall filter for the analysis tasks.
20 Set the schedule for the task sequence.
21 Click Finish.
TASK GROUPS
You can group a set of tasks together so that you can run them as part of a task
sequence (see page 109).
When you create a task group, Skybox creates a separate folder for the group,
where you can view and edit the list of tasks in the group.
Note: You can only run a whole task group as part of a task sequence.
Otherwise, you must launch or schedule each task separately. When run as part
of a task sequence, the tasks in a task group run in parallel.
Note: If auto-launch is not enabled for a task, it does not run on its specified
schedules. However, it does run as part of a task sequence.
Task alerts
You can set up Skybox to send email alerts to specific users for failed tasks. You
can configure global settings and you can configure specific settings in the task
properties of a specific task. By default, tasks alerts are sent for each task that
runs. However, if you do not want task alerts sent for a specific task, you can
disable them in the task properties.
Triggers
Skybox Firewall Assurance supports sending email notifications when there are
specific changes to a firewall. A trigger is a rule that defines the changes for
which these alerts are created and sent. The email message includes information
about the changes. For example, when you run the Analyze Firewall Changes
task, Skybox checks whether there are any change tracking triggers and whether
any new changes match these rules.
For compliance violation notifications and ticket notifications, triggers can run a
script in addition to or instead of sending an email.
CREATING TRIGGERS
To create a trigger
1 Select Tools > Administrative Tools > Triggers.
2 In the Skybox Admin window, right-click Triggers and select New Trigger.
3 In the New Trigger dialog box, select the Trigger Type and fill in the fields
according to the relevant table in the Skybox Reference Guide:
• Firewall Access Compliance Violation
• Firewall Rule Compliance Violation
• Change Tracking
4 Click OK.
Advanced topics
This chapter describes advanced topics in Skybox Firewall Assurance.
In this chapter
Reports ............................................................................116
Searching for access rules................................................... 131
Other ways to import data offline ......................................... 134
Change tracking utility ....................................................... 134
Cisco configuration diffs ...................................................... 136
Addresses behind network interfaces .................................... 137
Multi-zone interfaces .......................................................... 140
Reports
Reports in Skybox are detailed accounts of specific data in the model (for
example, compliance violations or firewall changes). You can schedule report
generation and send reports to specified Skybox users.
You can generate reports for single firewalls from the Firewall Assurance
workspace, but you work with reports for multiple firewalls in the Reports
workspace.
The remainder of the report is per firewall. For each firewall, the report includes
a linked list of policy sections with their compliance, followed by a linked list of
violating access rules for each policy section, information about each Access
Check, and a list of Access Checks violated by that access rule.
You can include a list of the violations of access tests, a list of the access rules
defined on the firewall, and a list of exceptions relevant for the firewall.
› Manually (File > Export Table to CSV; see Exporting model data (on page
130))
› By using a CSV – Compliance Results Export task
The 2nd section is a feature summary that includes a table for each feature in
the report. Each row in a feature table displays information about a single
firewall.
The remainder of the report is divided by firewalls. For each firewall, the report
includes some of or all the following information, depending on the sections
selected in the report definition:
› Basic information about the firewall and overview information about the
selected features:
• Policy compliance overview: Access Compliance and Rule Compliance
• Configuration Compliance overview
• Optimization and Cleanup overview
• Change Tracking overview
from the main report. This prevents details reports from becoming
unreasonably large.
The remainder of the report is divided by firewalls. For each firewall, the report
includes a summary of the changes to access rules and objects followed by a list
of the changed access rules and changed objects with their main properties.
The remainder of the report is divided by firewalls. For each firewall, the report
lists all the changed access rules and all the changed objects; you can include
detailed information for each changed entity.
› Manually (File > Export Table to CSV; see Exporting model data (on page
130))
› By using a CSV – Change Tracking Export task
Terminology
You can schedule reports to run at specific times and be sent to designated
recipients (see the Working with reports section in the Skybox Reference Guide).
For additional information about defining NERC Compliance reports and the
sections that can be included in the reports, see the NERC Compliance reports
topic in the Skybox Reference Guide.
Some subsection tests cannot be automated; verify these with the help of the
appropriate members of your organization. For example, the testing procedure
for subsection 1.1.4 is “Verify that firewall and router configuration standards
include a description of groups, roles, and responsibilities for logical management
of network components.” Such tests cannot be modeled in Skybox.
› All the predefined CSV reports are available for all firewalls by right-clicking
All Firewalls, selecting Reports, and then selecting a specific report (for
example, Export to CSV – Change Tracking).
A Firewall Summary CSV report is available at this level.
› All the predefined CSV reports are available per firewall by right-clicking a
firewall, selecting Reports, and then selecting the specific report.
› Specific reports are available by right-clicking a node of the firewall (for
example, Rule Review or Optimization and Cleanup) and selecting the
relevant report.
These reports are saved to: <Skybox_Home>/data/temp.
Note: For Palo Alto, you can also search by whole or partial profile types,
profile names, or group names of security profiles.
Open the extended search (see page 131) by clicking on the search bar.
EXTENDED SEARCH
This section explains how to use the extended search for access rules.
Search by
You can search by access rule properties using an extended version of the quick
search or a more advanced search.
› Use the Quick Search option to do simpler searches. For example, search for
all access rules that contain a specific object name, IP address, or service
name. By default, the fields searched are Source, Destination, Service,
Description, Original Text, and Original Rule ID.
Skybox version 9.0.800 131
Skybox Firewall Assurance User Guide
For example, search for all access rules that have an object named Finance.
This is useful when you want to make changes to this object and need to
know what it affects.
Note: Search time can sometimes be improved by clearing fields that are
not relevant for your search.
› Use the Advanced Search to search for specific information in specific fields.
For example, search for all access rules whose source includes IP addresses
200.160.1.0-200.160.2.255 (partner network) and whose destination includes
IP addresses 192.170.33.0-192.170.33.255 (DMZ). This is useful when you
want to check the rules that support access from a partner network to your
DMZ.
Important: Because there are many ways of interpreting search strings (for
example, an integer could be interpreted as part of an IP address, a port
number, and so on), there are very specific search formats that you must use
when searching for IP address ranges, services, and object names (see Search
formats (on page 133)).
Search settings
You can change the scope of the search and the definition of how the values in
the searched access rules match the searched entities.
› Scope: You can change the scope of the search. Usually, the default scope is
the whole model; when you are working in All Firewalls, the default scope is
the selected entity.
› Match criteria:
• Entire field match: An access rule only matches the search entity if the
search entity and the value of the searched field match exactly. For
example, if the search value is 2.2.2.2-2.2.2.255, it would only match if
the field value is the same: 2.2.2.2-2.2.2.255.
• Specific field match: An access rule only matches the search entity if the
search entity exactly matches the value of an entity in the searched field.
For example, if the search value is 2.2.2.2-2.2.2.255, it would match
the field value 1.1.1.1, 2.2.2.2-2.2.2.255, 3.3.3.3 (among others);
it would not match a field with the value 2.2.2.0-2.2.2.255.
• Contained within: An access rule matches the search entity if the search
entity is contained within the value of the searched field. For example, if
the search value is 2.2.2.2-2.2.2.255, it would match a field with the
value 2.2.2.0-2.2.2.255.
• Intersection: An access rule matches the search entity if the searched field
includes any of the searched addresses or ports. For example, if the search
value is 1.0.0.6-1.0.0.11, it would match a field with the value
1.0.0.5-1.0.0.10.
› Ignore Rules with Any: Specifies whether Skybox does not search in rules
that have Any as the value of the searched fields.
SEARCH FORMATS
This section lists the formats that you can use for searching.
IP address structure
Service structure
› Protocol name
› Destination port or range of destination ports: The search runs on
<port>/TCP
› Destination port or port range/protocol name
Object name
› Structure
• Any text that does not match the IP structure or service structure
• IP structure or service structure surrounded by single or double quotation
marks
› Textual search
› Wildcards: Use the characters ? and * for standard pattern matching
Note: This tool requires familiarity with Import – Advanced tasks, because the
tool uses the same configuration format and directory structure. For information
about Import – Advanced tasks, see the Advanced file import tasks topic in the
Skybox Reference Guide.
Input directories
Before running the utility, copy the relevant configurations into 2 directories,
with the naming convention and directory structure used by Import –
Advanced tasks. The 1st directory contains the newer configuration (referred to
as the current configuration) and the other contains the baseline configuration.
For example, if you have a PIX firewall, each directory (current and baseline)
must contain run.txt and, optionally, route.txt.
Changes are created in Skybox by comparing the current configuration to the
baseline.
Syntax
change_tracking (-host_id <id> | -host_name <name>) –format <format>
–current <dir> <date> [<rulebase>] –baseline <dir date
[rulebase]>
The Skybox change tracking utility arguments are described in the following
table.
Argument Description Required
host_id The ID (in Skybox) of the firewall on You must specify
which to create changes either host_id or
host_name.
host_name The name of the firewall on which to You must specify
create changes either
host_name or
host_id.
format The format of the configuration files Yes
(see the Data formats for file import
tasks topic in the Skybox Reference
Guide)
current The details of the current Yes
configuration, including the following
arguments:
• dir: The directory path
• date: The configuration timestamp
(yyMMddHHmmss)
• rulebase (optional): For
FW1_CONF format, the name of
the rulebase
baseline The details of the baseline Yes
configuration, including the following
arguments:
• dir: The directory path
• date: The configuration timestamp
(yyMMddHHmmss)
• rulebase (optional): For FW1_CONF
format, the name of the rulebase
Example
The following string creates changes for the firewall main_FW by comparing the
FW1 configuration in \temp\current to that in \temp\baseline. The current
configuration is from 9 Aug 2013 and the baseline is from 8 Aug 2013. Both
configurations use the Standard rulebase.
TROUBLESHOOTING
Problems that might occur when using the change tracking utility are listed in the
following table, together with suggested solutions.
Problem Possible cause Solution
Parsing Error The directories do not Try to import each directory
contain the expected files or using an Import –
the file themselves cannot Advanced task. The task
be parsed. error messages explain
what went wrong.
The asset cannot The configuration files were Check the spelling of the
be determined parsed successfully but they asset name in Skybox and
contain more than 1 asset. the name in the
However, they do not configuration file. Rename
contain an asset with a the asset or use the asset
name that is in Skybox or ID instead of the asset
there is more than 1 asset in name.
Skybox that matches the
name.
Note: Running the utility might add duplicate values to the change tables.
› In the relevant collection task, select Collect Startup Configuration (in the
Advanced tab).
Every time that the task runs, both the running configuration and the startup
configuration are imported.
› In the firewall summary page, by clicking the Cisco Configuration Diffs link
at the top of the page.
› On the Firewalls tab of the All Firewalls node, by displaying the Cisco
Configuration Diffs column. Devices that have diffs have a link in this
column.
› By right-clicking the device in the tree and selecting Compare > Compare
Running Configuration to Startup.
Clicking a link opens a comparison of the 2 files in WinMerge, with the
differences highlighted.
fields are Locked ( ) and their values are not updated by the file import.
Multi-zone interfaces
In most firewalls, each network interface maps to a specific zone. For example, 1
interface connects to the DMZ network, 1 to an internal network, and 1 to a
partner network. Skybox can then check access between 2 different zones by
checking the access between the corresponding network interfaces. However, in
some firewalls a single network interface has multiple zones behind it. For
example, 1 interface connects directly to a specific zone, but another interface
connects to a core network that has other networks behind it. Access must be
checked between a zone (on one network interface) and other zones that are all
behind a different network interface.
In Skybox, network interfaces with multiple zones behind them are multi-zone
interfaces, and they must be explicitly configured for compliance and access
analysis to work correctly.
Multi-zone interfaces are disabled by default. To enable these interfaces, set
enable_policy_section_zone_to_addresses to true in
<Skybox_Home>\server\conf\sb_server.properties.
You check this access by creating a zone named Core and then defining the
Access Policy to check from 1 network interface to the desired IP addresses
behind the core (rather than to all the addresses behind the core). In this case,
the Access Policy might include the following sections:
This enables Skybox to use the exact source or destination when analyzing
compliance, and not the entire zone.
For example, if you created a test from Internet to Core but limited the
destination to internal IP addresses according to the customized policy
sections, then compliance is analyzed between the Internet zone and the
Internal IP addresses behind the Core zone.
4 Assign network interfaces to the new zones: Right-click the firewall Policy
Compliance node and select Manage Access Policy.
After you finish this setup, access is analyzed over regular network interfaces
and multi-zone interfaces.