Sample
Sample
1. Firewall Assessment
o List all firewall devices and document hardware models, OS versions (e.g.,
FortiGate, Cisco ASA, Palo Alto, etc.).
o Ensure all devices are running the latest stable firmware versions.
o NAT (Network Address Translation): Review static and dynamic NAT rules to
ensure proper exposure of internal services.
o VPN (Virtual Private Network): Verify encryption standards (e.g., IPsec, SSL)
and review the configuration of site-to-site and remote-access VPNs.
o Assess firewall integration with IPS/IDS features. Ensure that it actively blocks
malicious traffic based on up-to-date threat signatures.
o If application control is enabled, confirm it’s blocking risky or unapproved
applications.
o Review advanced security features like Web Filtering, DLP (Data Loss
Prevention), AV scanning, and sandboxing.
o Check that traffic inspection (SSL/TLS) is configured for encrypted traffic.
Hardening
2. Router Assessment
Routing Protocols and Configuration
o Verify the use of dynamic routing protocols (e.g., BGP, OSPF, EIGRP) and
review configuration for misconfigurations, loops, or inconsistencies.
o Confirm the implementation of authentication for routing protocol neighbors (e.g.,
MD5 authentication for BGP).
Access Control
o ACLs (Access Control Lists): Review ACLs for each interface to ensure only
permitted traffic is allowed.
o Routing Security: Ensure filtering (inbound/outbound) is set for external BGP
announcements to avoid route leaks or hijacks.
Network Redundancy