3.3 Ensure firewall policy denying all traffic to/from Tor, malicious server, or scanner IP addresses using ISDB

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Firewall policies should include a deny rule for traffic going to/from Tor, malicious server, or scanner IP addresses using ISDB (Internet Service Database).

Rationale:

FortiGate includes Tor or malicious server related IP address using ISDB. The idea is to filter out malicious traffic using firewall policies as first level filtering. This is done without involving more resource intensive processes such as IPS inspection, hence optimizing FortiGate's performance.

Solution

Review firewall policies and ensure there are:

A firewall policy created to block inbound connections with these settings:

From: Any
To: Any
Source: 'Tor-Exit.Node', 'Tor-Relay.Node', 'Censys-Scanner', 'Shodan-Scanner', and 'Malicious-Malicious.Server'
Destination: all
Schedule: Always
Services: All
Action: Deny
Log Violation Traffic: Enabled
Enable this policy: Enabled



A firewall policy created to block outbound connections with these settings:

From: Any
To: Any
Source: All
Destination: 'Tor-Relay.Node' and 'Malicious-Malicious.Server'
Schedule: Always
Action: Deny
Log Violation Traffic: Enabled
Enable this policy: Enabled

See Also

https://workbench.cisecurity.org/benchmarks/12961