Originally posted by indy007
It was here before I got here. Also, my annual IT security budget is $0.00. I work with what I've got, which unfortunately is uh... not much.
Yeah I feel for ya. Why is it management never see the need until the network is falling down around their ears.
We run a test lab with a Netscreen 5GT in our office, and my counterpart in another office does the same with the Sonicwalls (we distribute both products among other things in NZ).
We have two demonstrations:
1) we have several "honeypots", email, ftp, http servers. These attract daily interest from hackers. All sorts of attacks come in. All we have to do is show them the logs and thats enough to scare most people into realizing their security is inadequate. Sometimes you see wierd attacks like this:
2004-11-30 16:51:06 emer optatck_6_IMAP_err has been detected from 202.73.198.140/50819 to 192.168.1.2/143 through policy 4 1 times.
2) we then demonstrate some basic web browsing with a McAfee protected PC through the firewalls with Deep Inspection/IDP turned off for that PC. McAfee usually pops up some spyware malware. We then repeat the sites we visit with Deep Inspection/IDP turned on, and of course McAfee stays silent, and the firewall logs show stuff like this:
2004-11-30 17:09:47 info HTTP:TUNNEL:CHAT-MSN-IM has been detected from 192.168.10.2/14473 to 65.54.213.62/80 through policy 15 1 times.
2004-11-30 17:08:04 error DB:MS-SQL:SQLXML-ISAPI-OF has been detected from 192.168.10.2/14408 to 207.97.253.208/80 through policy 15 1 times.
2004-11-30 16:35:19 info HTTP:SQL:INJECTION:GENERIC has been detected from 192.168.10.2/14194 to 65.59.207.13/80 through policy 15 1 times.
2004-11-30 16:10:46 warn HTTP:REQERR:REQ-MALFORMED-URL has been detected from 192.168.10.2/13731 to 66.28.224.242/80 through policy 15 1 times.
2004-11-30 15:54:09 info HTTP:SQL:INJECTION:GENERIC has been detected from 192.168.10.2/13619 to 207.246.136.196/80 through policy 15 1 times.
Now your Cisco PIX is letting that garbage straight through.
After that most people realize their Cisco, Linux, Checkpoint, or brand X firewall is not enough

. Just talking about it doesn't seem to acheive much, whereas showing someone the benefits on a live system does. One customer recent customer replaced an old Watchguard with a Sonicwall 4060, first 2 days they had over 4000 attacks detected that previously had been going straight through that watchguard.