You will always see constant scanning, its inevitable.  All those automated 
scanners out there now its going to happen.

Depending on how you have your firewall setup it really depends on what 
services you have running behind that firewall.   Once you open up that layer 
to be exposed, another attack vector is exposed. Are you mitigating those 
risks, or simply looking at the hardware supposedly preventing people from 
scanning your network?  Once the "information gathering" is done then its on to 
what's exposed through your firewall.

You also need to look into OS layer security once the traffic is passed through 
the firewall.  You can't rely on just one layer at the gateway/fw to protect 
your whole network.  Look into locking down different services, look up best 
security practices for them.  You definitely should start reading up on web 
application security (if your network is configured this way)

Also as far as pf goes, look into creating synproxy state rules for your 
firewall and whatever services/ports you allow through. You wouldn't want to 
leave these rules enabled by default, but when your under, say, a DDoS attack 
they come in handy.  Look into pf rate limiting, monitor how many connections 
you receive on an hour basis and setup your firewall rules to "rate limit" 
these connections to different services on your LAN. (This also helps in DoS 
situations) this is all assuming your running web, mail, DNS etc.  Tailor it to 
your needs. 

(I know this is an OpenBSD list) but I have a few Linux boxes I run OSSEC on 
and it works great for the hack attempts ONCE the traffic has passed through 
the firewall.  It uses active response features and rule sets to create 
iptables and host deny rules to block the offender.  If a common web attack is 
detected, like a SQLi attempt that ip's traffic is dropped (for as long as I've 
got the active response features set to block them).  Hence, this is ALL after 
traffic has been allowed through your firewall.  I think you get my point.

Bottom line is,  there is no sure fire way to just "prevent" it unless you do 
your research and learning.  Do a minor penetration test on your network so you 
can see what kind of information your system(s) is throwing out and start from 
there. 

Best of luck and don't hesitate to ask questions.
--
Michael D. Wood
www.itsecuritypros.org

Daniel Bertrand <danieljamesbertr...@me.com> wrote:

>Hello,
>
>Thanks for providing such great software. It really is much appreciated.
>
>I was wondering what your stance is about the constant hack attempts on 
>machines on our ISP networks..
>
>I see CONSTANT scanning for ports from all over the world, mostly from Italy, 
>Russia, and China.
>
>Every firewall/router product that I have purchased has been compromised so 
>far.
>
>Is there really a secure, trustworthy adaptive filtering firewall 
>configuration for each OS configuration out there?
>
>
>Most people who are on the net are completely oblivious and helpless when it 
>comes to this constant trolling for access, they have no idea what to do to 
>secure their machines.
>
>
>Shaw has neglected me and left me for dead when I ask for better control and 
>protection from malicious attackers.
>
>
>What do I do to make sure I don't spend money on new hardware but get a PF 
>configuration that I can trust besides "block in all"?
>
>Are there published rulesets for Mac/Windows etc. that we can just drop into 
>our pf.conf and /etc/pf.anchors/ directory?
>
>Regards,
>
>Dan
>

Reply via email to