<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6523076351819585849</atom:id><lastBuildDate>Wed, 06 Nov 2024 02:43:08 +0000</lastBuildDate><title>HyperGressive Technologies</title><description>A security weblog, strategies, tips and tricks</description><link>http://hypergressive.blogspot.com/</link><managingEditor>noreply@blogger.com (T. Cole)</managingEditor><generator>Blogger</generator><openSearch:totalResults>4</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6523076351819585849.post-5279697132657023017</guid><pubDate>Tue, 31 Mar 2009 19:29:00 +0000</pubDate><atom:updated>2009-03-31T15:52:17.182-04:00</atom:updated><title>Dual ISP Load Balancing Configuration</title><description>Security involves authentication, authorization, confidentiality, data integrity and availability. This document involves network availability. In this example we explore a high availability, load balancing solution for Internet redundancy. Although the example here is for dual Internet service providers the principles of this configuration could be applied in other situations where dual gateways are needed.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn78iBh8-In9cX06Lwfo7vyVSib6maHX_5gbh2xGLOVRksHOo3oXnmyNTWeOkKCMTdj6NGqPGtmhwfZeRzxaPb5JpIU-97oZfQIXZAV-ahHq9eFpY7m7DItPedMoR5T2DHz1JwTioiQb8/s1600-h/DualISPs.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5319436646490429362&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 97px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn78iBh8-In9cX06Lwfo7vyVSib6maHX_5gbh2xGLOVRksHOo3oXnmyNTWeOkKCMTdj6NGqPGtmhwfZeRzxaPb5JpIU-97oZfQIXZAV-ahHq9eFpY7m7DItPedMoR5T2DHz1JwTioiQb8/s400/DualISPs.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;In a topology where dual ISP’s customer premise equipment provides an Ethernet port for connection to their service, configuring two static routes with or without metric won’t have the desired effect. Since your equipment connects to an Ethernet port, that connection will always appear to be up as long as you have a link light indicating layer one connectivity. Ethernet ports won’t lose the carrier signal typical with a serial connection so your data path will never fail over to the other configured static route.&lt;br /&gt;&lt;br /&gt;In Cisco IOS versions 12.3T and 12.4 mainline object tracking features have been greatly improved and can now be applied to monitor the up/down status of interfaces. The solution contemplated in this article monitors ISP reachability by pinging a host on each of the ISPs networks that is only reachable through that ISPs interface. The ability to ping a host in the core of the ISPs network as opposed to pinging the ISPs gateway provides a means of monitoring that ISPs network health and not just the status of your local connection. The configuration presented here requires a Cisco IOS version of 12.3T or above.&lt;br /&gt;&lt;br /&gt;In my own research I found many examples of solutions to this problem. Many of them I dismissed immediately because they were just plain flawed, others were not flexible or provided only failover capabilities without load balancing or were not compatible with the way I needed to provide address translation services. If you prefer just failover without load balancing add a metric to tracked default route for your backup ISP in the configuration below like this “ip route 0.0.0.0 0.0.0.0 10.10.10.1 200 track 123”.&lt;br /&gt;&lt;br /&gt;The following configuration is in part the work of Josh Horton at blindhog,net and the original configuration can be seen here, &lt;span style=&quot;color:#000099;&quot;&gt;&lt;em&gt;http://www.blindhog.net/cisco-dual-internet-connections-without-bgp/&lt;/em&gt;&lt;/span&gt;. I’ve am making a similar configuration available here due the difficulty of finding this information on the Internet.&lt;br /&gt;&lt;br /&gt;I have made some enhancements and at the expense of failover have provided a way to force certain traffic out a particular interface. I’ve also added a host specific route to the ping monitored host on each network. This assures that the host will be reachable when the router is powered up or service is reestablished and forces the ICMP ping packet out the interface we want to monitor. A host specific route also assures that the monitored host is only reachable through it’s network gateway.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;version 12.4&lt;br /&gt;!&lt;br /&gt;hostname Router_Name&lt;br /&gt;!&lt;br /&gt;ip cef&lt;br /&gt;!&lt;br /&gt;!#### Establish sla monitors for use in tracking objects. These objects ####!&lt;br /&gt;!#### are used to track reachability of a host on each ISPs network ####!&lt;br /&gt;!&lt;br /&gt;ip sla monitor 1&lt;br /&gt;type echo protocol ipIcmpEcho 10.10.10.10&lt;br /&gt;ip sla monitor schedule 1 life forever start-time now&lt;br /&gt;ip sla monitor 2&lt;br /&gt;type echo protocol ipIcmpEcho 10.20.20.10&lt;br /&gt;ip sla monitor schedule 2 life forever start-time now&lt;br /&gt;!&lt;br /&gt;!#### Configure Tracking objects (referencing IP SLA monitor’s above) ####!&lt;br /&gt;!&lt;br /&gt;track 123 rtr 1 reachability&lt;br /&gt;delay down 5 up 5&lt;br /&gt;!&lt;br /&gt;track 124 rtr 2 reachability&lt;br /&gt;delay down 5 up 5&lt;br /&gt;!&lt;br /&gt;!#### Configure Interfaces for NAT, &#39;ip nat inside&#39; and &#39;ip nat outside &#39;####!&lt;br /&gt;!&lt;br /&gt;interface GigabitEthernet0/1&lt;br /&gt;description Connect to firewall outside interface or inside networks&lt;br /&gt;ip address 192.168.1.1 255.255.255.0&lt;br /&gt;ip nat inside&lt;br /&gt;!&lt;br /&gt;interface GigabitEthernet0/2&lt;br /&gt;description ISP1 Internet Interface&lt;br /&gt;ip address 10.10.10.2 255.255.255.252&lt;br /&gt;ip nat outside&lt;br /&gt;!&lt;br /&gt;interface GigabitEthernet0/3&lt;br /&gt;description ISP2 Internet Interface&lt;br /&gt;ip address 10.20.20.2 255.255.255.252&lt;br /&gt;ip nat outside&lt;br /&gt;!&lt;br /&gt;!#### Configure gateway of last resort with tracking objects ####!&lt;br /&gt;!&lt;br /&gt;ip route 0.0.0.0 0.0.0.0 10.10.10.1 track 123&lt;br /&gt;ip route 0.0.0.0 0.0.0.0 10.20.20.1 track 124&lt;br /&gt;&lt;br /&gt;!#### Configure host specific routes for sla monitors. Without ####!&lt;br /&gt;!#### these, tracking objects cannot recover after full failure. note ####!&lt;br /&gt;!#### the ‘permanent’ keyword installed the route into the RIB ####!&lt;br /&gt;!#### regardless of reachability ####!&lt;br /&gt;!&lt;br /&gt;ip route 10.10.10.10 255.255.255.255 10.10.10.1 permanent&lt;br /&gt;ip route 10.20.20.10 255.255.255.255 10.20.20.1 permanent&lt;br /&gt;!&lt;br /&gt;!#### Configure additional routes for inside subnets not directly connected ####!&lt;br /&gt;!&lt;br /&gt;ip route [inside subnet / mask] GigabitEthernet0/1&lt;br /&gt;ip route [inside subnet / mask] GigabitEthernet0/1&lt;br /&gt;!&lt;br /&gt;!#### Outbound dynamic NAT for each interface &lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;with overload parameter ####!&lt;br /&gt;!&lt;br /&gt;ip nat inside source route-map ISP1_MAP interface GigabitEthernet0/2 overload&lt;br /&gt;ip nat inside source route-map ISP2_MAP interface GigabitEthernet0/3 overload&lt;br /&gt;!&lt;br /&gt;!#### Additional static NAT for dedicated one to one NAT addresses and /or ####!&lt;br /&gt;!#### tcp/udp port translations. Note first two statements translate SMTP (25) ####!&lt;br /&gt;!&lt;br /&gt;ip nat inside source static tcp 192.168.1.5 25 10.10.10.5 25 route-map ISP1_MAP extendable&lt;br /&gt;ip nat inside source static tcp 192.168.1.5 25 10.20.20..5 25 route-map ISP1_MAP extendable&lt;br /&gt;ip nat inside source static 192.168.226.5 71.151.39.129 route-map ISP2_MAP extendable&lt;br /&gt;ip nat inside source static 192.168.226.6 71.151.39.130 route-map ISP2_MAP extendable&lt;br /&gt;!&lt;br /&gt;!####Configure a single ACL or an ACL for each interface if####!&lt;br /&gt;!####needed to direct specific traffic to a specific interface####!&lt;br /&gt;!####Both ACLs have the same permit statement but other####!&lt;br /&gt;!####permit or deny statements can be added as required####!&lt;br /&gt;!&lt;br /&gt;ip access-list extended ISP1_ACL&lt;br /&gt;remark ACL for ISP1 interface - permit or deny specific traffic on this interface / ISP&lt;br /&gt;permit ip 192.168.226.0 0.0.0.255 any&lt;br /&gt;!&lt;br /&gt;ip access-list extended ISP2_ACL&lt;br /&gt;remark ACL for Comacst interface - permit or deny specific traffic on this interface / ISP&lt;br /&gt;permit ip 192.168.226.0 0.0.0.255 any&lt;br /&gt;!&lt;br /&gt;!####Configure route maps for reference in NAT statements####!&lt;br /&gt;!####These route-maps direct NATs to appropriate interface####!&lt;br /&gt;!&lt;br /&gt;route-map ISP1_MAP permit 10&lt;br /&gt;description associates outside NAT addresses with the correct interface&lt;br /&gt;match ip address ISP1_ACL&lt;br /&gt;match interface GigabitEthernet0/2&lt;br /&gt;!&lt;br /&gt;route-map ISP2_MAP permit 10&lt;br /&gt;description associates outside NAT addresses with the correct interface&lt;br /&gt;match ip address ISP2_ACL&lt;br /&gt;match interface GigabitEthernet0/3&lt;br /&gt;!&lt;br /&gt;banner motd ^C&lt;br /&gt;********************************************&lt;br /&gt;&lt;br /&gt;SECURITY NOTICE&lt;br /&gt;&lt;br /&gt;********************************************&lt;br /&gt;This is a private secured computer system.&lt;br /&gt;It is for authorized use only.&lt;br /&gt;Users (authorized or unauthorized) have no&lt;br /&gt;explicit or implicit expectation of privacy.&lt;br /&gt;Any or all uses of this system and all&lt;br /&gt;files on this system may be intercepted,&lt;br /&gt;monitored, recorded, copied, audited,&lt;br /&gt;inspected, and disclosed to authorized&lt;br /&gt;site, law enforcement personnel, as well&lt;br /&gt;as authorized officials of other agencies,&lt;br /&gt;both domestic and foreign. By using this&lt;br /&gt;system, the user consents to such&lt;br /&gt;interception, monitoring, recording,&lt;br /&gt;copying, auditing, inspection, and&lt;br /&gt;disclosure at the discretion of site&lt;br /&gt;personnel. All activity is logged&lt;br /&gt;with your host name and IP address.&lt;br /&gt;Unauthorized or improper use of this&lt;br /&gt;system may result in civil and criminal&lt;br /&gt;penalties. By continuing to use this&lt;br /&gt;system you indicate your awareness of and&lt;br /&gt;consent to these terms and conditions of&lt;br /&gt;use. LOG OFF IMMEDIATELY if you do not&lt;br /&gt;agree to the conditions stated in this&lt;br /&gt;warning.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;********************************************&lt;br /&gt;^C&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;[HyperGressive Technologies Weblog]&lt;/div&gt;</description><link>http://hypergressive.blogspot.com/2009/03/dual-isp-load-balancing-configuration.html</link><author>noreply@blogger.com (T. Cole)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn78iBh8-In9cX06Lwfo7vyVSib6maHX_5gbh2xGLOVRksHOo3oXnmyNTWeOkKCMTdj6NGqPGtmhwfZeRzxaPb5JpIU-97oZfQIXZAV-ahHq9eFpY7m7DItPedMoR5T2DHz1JwTioiQb8/s72-c/DualISPs.gif" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6523076351819585849.post-1651479637129694997</guid><pubDate>Mon, 16 Mar 2009 22:45:00 +0000</pubDate><atom:updated>2009-03-16T19:17:44.312-04:00</atom:updated><title>Identification, Naming Conventions and Color Coding</title><description>&lt;span style=&quot;font-family:arial;&quot;&gt;Or a Rose by any other name is hard to correctly identify&lt;br /&gt;&lt;br /&gt;Technology is simple. Here’s a summary...&lt;br /&gt;&lt;br /&gt;Scrape the tape,&lt;br /&gt;Pop the top,&lt;br /&gt;Twitch the switch,&lt;br /&gt;Put what you got in the slot,&lt;br /&gt;Load the code…&lt;br /&gt;&lt;br /&gt;Well, Not exactly. There is a little more to it than that if you do it right.&lt;br /&gt;&lt;br /&gt;Let’s start at the very beginning because that is the very first opportunity we have to make mistakes.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;A naming convention, labeling practices, color coding and use of a change log and auditing methodology can help you stay organized, improve problem resolution times and minimize mistakes with security consequences.&lt;br /&gt;&lt;br /&gt;Here’s how easily thing can get out control. I had been working with a client that has maintained two unconnected networks for internal production and Internet connectivity. The reasoning was straight forward and simple. If you’re not connected you can’t be compromised. I’ve been telling them for years that they would be more secure connected where hosts could stay patched and network access could be controlled, logged and audited. My time has finally come and I am replacing firewalls, reconfiguring the topology and adding redundant ISP services in preparation for the collapse of these networks into a single topology. During the process of testing the load balancing ISP NAT configuration I was very surprised to see inside addresses from the production network being translated on the outside of my new Internet firewall cluster. Remember these are totally isolated networks, or so they thought. Obviously things are not always as they seem. It would seem that similar switches in a common rack in a common wiring closet and same color patch cables have resulted in an inadvertent connection between the two systems. The production network gateway and DNS servers are logically isolated from the outside and provide no Internet resolution so the client was completely unaware of a potential security fiasco.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Practical Advice:&lt;/strong&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;Label the cable, pathways and spaces.&lt;br /&gt;Adopt a labeling and color coding standard such as the ANSI/TIA/EIA 606-A Administrative Standard and make your contractor, consultants and peers to use it religiously. You don’t have to adopt this standard verbatim but its principles should apply. Know where your horizontal cabling, backbone cables, grounding and bonding systems and telecommunication outlets terminate. Use a labeling convention that identifies the floor, closet, rack, panel and port for instance at each data outlet.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;Example:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;strong&gt;0047-1A-1A45&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;em&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;UTP cable originates in Building 047, Telecommunications Room 1A.in Rack #1, Patch Panel A, Port 45.&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;Manage your pathways, spaces and racks. This effort pays big dividends in reduced administration and improved problem resolution times down the road. Your cabling contractor should be very familiar with this standard and its principles.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Network Electronics, Routers and Switches:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;Physically and logically label all devices with a naming convention that identifies it’s purpose or use and configure electronic port or interface labels to identify mission critical equipment connections.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;Example of a Cisco configuration:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;em&gt;hostname CC50_InterValve&lt;/em&gt;&lt;br /&gt;!&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;em&gt;interface GigabitEthernet0/2&lt;br /&gt;description Embark Internet Interface&lt;br /&gt;&lt;/em&gt;!&lt;br /&gt;&lt;em&gt;interface serial0/2&lt;/em&gt;&lt;br /&gt;&lt;em&gt;description Crosstown Complex, circuit ID # FL-0000-2236472-XX&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;An exception to the descriptive electronic name would apply in the case of edge devices or those with publically routable addresses. Although “security by obscurity” ranks really low in terms of effective security strategies, Internet routers and firewalls and wireless devices, shouldn’t be named “bastion_host” or “super_secret_FW” or indicate the company name or specific location. These names imply a purpose and a challenge to the wrong people and may open the consultant to liability issues. Names like “SWI_Valve1” or “Gate_SB50” are far less interesting to an attacker.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Network Host Devices:&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Here you can be a little less descriptive in the machine name opting for important but never changing information like the manufacturer, serial number or asset tag and acquisition date i.e “Dell_34672_07”. This naming convention does little help you locate the machine but PC and printers may move from person to person or be redeployed or repurposed into another department or division. Make use of the “Computer Description” field on the Windows Computer Name tab of the computer properties or similar “Comment” fields for other equipment. These fields can be easily changed when machines are moved, redeployed or repurposed and show up in the detail view of the network browser.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;Name.......................Computer Description&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;HP_34672_07 ..........Bldg J, HR, Rm 102. Jackie M., ext 5427&lt;br /&gt;Dell_222476_08 .......Bldg C, Lobby, Public Kiosk #1&lt;br /&gt;&lt;br /&gt;Printers show up in the network browser the same way so they can be named similarly. In the installed printer applet in on individual Windows PCs, printers are named for their device driver by default but can be changed if necessary to a descriptive name for the end user like this.&lt;br /&gt;&lt;br /&gt;Research_HP_LaserJet_4050N&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Network Management: &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;There are an abundance of network management tools for every conceivable need imaginable. Some are free and some are commercial applications. Some are single purpose and some are feature rich but inevitably you will need the capability to perform an administrative task that is not supported by whatever you have. One of the best and most effective management tools for a large network deployment is an administrator with scripting skills. VBScript, KixTart, Windows script, AutoIT and numerous other languages are relatively simple to learn and offer the ability to rename, add comments, change or add device drivers, perform inventory etcetera.&lt;br /&gt;&lt;br /&gt;ANSI/TIA/EIA 606-A Implementation Example-&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://net-services.ufl.edu/infrastructure/labelstandardhorizontal.htm&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;http://net-services.ufl.edu/infrastructure/labelstandardhorizontal.htm&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;ANSI/TIA/EIA 606-A Standard quick reference- this is an expansive standard. Here is a summary.&lt;br /&gt;&lt;a href=&quot;http://74.125.47.132/search?q=cache:bzuzMHx14kwJ:www.flexcomm.com/library/606aguide.pdf+ansi/tia/eia+606a&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us&quot;&gt;http://74.125.47.132/search?q=cache:bzuzMHx14kwJ:www.flexcomm.com/library/606aguide.pdf+ansi/tia/eia+606a&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;KixTart Scripting Language-&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://www.kixtart.org/&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;http://www.kixtart.org&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;[HyperGressive Technologies Weblog]&lt;/div&gt;</description><link>http://hypergressive.blogspot.com/2009/03/identification-naming-conventions-and.html</link><author>noreply@blogger.com (T. Cole)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6523076351819585849.post-8248355039206741451</guid><pubDate>Tue, 24 Feb 2009 16:32:00 +0000</pubDate><atom:updated>2009-02-24T12:08:50.618-05:00</atom:updated><title>Email Security Policy</title><description>&lt;div&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Email security is a very broad and in-depth subject. I won&#39;t attempt to cover every aspect here but rather provide a basic understanding of the issues and some practical solutions.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Why should we care-&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Email systems, their protocols, transport mechanisms and even even the carbon based life forms that are the end target of such systems are ripe and furtile attack vectors for hackers, spammers and phishing attacks. In addition they are a major source of information disclosure and breaches of confidentiality.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Any email security policy must thought of in bidirection terms. Inbound email can contain viruses, executable code such as .exe files or macros, automatic HTML links and mailto links . Marketing companies will routinely send email with graphics that are fetched from an marketing server allowing them to confirm the validity of a email address and possible sending other valuable marketing information such as the contents of email address books and cookies. Email may request that a recipient perform or complete a action that could compromise your network. Outbound email can propagate viruses and worms, propogate or originate SPAM, contain profanity, pornography or abusive language exposing the company or agency to legal liabilities. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Courts have repeatedly upheld that employers must provide a safe work environment free of abuse and harassment. Employees have sued and won over reciept of abusive or pornagraphic email or accidental disclosure of private information. Another company could also sue you for loss of productivity, loss of reputation, mitigation and repair costs associated with malicious or damaging email originating from your domain.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;What can be done-&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Develop and enforce an email policy within your organization. That simple step will provide evidence of you attempting to control dangerous, malicious and abusive content. That alone could mitigate some of the legal liablitiy and damage awards as a result of a legal action. A written policy and evidence of enforcement is key here.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Install and maintain effective anit-virus and anti-spam solutions. Inspect outbound mail for companie secrets, customer lists, credit card numbers, drivers license numbers, social security numbers etcetera to prevent disclosure of sensitive or confidential information.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Stategies-&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Don&#39;t include plain text lists of email addresses on your website. Addresses in the form of &lt;/span&gt;&lt;a href=&quot;mailto:&quot;&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&#39;username@domainname.ext&#39;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt; can easialy be read by web spiders or &#39;bots&#39; harvesting email addresses for use in unsolicited email campaiges. Use a script to build those addresses dynamically for display in an HTML page. If they can&#39;t harvest them they can use them.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Install an email policy device or engine configured to inspect all parts of an email inbound and outbound for threats such as viruses, worms, executables, attachments not complying with corporate policy, confidential information such as D/L, social security numbers, customer lists and other confidential information. The goal is to keep threats to your network out, confidential information in and enforce a corporate or agency policy.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Any such device should recursively disassemble an email in all it&#39;s parts and attachments and inspect each component. Multi level hueristic and lexical analysis against managed expression lists, realtime block lists and managed spam fingerprint or digital DNA lists should be performed. The device should have configurable actions for every policy. Reject RBL addresses and known spammer addresses, cure or delete virus and worms and quarantine executables, ebay emails and multimedia files according to policy. For ease of management the device or appliance should integrate with Active Directory or other LDAP directory to validate recipient addresses.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Validation of the sender domain is a valuable anti-spam strategy since spammer rarely use a valid domain to originate emails however, in my experience many email systems are not properly configured and reverse DNS lookup produce no results thereby blocking what might be valid email. To make matters worse, if you try to advise a sender that their sender domain cannot be validated, their email administrator will frequently advise you that it is your problem and that they don&#39;t have problems with other companies. Until email and security administrators understand RFC compliance and do their part in the overall scheme of email security you will be left with dealing with their mess and they will expose themselves to legal liability issues. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;br /&gt;In short, ant-virus and anti-malware is not enough to prevent inbound threats and does nothing to mitigate liability issues.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Anecdotal story-&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Recently, I installed and configured and tested a high end clustered email policy solution for a governmental agency. Shortly after the installation the helpdesk received a report of email being denied by the new appliance and the report was relayed to me. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;I placed a call to the sender since the appliance logs had absolutely no mention of the rejected message. The sender&#39;s email administrator told me that the non delivery receipt (NDR) reported that the email had a spam signature. &quot;That explains the lack of log file info as the system was configured to summarily reject spam&quot;, I explained to the admin. He advised me that the originator was a high profile public official, not a spammer; sending email to another high profile public official and that the email was in no way spam. They received the email through their ant-spam device and the sender didn&#39;t consider it spam. He wanted the recipient to have the infomation. The admin asked me to whitelist the sender.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;I temporarily adjusted my policy to quarantine known spam instead of rejecting it and requested that the message be resent. About an hour later the message was quarantined in my system where I could take a look at it to see haw I needed to adjust my policy. Upon inspection I found a blatent email spam from a bookstore advertising a &quot;143 page manual&quot; with web links, a chapter summary, author&#39;s bio and a printable order form complete with instructions for purchasing by credit card.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;This spam email had been propagated by the sender with a simple &quot;FYI&quot; added at the top. Seems that the appliance and my policy did what it was supposed to do! I put my &quot;reject&quot; policy back in place.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;If the sender had sent a short comment with a web link or just cut and paste a summary from the original spam, it would have gone through or at worst been quarantined so an admin could review it and release as appropropriate. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;There are several points to take from this story. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;1. All anti-spam engines are not equal. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;2. Spam is spam no matter who sends it. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;3. One persons treasure is another&#39;s spam.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;4. Policies need to be flexible.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOIpkYttlD5LgFILblG8orHxUcW5f1Gk2POgkdNenHpp9HijjKpw5ETBuwmpTSrfdRjTPys8A97eogpjkQW3HO4wAo_zgl9uUvXBjw2WuvF2UdjRIo4iYCeF6wKSEInwi6SwXPWGCx42o/s1600-h/link.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5306411774741737330&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 61px; CURSOR: hand; HEIGHT: 52px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOIpkYttlD5LgFILblG8orHxUcW5f1Gk2POgkdNenHpp9HijjKpw5ETBuwmpTSrfdRjTPys8A97eogpjkQW3HO4wAo_zgl9uUvXBjw2WuvF2UdjRIo4iYCeF6wKSEInwi6SwXPWGCx42o/s320/link.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.hypergressive.com/prod03.htm#whitepapers&quot;&gt;Email security white papers&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;[HyperGressive Technologies Weblog]&lt;/div&gt;</description><link>http://hypergressive.blogspot.com/2009/02/email-security-policy.html</link><author>noreply@blogger.com (T. Cole)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOIpkYttlD5LgFILblG8orHxUcW5f1Gk2POgkdNenHpp9HijjKpw5ETBuwmpTSrfdRjTPys8A97eogpjkQW3HO4wAo_zgl9uUvXBjw2WuvF2UdjRIo4iYCeF6wKSEInwi6SwXPWGCx42o/s72-c/link.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6523076351819585849.post-2321570523513075558</guid><pubDate>Fri, 20 Feb 2009 19:09:00 +0000</pubDate><atom:updated>2009-02-21T13:43:06.825-05:00</atom:updated><title>Protecting Network Edge Devices</title><description>&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Most administrators think of firewalls as the one device that protects their internal information resources but that may not be the case. In most networks there are additional devices outside of the firewall such as routers, switches and modems. In some cases a network may have directly connected remote sites that are generally considered to be on the inside of their network but utilize some manner of public transport that is not directly within their control. These devices may provide an attack vector for those with malicious intent. Some of these devices will even host public IP addresses that can be found by simply querying a DNS or whois server.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;&lt;br /&gt;Compromise of these network devices will allow an attacker to gain valuable information about your network, provide a stepping stone for another attack, create an intentional or unintentional Denial of Service, redirect or clone information on the transport or even disclose administrative credentials. These devices should be hardened, maintained and monitored as part of your security strategy.&lt;br /&gt;&lt;br /&gt;Here are some recommendations to address the vulnerabilities and exposure these devices present. Limit administrative access with ACLs and use only secure protocols, Don’t use clear text or insecure protocols to access these devices particularly form the outside as might be the case for a consultant or an “on call” IT staff member. For instance, use SSH instead of telnet or HTTP to access the administrative interface and disable insecure protocols.&lt;br /&gt;&lt;br /&gt;Edge devices in most cases should not run a routing protocol or exchange routing information with devices not under your direct control as the routing tables created by these protocols provide an accurate map of your internal network. Use static routes.&lt;br /&gt;&lt;br /&gt;Disable CDP (Cisco Discovery Protocol) at minimum on the outside interfaces of these devices. Don’t configure DNS servers or host lists on the routers. Disable IP redirects and directed broadcasts. Disable SNMP. Proper use ACLs to allow these devices to log security events to an inside trusted syslog service and configure the syslogger to alert via email and/or audible alerts on significant events.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Here is a typical best practices recommendation for Cisco routers.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Guideline for securing a typical enterprise perimeter (Gateway) router.&lt;br /&gt;* Security issues related to routing protocols (BGP, OSPF, RIP, VRRP etc) are beyond the scope of this document.&lt;br /&gt;* Latest IOS version available from CISCO (www.cisco.com) should be used.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Access Management&lt;br /&gt;&lt;/strong&gt;I. Console -&lt;br /&gt;Router# config t&lt;br /&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;br /&gt;Router (config)# line con 0&lt;br /&gt;Router (config-line)# login local //Enforce local user login; Local user must be&lt;br /&gt;created&lt;br /&gt;Router (config-line)# exec-timeout 5 0 //Set automatic session timeout&lt;br /&gt;&lt;br /&gt;IOS - Create local users -Create at least one local user with password to enable&lt;br /&gt;console login&lt;br /&gt;Router(config)# username user_name password &lt;password&gt;&lt;br /&gt;&lt;br /&gt;II. Auxiliary port-&lt;br /&gt;Router(config)# line aux 0&lt;br /&gt;Router(config-line)# transport input none&lt;br /&gt;Router(config-line)# login local&lt;br /&gt;Router(config-line)# exec-timeout 0 1&lt;br /&gt;Router(config-line)# no exec&lt;br /&gt;&lt;br /&gt;III. VTY -&lt;br /&gt;Disable access through VTY (Telnet)&lt;br /&gt;Router(config)# no access-list 90&lt;br /&gt;Router(config)# access-list 90 deny any log&lt;br /&gt;Router(config)# line vty 0 4&lt;br /&gt;Router(config-line)# access-class 90 in&lt;br /&gt;Router(config-line)# transport input none&lt;br /&gt;Router(config-line)# login local&lt;br /&gt;Router(config-line)# exec-timeout 0 1&lt;br /&gt;&lt;br /&gt;Securing VTY (Telnet) if required&lt;br /&gt;Allow only specific IP to telnet the Router&lt;br /&gt;Router(config)# ip telnet source-interface loopback0&lt;br /&gt;Router(config)# access-list 99 permit IP_allowed log&lt;br /&gt;Router(config)# access-list 99 deny any log&lt;br /&gt;Router(config)# line vty 0 4&lt;br /&gt;Router(config-line)# access-class 99 in&lt;br /&gt;Router(config-line)# exec-timeout 5 0&lt;br /&gt;Router(config-line)# transport input telnet&lt;br /&gt;Router(config-line)# transport output none ---Disable telnet outside&lt;br /&gt;Router(config-line)# login local&lt;br /&gt;Router(config)# service tcp-keepalives-in&lt;br /&gt;Disable unnecessary VTY lines&lt;br /&gt;Router(config)# no line vty 5&lt;br /&gt;&lt;br /&gt;IV. Enable Secret&lt;br /&gt;Router(config)#enable secret &lt;my_secret_password&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Disable unnecessary Services&lt;br /&gt;&lt;/strong&gt;Router(config)# no service finger&lt;br /&gt;Router(config)# no ip identd&lt;br /&gt;Router(config)# no ip finger&lt;br /&gt;Router(config)# no ip http server&lt;br /&gt;Router(config)# no service tcp-small-servers&lt;br /&gt;Router(config)# no service udp-small-servers&lt;br /&gt;Router(config)# no ip bootp server&lt;br /&gt;Router(config)# no cdp run&lt;br /&gt;Router(config)# no service config -- Disable loading of remote configs.&lt;br /&gt;Router(config)# no tftp-server INSTANCE&lt;br /&gt;Router(config)# no boot network&lt;br /&gt;Router(config)# no ip domain-lookup&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;SNMP Security&lt;/strong&gt;&lt;br /&gt;Disable SNMP if not in use.&lt;br /&gt;Router(config)# no snmp-server&lt;br /&gt;If the network requires SNMP, then configure an SNMP ACL and hard-to-guess SNMP community strings.&lt;br /&gt;Router(config)# no snmp community public ro&lt;br /&gt;Router(config)# no snmp community private rw&lt;br /&gt;Router(config)# access-list 51 permit Permited_IP_Address&lt;br /&gt;Router(config)# snmp community Your_Password ro 51&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Routing Rules&lt;br /&gt;&lt;/strong&gt;I. Turn off opportunities for crafted spoof attacks &amp;amp; probes&lt;br /&gt;Router(config-if)# no ip directed-broadcast // Disable IP directed broadcast on each&lt;br /&gt;interface&lt;br /&gt;Router(config-if)# no ip proxyarp // Disable proxy ARP&lt;br /&gt;Router(config-if)# no ip directed-broadcast // Disable directed broadcast&lt;br /&gt;Router(config-if)# no ip unreachables // Disable host unreachable reply&lt;br /&gt;Router(config-if)# no ip mask-reply // Disable mask reply message&lt;br /&gt;Router(config-if)# no ip redirects //Disable ip redirects&lt;br /&gt;Router(config)# no ip source-route // Disable source routing.&lt;br /&gt;Router(config)# service tcp-keepalives-in // Use tcp keepalives to kill sessions&lt;br /&gt;where the remote side has died.&lt;br /&gt;II. Unicast reverse path forwarding&lt;br /&gt;Router(config)# ip cef&lt;br /&gt;Router(config-if)# ip verify unicast reverse-path // Unicast Reverse Path Forwarding (RPF) helps to mitigate problems caused by malformed or forged IP source addresses passing through a router.&lt;br /&gt;Ref &lt;a href=&quot;http://www.cisco.com/univercd/cc/td/doc/product/software/ios111/cc111/uni_rpf.htm&quot;&gt;h&lt;a href=&quot;http://www.cisco.com/univercd/cc/td/doc/product/software/ios111/cc111/uni_rpf.ht&quot;&gt;ttp://www.cisco.com/univercd/cc/td/doc/product/software/ios111/cc111/uni_rpf.ht&lt;/a&gt;m&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Access control lists&lt;br /&gt;&lt;/strong&gt;The ACLs mentioned here are designed for restricting inbound traffic of a perimeter router.&lt;br /&gt;*The access_list number (101) given is user defined. User can change it as per their requirement&lt;br /&gt;*The access list has to be applied to inbound traffic on external interface.&lt;br /&gt;&lt;br /&gt;I. Filter all RFC 1918,3330 address space and special/reserved addresses&lt;br /&gt;Router(config)# access-list 101 deny ip 10.0.0.0 0.255.255.255 any log&lt;br /&gt;Router(config)# access-list 101 deny ip 172.16.0.0 0.15.255.255 any log&lt;br /&gt;Router(config)# access-list 101 deny ip 192.168.0.0 0.0.255.255 any log&lt;br /&gt;Router(config)# access-list 101 deny ip 127.0.0.0 0.255.255.255 any log&lt;br /&gt;Router(config)#access-list 110 deny ip 192.0.2.0 0.0.0.255 any log&lt;br /&gt;Router(config)# access-list 101 deny ip 255.0.0.0 0.255.255.255 any log&lt;br /&gt;Router(config)# access-list 101 deny ip 224.0.0.0 7.255.255.255 any log&lt;br /&gt;Router(config)# access-list 101 deny ip host 0.0.0.0 any log&lt;br /&gt;Router(config)#access-list 110 deny ip host 255.255.255.255 any log&lt;br /&gt;Router(config)# access-list 101 deny ip 169.254.0.0 0.0.255.255 any log&lt;br /&gt;II. Apply ingress filtering (RFC 2827)&lt;br /&gt;Stop spoofing Deny anything source address as own address&lt;br /&gt;Router(config)#access-list 101 deny ip my_network_id any log&lt;br /&gt;III. Permit the required services for the required IP Addresses only&lt;br /&gt;!! Incoming Requests&lt;br /&gt;! Permit access to Public web, Mail&lt;br /&gt;access-list 101 permit tcp any host web_server_ip eq www&lt;br /&gt;access-list 101 permit tcp any host mail_server_ip eq smtp&lt;br /&gt;! Allow DNS request to DNS Servers&lt;br /&gt;access-list 101 permit tcp any host dns_server_ip eq domain&lt;br /&gt;access-list 101 permit tcp any host dns_server_ip eq domain&lt;br /&gt;access-list 101 permit udp any host dns_server_ip eq domain&lt;br /&gt;access-list 101 permit udp any host dns_server_ip eq domain&lt;br /&gt;!! Return traffic&lt;br /&gt;! Allow only ACKed tcp packets to your network or only to specific IPs accessing&lt;br /&gt;Internet&lt;br /&gt;access-list 101 permit tcp any my_network gt 1023 established&lt;br /&gt;! Allow DNS query return traffic&lt;br /&gt;access-list 110 permit udp any eq 53 host DNS_Client_IP gt 1023&lt;br /&gt;! Allow FTP Clients return traffic&lt;br /&gt;access-list 110 permit tcp any eq 20 my_network gt 1023&lt;br /&gt;! Permit limited ICMP message types&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 echo-reply&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 net-unreachable&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 host-unreachable&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 port-unreachable&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 packet-too-big&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 administratively-prohibited&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 source-quench&lt;br /&gt;access-list 101 permit icmp any 100.100.100.0 0.0.0.15 ttl-exceeded&lt;br /&gt;IV. Block everything else&lt;br /&gt;Router(config)# access-list 101 deny ip any any log&lt;br /&gt;V. Apply the following on the External Interface as in&lt;br /&gt;Router(config-if)# ip access-group 101 in&lt;br /&gt;VI. OutBound ACLs&lt;br /&gt;Include all ACLs of section 6.1&lt;br /&gt;Permit packets only from own network only&lt;br /&gt;access-list 102 permit ip My_network any&lt;br /&gt;Deny and log everything else&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Logging&lt;br /&gt;&lt;/strong&gt;Turn on the Router’s logging capability, send all log errors and blocked packets to a trusted syslog server.&lt;br /&gt;Router(config)# logging buffered&lt;br /&gt;Router(config)# logging syslog_server_ip&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reference&lt;/strong&gt;&lt;br /&gt;http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00&lt;br /&gt;801afc76.shtml&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;[HyperGressive Technologies Weblog]&lt;/div&gt;</description><link>http://hypergressive.blogspot.com/2009/02/protecting-network-edge-devices.html</link><author>noreply@blogger.com (T. Cole)</author><thr:total>0</thr:total></item></channel></rss>