HCHTech
Well-Known Member
- Reaction score
- 4,025
- Location
- Pittsburgh, PA - USA
I've got a new client setting up their first office. They have 2 office computers, 2 public-use computers and a single FirstData IP-connected credit card terminal. They have a block of 5 public IPs with their internet service, so I set them up with a Sonicwall, and have 3 zones with different IP schemes and different public IPs.
The office computers are in zone 1 with say, the IP range of 172.16.2.x and use x.x.x.122 for their WAN
The public computers are in zone 2 with the IP range of 172.16.3.x and use x.x.x.123 for their WAN
The cc terminal is all alone in zone 3 with an IP of 172.16.4.100 (no DHCP range) and uses x.x.x.124 for it's WAN
All of the appropriate rules are in place to prevent traffic between the zones.
So far, so good - everything works as desired. However, the PCI scans are failing because the scan cannot detect the cc terminal. I have no doubt that this is because the firewall is doing its job.
There is verbiage in the PCI documentation that DPS / IPS protection can interfere with scans, and the client can also "sign off" that no intentional blocking of the scan was done, which lets them get a pass after a review.
It goes against my nature to lower the protection so the automated scans can see if we're protected.
Should I be disabling the firewall protection for the cc terminal's LAN? That seems crazy. Plus, the terminal doesn't store any data so there isn't any possible danger as far as I can see anyway. I can tell the client wouldn't be happy having to make the exception statement every quarter...How do I set this up to get a passing scan?
The office computers are in zone 1 with say, the IP range of 172.16.2.x and use x.x.x.122 for their WAN
The public computers are in zone 2 with the IP range of 172.16.3.x and use x.x.x.123 for their WAN
The cc terminal is all alone in zone 3 with an IP of 172.16.4.100 (no DHCP range) and uses x.x.x.124 for it's WAN
All of the appropriate rules are in place to prevent traffic between the zones.
So far, so good - everything works as desired. However, the PCI scans are failing because the scan cannot detect the cc terminal. I have no doubt that this is because the firewall is doing its job.
There is verbiage in the PCI documentation that DPS / IPS protection can interfere with scans, and the client can also "sign off" that no intentional blocking of the scan was done, which lets them get a pass after a review.
It goes against my nature to lower the protection so the automated scans can see if we're protected.
Should I be disabling the firewall protection for the cc terminal's LAN? That seems crazy. Plus, the terminal doesn't store any data so there isn't any possible danger as far as I can see anyway. I can tell the client wouldn't be happy having to make the exception statement every quarter...How do I set this up to get a passing scan?