m o

MikroTik Router OS Firewall Strategies

c .i

Speaker:

b o

Location: Date:

Budapest, Hungary 10th of March 2011

o h a s

MikroTik Router OS Network Threats and Countermeasures Tom Smyth CTO Wireless Connect Ltd.

http://wirelessconnect.eu/ Copyright 2007 - 2011

1

m o

Wireless Connect Ltd. ●

Irish Company Incorporated in 2006



Operate an ISP in the centre of Ireland.



Good Infrastructure Expertise.



Certified MikroTik Partners

b o

o h a s

c .i



Training



Certified OEM Integrators



Consultants



Distributor & Value Added Reseller

http://wirelessconnect.eu/ Copyright 2007 - 2011

2

Speaker Profile: ●





m o

Studied BEng. Mechanical & Electronic Engineering, DCU, Ireland

c .i

Have been working in Industry since 2000

st

b o



Server Infrastructure Engineer



Systems / Network Administrator



IS Architect



Internet Security Consultant

o h a s

1 MikroTik Certified Trainer in June 2007 in Ireland

http://wirelessconnect.eu/ Copyright 2007 - 2011

3

m o

Ogma Connect ●







A Collaborative Effort involved in the development and support of MikroTik Powered Appliances

c .i

Ogma Connect's name comes from the Ancient God of Communications and eloquence who's name was Oghma

b o

Oghma was credited with the invention of the written language Ogham which is found carved in stones that mark the land of ancient tribes throughout the once vast Celtic world in northern & western Europe

o h a s

We want people to be able to connect with each other eloquently efficiently and elegantly

http://wirelessconnect.eu/ Copyright 2007 - 2011

4

m o

Presentation Objectives ●

IP v4 Firewall Systems Concepts



Outline what a firewall can and can not do



Discuss Network Attacks and Mitigation Strategies



Structure the Firewall

o h a s

b o

c .i



In a security centric manner



Create policy based rule sets

http://wirelessconnect.eu/ Copyright 2007 - 2011

5

Sources of Security Information http://www.enisa.europa.eu/

m o



ENISA –



OWASP http://owasp.org



Rits Group – http://www.ritsgroup.com/



SANS Institute – http://sans.org



CIS Centre for Internet Security – http://cisecurity.org/



NIST Computer Security http://csrc.nist.gov/



Open BSD – http://OpenBSD.org/



Spamhaus.org – http://spamhaus.org



nmap.org – http://nmap.org



ha.ckers.org – http://ha.ckers.org/



Cypherdyne - http://cypherdyne.org/

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

6

m o

Firewall Systems ●



c .i

One or more systems combined to achieve a desired security objective

b o

There are multiple ways firewall systems handle traffic –

Routing



NATing



Bridging



Proxying

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

7

Firewall Design Objectives ●





m o

To implement a security policy by classifying, validating, logging and ultimately reacting to traffic –

Flowing to the system



Flowing through the system



Flowing from the system

o h a s

b o

c .i

Legitimate / useful traffic for users and systems should: –

Not be Blocked



Not be Corrupted



Not be Slowed or Hampered Beyond Strict Tolerances

Protect the users / systems behind it and Itself http://wirelessconnect.eu/ Copyright 2007 - 2011

8

Ideal firewall interface ●

Protect me from bad traffic



Allow only good traffic



Protect me from myself



Read my mind

o h a s

b o

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

9

Current Firewall Capabilities ●

m o

Can Identify traffic according to the following –

Entry interface



Exit interface



Source Address (Source Address List)



Destination Address (destination Address List)



Address Types



Protocol type (number)



Protocol port (source and destination



Message type (ICMP)



State of the Connection



IP V4 Options



TCP Flags



Number of Concurrent Connections



Packet Rate



Packet Size



Packet Fragmentation

o h a s

b o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

10

m o

Payload Inspection ●







Packet Inspection inside the netfilter Firewall Can use content matcher in Advanced Tab

b o

Exact Match only Safe to use no regular expressions to trip you up

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

11

m o

Layer 7 classifier ●

Very powerful uses a Regular expressions



Searches first 10 Packets / 2.5KB of a stream / connection



b o

c .i

Pre-defined signatures / patterns available from http://l7-filter.sourceforge.net/



User Can generate their own custom pattern matches



Be careful Layer 7 Rules if incorrectly written can crash





o h a s

The longer the search pattern the more processing power required Gradually add L7 Rules so that if there is an issue with the Firewall you can easily diagnose which rule is causing the issues http://wirelessconnect.eu/ Copyright 2007 - 2011

12

m o

Adding L7 Rules

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

13

Firewall Challenges ●

m o

Firewalls generally have difficulty with the following

c .i



Specific protocol Validation / Filtration



Deep packet inspection beyond the first 10 packets / 2.5KB of data in the stream



Inspection of encrypted data streams such as

b o

o h a s ● ● ● ●

Ssh sessions Https Ipsec TLS / SSL Protected Connections e.g SSTP

http://wirelessconnect.eu/ Copyright 2007 - 2011

14

Firewall Limitations … Dont Worry

m o



Proxies pick up where firewalls leave off...



Proxies allow fine control over specific protocols :)



Limitations are not a problem for inherently safe protocols





b o

c .i

For unsafe protocols proxies help can provide some damage limitation.

o h a s

Check out my Presentation Last year, at http://mum.mikrotik.com

http://wirelessconnect.eu/ Copyright 2007 - 2011

15

Modular Firewall System Example

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

16

Firewall hardening ●

m o

Some of the checks may be duplicated, this is ok, belt and braces.

c .i



Check for unusual TCP Flags and drop.



Drop packets with invalid connection state





b o

Your Effort will complement and bolster your networking operating software provider's efforts to maintain security

o h a s

Ultimately you are responsible for your networks security

http://wirelessconnect.eu/ Copyright 2007 - 2011

17

Firewall Best Practices ●







m o

Populate a Router with the Maximum RAM Configuration

c .i

Use Connection Tracking to achieve state-full packet inspection & perform fragmented packet reassembly

b o

Disable Administration interfaces from External Interfaces

o h a s

Try where possible to use in interfaces rather than source IP address for establishing the level of trust that you have for the

http://wirelessconnect.eu/ Copyright 2007 - 2011

18

Firewall System Best Practices ●

m o

Run as few network services on the firewall hardware as possible

c .i



Turn off all Administration services that are not needed



Do not use un-encrypted administration protocols



Shore up un-encrypted services with IPSEC policies

b o

o h a s



SNMP



DNS (internal use not for customer use)



Http fetch



NTP Time updates make sure the NTP Server responses are authenticated. http://wirelessconnect.eu/ Copyright 2007 - 2011

19

Disable Un-needed services ●









m o

Drastically reduces attack surface of your device

c .i

If a service has a vulnerability your firewall can be compromised (stability, availability, integrity)

b o

Administration Services are particularly risky as they allow for the change of firewall configuration

o h a s

DNS Server services should be offloaded to a Hardened DNS Box NTP Server services should be offloaded to a Hardened NTP Box

http://wirelessconnect.eu/ Copyright 2007 - 2011

20

Unencrypted Administration Risk ●

Vulnerable to Sniffing / Replay attacks.



Packets could be modified in transit







m o

c .i

Can allow an attacker who can view the traffic to harvest user authentication credentials

b o

IPSEC can eliminate this risk by securing the traffic with the best available FIPS grade cryptography protocols

o h a s

IPSEC can be used to increase confidence if encryption quality of an administration service is unknown.

http://wirelessconnect.eu/ Copyright 2007 - 2011

21

More RAM – More Connections ●



m o

NSA Security Guide for Routers suggests that Perimeter routers /firewalls be configured with the maximum available RAM

c .i

The More RAM you have the harder the device is to Crash due to memory exhaustion (DOS / DDOS attacks)

b o



MT ROS Devices are Optimised against RAM Exhaustion Attacks.



The firewall can cope better in busy periods.







o h a s

Ogma Connect Routers are always Sold with the maximum Supported RAM available :) Wireless Connect Customers can avail of RAM upgrades for RB1100 the New MikroTik Now Ship 1.5 GB RAM on the Improved RB1100AH :)

http://wirelessconnect.eu/ Copyright 2007 - 2011

22

m o

Hardware with multiple Physical Interfaces ●



c .i

The More Interfaces the more you can isolate multiple untrusted interfaces.

b o

For Clients who require higher levels of Security assurance.

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

23

Hardware fit for the Job :) ●

m o

As you have seen from the My colleague and Friend Patrik Schaub's presentation on Mikrotik Datacentre products.

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

24

RB 1100 / RB1100AH ●





b o





m o

13 Interfaces :) so greater control of your network

Available from Wireless Connect.

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

25

Ogma Connect 2500 ●

11 GBE Interfaces by Default



Up to 19 GBE with Expansion Cards

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

26

Connection Tracking ●

m o

ConTrack carries out the following essential tasks

c .i



It monitors the state of all connections / requests flowing in the firewall



Allows the firewall to dynamically open / close ports according to the connection state in the firewall



Performs IP Packet Reassembly before inspection (prevents IP Fragment Attacks)

b o

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

27

Filter Administration Services

m o



Minimise Risk from outside attacks



Allow Flexibility of management internally

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

28

Firewall Setup Strategy

m o



Turn on connection tracking



Break down the security policy into functional groups



Use chains to define these functional groups



Granularly control settings within the chains /groups



Make use of Address lists group hosts together

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

29

Security Objectives (policies) ●

One Should

m o

c .i



Detect / Block Traffic to / from Invalid Addresses



Detect / Block Traffic that have a large packet size



Detect / Block Traffic that has unusual characteristics



Detect / Block Traffic from Port Scanners



Detect / Block Traffic from Brute Force Hackers



Once Traffic has been inspected don't keep reprocessing the same connection.



Analyse Traffic originating from and Leaving router



Protect Traffic Entering and destined for the router.



Update some Rules dynamically (Self Defending Networks)

b o

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

30



Invalid Addresses Bogons (source and destinations)





Un allocated addresses



Remove (Special Purpose Allocated Addresses)

Allocated Special Purpose: –

b o

m o

c .i

Multicast Addresses (source addresses only) 224.0.0.0/4



Broadcast Addresses 255.255.255.255



Connected Network Broadcast addresses such as

o h a s



192.168.0.255 if the router has an ip address of 192.168.0.x/24



192.168.0.127 if the router has an ip address of 192.168.0.x/25



Private IP Addresses



Test IP Addresses 192.0.2.0/24



Loopback Addresses 127.0.0.0/8 http://wirelessconnect.eu/ Copyright 2007 - 2011

31

m o

Block invalid packets with IP Broadcast source address

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

32

Block Multicast source Address

m o



Multicast should never be a source address of an IP Packet



Block it the same way as the previous slide

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

33

Blocking IP Directed broadcast ●



m o

In forward chain create a rule with “destination address type” = Broadcast.

c .i

Example of IP Directed broadcast 192.168.1.255

b o

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

34

Blocking IP Directed Broadcast

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

35

m o

Block Bad People Dynamic updates ●

c .i

Reference Spamhaus DROP List (Dont Route or Peer) updated Weekly

b o



Reference SANS ISC Top 10 – 10000(optional if you wish)



Bogons (un allocated not special Purpose)



o h a s

If updating using fetch with dns host name one should use IPSEC for protecting the DNS & the FTP /http Download of rules list

http://wirelessconnect.eu/ Copyright 2007 - 2011

36

Updating Address Lists automatically ●





m o

c .i

Use a combination of Scheduler and Scripting tools, and Fetch.

b o

Fetch is very good because of the ability to use DNS Addresses for ease of management.

o h a s

Security Concerns...Updates traversing untrusted networks –

Use IPSEC Policy for fetch tool,



ensure DNS Requests don't traverse untrusted networks

or



Use Static DNS

http://wirelessconnect.eu/ Copyright 2007 - 2011

37

m o

Address List Update Script Sample :global oldbogoncount; :global totalbogoncount;

b o

c .i

/ip firewall address-list set comment="oldbogons" [/ip firewall address-list find list=bogons_address_list] :set oldbogoncount [ip firewall address-list print count-only value-list where list=bogons_address_list]; /tool fetch mode=http url="http://wirelessconnect.eu/store/images/bogonsnoprivate.rsc"

o h a s

import bogonsnoprivate.rsc

:set totalbogoncount [ip firewall address-list print count-only value-list where list=bogons_address_list]; :if ($oldbogoncount < $totalbogoncount) do {/ip firewall address-list remove [/ip firewall address-list find comment="oldbogons"] }

http://wirelessconnect.eu/ Copyright 2007 - 2011

38

Block Packets with Large Size ●

m o

Block Packets larger than 1500 bytes to protect legacy clients.

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

39

Block Un-needed IP Options ●

Strict Source Route



Loose Source Route



Route Record



Timestamp



Router Alert (if not using RSVP)

o h a s

b o

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

40

Block Port Scanners ●





Detect Nmap Scan types (TCP) –

Christmas Tree



SYN FIN



FIN



ALL



SYN/RST

b o

o h a s

m o

c .i

Detect using MT Port Scan Detect TCP

Detect and drop scans using ICMP Messages out bound –

(Port Unavailable)



Communications Prohibited http://wirelessconnect.eu/ Copyright 2007 - 2011

41

Port Scan Detect ●







TCP Scans are Detected Directly UDP Scans indirectly Drop UDP Scans / Results of UDP Scans (ICMP)

o h a s

b o

Add big offenders to Port Scanners blocking list

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

42

Checking Rate of matches ●



For blacklisting obvious UDP Scanners Limit the speed of a scan for 120 ports per minute

o h a s

b o

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

43

Blocking the UDP scanner ●

Use Add Dst Address to Address List action

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

44

m o

Blocking Port scanners can be abused ●

– ●









c .i

What about spoofing UDP Scans and TCP Syn Scans?

Attacker can send the packets does not need the reply ?

b o

An attacker can spoof your Customers IP Address and your Firewall will block the customer IP address

o h a s

Your customer will be denied your services There is a trade off between high security and service availability for UDP and TCP Syn Scan detection Can be over come by using white lists for critical customers / servers Differentiate between Connect port scans ( bi directional cant be spoofed) and scans that can be spoofed http://wirelessconnect.eu/ Copyright 2007 - 2011

45

Before the DOS

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

46

Attacker Starts DOS

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

47

Firewall Responds to Scan

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

48

m o

DOS Complete

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

49

Port Scan Address Lists ●



m o

Create one “definite port scan address list”

c .i



Longer lockout time



Log using syslog for external reporting and follow up

b o

Create a second “possible port scan address list” –

Shorter lockout time



Log using syslog for internal reporting and analysis



Analyse logs for the following

o h a s ●



Repeated persistent scans denial of service, may have to work with intermediate ISPs to trace the culprit Single scans lasting under an hour ? Most likely a scan and src ip address likely to be in control of your adversary http://wirelessconnect.eu/ Copyright 2007 - 2011

50

m o

Develop your own FW signatures

c .i



Identify suspicious Traffic patterns,



Example Brute Force Password Attacks on servers

b o



Some Administrative Services have 1 TCP Connection mantained per Active Admin session



Some Administrative Services Disconnect users after a number of Failed Password attempts



These include Winbox , SSH, Telnet etc



These Do not include HTTP / HTTPs

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

51

Brute Force Detection ●







m o

Depends on server disconnection after failed authentication attempts.

c .i

Requires that any one administration session is maintained as continuous established connection.

b o

Based on some cool ideas from the MT User Community

o h a s



On First Connection ( First authentication attempt) add src to Management Light Grey List



On Second Connection add src to Management Grey List



On Third Connection add src to Management Dark Grey List



On Fourth Connection add src to Management Black List

Then insert Rule to Block members of the Management Black List this List on the Router http://wirelessconnect.eu/ Copyright 2007 - 2011

52

Port Scan Timings

m o



You can slip a scan under the radar



Slow scan one port per hour



Very slow scan 1 port per week / 1 port per month



Find the balance –

b o

c .i

time-out values for port scans are proportional to your paranoia :)

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

53

m o

Sending Protocols to bruteforce check ●

Send selected protocols to the Brute Force Check Chain

b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

54

Brute Force Detection

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

55

Last Rule in Detection Chain ●

m o

Accept new connection as long as Src Address is not in the management Black List



b o

o h a s

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

56

External Multi system Response ●

MikroTik is so powerful that you can

m o

c .i



Report Suspicious Traffic back to a central Syslog Server



Receive real-time updates from an incident response server.



Firewalls effectively sharing data on attack sources and other security threats



After analysis of Logs system can push out commands to add people to address lists in multiple mikrotik devices using SSH scripts & SSH Keys

b o

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

57

Detection & Reporting

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

58

Incident Response

b o

o h a s

m o

c .i

http://wirelessconnect.eu/ Copyright 2007 - 2011

59

Further Reading

m o



For more information on firewall rules click on



http://wirelessconnect.eu



c .i

Sign up for an account and we will send you instructions for setting up the firewalls and Proxies when they are publicly released after the MUM

o h a s

b o



Rules will be released first of May This year.



http://wiki.mikrotik.com



http://www.cipherdyne.org/

http://wirelessconnect.eu/ Copyright 2007 - 2011

60

Thank you

m o



Thanks to the management team At MikroTik



Thanks to all the support team at Mikrotik –

c .i

For patiently responding to my emails

b o



Thanks to all who contribute to the wiki



Thanks to all who contribute positively to the Wiki



Thank you for listening

o h a s

http://wirelessconnect.eu/ Copyright 2007 - 2011

61

08. Strategi_Membangun_Firewall_dengan_Mikrotik_2.pdf ...

MikroTik Router OS Firewall Strategies. MikroTik Router OS Network Threats and Countermeasures. Speaker: Tom Smyth. CTO Wireless Connect Ltd. Location: ...

3MB Sizes 0 Downloads 51 Views

Recommend Documents

08-08-11schoolboardmtg.pdf
5) Contract Approvals; Sharon Uhl, Para educator Student Specific; Caleb Christensen,. Regular Route Driver; Toni Weber, Substitute Bus Driver; Dick Bloyer, ...

acd-08-08-reglamento-biblioteca.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

0680-08
Oct 16, 2017 - colleges in this state, and through apprenticeship Programs. Authority: T.C.A. §§ 4-41-105, 4-41-107, and 4-41-108. Administrative History: ...

1140-08
Feb 1, 2017 - Repetitions of the violation. (c). Magnitude of the risk of harm caused by the violation. (2). Each violation of any statute, rule or order enforceable ...

0680-08
Oct 16, 2017 - (e) The Corporation may delegate the review and acceptance of bids to one (1) or more persons each having no direct or indirect interest in any of the bidders, as defined above, who shall review all submissions and choose a qualifying

0680-08
Oct 16, 2017 - generally accepted accounting principles; and .... detailed description of the project and timeline pursuant to 0680-08-.06 (1)(b), the name of.

Jennissen Annie 1940-08-08.pdf
Sign in. Loading… Page 1. Whoops! There was a problem loading more pages. Jennissen Annie 1940-08-08.pdf. Jennissen Annie 1940-08-08.pdf. Open.

#08 08-15-2010 OUTSIDER FOIA request regarding Joe Warren ...
#08 08-15-2010 OUTSIDER FOIA request regarding Joe Warren Asst. DA of Liberty County Texas.pdf. #08 08-15-2010 OUTSIDER FOIA request regarding Joe ...

27536-08, 27539-08, 27540-08, 29904-07A-J03261.pdf
Dec 15, 2010 - This Big Bore Stage 1 kit is intended for High Performance. applications only.This engine related performance part is legal. for sale or use in ...

08 - Review.pdf
C. Embodiment of the Divine Life animated by the Divine Breath. D. Humans to serve as Kings & Priests of Creation on Earth. IV. The Creation Mandate: From ...

08-Musyarakah.pdf
Shad [38]: 24: ...و إِنَّ كَثِي ر ا مِن الْخ لَطَاءِ لَي ب غِي ب ع ض ه م ع لَى ب ع ضٍ، إِلاَّ الَّذِي ن آم ن و ا. و ع مِلُوا الص الِح اتÙ

08.pdf
Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 08.pdf.

08-isaim.pdf
The structure of the system is ex- ploited so that a joint probability distribution over the faults. and system variables is represented compactly as a Bayesian.

2017-08-27_SonntagsZeitung_Portrait_Mannar_Hielal.pdf ...
Page 1 of 1. 2017-08-27_SonntagsZeitung_Portrait_Mannar_Hielal.pdf. 2017-08-27_SonntagsZeitung_Portrait_Mannar_Hielal.pdf. Open. Extract. Open with.

08 - Palazzo.pdf
modificazioni in l. 12 luglio 2011, n. 106, e dell'organo di vertice della giurisdizione. Page 3 of 3. 08 - Palazzo.pdf. 08 - Palazzo.pdf. Open. Extract. Open with.

1200-08-24
May 9, 2017 - the provision of routine delivery services and postpartum care for mothers ...... (a) Plot plan(s) showing property lines, finish grade, location of ...

1200-08-10
May 9, 2017 - (7) Ambulatory surgical treatment center (ASTC). Any institution, place or building devoted primarily to the maintenance and operation of a facility for the performance of surgical procedures. Such facilities shall not provide beds or o

08 fuller.pmd
Whiteoak, J.W.; Chalip, L.; and Hort, L.K. Assessing group efficacy: Comparing three methods of measurement. Small Group Research, 35, 2 (2004), 158–173. 76. Zellars, K.L.; Hochwarter, W.A.; Perrewe, P.L.; Miles, A.K.; and Kiewitz, C. Beyond self-e

08 - Romeo.pdf
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 08 - Romeo.pdf. 08 - Romeo.pdf. Open. Ex

1240-06-08
Aug 1, 2017 - (4) A manager, with prior approval from the TBE Consultant/Specialist, may lease equipment for use in the operation of the vending facility. In no event shall the Agency be held liable for the manager's obligation under the terms of any

0250-04-08
Jun 1, 2017 - (3) The facility administrator shall approve a list of articles and .... monitoring Juvenile Justice and Delinquency Prevention core ..... (a) The facility shall establish an application and screening process in order to ensure that ...

1200-08-34
May 9, 2017 - A home care organization providing professional support services. ...... shall make the decision in accordance with the consumer's best interest.

1200-08-34
May 1, 2017 - decision for the individual granting the power. (7) Board. .... availability shall include, but not be limited to, availability by telephone.

1200-08-01
May 1, 2017 - 1,200.00. (d) 75 to 99 beds, inclusive. $ 1,400.00. (e) 100 to 124 beds, inclusive .... boldface type, for immediate assistance and posted on a sign no smaller than eight and one-half inches (8½") in width and eleven ...... dimensions