This really is all in the archives at this point isn't it?

-----Original Message-----
Okay, your specific point is that having a FE server in the internal
network is as good as having one in the DMZ?

CS: That's one of my points yes.

Well, if the FE server in the internal network is compromised it has
open access to all of your internal network. 

CS: Not my FE server, because I'vwe suffucuently hardened it, wasn't that
one of the criteria we were using in our DMZ? I haven't thrown out best
practices simple because I located the server on my internal network instead
of the DMZ. Instead, I've implemented IPSec and I know exactly what servers
my FE server is allowed to talk to.

So, there would be be no
difference if all of the hosts and workstations within your internal
network were hardened to the security level provided by the firewall
between the DMZ and your internal network. 

CS: A logical falicy IMO, because you have not hardened the internal servers
that your FE server can speak to in your scenario and if you do, you won't
be hardening them any more because the servers communicate with your FE
server in the DMZ than I'll harden them talkign to my FE server on the
internal network will you?

But, practically, I've never
found that to be a possibility.  I suppose if I personally created every
internal system I could achieve this, but I'd be swamped trying to do
this with more than a few dozen machines.  

CS: Sure. But your need to harden internal or intermediary systems seems to
be no greater for a FE server in a DMZ then my FE server on the itnernal
network does it? IPSec is fairly inexpensive to implement and would be high
on my list of good ideas if I had high security concerns....

Minimally, you'd need a
software firewall on all your internal hosts and workstations (which
admittedly is where technology seems to be heading).

CS: I disagre. IPSec is more than sufficient for this scenario to my way of
thinking.

  I suppose you
could put a router access-control list between your FE server and the
rest of your internal network, but really that would just be a way of
recreating a DMZ.  But this path will become more elaborate than
deploying the DMZ.

CS: No, I've taken the time to understand who and what my OWA server talks
to and made sure that it only talks to those machines it needs to talk to.
It's not in a DMZ by any definition of a DMZ I'd care to use.  

What is your fear of implementing a DMZ?  It's no more complicated than
the initial firewall deployment and often can be done with the same
hardware/software used for that firewall.  

CS: I have no fear of impelementing a DMZ. In fact I have rather a sizeable
IT budget I could draw from to implement such a scenario for Exchange if one
could provide a demonstrable benefit it provides. I still don't believe I've
seen that.

My assumption is that you have an internal network.  I suppose if there
wasn't one, then my arguments might be tenuous.  

CS: Sure do. In fact my security guy is a anal SOB who reads the rainbow
books for pleasure and used to write encryption and compression algorythms
for fun and profit. We argue about security stuff after a fashion on a
regular basis.

Regarding costs, you can't really design without attention to costs
(hardware, software, technician time, user disruption/training). 

CS: Cost is irrelavent to the discussion at hand. We're talking about what
is more secure. Your contention is that a FE server in a  DMZ is more secure
than one on the internal network. I have more than enough hardware and
software about to implement this scenario if someone can demonstrate a real
security benefit from it.

Yes,
you can build rather than buy to some extent (open source firewalls,
intrusion detection scripts you design yourself, etc) but that would
just push up the technician time and expertise requirements to save
hardware and software costs.  

CS: Again, this was a discussion fo the technical merits of a particular
configuration. If someone came to me and said "I have unlimited budget,
design me the most secure OWA solution you can" you can be damn sure my
solution would bear only a passing resemblance to my current configuration
or the one you proposed. Pie in the sky desires are not what we're talking
about here... this thread was started on a very specific set of questions
and a small subset of possible impelementation scenarios. An answer of what
is ideal is not terribly useful if it's not an option.

It might be entertaining to totally
disregard costs in an engineering solution, but it has almost no
practical value.  

CS: Right, so assuming I have exactly the same hardware you do, why is my FE
server on the internal network less secure than your FE server in the DMZ?
IMO a very practical question.

Ultimately, resource allocation is the primary
limiting factor in all engineering designs, so I can't ignore costs in
proposing any solution.      

CS: OK, but can you ignore technical merits? Assuming cost is not a deciding
factor in whether I place my FE server in the DMZ or the internal network
what are the technica reasons I would choose one over the other. The reasons
I've seen so far from anyone in this thread look more like straw men then
compelling arguments.

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to