Aaron,

        I previously worked at a web development company and this is what I
set up.


        router ------------- fw --------------- internal network
                        |
                        |
                        DMZ
                        webserver

        checkpoint firewall dropped all incoming traffic except that bound
for the web server in the DMZ.  This server had an internal and external
address but was on a different subnet.  The developers if required were able
to map a drive to this server using the internal address.

        Personally, unless there is a reason for external access to this
server, I would be putting a development server on the internal network so
that they can access it using explorer or IE.

        The idea of a DMZ is to put things that need to be accessed but not
to sacrifice them to the world so I would be putting the DMZ off the
firewall so that you only allow particular protocols through such as HTTP.
The mail server I would put internally but that is a personal thing.

        Bastion host:  Install an application level firewall and you should
be right.

        With the domains, I see nothing wrong with putting them all on one
domain then set up access groups.

        I would be putting the WINS internally and the DNS internally.

        John Taylor




        From:   Aaron <[EMAIL PROTECTED]> on 08/03/2000 12:49 AM
        To:     [EMAIL PROTECTED]@SMTP@Aus Exchange
        cc:      

        Subject:        DMZ, NT Browsing, Multi-homed hosting

        Hello All,

        I've looked through the archives and found some answers to some of
my 
        questions, however I still have some questions.  First off, we are a
web 
        hosting/development company with 8 servers that do most of our
hosting and 
        mail etc. I just started working here as a Network Admin and
realized that the 
        network is pretty wide open. (They're using NetBEUI still!!!)
Currently we 
        have no firewall set-up and all workstations and servers are
"visible" with 
        global IP addresses.   All the servers are running WinNT 4, with one
NT Domain 
        for Workstations and Servers.  We have a router setup but currently
there is 
        no filtering on it.  We have two subnets: one full Class C, and one
subnetted 
        Class C.

        The web developers have kept it like this so that they can "browse"
in windows 
        to the web server and change sites while they're live.  (This is why
they need 
        NetBEUI, as it broadcasts and the computers show up in Network
Neigbourhood 
        even if they have different IP net addresses)  I will be setting up
a WINS 
        server to take care of that problem, and then remove NetBEUI as a
protocol 
        from the network.

        Obviously this setup can't continue.  After browsing this group for
a while 
        and reading the archives I've made an initial plan and had some
questions:

        Proposed network layout:

        - Setup IP filtering on Router to Internet
        - Behind the router will then be the DMZ (is this correct? Should I
setup a 
        firewall behind the router and then the DMZ?)
        - In the DMZ I will have my Web Servers, Mail Server, DNS, and FTP.
        - Behind the DMZ is the firewall ( I haven't decided which one to
use 
        yet...probably FW-1 NT)
        - This firewall will use NAT to make internal network "invisible"
and use 
        192.168.x.y addresses for internal workstations.

        Now for the Questions:
        1) How can I set this up so my Developers can still browse with
Windows 
        Explorer to a mapped drive on a server in the DMZ?
        2) Should the WINS server be on the internal network?  Will WINS
help me in 
        this situation?  
        3) My web servers are multi-homed with up to 100 IPs on a single
system, will 
        this cause any problems for me?
        4) What software would I use as a Bastion Host, I see the term all
the time, 
        but are there any commercial (or Free)   software/OS packages that
are used 
        for this purpose?
        5) What kind of IP filtering rules should be on my router?
        6) Should I setup a different NT Domain for the servers and one for
the 
        internal workstations?  Then Setup a one-way trust relationship?
        7) Should I be using NAT on the firewall with private IPs inside, or
will this 
        not allow me to communicate with the NT servers in the DMZ.
        8) Is there anything else I should be concerned about or address
when setting 
        up my security system?  (aside from the obvious ones)

        Thanks for your help!

        Aaron Rothschild

        -
        [To unsubscribe, send mail to [EMAIL PROTECTED] with
        "unsubscribe firewalls" in the body of the message.]



-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to