I've been following the list for a few weeks and I've noticed a number
of questions/answers about methods and risks associated with allowing
different types of traffic through a firewall. Can someone point me to
reasonably complete technical information about this topic?
I work for a company with both Internet and extranet (VAN, frame relay,
and leased line) connectivity to important partners and customers. Some of
these connections utilize hosts maintained outside a state-based packet
filter firewall. The external servers are fairly common (FTP, reverse
proxy, web, SMTP, DNS, etc.) and run on both NT and UNIX.
I'm looking for documentation on how to most securely perform adequate
remote administration and monitoring functions on these external hosts. We
have requirements for traffic initiated internally and externally (i.e.,
access for internal users to place data on external hosts for customer
pick-up, and access for external security software to send traps to an
internal server when a change occurs to important configuration data).
Regards,
Mike Brown
[EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]