A new category of products - cyberwalls, that performs very granular network
access control and intrusion prevention on the actual servers - can
eliminate your concern, since a rule can be put on the server defining
combinations of in/out services (ports) and IP addresses and would hence
eliminate back-end connections by someone accessing the remote diagnosed (or
managed) server.

If you like more info - pls send me a mail off the thread.

Thanx

Avi

Network-1 Security Solutions, Inc.
"Securing e-Business Networks"

> -----Original Message-----
> From: /o=citicorp/ou=DOMDI/cn=Recipients/cn=dmarkle  On Behalf Of David
> Markle
> Sent: Thursday, July 08, 1999 8:51 AM
> To:   'jaeger'; 'Firewalls'; 'ruegamer'
> Subject:      RE: Subject: Remote diagnostic security
> 
> Good points.  Additionally, you can use dialer call back as another layer
> of protection.
> 
>       -----Original Message-----
>       From:   jaeger [SMTP:[EMAIL PROTECTED]]
>       Sent:   Thursday, July 08, 1999 5:56 AM
>       To:     Firewalls; ruegamer
>       Cc:     jaeger
>       Subject:        RE: Subject: Remote diagnostic security
> 
>       we recommend the following approach to this wide spread problem:
> 
>       put a RAS Server or any other remote access device in the DMZ.
>       Authenticate remote users on the firewall. Establish a rule set on
> the
>       firewall that limits remote users access to only those systems
> really
>       needed. Sounds to good to be true? Right, you still have the problem
> of
>       authenticated remote users misusing the servers they have access to
> as a
>       jump platform. To prevent this you should have an IDS in place, that
>       monitors remote users activity and enforces a security policy on the
>       server itself. You need a host based IDS to achieve that level of
>       security. 
>       Alternatively you could have more than one DMZ or a second firewall,
>       where all your servers
>       are sitting behind the 1st firewall, but cannot be misused as a jump
>       platform because of the 2nd firewall.
> 
>       Karl Jaeger
>       BDG
> 
>       Peter wrote:
> 
>       >Date: Tue, 6 Jul 1999 10:53:40 +0200 
>       >From: [EMAIL PROTECTED]
>       >Subject: Remote diagnostic security
>       >
>       >Hello,
>       >
>       >has anyone a suggestion how I can handle remote diagnostic access
> to
>       >servers in our LAN. My first thought was to put the server which
> need
>       >remote diagnostic access in the DMZ. But in this case I have to put
> all
>       >my servers in the DMZ sooner or later. The remote diagnostic user 
>       >shouldn't get any access to other servers on the LAN. Yes I know I 
>       >asking for something impossible. But, if anyone has a solution
> please
>       >let me know. Thanks in advance.
>       >
>       >Peter Ruegamer
>       >Network Administrator
>       >MTU Friedrichshafen
>        << File: jaeger.vcf >> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to