> A new category of products - cyberwalls, that performs very granular
> network access control and intrusion prevention on the actual servers -
> can eliminate your concern, since a rule can be put on the server defining
> combinations of in/out services (ports) and IP addresses and would hence
> eliminate back-end connections by someone accessing the remote diagnosed
> (or managed) server.
> 
> If you like more info - pls send me a mail off the thread.
> 
> Thanx
> 
> Avi
> 
> Network-1 Security Solutions, Inc.
> "Securing e-Business Networks"
> 
>       -----Original Message-----
>       From:   /o=citicorp/ou=DOMDI/cn=Recipients/cn=dmarkle  On Behalf Of
> David Markle
>       Sent:   Thursday, July 08, 1999 8:51 AM
>       To:     'jaeger'; 'Firewalls'; 'ruegamer'
>       Subject:        RE: Subject: Remote diagnostic security
> 
>       Good points.  Additionally, you can use dialer call back as another
> layer of protection.
> 
>               -----Original Message-----
>               From:   jaeger [SMTP:[EMAIL PROTECTED]]
>               Sent:   Thursday, July 08, 1999 5:56 AM
>               To:     Firewalls; ruegamer
>               Cc:     jaeger
>               Subject:        RE: Subject: Remote diagnostic security
> 
>               we recommend the following approach to this wide spread
> problem:
> 
>               put a RAS Server or any other remote access device in the
> DMZ.
>               Authenticate remote users on the firewall. Establish a rule
> set on the
>               firewall that limits remote users access to only those
> systems really
>               needed. Sounds to good to be true? Right, you still have the
> problem of
>               authenticated remote users misusing the servers they have
> access to as a
>               jump platform. To prevent this you should have an IDS in
> place, that
>               monitors remote users activity and enforces a security
> policy on the
>               server itself. You need a host based IDS to achieve that
> level of
>               security. 
>               Alternatively you could have more than one DMZ or a second
> firewall,
>               where all your servers
>               are sitting behind the 1st firewall, but cannot be misused
> as a jump
>               platform because of the 2nd firewall.
> 
>               Karl Jaeger
>               BDG
> 
>               Peter wrote:
> 
>               >Date: Tue, 6 Jul 1999 10:53:40 +0200 
>               >From: [EMAIL PROTECTED]
>               >Subject: Remote diagnostic security
>               >
>               >Hello,
>               >
>               >has anyone a suggestion how I can handle remote diagnostic
> access to
>               >servers in our LAN. My first thought was to put the server
> which need
>               >remote diagnostic access in the DMZ. But in this case I
> have to put all
>               >my servers in the DMZ sooner or later. The remote
> diagnostic user 
>               >shouldn't get any access to other servers on the LAN. Yes I
> know I 
>               >asking for something impossible. But, if anyone has a
> solution please
>               >let me know. Thanks in advance.
>               >
>               >Peter Ruegamer
>               >Network Administrator
>               >MTU Friedrichshafen
>                << File: jaeger.vcf >> 

application/ms-tnef

Reply via email to