I have a couple of questions about firewall strategies. I currently 
have a single Linux box doing duty as a web, mail, ftp, and news 
server, and it's also a firewall and masquerading for an internal 
network. It's time to break that functionality down into several 
machines, for various reasons. I have a 16 address subnet. I initially 
thought about using a three-homed machine along the lines of the 
"serious example" at the end of the ipchains how-to. But having a 
single point of entry/exit, while making security administration 
easier, seems to me to introduce a weak point as well. If the 
three-homed firewall goes down, I lose all services. 

Instead I've been thinking about just exposing the various 
mail/news/web servers and locking each down appropriately with 
ipchains, and allowing telnet and a few other services throughout the 
subnet for ease of maintenance. What's the better strategy? By exposing 
more machines directly am I increasing my security risk significantly? 
Or am I better protecting the network by only giving away a smaller 
piece of the pie if I do get hacked? Root passwords are different for 
all machines. 

Thanks for your help,

Dave

Dave Harms
[EMAIL PROTECTED]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to