Considering the low cost firewalls out there, not to mention the free ones,
how much of a savings are you planning on? Look, the paddle is much bigger
if your hit with an attack, or even worse, someone owns your servers (the
more likely scenario) pilfering intellectual assets, than if you spend a
little more dollars up front.
> [EMAIL PROTECTED] wrote:
> So is it safe to deploy three nic cards on one firewall to save money if
> an organization doesn't have the funds to deploy the two firewall
> method. I do agree two firewalls with the dmz in the middle seems to be
> allot more secure. My question is can one make a single firewall
> solution with three nics just as secure too?
In short, NO. I'll stand by my original arguments. However, add some
additional tid-bits:
1) Performance - considering your low budget, I can only assume that your
box is not a blast-furnace in performance. Placing several nic cards in a
single point of presence - by design will be a function of performance
degradation. Your security budget is subject to critique if your design
impacts your production's bottom line. You think your budget is small now,
wait til your firewall becomes a bottleneck to the rest of the
organization.
2) Single point of failure (nuff said).
3) Policies grow with time - do you really want "war and peace" for a
security policy - catering to an array of nic cards is just asking for
"human error". Effective defenses are simple and elegant, not convoluted.
4) Now remember - the appropriate defense is only half the equation - the
effectiveness of your design will be measure in post-mortums, i.e., "what
happened", "how was it avoided", or "how do we avoid it in the future (more
likely). In short, FAULT ISOLATION, Time to respond (there is that term
again "time" hmmm, firewall = delay time). How effective are you going to
be if your policy/logs reads like an air traffic control screen.
Sorry about the verbal-rhea!
chao!
> dmz
> /
> Inet-------FW-----inernal lan
>
> It is possible to block originating telnet ftp whatever type of traffic
> from passing from the dmz nic to the protected lan nic.
Your security policy may be the end all blocking my telnet attempts to leap
over to the other nic (but that's not how I'm going to get in, i.e,
vulnerabilities in O/S, hardware, protocols, packets, applications, et. al.
>
>
> Am I thinking correctly?
>
> thanks
> al
>
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, May 03, 2000 6:36 PM
> Cc: '[EMAIL PROTECTED]'
> Subject: Re: Where to place public servers
>
> Aza,
>
> I understand your perspective on your public hosts;
>
> Inet-------FW1------Public Servers
> \--- Private Servers
>
> However, this has a disadvantage that that only one firewall needs to be
> penetrated to enter local network. In addition, there must be an
> enforcement
> point between networks at a different trust level. So this
> configuration
> would put the public Servers and the internal private servers at the
> same
> trust level. If they are really different, then so should be your
> policy to
> protect them.
>
> In addition, Placing a publicly accessible servers on the same trusted
> domain
> firewall is about as sure a way of getting your internal network
> compromised
> as any. By allowing inbound connections to pass through the firewall to
> appointed segments, you are opening up your trusted segments to attack
> as soon
>
> as a vulnerability is discovered in one of the untrusted segment
> servers.
> Granted the other segments are protected by policy, but considering that
> the
> intrusion or vulnerability of the untrusted segment servers has
> compromised
> the firewall, it is just a matter of time before the other segments go
> as
> well.
>
> In fact, vulnerabilities of protected servers can be used against the
> firewall
>
> itself. Hence, the actual firewall can be compromised. The firewall is
> then
> useless in trying to minimize the scope of the compromise (what
> firewalls
> where designed to do).
>
> Consider:
>
> THE TWO FIREWALL APPROACH
>
> This is the reason that people like the two-firewall approach
>
> Inet-------FW1------Public Servers-----FW2 --- Private Servers
>
> This approach is the concept of security in depth. In real-world
> firewalls,
> walls are measured in minutes of burn through delay. One would then
> calculate
>
> the time it would take for a fire to burn through to the "apps" room
> from the
> "inet" room as the time of the outer firewall plus the time of the inner
> firewall. In the electronic world, things aren't so clear. In
> particular, if
>
> the two enforcement points are using the same kind of technology and are
> configured by the same people, they probably have the same kinds of
> vulnerabilities, and so having them in series adds very little to the
> strength
>
> of the suite.
>
> Hence, the DMZ approach to make sense, the two firewall suites should be
> using
>
> different technologies, e.g. the outer FW1 is a stateful packet filter
> from
> one vendor, while the inner FW2 is from another vendor. Why? Once one
> Firewall has been breached, the second if the same type of firewall,
> with the
> same administrator, with the same policies... follow?
>
> You probably also want to have an IDS setting off an alarm somewhere on
> that
> Citrix net, so that you are made aware that there is traffic between the
> two
> firewalls of a nature that is not permitted, so that you can take
> appropriate
> action before the inner firewall goes down.
>
> Inet -- FW1 -- Public Servers-- FW2 -- Private Servers
> |
> IDS
>
> Cheers,
>
> Aza Goudriaan wrote:
>
> > In a 'security improvement module' about deploying firewalls
> > (http://www.sei.cmu.edu/pub/documents/sims/pdf/sim008.pdf or in HTML:
> > http://www.cert.org/security-improvement/modules/m08.html), several
> > different architectures for placing a firewall are given. In this
> document
> > they are speaking about a untrustworthy host, which is a host that
> isn't
> > protected by the firewall. Therefore, hosts on the private network
> (behind
> > the firewall) can place only limited trust in it.
> > I think that kind of hosts are web servers, mail servers and ftp
> servers.
> >
> > The people who have written this document, advise this architecture
> when
> > using a single firewall:
> >
> > priv. network --- firewall ----- untrustw. host ----- internet
> >
> > They motivate their choice with the statement that when the untrustw.
> host
> > has been compromised, intruders don't have access to your network. I
> agree,
> > but your public host isn't really secured. In my opinion it is better
> to
> > place the public host behind the firewall and then create rules to
> access
> > that system from internet (static NAT, e.g.), and / or use a reverse
> proxy.
> >
> > What is your opinion about it?
> >
> > TIA.
> >
> > Kind regards,
> > Aza Goudriaan.
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]