you are right each approach has its own pros and cons
     
     1) this does not seem to be a logical choise. if the servers are 
     compromized you have an hacker with all the user names and passwords 
     on the server and a bastion host outside the wall to break into the 
     wall.
     
     2) installing in the DMZ
     
     This seems more secure, if the servers are compromised you still have 
     additional security, but it is more complicated to impliment. Another 
     observation is that you will be opening a hole from your DMZ to the 
     internal network and vice versa. 
     
     2) On the internal
     
     This seems like the most uncomplicated way of doing it. you can 
     control the security at the firewall and monitor traffic for any 
     goofing around. open PPTP or whatever the client requires and this 
     should work fine. remember you can keep on adding security, but at 
     some point you have to ask, is it worth it?
     
     
     Amit Kaushal
     Deloitte & Touche LLP
     ebusiness technologies and security


______________________________ Reply Separator _________________________________
Subject: Where Should the VPN Server Go?
Author:  [EMAIL PROTECTED] at Internet-USA
Date:    5/31/2000 10:15 AM


Greetings! This is my first post to the firewalls mailing list.
     
I am about to install two Windows NT or Windows 2000 VPN servers for 
site-site communications and road-warrior access.
     
What is the conventional wisdom for the placement of these servers? Should 
they each go:
     
(1) Outside their respective firewalls?
     
(2) In the DMZ at each location?
     
(3) On the internal network at each location?
     
Each approach seems to have its own advantages and disadvantages.
     
--Eric
     
     
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with 
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to