hi ya eric

good... as long as your internal lan/fw is not off of the 
dmz... guess we're back in sync... not that it matters..

have fun fw'ing
alvin
http://www.Linux-Sec.net/FW


On Thu, 12 Jul 2001, Eric Johnson wrote:

> At 04:56 PM 7/12/2001 -0700, Alvin Oga wrote:
> 
> >hi ...
> >
> >just my $0.02 worth...
> >
> > >
> > > Would it be better to put it out on the DMZ or to run two DMZ's?
> > >
> > > I'd think it would be better to run two firewalls.  Something like:
> > >
> > >   Router/Firewall
> > >       |
> > >     DMZ
> > >       |
> > >   Firewall ----  ADSL machine -- Router/Firewall -- ADSL
> > >       |
> > >   Internal  Network
> >
> >dmz machines are endpoints... it shouldn't pass traffic to internal
> >  lans and firewalls
> >
> >
> >If time and cost and maintenance and skills was more of an issue ...
> >I'd propose a simpler solution for some personal networks
> >
> >
> >     internet
> >        |
> >        |
> >adsl router/firewall  ( hardware version ? )
> >        |
> >  f i r e w a l l   ( ipchians etc )
> >   |           |
> >  dmz       internal lan
> >192.168.x  10.0.1.x
> >
> >internal lan should NOT allow incoming traffic to the internal lan
> 
> I have seen diagrams like that, but they make me a bit nervous
> having only a single point of failure to compromise the internal
> network.
> 
> But you are right in one respect.  Maybe my drawing should have been
> something like this instead:
> 
>    Router/Firewall -- DMZ
>        |
>    Firewall ----  ADSL machine -- Router/Firewall -- ADSL
>        |
>    Internal  Network
> 
> My understanding of a DMZ is that it is usually one or more
> computers that are hardened and somewhat protected by a
> firewall or a router with ACL lists.  I really didn't mean that the
> traffic from the internal network to the internet would pass through
> each computer in the DMZ.  Just that the company firewall itself
> is in the DMZ.
> 
> Also, in the message that started this, I had the impression that
> they actually have two internet connections.  One through their
> ISP for general use and an ADSL connection for limited use.
> 
> >yes... if they hack into the firewall you're hosed... but you're
> >hosed anyway if they get into any firewall... cause if they get into
> >one... they can probably get into the 2nd one that is also misconfigured???
> 
> Probably.  But hopefully by the time they get into one and find out
> there is another to ge through, they will have been discovered and
> actions will be started to keep them from going further.
> 
> It is clear that the company LAN requires more serious protection
> than does the DMZ.  Ideally, the computers in the DMZ should be
> hardened (it would take a real lunatics put a Windows 95 or 98
> computer there).
> 
> In reality, the demands for protection of the DMZ are much different
> from the demands for protection of the internal network.  If you use
> a firewall to protect the DMZ instead of ACLs on a router, why not
> use one that is tuned to the job.  And for the internal firewall, use
> one tuned to that job.
> 
> If you just use one firewall for both, there would seem to be a greater
> chance of misapplying the rules for one side to also apply to the
> other.  It would be easy to accidentally permit incoming traffic on
> to the DMZ and the internal network when you really meant to just
> limit traffic to the DMZ.
> 
> Of course, a large company might reasonably have a large number of
> firewalls with individual departments in the company firewalled from
> the rest of the company.
> 
> Eric Johnson
> 

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to