3Com has an Embedded Firewall on a PCI card that can be used to secure individual machines (including webservers). The PCI card can restrict inbound/outbound traffic such that the machine in question could be a webserver, but is unable to initiate connections back out into the network.
http://www.3com.com/security/efw_info.html It's a good product for hardening a server (making sure it only uses approved ports, protocols, directions, etc.) as well as desktop PCs. Jared Valentine Network Security Consultant 3Com Corporation [EMAIL PROTECTED] On Wed, 15 May 2002, Robert Buel wrote: > Is the Web server located on your internal private network (LAN)? I > believe that it is a very bad idea to locate a web server on your > internal LAN. If the box is rooted, then they have full access to your > data and internal operations. If it is in a DMZ, then that is fine... > Definitely secure outbound ports. Stephen was right on... > > Bob > > -----Original Message----- > From: Stephen Kemler [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, May 14, 2002 1:55 PM > To: Craig Brauckmiller; [EMAIL PROTECTED] > Subject: Re: Outbound Firewall Rules for a Web Server > > > I have our IIS 5 server sitting on a private network with > > an IP of 10.2.32.20. It is being NAT'd via CheckPoint NG. > > I only allow HTTP traffic in to the web server but I allow > > the server unrestricted access out from the network. > > > > 1. Is this a good idea? > > > > 2. Should I lock down the web server's outbound ports to > > prevent Nimda/CodeRed type infections from propigating from > > my server? > > You should definately lock down your outbound traffic for all systems, > especially systems that accessible from outside the network. Consider a > very simple example: An attacker compromises your IIS server, installs > an > SSH client, and then uses your compromised host to launch further > attacks. > The idea here is to minimize damage. If you system is compromised, you > have > problems to deal with. If your system is compromised, and used to > launch a > further attack, you could have law enforcement agents to deal with. > > > 3. What ports should I allow the server to go out on if any? > > What do you use your Webserver for? If it is used strictly for serving > HTTP, then you should not have to allow much. Although you could > probably > get away with allowing no outbound traffic, you will probably want to be > able to resolve names in your logs, so probably DNS. Have any pages > that > generate emails? Then you will need to open SMTP. Also keep in mind > that > you can restrict where the outbound traffic goes -- so even if you > decide to > open up DNS, you could specify only to your DNS server. > > If you really want to determine what you have to open, close everything, > and > see what stops working, or who complains. Otherwise, set up a snifffer > for > a couple of days to determine that same information with less > disruption. > > Hope this helps, > Steve > >