Hello Dan,

The architecture you set up will depend on the sensitivity of the data, the
risk value involved and the money your company has to spend, as I am sure
you already know.

The need for a firewall is not negated by the need for a two-way connection.
I have experience with PIX so my example will be based on this. You can
specify a conduit through the firewall from one and only one address on the
outside to one and only one address on the inside. This will ensure that
only data from the web server gets to the SQL server. Likewise, with a
conduit going out you can specify that data from the SQL server goes only to
the web server.

The most secure architecture could go something like this. A firewall for
each protocol coming into the DMZ. User authentication into the DMZ via a
SOCKS proxy by which you can also determine permitted destinations. Traffic
destined for the web server is proxied by application. All traffic to and
from the web server is 128-bit SSL. Authentication at the web server is
verified at the SQL server. No login/password or any other type of data on
the web server. Or, better yet, initial authentication to the web server
could be verified against something like active directory or ACF2 and a
secondary authentication to the SQL server. Ensure no cached information
exists, clicking the 'back' button gets the user nowhere. Queries from the
web server to the SQL server are encrypted and go through another firewall
and, again, proxied by application on the inside of this firewall. Also, set
up a timeout value so that each session expires after inactivity. NAT
traffic from the core-DMZ firewall and then NAT the traffic from the
DMZ-Internet firewall. Set up an IDS for the web server.

...or something like that...

Cheers,

Jeff

-----Original Message-----
From: Dan Williamson [mailto:[EMAIL PROTECTED]]
Sent: Monday, May 20, 2002 2:39 PM
To: [EMAIL PROTECTED]
Subject: Secure Infrastructure




I currently am faced with a troublesome infrastructure 
dilemma.

We have some real-time data that resides on an SQL server 
in our intranet. This data is queried and updated by users 
via a web server that is in our DMZ. Queries are sent from 
the web server in the DMZ to the SQL server and data is 
provided from the SQL server back to the web server based 
on the queries. This obviously requires a two way 
connection through the firewall which negates the reason 
for the firewall in the first place. The question I have is 
what is the most secure network design for these systems? 
How do you provide access to real-time sensitive data in a 
secure environment? Financial, medical and other government 
agencies provide this kind of real-time information on a 
daily basis so I know there are ways to do what we need. 
I'm just not sure how yet.

Any suggestions would be greatly appreciated.

Reply via email to