On Sat, 15 Apr 2006, Thor (Hammer of God) wrote:

ISA Server is an application that is installed on top of the base OS. Are
you suggesting that the application should actually prevent the local
administrator of the host machine from installing and configuring what
protocols are bound to what adapters?

  No, I'm suggesting that the application should enable the local
  administrator to configure that application. Configuring a firewall
  is a bit more than setting a domain name. It must contain some
  (preferebly reasonable) filtering mechanisms.
  From what is said so far this seems not to be possible. If that is
  true, ISA is broken by design. We are talking about a firewall. A
  firewall that cannot filter is not a firewall. Agreed?

To me, *that* is the borderline.  There is no such thing as "for what ever
reason ipv6 in enabled on ISA" when it comes to administering an enterprise
firewall product.  If an administrator installs configures ipv6 on the OS of
the firewall, and then binds ipv6 to a protected network segment, then they
absolutely, positively, without-a-doubt get exactly what they deserve.

  Do you think the same applies to ipv4? I said "for what ever reason ipv6
  in enabled on ISA" because I am definitely not in the position to guess
  all possible reasons for activating ipv6.

Anyone who does that without understanding what they are doing are simply
taking jobs away from competent, knowledgeable administrators.

  You are speaking out of my deepest heart. Anyhow, you are aware that
  it is not always the incompentent admin; sometimes it is the incompetent
  superior and not every admin has the nerv and the backing to say no
  to idiotic orders by management.

The mindset of "protecting the ignorant administrator from themselves" in
this business has got to end.  Positioning this as if there is some flaw in

  Definitely.

ISA because the application does not prohibit a local administrator from
binding unsupported protocols to interfaces is simply ludicrous. In fact, it

  I still fail to see why an unsupported protocol goes through anyway.
  The reason for implementing a firewall is to separate networks with
  different trust levels. Not to connect them wide open. For this any
  router will do.

is the opposite that is true:  If I as an administrator of a machine want to
bind a protocol to an adapter for some reason (as in a separate, private
segment for use in a particular environment) then I should, indeed MUST, be
able to do it.  And I will be responsible for the implications of doing so.

  Sure. But even in a protected enviroment you may want some additional
  restrictions.

There was an earlier thread today where a simple list of hostnames being
filtered from the Win32 HOSTS file was positioned as "deliberate sabotage"
of our machines by Microsoft; a case of "It's my computer- keep your hands
off."  Yet here, the integrity of a product is being challenged because the
application does not prevent an administrator from installing and binding
protocols at the OS-level in cases where the application is not designed to
filter those protocols?  That is a double-standard at its best.

  Again: If that application is a firewall it's a must to be able to
  filter. Anything else is not logical.
  If the application is some funny network gaming tool, then I heartly
  agree.

  Cheers,

  Christine Kronberg.


Reply via email to