Do you load balance traffic to your fire wall(s)?  If so, what methodology
and more importantly, whose technology are you using.  For example, if you
were utilizing Foundry Networks ServerIronXLs and are employing a sandwich
architecture, you could not only switch based on the protocol and in effect
load balance all port 80 and 443 traffic to different devices respectively,
you could also provide nimda/code red (sic Trojan) mitigation.  I believe
that Cisco's CSS switches will allow you the same functionality but am not
quite up to speed on that gear. Security Policies gain legitimacy through
actions.  Your Security Policy and Procedures should act as a point of
reference to for your Rulesets, however it will be up to you as the
administrator, working with your ITSEC team and business units to define and
streamline your identify the types of traffic you will need to allow entry
and exit from your network in order to maintain normal business conditions.
Remember the more complex a solution is, the greater the risk due to
learning curve, configuration etc.   you are concerned about Worms and
viruses infiltrating hosts within or past a zone/dmz you may wish to explore
not only Network Based Intrusion Detection, but Host Based as well.



-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Patrick Ramsey
Sent: Tuesday, April 23, 2002 12:59 PM
To: [EMAIL PROTECTED]
Subject: Re: Security advice - opening ports other than 80 and 443 in[7:
[7:42347]


a good security policy would have had this matetr taken care of as soon as
it sprouted!  :)   (not directed to you Sam, just replying to thread)  :)

that aside,

1) opening up every port on the firewall is not danegrous unless you have
something accesible via the firewall listening on a specific port.

2) it only takes one server to be hacked to bring a network to a stop

3) 1 should never happen because it is highly insecure..  :)

>>> "sam sneed"  04/23/02 12:41PM >>>
They can do more than just bring the server down. They can gain control of
the server and have it attack other servers on your network or outside
network. ex. the IIS code red worm only needed port 80 to be open on
Winblows servers to spread across the internet.

""Brown, M""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Certain application requires port other than 80 or 443 opened in the
> firewall for inbound and outbound traffic. The firewall was configured to
> allow traffic to that specific server ip address.
>
> The software vendor argues "that the worst scenario could be that hackers
> could bring the server down. No other significant would be possible. "
>
>  Is that true  ?
>
> How risky is that to my network ?  I would like to secure that connection
> using CA from the company and IPSec. The software vendor argues that is
not
> necessary.
>>>>>>>>>>>>>  Confidentiality Disclaimer   <<<<<<<<<<<<<<<<
This email and any files transmitted with it may contain confidential and
/or proprietary information in the possession of WellStar Health System,
Inc. ("WellStar") and is intended only for the individual or entity to whom
addressed.  This email may contain information that is held to be
privileged, confidential and exempt from disclosure under applicable law. If
the reader of this message is not the intended recipient, you are hereby
notified that any unauthorized access, dissemination, distribution or
copying of any information from this email is strictly prohibited, and may
subject you to criminal and/or civil liability. If you have received this
email in error, please notify the sender by reply email and then delete this
email and its attachments from your computer. Thank you.

================================================================




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=42356&t=42356
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to