I am in agreement.
Why put the external nic in the DMZ at all?

- connect a hub to your router
- Firewall external nic gets connected to hub
- concentrator external nic gets put into hub
- both internal nics get connected to switch (Secure LAN)

As far as I know, this is the manufacturer's suggested practice, and the
most reasonable...
After this, you point the packets where they are supposed to go :-)

Just make sure you only allow those authorized into your concentrator.

IMO, it is best to use the DMZ for things it is good for... Such as Web
servers ;-)
    Regards,
        Marshal


-----Original Message-----
From: Patrick Ramsey [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, May 28, 2002 11:03 AM
To: [EMAIL PROTECTED]
Subject: Re: VPN Design [7:44953]


Well, have you thought this setup through?

I mean... if you are placing the vpn device's external nic in the dmz, and
it's internal nic on your lan, you are defeating your firewall.  You still
have to allow access into the vpn device.(which is the same as having it on
the outside)  If you really want to have the double protection, you should
think about placing the vpn's external nic on the outside and creating a
tunnel though the dmz. (of course this also defeats your firewall, but at
least you can set the pix to only tunnel from the vpn device)

But at this point, it's a trust game.  You trust your firewall to protect
your corporate lan right?  Why would you not trust your vpn device?  There's
nothing wrong with running parallel firewalls or vpn scenarios.  I'm pretty
sure I can come up with a list of pros and cons for both.  In the end you'll
probably find them to be 50/50.

Of course, running in parallel may actualy cause issues for your clients on
the outside.  If the concentrator is not the default route, then you may run
into asymetric routing problems.

You might try just using one nic in the concentrator too.  Unless you are in
a scenario that requires high speed routing, chances are, that t1 to the
internet is not going to bog down your vpn device.

just somoe tidbits to think about.

-Patrick

>>> "neil K."  05/24/02 11:10AM >>>
Hi All,

1. Could anyone please tell me what needs to be done on the PIX firewall if
the
Cisco VPN concentrator is placed in such a way as the public interface is in
the DMZ and private interface on the inside network.
2. This design of placing the Concentraor in the DMZ is a little complex as
compared to keeping the Concentrator Parallel to Firewall, which has
security
risks.Also in the case of Parallel design concentrator public address has to
be in the IP subnet as the
Firewall and the External Router( If I am not wrong) can this be overcome by
placing the Concentrator in the DMZ.
3. Does the firewall need some routing capability so that it can route
Encrypted packets to go thru concentrator or can it be done by adding routes
to the servers pointing to concentrator.
4. What will have to be done if there are some AS-400 servers and we are
planning to use IPsec.

Any help will be highly appreciated.

Thanks,

Neil
>>>>>>>>>>>>>  Confidentiality Disclaimer   <<<<<<<<<<<<<<<<
This email and any files transmitted with it may contain confidential and
/or proprietary information in the possession of WellStar Health System,
Inc. ("WellStar") and is intended only for the individual or entity to whom
addressed.  This email may contain information that is held to be
privileged, confidential and exempt from disclosure under applicable law. If
the reader of this message is not the intended recipient, you are hereby
notified that any unauthorized access, dissemination, distribution or
copying of any information from this email is strictly prohibited, and may
subject you to criminal and/or civil liability. If you have received this
email in error, please notify the sender by reply email and then delete this
email and its attachments from your computer. Thank you.

================================================================




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=45386&t=44953
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to