2000-04-22-11:43:43 Kelly Scroggins:
> My boss has asked me to investigate the various firewall/proxy
> solutions that would work for our company.

A great start.

But not, unfortunately, enough to make really great use of these
mailing lists and the expertise they contain.

I recommend you ask your question again, and this time provide some
more details. The first ones are easy:

1. What are your network requirements? What speed connection do you
   have to the internet? Approximately how many users do you have?
   Do they run any especially resource-intensive applications? Will
   you want to publish any large volume of traffic through the
   firewall back out to the internet? Do you have multiple
   connections that the firewall will have to intelligently route?
   Do you need High-Availability or load balancing with multiple
   firewalls?

2. What's your in-house expertise? Do the folks who are going to
   administer this have any particular systems on which they're
   exceptionally strong --- or particularly weak?

The last one is the toughie, answering it thoroughly may require a
good bit of work, but it will be critical to the success of your
project:

3. What's your security policy? What protocols must you allow
   incoming? What protocols must you permit outbound? Do you require
   per-user authentication for these protocols? Are you going to be
   attempting to examine or filter the content passed through
   various protocols --- e.g. email, http, ftp, ... --- as it passes
   through the firewall? Are you interested only in protecting
   against unassisted outside attacks, or are you also concerned
   with protecting against potentially hostile attackers or code
   running inside the firewall? How about email worms, viruses, and
   other such problems?

If you can nail down 1 and 2 reasonably tightly, and even just offer
some reasonable guesses about 3, you can get much better answers
from the folks out here.

But thoroughly answering 3 is the most valuable, and at the same
time far and away the hardest. To really do the job, you need to
define what resources you must protect, and what threats you care
about. For some sites, the combination of good backups and a loose
firewall can bring things to a reasonable balance. At other sites
you need to impose a really really strict, draconian policy that
prohibits users from using anything but proxied, scanned, examined
email, and proxied, logged, filtered http. Most sites are somewhere
in between the extremes. The tighter the security you want, the more
inconvenience you must impose upon your users.

-Bennett

PGP signature

Reply via email to