Actually this is not true.  I have done multiple Visio and other type of 
network diagrams down to the port level and all the way up to the 30,000 
foot level..  It takes a while to not only understand how to draw one, but 
to make one seem decipherable by the massess.

/mark

At 01:59 PM 10/10/00 -0400, Marc E. Mandel wrote:
>Dear All:
>
>I have been getting a number of off-list replies to my query and have been 
>responding to them likewise.  I therefore thought that I should post a 
>summary of information discussed to the list.
>
>Kyle Haugsness provided references of a number of switch vulnerabilities.
>
>Richard Taylor gave this published reference:
>Building Internet Firewalls, 2nd Edition,  Elizabeth D. Zwicky, Simon
>Cooper, & D. Brent Chapman, O'Reilly & Associates, Page 101
>"You should not rely on VLANs to provide strong, secure separation between
>networks"
>"they provide a small measure of increased security over a plain switched"
>
>Michael Hamelin also provided references to switch vulnerabilities.  He 
>also wrote, "I have serious reservations about trusting a VLAN outside the 
>Firewall."
>
>In replying to these individuals, I stated my views:
>"In most of the diagrams that I have seen, the physical connectivity is 
>usually stylized and never actually show details down to the actual 
>switches, hubs, or cables (10base-T, baseband, broadband, etc.) that 
>compose the logical LAN segments.  In addition, the switch vendors (e.g.; 
>Cisco, 3Com, ...) will all tell you that it is "safe" to use a single 
>intelligent switch configured with logically isolated VLANs to build such 
>an architecture.  Since I started in information security at a defense 
>contractor, I tend to adhere to the belief that individual physical 
>segments is the best way to ensure that the two security domains will 
>remain safely isolated in the event of an equipment failure in the device 
>providing the interconnection."
>"My concern ... stems from the rare situation when the switch fails in 
>such a way as to loose its configuration.  Almost every network device 
>(e.g.; switch, router, ...) that I have seen will default to all ports 
>open (i.e.; a bridged configuration) in such situations.  Only purpose 
>built firewalls are normally designed to forbid all traffic if they were 
>to fail the same way."
>
>In summation, at this time it appears that the consensus is: Connecting 
>both the external and internal ports of a firewall to a single switch is 
>an architectural approach that does not represent "best practice."
>
>I can only hope that:
>(1) The switch vendors work to rectify the vulnerability to the 
>satisfaction of an independent, third party review acceptable to the industry.
>(2) That the authors of firewall books, such as those by Cheswick & 
>Bellovin, Goncalves & Brown, and Zwicky, Cooper, & Chapman, add a 
>discussion on this matter the next time their books are revised.  (If any 
>of these authors are monitoring this list, I'd love to hear your comments 
>about this.)
>
>Respectfully;
>
>Marc Mandel
>[EMAIL PROTECTED]
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to