My opinion, which is biased, is that you could firewall the front-end server
with server resident firewall technology, that would allow you to have
different rules / protocols / services-ports / times of day / diresctionsla
controls for every NIC.
It would still allow you to use IPSEc if you choose to do so on the back-end
connections.

***********************************************
Avi A. Fogel    
Network-1 Security Solutions, Inc.
"Securing e-Business Networks"
1601 Trapelo Rd.
Waltham, MA 02451-7333
Tel:            781-522-3400
Fax:            781-522-3450
Email:              [EMAIL PROTECTED]
Web:            http://www.network-1.com
NASDAQ:      NSSI

This machine is protected by the best host-
resident firewall in the market - CyberwallPLUS.
Feel free to try and break in at your own risk.
***********************************************



>>> -----Original Message-----
>>> From: Steve Riley (MCS) [mailto:[EMAIL PROTECTED]]
>>> Sent: Wednesday, November 01, 2000 2:36 PM
>>> To: '[EMAIL PROTECTED]'
>>> Subject: Need your opinion on a design choice, please.
>>> 
>>> 
>>> In typical enterprise networking, the recommended way to 
>>> build in Internet
>>> connectivity is with the classic DMZ: there are two 
>>> firewalls, one facing
>>> the Internet and the other facing the corporate network; 
>>> all DMZ resources
>>> can make connections out the Internet as well as receive inbound
>>> connections; the internal firewall allows only outbound 
>>> connections from the
>>> internal network, thus preventing the internal network from 
>>> being attacked
>>> by the DMZ. OK, so far so good -- there's never really any 
>>> reason for DMZ
>>> hosts to make connections into the internal network.
>>> 
>>> But what about for service providers? Your typical hosted Exchange
>>> environment will have protocol servers in a front-end network and an
>>> Exchange store in a back-end network. Obviously, now, there 
>>> will need to be
>>> some traffic originating from the front net (DMZ) and 
>>> heading into the back
>>> (internal network). Since this traffic might be carried 
>>> over RPC, does it
>>> really even make sense to put a firewall between the front 
>>> and the back
>>> networks? My gut tells me it's still the best thing to do, 
>>> even if you have
>>> to open up the firewall to handle RPC (and we can limit 
>>> port use by making
>>> some registry modifications on the servers). You could use 
>>> IPSec to carry
>>> all that traffic and therefore lock down the firewall, but most
>>> implementations use clusters in the back network, and IPSec 
>>> doesn't like
>>> clusters very much.
>>> 
>>> I'm asking this question because a number of network 
>>> designers have simply
>>> dual-homed their front-end servers, with one NIC pointing 
>>> to the Internet
>>> and the other NIC pointing to the back. I'm just not 
>>> comfortable with this,
>>> but honestly I can't really think of concrete reasons why! 
>>> Maybe my brain
>>> won't engage today. Anyway, what are your thoughts on this? Thanks!
>>> 
>>> ___________________________________________________________
>>> Steve Riley
>>> Microsoft Telecommunications Consulting in Denver, Colorado
>>>    [EMAIL PROTECTED]
>>>    +1 303 521-4129 or [EMAIL PROTECTED]
>>>    www.microsoft.com/isn/
>>> Applying computer technology is simply finding the right 
>>> wrench to pound in
>>> the correct screw.
>>> 
>>> 
>>> -
>>> [To unsubscribe, send mail to [EMAIL PROTECTED] with
>>> "unsubscribe firewalls" in the body of the message.]
>>> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to