----- Original Message -----
From: "David LeBlanc" <[EMAIL PROTECTED]>
To: "'Jim Stagg'" <[EMAIL PROTECTED]>; "'Focus-MS'"
<[email protected]>
Sent: Sunday, October 30, 2005 3:20 PM
Subject: RE: Active Directory and IIS on production servers, and clustering
Next, consider the possibility of trusts to the internal domain. In most
cases, unless there is some pressing business need to make a trust, I
would
_not_ establish a trust between the DMZ domain and the internal domain,
but
if I did, I'd make sure and use Win2k3 DCs and make it a limited trust.
Additionally, if I had to create a trust out into the DMZ, I'd strongly
consider making 2 DMZs so that I could watch the one with the trust very,
very carefully.
Just to elaborate, if one *did* decide to implement such a trust model
(Which, I too would *not* recommend doing) it should be an external, one
way, nontransitive trust to a domain in a separate forest. I'm sure that's
what you had in mind, but I think it's important to be specific about these
things, particularly when discussing trusts between a DMZ domain and an
internal domain.
The logical boundary might be the domain, but the true security boundary is
the forest. I know you know that, but we need to say it.
I'm all up for a separate forest/domain for the DMZ- It is standard practice
for me. But I can't honestly think of a good reason to go through all the
trouble of a trust, even if external, between the internal and DMZ domains.
Yikes- it gives me the shivers just considering such a thing... The needed
firewall ruleset alone is too much exposure if you asked me... When you can
securely administer the DMZ via RDP and do so with no static rules (outbound
only 3389 or whatever) and an isolated AD, why risk it??
t
---------------------------------------------------------------------------
---------------------------------------------------------------------------