RE: Firewall and DMZ topology

2003-06-21 Thread Chris Berry
From: NC Agent [EMAIL PROTECTED] I'm not sure how a tri-homed firewall can be just as secure as a two firewall setup. Consider this: Hacker is able to penetrate your firewall and owns the box. In a tri-homed firewall, they now have direct access to your internal network. If this had been a two

RE: IDS question [was: Re: Firewall and DMZ topology]

2003-06-16 Thread John Brightwell
I wasn't completely clear in my last e-mail. I was thinking more along the lines of having the IDS in the DMZ. Any attacks that get past the outside firewall to the DMZ hosts would be caught by the IDS in the DMZ. The attacks that don't make it past the external firewall into the DMZ

IDS question [was: Re: Firewall and DMZ topology]

2003-06-12 Thread Steve Bremer
tri-homed firewall, more so if you have IDS sensors at exterior, dmz, and interior, and the time to monitor them. Changing subjects a little bit here. I agree with our IDS comment, but I'm curious about how your external IDS is used. I've ran into differing opinions on this (as I do with

RE: Firewall and DMZ

2003-06-12 Thread David Gillett
The problem with this is that there's almost always a need to provide (some) LAN users with access to servers in the DMZ, such as to maintain content. To avoid exposing that traffic, or the necessary firewall holes, to the Internet, you need to add a third firewall between the LAN and DMZ.

RE: IDS question [was: Re: Firewall and DMZ topology]

2003-06-12 Thread Mann, Bobby
Message- From: Steve Bremer To: [EMAIL PROTECTED] Sent: 6/12/03 5:56 AM Subject: IDS question [was: Re: Firewall and DMZ topology] tri-homed firewall, more so if you have IDS sensors at exterior, dmz, and interior, and the time to monitor them. Changing subjects a little bit here. I agree

Re: IDS question [was: Re: Firewall and DMZ topology]

2003-06-12 Thread Chris Berry
From: Steve Bremer [EMAIL PROTECTED] tri-homed firewall, more so if you have IDS sensors at exterior, dmz, and interior, and the time to monitor them. Changing subjects a little bit here. I agree with our IDS comment, but I'm curious about how your external IDS is used. I've ran into differing

RE: IDS question [was: Re: Firewall and DMZ topology]

2003-06-12 Thread Steve Bremer
Hi, External IDS can be inline or passive sitting on a span port. For any Good point. I was thinking of just a monitoring sensor, but an in-line sensor that can be configured to block active attacks would be nice. Has anyone tried Hogwash? So in my opinion I think it's important to

RE: Firewall and DMZ topology

2003-06-11 Thread Depp, Dennis M.
Ed, I agree that this is more likely. However, if the control a tri-homed firewall, they have access to your internal network. If they control the external firewall of a two firewal system they only have access to your DMZ. The original statement was something about there is no securit benefit

Re: Firewall and DMZ topology

2003-06-11 Thread Steve Bremer
In theory yes, however, if your administration isn't perfect, it would actually LOWER your security stance. Kind of goes against the KISS principal unless you have enough staff/time to keep a close eye on it. Guess it all depends on your size. True, but I figure that's what I'm paid for ;-)

RE: Firewall and DMZ topology

2003-06-11 Thread David J. Jackson
Small Office Home Office -Original Message- From: Morgado Alain [mailto:[EMAIL PROTECTED] Sent: Wednesday, June 11, 2003 7:55 AM To: [EMAIL PROTECTED] Subject: RE: Firewall and DMZ topology What is a soho? -Original Message- From: Christopher Ingram [mailto:[EMAIL PROTECTED

Ang: RE: Firewall and DMZ topology

2003-06-11 Thread marcus
-11 16:54 Till [EMAIL PROTECTED] Kopia Ă„rende RE: Firewall and DMZ topology What is a soho? -Original Message- From: Christopher Ingram [mailto:[EMAIL PROTECTED] Sent: Tuesday, June 10, 2003 3:01 PM To: [EMAIL PROTECTED] Subject: Re: Firewall and DMZ topology First I apologize

RE: Firewall and DMZ topology

2003-06-11 Thread ed
On Wed, 2003-06-11 at 15:54, Morgado Alain wrote: What is a soho? Small Office/Home Office signature.asc Description: This is a digitally signed message part

RE: Firewall and DMZ topology

2003-06-11 Thread David Gillett
-Original Message- From: Morgado Alain [mailto:[EMAIL PROTECTED] What is a soho? It's an acronym: Small Office / Home Office. SOHO products are typically aimed at networks of 5-15 machines, which may not have a full-time IT person. They need to be both cheap and simple. David

Re: Firewall and DMZ topology

2003-06-11 Thread Adam Newhard
soho = small office/home office webopedia.com is always a good place to get a(n) (extremely) general definition of terms. later, adam - Original Message - From: Morgado Alain [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, June 11, 2003 10:54 AM Subject: RE: Firewall and DMZ

Re: Firewall and DMZ topology

2003-06-11 Thread Chris Berry
From: Steve Bremer [EMAIL PROTECTED] In theory yes, however, if your administration isn't perfect, it would actually LOWER your security stance. Kind of goes against the KISS principal unless you have enough staff/time to keep a close eye on it. Guess it all depends on your size. True, but I

RE: Firewall and DMZ topology

2003-06-11 Thread Mann, Bobby
: 6/10/03 6:20 PM Subject: RE: Firewall and DMZ topology You are ignoring any intusion detection that should alert you to nefarious activity inside your DMZ. This same traffic on the outside of your firewall may not give concern or alarm, but when it is hitting the outside interface of your DMZ

Re: Firewall and DMZ topology - Thanks for all the information

2003-06-11 Thread Chris Berry
From: William J. Burgos [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: Firewall and DMZ topology - Thanks for all the information Date: 11 Jun 2003 12:09:32 +0900 Greetings all, Thank you all for your reply to my question regarding Firewalls and DMZ topology. This has been a lively thread

RE: Firewall and DMZ topology

2003-06-11 Thread Chris Berry
From: Morgado Alain [EMAIL PROTECTED] What is a soho? Small office home office Chris Berry [EMAIL PROTECTED] Systems Administrator JM Associates Within every man beats a heart of darkness. --The Shadow _ MSN 8 with e-mail virus

Re: Firewall and DMZ topology

2003-06-10 Thread Chris Berry
From: Christopher Ingram [EMAIL PROTECTED] So, the below setup is not decent for a corporate LAN. Ideally, the DMZ should sit on a seperate connection to the Internet from the rest of the network, using a different ISP and therefore, different IP block. This provides the most isolation. I'm

Re: Firewall and DMZ topology

2003-06-10 Thread Brad Mills
William, I would like to set up a SOHO network with a firewall and DMZ for mostly web serving and email. Of course, there are private PCs on the internal network, Windows and Linux. My connection is a dynamic IP on a pppoe and I already have an old laptop used as a simple firewall setup.

RE: Firewall and DMZ topology

2003-06-10 Thread David Gillett
-Original Message- From: Chris Berry [mailto:[EMAIL PROTECTED] I'm afraid I don't see how that: internet -- Firewall -- Lan internet -- Firewall -- DMZ Actually, it's internet -- Firewall -- LAN internet -- Firewall -- DMZ would be any more secure than this: internet --

Re: Firewall and DMZ topology

2003-06-10 Thread Erik Vincent
I think there is a major difference between: 1:internet -- Outer Firewall -- DMZ -- Inner Firewall -- LAN If your Outer Firewall is crack, only the DMZ computer will be unprotected but the LAN portion still protected. If

RE: Firewall and DMZ topology

2003-06-10 Thread ed
). This way all clients must still pass through your firewall to hit the mail server. Bob. -Original Message- From: Des Ward To: 'William J. Burgos' Cc: [EMAIL PROTECTED] Sent: 6/9/03 10:46 AM Subject: RE: Firewall and DMZ topology Basically, you're going to have to get a machine

Re: Firewall and DMZ topology

2003-06-10 Thread Daniel B. Cid
There are many reasons. The first of all, in this situation: internet -- Firewall -- LAN -- DMZ You need to pass through you LAN to access the DMZ ... I dont need to say anithing more. The purpose of a DMZ is to isolate the public servers from outside the LAN. If

RE: Firewall and DMZ topology

2003-06-10 Thread Des Ward
possible. Just my .002667 cents worth (After converting from the BRITISH and not ENGLISH pound) -Original Message- From: Chris Berry [mailto:[EMAIL PROTECTED] Sent: 10 June 2003 01:53 To: [EMAIL PROTECTED] Subject: Re: Firewall and DMZ topology From: Christopher Ingram [EMAIL PROTECTED

Re: Firewall and DMZ topology

2003-06-10 Thread Zach Crowell
Erik Vincent wrote: I think there is a major difference between: 1:internet -- Outer Firewall -- DMZ -- Inner Firewall -- LAN If your Outer Firewall is crack, only the DMZ computer will be unprotected but the LAN portion

Re: Firewall and DMZ topology

2003-06-10 Thread Erik Vincent
the mail server. Bob. -Original Message- From: Des Ward To: 'William J. Burgos' Cc: [EMAIL PROTECTED] Sent: 6/9/03 10:46 AM Subject: RE: Firewall and DMZ topology Basically, you're going to have to get a machine with three NICs. The purpose of a DMZ is to segment machines from your internal

RE: Firewall and DMZ topology

2003-06-10 Thread Chris Berry
From: Des Ward [EMAIL PROTECTED] The second means that all traffic has to traverse your LAN to get to the 'Unprotected' DMZ systems and also could leave your internal LAN open to attack. My ASCII drawing didn't come out very well it was supposed to represent a tri-homed firewall, which, to the

Re: Firewall and DMZ topology

2003-06-10 Thread Erik Vincent
Not realy, becouse they are configured differently. The outer Firewall let traffic from the internet inside the DMZ ie: SMTP, HTTP etc...) But the Inner firewall wont accept any connection from the DMZ to LAN, ie: internet - Outer Firewall - DMZ - Inner Firewall - LAN The Inner firewall will

Re: Firewall and DMZ topology

2003-06-10 Thread Daniel B. Cid
The proxy server cannot be inside the DMZ. You will only want to have public servers on it. This setup is very good, but in some cases (low money) the NIC2 can be the same as NIC1. Internet - (NIC 3) Firewall (NIC1) - Fireawll / Proxy server - LAN

Re: Firewall and DMZ topology

2003-06-10 Thread Chris Berry
From: Erik Vincent [EMAIL PROTECTED] 2: internet -- Firewall -- LAN -- DMZ If the Firewall is crack, the DMZ and LAN will be unprotected. It is far easier to crack a

RE: Firewall and DMZ topology

2003-06-10 Thread Depp, Dennis M.
I'm not sure how a tri-homed firewall can be just as secure as a two firewall setup. Consider this: Hacker is able to penetrate your firewall and owns the box. In a tri-homed firewall, they now have direct access to your internal network. If this had been a two firewall setup, they would have

Re: Firewall and DMZ topology

2003-06-10 Thread Daniel B. Cid
I think similar to you. In most companies all the firewalls are the same(same OS, same version and same configuration).. If someone is able to crack the firewall 1, will be able to crack the firewall 2 and 3 .. []`s Daniel B. Cid On Tue, 2003-06-10 at 13:41, Zach Crowell wrote: Erik

Re: Firewall and DMZ topology

2003-06-10 Thread Steve Bremer
Under what conditions would these firewalls be configured any differently from a vulnerability-assessment view point? i.e., if someone was able to crack the outer firewall, is it not likely they would crack the inner firewall as well? Not necessarily. If different types of firewalls are

Re: Firewall and DMZ topology

2003-06-10 Thread Daniel B. Cid
J. Burgos' Cc: [EMAIL PROTECTED] Sent: 6/9/03 10:46 AM Subject: RE: Firewall and DMZ topology Basically, you're going to have to get a machine with three NICs. The purpose of a DMZ is to segment machines from your internal network whilst still providing protection for them. Any other

RE: Firewall and DMZ topology

2003-06-10 Thread David Ellis
OK, everyone, Use a firewall with three network cards in it, one going to DMZ, one going to lan, and one going to internet, allow traffic such as smtp to dmz, don't allow any traffic to internally. Store all your smtp messages in the dmz. Use an internal program on the lan to go out and grab the

RE: Firewall and DMZ topology

2003-06-10 Thread Steve Bremer
I do think tri-homed firewalls are a good solution, but they are not as secure as a two firewall solution. Why not combine both topologies? Internet | | | Ext FW --- External DMZ | | (Int DMZ) | Int FW | | | LAN The network between the

RE: Firewall and DMZ topology

2003-06-10 Thread DeGennaro, Gregory
, June 10, 2003 11:41 AM To: Chris Berry; [EMAIL PROTECTED] Subject: RE: Firewall and DMZ topology I'm not sure how a tri-homed firewall can be just as secure as a two firewall setup. Consider this: Hacker is able to penetrate your firewall and owns the box. In a tri-homed firewall, they now have

RE: Firewall and DMZ topology

2003-06-10 Thread Depp, Dennis M.
First in order to increase security Firewall1 should not be the same as Firewall2. Even if they are the same, rules will be different on each of the firewall. Different rules means different vulnerabilities. Finally Intrusion detection should be more sensative on the inside of the outer

RE: Firewall and DMZ topology

2003-06-10 Thread Daniel B. Cid
Is not that the problem. For example, if you use Linux as your firewall, and if someone break your first firewall, in most of the cases this person will be able to break the second too. why ? Because in both firewalls you will not run a webserver or a mail server, but only administrative stuffs,

Re: Firewall and DMZ topology

2003-06-10 Thread Chris Berry
From: Steve Bremer [EMAIL PROTECTED] Under what conditions would these firewalls be configured any differently from a vulnerability-assessment view point? i.e., if someone was able to crack the outer firewall, is it not likely they would crack the inner firewall as well? Not necessarily. If

RE: Firewall and DMZ topology

2003-06-10 Thread ed
This is true to an extent. However it is far more likely that someone will use an exploit on the server in the DMZ than on the firewall its self. For example: Lets say you have a linux box running iptables with three NICs as your firewall. Behind the firewall, in the DMZ you have a web-server

RE: Firewall and DMZ topology

2003-06-09 Thread Des Ward
Basically, you're going to have to get a machine with three NICs. The purpose of a DMZ is to segment machines from your internal network whilst still providing protection for them. Any other solution will just not give you the right balance of security. Sorry -Original Message- From:

Re: Firewall and DMZ topology

2003-06-09 Thread Christopher Ingram
That would me more secure than some of the options presented, although the first firewall could reside on the DMZ. The point, however, is that even though the DMZ is isolated from the internal network (things like file sharing between workstations is protected) should the DMZ be compromised,

RE: Firewall and DMZ topology

2003-06-09 Thread Mann, Bobby
PROTECTED] Sent: 6/9/03 10:46 AM Subject: RE: Firewall and DMZ topology Basically, you're going to have to get a machine with three NICs. The purpose of a DMZ is to segment machines from your internal network whilst still providing protection for them. Any other solution will just not give you