----- Original Message -----
From: Mike Shaw <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, March 07, 2002 06:25
Subject: VLAN as a DMZ


> There are definitely textbook reasons (secondary compromize issues, etc),
> but does anyone know of a specific technical reason why using a VLAN for a
> DMZ segment is a bad idea (cisco 5500 switch)?
>

Provided it's properly designed so there is no way for machines in the DMZ
VLAN to communicate with the switch (to change the VLAN memberships - Telnet
is not your only concern here, remember SNMP), AND that the switch (L3/RSM)
does not route between the DMZ VLAN and the other VLAN's, AND the only
connection between the DMZ VLAN and the internal network is via a filtering
device like a firewall, then I can't see that it's much different from
having the DMZ on a physically separate backplane.

However, from an operational perspective, it's harder to manage.
Personally, I'd never do it, I think the risk of someone accidentally
cross-patching the DMZ and other VLAN's, or plugging a machine into the
wrong VLAN, is too high.  I do have at least one gov customer who does it.

> The VLAN would have no telnet interface living on it, and no level 3
> switching/routing going to/from it.  It'd be just an isolated segment.
The
> only thing I could think of would be that someone could spoof the
> frame-tagging or something.
>

This should not be an issue, as you should only see tagged frames on trunked
links.  Certainly all the VLAN networks I've ever worked with have worked in
this way.  Even if a malicious entity can inject tagged frames into the
(untagged) segment, unless the receiving device is expecting tagged frames
then the packets are basically dropped, because the Ethertype field is not
IP, ARP, ARP reply or something else the protocol stack was expecting.

On the other hand, my very flimsy understanding of Cisco VLAN's is that the
switches can be in some sort of "auto" mode, where if they see a tagged
frame they'll automatically process it as a trunked link.  This could be an
issue for you.

The other thing which could be an issue is CDP.  You'll want to turn it off
on the DMZ VLAN, otherwise a malicious entity could capture information of
use in mounting further attacks.

Unless you have really pressing reasons (like backplane bandwidth or
rackspace) for doing so, from a risk management perspective I think a
physically separate DMZ backplane makes a lot of sense :-)

Reply via email to