I think there is some confusion.

A cable/DSL router is not a real "hardware security solution".

Truths:
- Network Address Translation DOES hide the private network to some extent
- Stateful Packet Inspection DOES stop outside connections that did not
originate from your system
- Filters DO stop outgoing connections on specific ports or ranges of ports
IF used

Misunderstandings:
- NAT CAN be tricked into giving private network details
- Routers don't stop Trojans or malware or spyware from coming in from
sources like malicious web pages, email, or the floppy or zip disk your
buddy gave you
- Port filtering only works if used, if set up properly, and then only if
the connection is using ports you don't allow through. If the connection
uses ports such as 80 or 25 or 110 or 443, it will get through if you use
these ports (http, send mail, pop, ssl https)
- session hijacking DOES work through a NAT
- if you allow port forwarding, anything using that port can start a
connection on that port

A hardware solution such as a Cisco PIX 501 does more than NAT. An easy
example is a NAT forwarding all port 80's will direct port 80 to your web
server, but a 501 will identify the connection as being CodeRed and stop it.
(Well, should stop it. Let's not get too detailed)

Never forget that cost also includes YOUR man-hours.

The router == set it up and forget it. It's not granular. It lets stuff
through. It can't tell CodeRed from a legit web hit.

A PIX == Configuration takes some time. Updates are more time. Stops quite a
bit of stuff, though likely not cutting edge exploits/worms (until the new
update to combat it is developed and available)

a Linux, etc box firewall == building this is lots of man-hours depending on
OS and other factors (like is the default already got all ports shut?).
Finding safe sources is a bit difficult. Stops even more stuff. More
granular than a PIX (You can even build you own trap triggers) still doesn't
stop cutting edge

Software firewall== Annoyance level is high. Configuration is a drill in
patience. Stops everything you tell it to. The first time you tell it to let
all anything through (all pop connections as example) anyone connecting 110
has you.


The cheapest protection from hacking and DoS is a router AND a firewall. But
the true savior is a protected good back up of a well patched system. When
CodeRed first came out, the fast fix was to restore from a backup. Granted,
an hour into CodeRed's deployment, so many boxes were hunting for unpatched
boxes, you were toast, but at least when the patch came out, you had a clean
backup to start the rebuild and patching process, rather than starting with
an OS install CD.

Backups, especially things like a ghost image, are the most cost efficient
thing a user can have. 90% of hacks are because of something the user
installed, read, or somewhere the user went to. Then it's on the system.

D. Weiss


-----Original Message-----
From: Jim Clark [mailto:[EMAIL PROTECTED]]
Sent: Saturday, July 20, 2002 12:39 AM
To: [EMAIL PROTECTED]
Subject: Hardware/Software Solution for Standalone DSL User


I understand from reading these posts that a hardware solution is
recommended over a software solution.  However, for a single DSL home user
is a hardware solution cost-beneficial?  Or is a software solution, e.g.
Zone Alarm. Agnitum, Kerio, etc. best?

One could say that for $70.00 a hardware solution(assuming something like
Linksys BEFSR41 Etherfast 4-Port Cable/DSL Router) is beneficial compared to
the damage that could be done, but convincing a user to spend the money when
there are free software solutions is difficult.  Are there hardware
solutions for single users that are more cost effective?

Lastly, I appreciate all the replies regarding my DSL vs Dial-up firewall
post.

Thanks.

Jim




Reply via email to