Home page logo

pen-test logo Penetration Testing mailing list archives

RE: Clueless firewall configuration ?
From: "Ng, Kenneth (US)" <kenng () kpmg com>
Date: Mon, 14 Aug 2006 01:40:57 -0400

This is very difficult to set up completely correctly.  And your always
open to the possibility of an unpublished exploit being able to get
around your rules.  And while I do not know if it is still possible, I
remember someone demonstrating injecting packets from one vlan to
another a few years ago.  And as the infrastructure changes, you have to
make double sure that you are entirely correct.  Conversely, if you use
physically separate hardware, it's a lot easier to get it right, or
close enough to right that it doesn't matter much.   

-----Original Message-----
From: cableguy clueless [mailto:cluelesscableguy () gmail com] 
Sent: Friday, August 11, 2006 4:08 PM
To: pen-test () securityfocus com
Subject: Clueless firewall configuration ?

Guys, I need to ask a favor, my boss knows nothing of IT infrastructure,
and our "cableguy" (manages the firewall through a third party contract)
proposed to him an architecture as  follows :

2 cisco 6509 each with firewall blade in them. These function as core
switches for a 1000 users site with lots of vlans and FW roules between
the vlans (oh and we are a big production site that relies on these
cores to let our ciritical bussiness process machines communicate to the

He wants to create 2 vlans, 1 for untrusted traffic and 1 vlan for DMZ
machines and assign physical ports to these to connect to the internet.
The DMZ vlan would also have some physical ports. These ports would not
be on the core switch but on the access layer switches that are fiber
attached to the distribution switches that attach to the cores...

Does anyone care to comment on the security issues a setup as this would
pose? would this be pentest bonanza for you guys? and what would the
hackers make of a dmz vlan living in a big switch together with other

I have some ideas myself, but would appreciate your take on this. I know
this is the pentest list but it is you guys who get to poke holes in
these designs...


This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's Choice Award from eWeek. As attacks through web applications
continue to rise, you need to proactively protect your applications from
hackers. Cenzic has the most comprehensive solutions to meet your
application security penetration testing and vulnerability management
needs. You have an option to go with a managed service (Cenzic
ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download
FREE whitepaper on how a managed service can help you:
And, now for a limited time we can do a FREE audit for you to confirm
your results from other product. Contact us at request () cenzic com for

The information in this email is confidential and may be legally privileged.  It is intended solely for the addressee. 
Access to this email by anyone else is unauthorized. 

If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken 
in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in 
this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter.  

This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]