Security Basics mailing list archives
Re: External Network / Firewall Setup.
From: Jayson Anderson <sonick () sonick com>
Date: Thu, 08 Sep 2005 01:13:23 -0700
Your topology layout looks fine. In fact, it is the defacto belt and suspenders approach with a single bastion host. Very common. I'm not sure about the Nokia approach as I've never used those devices, but it could be argued that closed-source by virtue of philosophy becomes a single point of failure. Key metric of course being response time both to acknowledgement in announced vulnerabilities, and the time to publish those all-important fixes. 1 Enterprise X 9am-5pm versus 1 Planet x 24-7 = disparity. Lay out your checks and balances and see what you come up with, and roll with it. One other thing: spare the DMZ the real and perceived anomalys in traffic flow and application response by making sure to configure your bastion host(s) with a permanent route for [ALL] internal networks. Of course your internal networks are all contiguous such that you can do this with one single aggregate prefix correct ? ;) At 30% saturation on a 2mB pipe, the redirects that can be generated on that hub are staggering indeed. Don't bother fiddling around with Layer4 magic thinking you can predict every packet and icmp type that may need to flow back towards the internal networks..... just slap on the L3 route the old fashion way and things will stay happy. Let the filter worry about what shall and what shant back towards the internal networks, AFTER the route is identified. Now about that single point of failure..... since there is inherently an uncomfortable amount of those in this classic topology, it would be a good thing if you can install two more filters in parallel with your existing two, and then tie the system together with an automatic failover. Many are tempted to use an IGP here, and the argument is sound when considering the maturity of L2 open-source failover solutions; but I have put in a considerable amount of testing and deployment time with 'vrrpd' and found it to be a stellar performer at least on Linux kernel 2.6. vrrpd does not require any kernel patches, no fancy wrappers or modules; just compile, configure and install and it works to spec by default. vrrpd is fairly new but is extremely thin and has yet to do exhibit the slightest de-spec behavior and i've been waiting for some time. L2 solutions also eliminate the temporary hiccup cause against current established connections that become discontiguous/broken. Good luck, hit me up if you need anything. Best Regards, Jayson On Mon, 2005-09-05 at 12:44 +0100, lists () ninjafriendly com wrote:
Hi all, Background: We're a .sch.uk with a currently county-managed firewall and webmail provision. We have a 2mb symmettric DSL connection with approx 30% use at any one time. Due to service and reliability issues with the county-managed solution we are looking to run our own mailserver, accessible from the internet. On balance, maintaining our own firewall setup is less hassle than keeping what we currently have. I'm currently in the process of working out the firewall requirements, what I have so far is this: Internet | Router | Firewall(1) | HUB---Snort(1) | |___Mailserver | Firewall(2) | HUB---Snort(2) | | LAN I suspect this setup may be overkill for the amount of traffic we receive, but I'm wary of a single point of failure. Hardware isn't a problem. Further info: The mailserver will be running Horde. I'm hoping to convince management to use a PIX or similar for the first firewall and then something *nix based for the second, otherwise it will be two *nix boxes (IPcop and something BSD based). Something I'm still unsure about is internal clients connecting to the mailserver in the DMZ - how much of a security issue is this? Should I use the DMZ mailserver simply as a relay for an internal mailserver? Would anyone mind looking this over and telling me if I've screwed up / overlooked something? Thanks Pete
Current thread:
- External Network / Firewall Setup. lists (Sep 06)
- Re: External Network / Firewall Setup. Michael Gale (Sep 07)
- Re: External Network / Firewall Setup. Ivan . (Sep 07)
- Re: External Network / Firewall Setup. lists (Sep 07)
- RE: External Network / Firewall Setup. Mikhail Minyailov (Sep 07)
- Re: External Network / Firewall Setup. Greg Stiavetti (Sep 07)
- Red Cross needs network security tech volunteers Kelley Greenman (Sep 12)
- Re: External Network / Firewall Setup. Greg Stiavetti (Sep 07)
- RE: External Network / Firewall Setup. David Gillett (Sep 07)
- Re: External Network / Firewall Setup. Jayson Anderson (Sep 08)
- <Possible follow-ups>
- RE: External Network / Firewall Setup. Tim.BUTTON (Sep 07)
- RE: External Network / Firewall Setup. lists (Sep 07)
- Re: External Network / Firewall Setup. Florian Rommel (Sep 07)
- RE: External Network / Firewall Setup. Tim.BUTTON (Sep 07)
- RE: External Network / Firewall Setup. Jayson Anderson (Sep 08)
- RE: External Network / Firewall Setup. Yvonne McInally (Sep 08)
