Code: |
INTERNET | Router/firewall | | LAN DMZ | | | PC PC PC 1 2 3 |
Bhodi wrote: |
Is traffic coming from one of the boxes in the DMZ handled the same as traffic coming from the internet? I mean, is traffic from a compromised box in the DMZ zone more dangerous for the 'safe' part of the network then traffic coming from the internet?
|
Aflack wrote: |
Would it be to much trouble if you point me to our draw out this layout of the DMZ security settings. It would be a lot easier if I could picture what was being mentioned above. |
danielrm26 wrote: |
This is a "sandwich" DMZ -- the one that I prefer, and the one that offers more security than the "multi-NIC" approach. |
Sgt_B wrote: |
Could you explain how that DMZ topology offers "more security"? The multi-nic approach would be based on the same rulesets as the two firewall DMZ. So the same rules would be applied...just on different firewalls.
The only aspect where this would provide more security (to me anyway) would be if a firewall itself was compromised. |
Bhodi wrote: |
Well, my router basically just does that, it functions as a firewall and a hub together. I can set one pc up as DMZ. |
danielrm26 wrote: |
All that is is a default host for the NAT functionality of your router, and it's generally not a good idea to use if you need real security. |
yaoweihung wrote: |
1. Which Firewall product is more powerful, Check Point NG or Cisco PIX 506? I would like to know which Firewall I should setup as internal Firewall.
2. If I want to setup a VPN for remote management purpose, where this VPN server should goes and how to setup these two Firewall? 3. From your demonstration, you have both DMZ and internal Firewall connected to the e same hub/switch. Would it be better if I have dual NICs in all servers located inside DMZ? By doing this, I have my external Firewall connected to one subnet address (say, 192.168.1.xxx) and my internal Firewall connected to another subnet address (say, 192.168.2.xxx). |
kantan wrote: |
What difference does it make if i directly connect my external firewall to the internal firewall rather than bypassing it via the DMZ hub / Switch. |
kantan wrote: |
I think u'hv got my question wrong. The DMZ hub/switch exists and the respective servers that need to go in the DMZ are connected to the DMZ hub/switch. My concern now is... what happens if i connect the external firewall directly to the internal firewall rather than connecting it via the DMZ hub/switch. Does that compramise the security in anyway?[/code] |
Colonel_Panic wrote: |
Users need to use INSERT, SELECT, UPDATE and even DELETE (in other words, php script access needs these priviledges). If it happened that the webserver got rooted, what would it help if the db was inside secure network? Whoever has the root can change my php and mess with the data. So, is there even theoretical possibility to secure the data agains someone who manages to hack the webserver? |
Colonel_Panic wrote: |
Another thing. Say one would like to give access to, say consultants and other third-party staff, to the internal network. They have to have access to machines located inside the internal "protected" network, because it needs the entire enviroment that surrounds it (like databases, shares etc), and therefor cannot be putted in dmz. How would one implement such a solution..? |
danielrm26 wrote: |
Ideally, one would have a three tiered architecture for their web/app/db environment, and each would reside in their own network. Apache, Websphere, and Oracle, for example.
|
danielrm26 wrote: |
This offers additional protection vs. the direct attacks on the database from the webserver that resides in the DMZ, and I know of many top 10 companies that do just this. The coolest one does the entire thing in VMWare - Check Point boxes, servers, and all. ![]() |
neewt wrote: |
There has to be some sort of proxy that can do content filtering and therefor just allow valid traffic from DMZ to internal lan. In this case, certain SQL-commands. Anyone know of such an implementation? |
gsnatesh wrote: |
Question: How would a server on the DMZ communicate with the intranet assuming the DMZ and Intanet have different subnets?? |
danielrm26 wrote: | ||
This is a "sandwich" DMZ -- the one that I prefer, and the one that offers more security than the "multi-NIC" approach. ![]() |
UnaBomber wrote: |
Cisco Switches are very difficult to flood, (I presume your are talking about mac flooding and arp poisioning) once you have deployed CIS (Cisco intergrated security) which limits the number of MAC addresses that can be learned at a given port... preventing CAM manupulation. |
xathras wrote: |
is this post your own work or an extract from elsewhere, I have seen this before, not on this site but for the life of me cannot track it down. |
danielrm26 wrote: | ||
Yes, it's my work. You probably saw it on New Order, which is where I posted it first. You'll notice it was posted under "danielrm26" in both places. Google (http://www.google.com) can show you this information if you enter the string "danielrm26" and "DMZ" into the search field and either press "enter" or click the search button. Regards, |
xathras wrote: |
lol, at least it shows that I paid attention to the info ![]() |
output generated using printer-friendly topic mod, All times are GMT + 2 Hours