Security Basics mailing list archives
Re: Firewall and DMZ topology
From: "Daniel B. Cid" <danielcid () yahoo com br>
Date: 10 Jun 2003 14:34:59 -0400
The proxy server cannot be inside the DMZ. You will only want to have public servers on it. This setup is very good, but in some cases (low money) the NIC2 can be the same as NIC1.
Internet <-> (NIC 3) Firewall (NIC1) <-> Fireawll / Proxy server <- LAN (NIC 2) <-> DMZ
But what will happen if the attacker break both firewalls ? Is the same question that you gave me before... We are not supposing that the firewall will be broken ... generally people use the same firewall in all the places. []`s Daniel B. Cid
On Tue, 2003-06-10 at 14:14, Erik Vincent wrote: see below.. Daniel B. Cid wrote:There are many reasons. The first of all, in this situation:internet --> Firewall --> LAN --> DMZYou need to pass through you LAN to access the DMZ ... I dont need to say anithing more. The purpose of a DMZ is to isolate the public servers from outside the LAN. If someone hacks the DMZ will not be able to access the LAN.internet --> Outer Firewall --> DMZ --> Inner Firewall --> LANIn this other situation you need to pass through the DMZ to access the LAN, so all conections from the LAN to the INTERNET will pass in the DMZ.. if someone compromise the DMZ will be able to snif the conections to the internet and a lot of other things ...So is this should be a better setup Internet <-> (NIC 3) Firewall (NIC1) <-> Fireawll / Proxy server <- LAN (NIC 2) <-> DMZ Because if you put the proxy server in the DMZ, you still have the same sniffing problem. If you only accept connection from the LAN to the Proxy server....... If you don't put the second firewall, what happend if the outer firewall get crack?->The "real" purpose of a DMZ is to isolate your public servers, nothing more. []`s Daniel B. CidOn Mon, 2003-06-09 at 20:53, Chris Berry wrote:From: Christopher Ingram <cmi () crystalsands net> So, the below setup is not decent for a corporate LAN. Ideally, the DMZ should sit on a seperate connection to the Internet from the rest of the network, using a different ISP and therefore, different IP block. This provides the most isolation.I'm afraid I don't see how that: internet --> Firewall --> Lan internet --> Firewall --> DMZ would be any more secure than this: internet --> Outer Firewall --> DMZ --> Inner Firewall --> LAN or this: internet --> Firewall --> LAN --> DMZ which are the setups that I've seen. Can you give some justification/explanation on why you think that would be better? Chris Berry compjma () hotmail com Systems Administrator JM Associates "All I want is a few minutes alone with the source code for the universe and a quick recompile." _________________________________________________________________ STOP MORE SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail --------------------------------------------------------------------------- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare. Find out why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm ------------------------------------------------------------------------------------------------------------------------------------------------------- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare. Find out why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm ----------------------------------------------------------------------------
--------------------------------------------------------------------------- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare. Find out why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm ----------------------------------------------------------------------------
Current thread:
- Re: Firewall and DMZ topology, (continued)
- Re: Firewall and DMZ topology Zach Crowell (Jun 10)
- Re: Firewall and DMZ topology Erik Vincent (Jun 10)
- VPN vs changing routes Keenan Smith (Jun 10)
- Re: VPN vs changing routes chort (Jun 10)
- RE: VPN vs changing routes David Gillett (Jun 10)
- Re: [security] VPN vs changing routes Martin (Jun 11)
- Re: VPN vs changing routes Joerg Over Dexia (Jun 11)
- Re: Firewall and DMZ topology Daniel B. Cid (Jun 10)
- Re: Firewall and DMZ topology Steve Bremer (Jun 10)
- Re: Firewall and DMZ topology Daniel B. Cid (Jun 10)
- Message not available
- Re: Firewall and DMZ topology Daniel B. Cid (Jun 10)
- Re: Firewall and DMZ topology Aaron Fisher (Jun 11)
- RE: Firewall and DMZ topology Steve Bremer (Jun 10)
- RE: Firewall and DMZ topology ed (Jun 10)