Security Basics mailing list archives

RE: DMZ - VLAN Security


From: Dan Lynch <DLynch () placer ca gov>
Date: Tue, 29 Sep 2009 08:43:51 -0700

Michail,

My rule is to avoid sharing switch hardware between high risk and high value networks. VLAN segregation doesn't offer 
flexible access controls or logging/audit capability like a firewall does. Even though vlan hopping attacks are old and 
(AFAIK) have all been mitigated, the cost of a second switch is minimal. So while the risk is low, the cost of complete 
mitigation is low too. You also have to worry about misconfigurations on that switch. For the same reasons, we avoid 
running high risk public web servers on VMs that also host high value internal servers.

That said, I do allow our internet segment and our public access DMZ segments to share switch hardware. The DMZ is only 
slightly lower risk, and very slightly higher value than the internet segment outside our firewall.

Assuming I understand your diagram, I would move your high-value "Other internal resources" off the high-risk "switch 
1", to "switch 2 - zone A - internal".

- Dan



Dan Lynch, CISSP
Information Technology Analyst
County of Placer
Auburn, CA


"Isn't it enough to see that a garden is beautiful without having to believe that there are fairies at the bottom of it 
too?"
     - Douglas Adams



-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of m.poultsakis () gmail com
Sent: Monday, September 28, 2009 8:38 AM
To: security-basics () securityfocus com
Subject: DMZ - VLAN Security

Hello to everyone,

This is my first post here :-)

I am currently investigating a DMZ deployment. The network infrastructure consists of one internal Switch (Summit 400), 
one Firewall and one (here is the problem...) Summit 400 switch that acts as the outside Switch as well as the DMZ 
Switch...

So it looks like this: 



                Other
               Internal
              Resources
               (ZoneA)
                  |
Internet-------Switch1-----Firewall-----Switch2
                  |                      ZoneA
                  |                    (Internal)
                 DMZ
                

Even though VLAN segregation exists on Switch1 and InterVLAN routing needs to take place via the Firewall in order for 
an inbound request to access DMZ resources, the more I am looking at the scheme... the more I am getting concerned...

A physical Switch sharing valuable resources with the untrusted interface seems like a weak point to me... I have made 
a research on Layer-2 attacks where an attacker can access another VLAN without the router/Firewall knowing anything 
about it but most of these resources age back in the late 90's beginning of 2000's...

So, the reason I am creating this post is that I do not know if things have changed in this field (VLAN attacks) during 
the last years... are Layer-2 attacks against VLANs still possible?

I am thinking of proposing a change in this deployment but I need to be sure first if threats really exist. The most 
obvious solution would be to dedicate a Firewall port to the outside (attacker) connection and implement VLAN 
separation on Switch1 for DMZ and ZoneB (adding another Switch is impossible unfortuantely...).

What I need to mention here is that the netire configuration is "static" which means that no VTP, CDP etc is running in 
the network...


Thank you all in advance for reading my post and (probably) of thinking of something that can help.


Regards,

Michail Poultsakis

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: