[prev in list] [next in list] [prev in thread] [next in thread] 

List:       suse-security
Subject:    Re: [suse-security] RFC: Network Setup
From:       Robert Davies <rob_davies () ntlworld ! com>
Date:       2002-02-05 11:42:09
[Download RAW message or body]

On Tuesday 05 February 2002 09:23, Stefan Nauber wrote:

> thanks for your replay. You advised me of not connecting the administrative
> network to the normal LAN. I understand that there is a security risk but
> this was, what I actually wanted to do. The idea was, that I wanted to
> administer the computers from my desktop without interference  with the
> productive traffic.

Personally I think it's a good idea, and Dlink made some 4 port 100BaseT 
cards which were very useful for this sort of purpose.  This kind of backend 
network should also use an ether switch if at all possible, they cost little 
more than hubs, and reduce eavesdropping possibilities even further.  
Furthermore using 4 port cards, additionally allows things like web server to 
communicate with backend databases or file servers using a seperate server 
network, at little extra cost (and co-located rackspace is cheaper without IP 
address or traffic allocation).

The hosts in the DMZ, should not route packets between the networks, and 
should only permit admin access through the admin host 'bastion' on that 
network, and the administration network  should not be trusted by that admin 
host, packet filtering should be in place.

Any probing causing packets to be dropped, in that admin network should 
trigger some immediate, and heavy attention.

Rob


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic