Solved

Firewall & Mail Servers

Posted on 1998-04-06
4
167 Views
Last Modified: 2013-12-23
1. What is the most popular firewall used by banks currently ?
2. Is it possible to have two different domain names from the same mail server ?
0
Comment
Question by:lisalim
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
n0thing earned 100 total points
ID: 1583229
1- Checkpoint Firewall-1 and Cisco's PIX Firewall.
2- Yes. You will need some modification to the MX records on your DNS Server and play with sendmail.cf on your mail gateway to route mails to the proper hosts/destinations.

-Minh Lai
0
 

Author Comment

by:lisalim
ID: 1583230
For Question One :

1. What about CyberGuard ? Heard it swept a lot of awards ?
0
 
LVL 5

Expert Comment

by:n0thing
ID: 1583231
Yes, Cyberguard has just won an award. But it was not in the field as long as Checkpoint and doesn't have the name that Checkpoint has build onto it. For Cisco, their firewall is not among the best, but they have the good image and support behind it and their usually sell a complete solution end to end. That's why their firewall got into majors accounts including banks.

0
 

Expert Comment

by:mseiden
ID: 1583232
one issue for financial institutions is auditability of the
firewall.  that is, is is possible to independently verify that
the firewall's behavior is correct.  the only way to do this
is by source code inspection.

to my knowledge the only practical options that satisfy this requirement are:
gauntlet from TIS (now network associates).
custom firewalls based on various firewall toolkits, e.g.
fwtk-2.0 from tis.

popularity is not a good reason to pick a firewall.  both requirements and custom and practice differ considerably among
financial institutions.

another comment is that a single solution is unlikely to be as
strong as a "belt and suspenders" approach, using both packet filtering and proxy firewalls (independent technologies) in series, and from different vendors.  e.g. carefully implemented
router packet filtering as well as a proxy firewall are my usual chosen solution when you have other people's secrets to protect.
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Let’s list some of the technologies that enable smooth teleworking. 
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question