Solved

Firewall & Mail Servers

Posted on 1998-04-06
4
168 Views
Last Modified: 2013-12-23
1. What is the most popular firewall used by banks currently ?
2. Is it possible to have two different domain names from the same mail server ?
0
Comment
Question by:lisalim
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
n0thing earned 100 total points
ID: 1583229
1- Checkpoint Firewall-1 and Cisco's PIX Firewall.
2- Yes. You will need some modification to the MX records on your DNS Server and play with sendmail.cf on your mail gateway to route mails to the proper hosts/destinations.

-Minh Lai
0
 

Author Comment

by:lisalim
ID: 1583230
For Question One :

1. What about CyberGuard ? Heard it swept a lot of awards ?
0
 
LVL 5

Expert Comment

by:n0thing
ID: 1583231
Yes, Cyberguard has just won an award. But it was not in the field as long as Checkpoint and doesn't have the name that Checkpoint has build onto it. For Cisco, their firewall is not among the best, but they have the good image and support behind it and their usually sell a complete solution end to end. That's why their firewall got into majors accounts including banks.

0
 

Expert Comment

by:mseiden
ID: 1583232
one issue for financial institutions is auditability of the
firewall.  that is, is is possible to independently verify that
the firewall's behavior is correct.  the only way to do this
is by source code inspection.

to my knowledge the only practical options that satisfy this requirement are:
gauntlet from TIS (now network associates).
custom firewalls based on various firewall toolkits, e.g.
fwtk-2.0 from tis.

popularity is not a good reason to pick a firewall.  both requirements and custom and practice differ considerably among
financial institutions.

another comment is that a single solution is unlikely to be as
strong as a "belt and suspenders" approach, using both packet filtering and proxy firewalls (independent technologies) in series, and from different vendors.  e.g. carefully implemented
router packet filtering as well as a proxy firewall are my usual chosen solution when you have other people's secrets to protect.
0

Featured Post

Database Solutions Engineer FAQs

In this series, we will discuss common questions received as a database Solutions Engineer at Percona. In this role, we speak with a wide array of MySQL and MongoDB users responsible for both extremely large and complex environments to smaller single-server environments.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month10 days, 8 hours left to enroll

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question