Solved

Firewall & Mail Servers

Posted on 1998-04-06
4
162 Views
Last Modified: 2013-12-23
1. What is the most popular firewall used by banks currently ?
2. Is it possible to have two different domain names from the same mail server ?
0
Comment
Question by:lisalim
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
n0thing earned 100 total points
ID: 1583229
1- Checkpoint Firewall-1 and Cisco's PIX Firewall.
2- Yes. You will need some modification to the MX records on your DNS Server and play with sendmail.cf on your mail gateway to route mails to the proper hosts/destinations.

-Minh Lai
0
 

Author Comment

by:lisalim
ID: 1583230
For Question One :

1. What about CyberGuard ? Heard it swept a lot of awards ?
0
 
LVL 5

Expert Comment

by:n0thing
ID: 1583231
Yes, Cyberguard has just won an award. But it was not in the field as long as Checkpoint and doesn't have the name that Checkpoint has build onto it. For Cisco, their firewall is not among the best, but they have the good image and support behind it and their usually sell a complete solution end to end. That's why their firewall got into majors accounts including banks.

0
 

Expert Comment

by:mseiden
ID: 1583232
one issue for financial institutions is auditability of the
firewall.  that is, is is possible to independently verify that
the firewall's behavior is correct.  the only way to do this
is by source code inspection.

to my knowledge the only practical options that satisfy this requirement are:
gauntlet from TIS (now network associates).
custom firewalls based on various firewall toolkits, e.g.
fwtk-2.0 from tis.

popularity is not a good reason to pick a firewall.  both requirements and custom and practice differ considerably among
financial institutions.

another comment is that a single solution is unlikely to be as
strong as a "belt and suspenders" approach, using both packet filtering and proxy firewalls (independent technologies) in series, and from different vendors.  e.g. carefully implemented
router packet filtering as well as a proxy firewall are my usual chosen solution when you have other people's secrets to protect.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now