Solved

2003 Server with an interface on the internet

Posted on 2006-11-02
7
252 Views
Last Modified: 2013-12-04
In a couple places I have run across Windows Servers sitting directly on the internet with routable IPs on 1 interface and internal Ips on another.   The person that has done this says that it is perfectly fine and safe.  I have a hard time beleiving that to be true, what would be the point of firewalls if that was the case.

So my question is, is that really a good idea and if not why?
0
Comment
Question by:InvisibleTerror
7 Comments
 
LVL 12

Expert Comment

by:gidds99
Comment Utility
0
 
LVL 12

Expert Comment

by:gidds99
Comment Utility
Firewalls provide additional security and can provide valuable defence where a Windows Server is not adequately secured (or as an additional layer of network security for Internet facing Windows Servers).
0
 
LVL 25

Expert Comment

by:mikeleebrla
Comment Utility
if by 'directly' you mean there is no router/firewall between the internet and the server, then you are correct that the setup isn't secure at all.  nothing you do on the server to 'protect' it really does much good since the 'offender' has already hit the server.  that is what the firewall/router needs to prevent.

0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:InvisibleTerror
Comment Utility
Yes that is exactly what I mean.
0
 
LVL 9

Expert Comment

by:FixingStuff
Comment Utility
Agreeing with mikeleebrla ... if indeed the second interface is a direct connect to a router without ACLs and/or firewall in place, this is just as bad a the primary NIC connected to a router with a public IP.  Does the gateway IP route to the "unsecure" NIC? One would assume so or else it would be useless for internet traffic.  Go here and run SheildsUP from the server to check open ports, etc, then show the person:
www.grc.com
FS-
0
 
LVL 8

Expert Comment

by:RevelationCS
Comment Utility
what you describe above sounds like a proxy/load balancing type environment. If properly secured with firewalls and intrusion detection (internal and external for both), then it is safe to use that method. Using a proxy method to hide your internal network schema is typically a recommended practice as it makes it harder for an external hacker to gain access to the servers as they need to compromise both the external proxy (the hardware with the external IP address) along with the internal machine. Firewalls place more of a difficulty level on that as they would also have to compromise the firewalls.
0
 
LVL 7

Accepted Solution

by:
CharliePete00 earned 125 total points
Comment Utility
A Windows server is a general purpose machine.  By default it posses all of the necessary instructions to provide a wide range of services (file, print, dns, web, aplication, routing, etc.) and is designed to execute applications.  They also designed to be dynamic and may be configured to act in just about any role.  A dedicated firewall, on the other hand, is designed for a specifc purpose, limiting and controlling network traffic, and only contains the necessary instructions for the tasks it was designed for.  If security is compromised on a firewall it's difficult to get it to act like anything but a firewall.  If security is compromised on a Windows server you can make it act like just about anything.  While you may be able to secure a Windows server to the point it can be deemed "safe" to expose to the Internet the consequences of any compromises of its security can be pretty severe.  It's always good practice to place a standoff device like a firewall between your servers and the outside world.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now