Solved

Everything plugged into 1 switch - a security Risk???

Posted on 2011-09-30
4
248 Views
Last Modified: 2012-05-12
Hi, We have been provided with one flat/unconfigured switch by our new support company as part of installation. This Switch is completely unconfigured (no VLAN's). It has our Internet feeds plugged into it, our servers and Routers LAN and WAN interfaces. So basically the inside and outside is plugged into the same switch...

Could somebody tell me the security risks of this?
N.B The servers don't have public IP addresses and use the router LAN interface as their Default Gateway.

Thanks,
Jaime
0
Comment
Question by:jamwalk123
4 Comments
 

Assisted Solution

by:wdavidson65
wdavidson65 earned 250 total points
ID: 36890948
in my opinion their should be no security issues as long as your fiwewall is configured properly
0
 
LVL 28

Accepted Solution

by:
jhyiesla earned 250 total points
ID: 36891018
Agree with other expert. As long as you have a firewall that separates you from the Internet and as long as it's configured properly. A basic switch has no security aspects to one or two or three make no difference. You could add another internal switch with a firewall between the two switches, but that is probably a little overkill. Our config is similar from this perspective. We have a switch that connects all our internal stuff and we also have a connection on that same switch in the same main VLAN for our firewall. The only other thing you might consider, and this is probably overkill s well, is to partner with an IDS/IPS provider to put an IDS/IPS appliance in the path to the Internet as well to help the firewall do it's job. That's a decision that you'd have to make based on your budget and you exposure risk.
0
 

Author Closing Comment

by:jamwalk123
ID: 36891094
Thanks for the quick responce guys
0
 
LVL 9

Expert Comment

by:davealford
ID: 36891114
"It has our Internet feeds plugged into it, our servers and Routers LAN and WAN interfaces"

If your 'WAN' is a private WAN then no major problem. If the private WAN is on a different subnet to your LAN then you may get some  extra broadcast traffic which might confuse some kit/software.

If by WAN you mean "Internet" then that wouldn't be sensible - even VLAN isn't advised as a security measure - it's a network management technique NOT security. If on the other hand there's still another NAT'd or orther firewall device between the switch and the Internet then you "should" be OK depending on how that device is configured.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now