Firewall allow all policies per zone - what is secure?

Can somebody tell me which of these is secure and which are not.  I mean....probably none of them are secure, but just give me an idea of which are reasonably safe because of the relationships between the zone.  

If I were to ALLOW ALL SERVICES, ANY SOURCE TO ANY DESTINATION on these, which are reasonably ok?  If any are big security concerns, why?

lan to wan
lan to vpn
vpn to lan
vpn to vpn
vpn to wan

thanks for your help!
readymadeAsked:
Who is Participating?
 
arnoldConnect With a Mentor Commented:
Lan to wan allows all systems in the LAN access to the outside. normally this is fine, but if one of the systems is compromised with a virus that establishes a connection to a remote site through which commands can be sent means your entire LAN is now open.

VPN to LAN means that the security of the remote system is the weakest point and which you can not control unless you control the system.

LAN to VPN allows for systems on the LAN to access remote resources connected via VPN including responses to requests originated from VPN connected systems.

Similarly for VPN to VPN.

VPN to WAN you allow your connection to be used by VPN connected devices to access the outside.

This is required if your VPN policy is to secure all networks rather than split tunnel where only LAN traffic is sent through the VPN.

Limiting each zone  to the bare essentials will limit the attack vector from that location.

Security is based on the weakest link/system. VPN to LAN exposes systems you control to an external system that you do not.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.