Solved

Firewall allow all policies per zone - what is secure?

Posted on 2012-03-11
1
355 Views
Last Modified: 2012-03-13
Can somebody tell me which of these is secure and which are not.  I mean....probably none of them are secure, but just give me an idea of which are reasonably safe because of the relationships between the zone.  

If I were to ALLOW ALL SERVICES, ANY SOURCE TO ANY DESTINATION on these, which are reasonably ok?  If any are big security concerns, why?

lan to wan
lan to vpn
vpn to lan
vpn to vpn
vpn to wan

thanks for your help!
0
Comment
Question by:readymade
1 Comment
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 37708548
Lan to wan allows all systems in the LAN access to the outside. normally this is fine, but if one of the systems is compromised with a virus that establishes a connection to a remote site through which commands can be sent means your entire LAN is now open.

VPN to LAN means that the security of the remote system is the weakest point and which you can not control unless you control the system.

LAN to VPN allows for systems on the LAN to access remote resources connected via VPN including responses to requests originated from VPN connected systems.

Similarly for VPN to VPN.

VPN to WAN you allow your connection to be used by VPN connected devices to access the outside.

This is required if your VPN policy is to secure all networks rather than split tunnel where only LAN traffic is sent through the VPN.

Limiting each zone  to the bare essentials will limit the attack vector from that location.

Security is based on the weakest link/system. VPN to LAN exposes systems you control to an external system that you do not.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question