Solved

Firewall allow all policies per zone - what is secure?

Posted on 2012-03-11
1
357 Views
Last Modified: 2012-03-13
Can somebody tell me which of these is secure and which are not.  I mean....probably none of them are secure, but just give me an idea of which are reasonably safe because of the relationships between the zone.  

If I were to ALLOW ALL SERVICES, ANY SOURCE TO ANY DESTINATION on these, which are reasonably ok?  If any are big security concerns, why?

lan to wan
lan to vpn
vpn to lan
vpn to vpn
vpn to wan

thanks for your help!
0
Comment
Question by:readymade
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 37708548
Lan to wan allows all systems in the LAN access to the outside. normally this is fine, but if one of the systems is compromised with a virus that establishes a connection to a remote site through which commands can be sent means your entire LAN is now open.

VPN to LAN means that the security of the remote system is the weakest point and which you can not control unless you control the system.

LAN to VPN allows for systems on the LAN to access remote resources connected via VPN including responses to requests originated from VPN connected systems.

Similarly for VPN to VPN.

VPN to WAN you allow your connection to be used by VPN connected devices to access the outside.

This is required if your VPN policy is to secure all networks rather than split tunnel where only LAN traffic is sent through the VPN.

Limiting each zone  to the bare essentials will limit the attack vector from that location.

Security is based on the weakest link/system. VPN to LAN exposes systems you control to an external system that you do not.
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Read about achieving the basic levels of HRIS security in the workplace.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question