Solved

Firewall allow all policies per zone - what is secure?

Posted on 2012-03-11
1
352 Views
Last Modified: 2012-03-13
Can somebody tell me which of these is secure and which are not.  I mean....probably none of them are secure, but just give me an idea of which are reasonably safe because of the relationships between the zone.  

If I were to ALLOW ALL SERVICES, ANY SOURCE TO ANY DESTINATION on these, which are reasonably ok?  If any are big security concerns, why?

lan to wan
lan to vpn
vpn to lan
vpn to vpn
vpn to wan

thanks for your help!
0
Comment
Question by:readymade
1 Comment
 
LVL 76

Accepted Solution

by:
arnold earned 500 total points
Comment Utility
Lan to wan allows all systems in the LAN access to the outside. normally this is fine, but if one of the systems is compromised with a virus that establishes a connection to a remote site through which commands can be sent means your entire LAN is now open.

VPN to LAN means that the security of the remote system is the weakest point and which you can not control unless you control the system.

LAN to VPN allows for systems on the LAN to access remote resources connected via VPN including responses to requests originated from VPN connected systems.

Similarly for VPN to VPN.

VPN to WAN you allow your connection to be used by VPN connected devices to access the outside.

This is required if your VPN policy is to secure all networks rather than split tunnel where only LAN traffic is sent through the VPN.

Limiting each zone  to the bare essentials will limit the attack vector from that location.

Security is based on the weakest link/system. VPN to LAN exposes systems you control to an external system that you do not.
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now