Solved

Firewall allow all policies per zone - what is secure?

Posted on 2012-03-11
1
354 Views
Last Modified: 2012-03-13
Can somebody tell me which of these is secure and which are not.  I mean....probably none of them are secure, but just give me an idea of which are reasonably safe because of the relationships between the zone.  

If I were to ALLOW ALL SERVICES, ANY SOURCE TO ANY DESTINATION on these, which are reasonably ok?  If any are big security concerns, why?

lan to wan
lan to vpn
vpn to lan
vpn to vpn
vpn to wan

thanks for your help!
0
Comment
Question by:readymade
1 Comment
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 37708548
Lan to wan allows all systems in the LAN access to the outside. normally this is fine, but if one of the systems is compromised with a virus that establishes a connection to a remote site through which commands can be sent means your entire LAN is now open.

VPN to LAN means that the security of the remote system is the weakest point and which you can not control unless you control the system.

LAN to VPN allows for systems on the LAN to access remote resources connected via VPN including responses to requests originated from VPN connected systems.

Similarly for VPN to VPN.

VPN to WAN you allow your connection to be used by VPN connected devices to access the outside.

This is required if your VPN policy is to secure all networks rather than split tunnel where only LAN traffic is sent through the VPN.

Limiting each zone  to the bare essentials will limit the attack vector from that location.

Security is based on the weakest link/system. VPN to LAN exposes systems you control to an external system that you do not.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question