Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Setting up a server in a DMZ, AD authentication?

Posted on 2014-03-19
4
Medium Priority
?
611 Views
Last Modified: 2014-05-06
Hello there,

I am pondering a design question.  I want to set up an FTP server in my DMZ.  In the past, I would throw up a server and put FTP on it, and setup local users or users to the FTP service and let that all work like that.

One of the requirements this time around is to have Active Directory authentication.  This is where I start to wonder.

In some configurations, I would just NAT an address thru the firewall, ports 20 and 21, to the actual server, and then leave it on the production network, connected as a server in AD.  I know that opens up some vulnerabilities, but it does solve my authentication problem.

So, if I put it in the DMZ, what do I need to have open for that server to be active in Active Directory?  Is this a good design decision?

TIA

Tom
0
Comment
Question by:thafemann
  • 2
4 Comments
 
LVL 17

Expert Comment

by:James H
ID: 39939360
Just create an ACL and only allow the ports required for AD to your DC.


http://technet.microsoft.com/en-us/library/dd772723(ws.10).aspx
0
 
LVL 11

Expert Comment

by:itguy565
ID: 39939366
0
 

Author Comment

by:thafemann
ID: 39939687
Okay, got it, it is possible.

Now riddle me this, is it worth it?  Now, before you respond with the what I say to my end users, "It depends", I know that.  :)

This server is to be an FTP server.  I am leaning toward using either Serv-u or CrushFTP.  While the server does not necessarily need to be a part of Active Directory, user authentication to the FTP server must use Active directory.   There has even been talk of using RSA tokens for authentication.

Both of these FTP servers do LDAP authentication from Active Directory, which is really the driving force.  I am thinking that maybe I should just leave the server in Workgroup mode, and set LDAP authentication thru the firewall.

I guess I am looking for best practice with putting a server in the DMZ.
0
 
LVL 11

Accepted Solution

by:
itguy565 earned 300 total points
ID: 39939712
I am thinking that maybe I should just leave the server in Workgroup mode, and set LDAP authentication thru the firewall.

This would be your best option because it makes it more difficult for someone to hack the server/network and minimize risk if the local account that is logged on doesn't have privileges to other network resources.

I would personally use serv-u because solarwinds has been around for a very long time and it is a company I trust.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question