
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 18
LayersofProtection:
Intermsofsecurity,thegoalistoensurethatcritical internal resourcesmusthave
multiplelayersofprotectionifbeingaccessedfromthe“outside”.Insucha
multilayerarchitecture,firewallsofdifferentbrands/makesareusedsuchthatany
vulnerabilityon any oneofthemwon’trendertheentiresolutionbreakable.
Toensurethatthefirewallsystemsthemselvesaresecure,onlylocalconsolelogins
areallowed.Loginviathenetwork(suchastelnet)areentirelydisabled.Onalarge
andcomplexnetwork,itisdesirabletosetupoutofbandchannelsforthecentralized
administrationofthesefirewalls.OnGIAC’srelativelysimplenetwork,however,
suchapproachmaybetoocomplicatedandcostlytoimplement.
Frontline/PrimaryFirewalls:
Toprotectthenetworkagainstoutsideintrusion atthefrontline,itisdesirabletouse
namebrandfirewallsoftwarethathassolidreputations.IntheGIACnetwork,the
frontlinefirewall ontheB2ClinkisCheckPointFW1. Weshouldalwaysoptfor
usingthelatestversionsofthesesoftware,butduetoresourcelimitation,theFW1
versionbeingusedis4.0(whichis2yearsoldalready)runningonNTServer4.0.
DepartmentalLevelF irewalls:
FirewallsatthedepartmentallevelincludeNortonPersonalFirewall2002and
DeerfieldVisNetic.Thesefirewallsolutionsprovideadditionallayersofprotectionat
muchlowercosts,makingadefenseindepthstrategypossiblecosteffectively.
EquipmentGuidelines:
Inordertoprovidesecurity,reliabilityandanacceptablelevelofperformance,the
computerhardwareplatformsmustbededicated– afirewallsystemshouldjustactas
afirewallandnothingelse.Theminimumrecommendedhardwarerequirementsfor
thededicatedrouter/firewallplatformsreallydependon theactual use.When drafting
thehardwarerequirements, theguidelinesare:
Kommentare zu diesen Handbüchern