HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.73 Selecting a suitable firewall

S 2.73 Selecting a suitable firewall

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management, Administrators

After a security policy has been determined for the firewall, it must be decided which components are to be used for the implementation of the firewall. A suitable configuration is to be selected.

The following are possible configurations:

The following is a list of the advantages and disadvantages of the various configurations.

Exclusive use of a Packet Filter

Advantages:

Disadvantages:

This configuration can only be used in small networks where all computers are protected against attacks.

Dual-homed Gateway

Advantages:

Disadvantages:

Additional protection can be obtained by using a packet filter in front of the gateway, e.g. using an existing router. In this case, the router and gateway must be penetrated in order to gain access to the network.

Screened Sub-net

Advantages:

Disadvantages:

As a result of the above advantages and disadvantages of the various configurations, only a screened sub-net with a dual-homed gateway (configuration 1) is recommended. In this case, the gateway is between the network requiring protection and the external network and must be passed in any case.

So-called proxy processes run on the application gateway. These set up the connection with the target computer after authentication of the user and filter the data in accordance with the information of the application layer. Connections without proxy processes are not possible.

The more flexible but less secure option consisting of an application gateway with just one interface (configuration 2) should only be used if higher flexibility is absolutely necessary.

The computers involved must be set up in such a way that only the essential programs run on them (minimal system), and that these programs are correctly configured and all known weaknesses are eliminated.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home