From: Ng, Kenneth (US) (kenng@kpmg.com)
Date: Mon Aug 14 2006 - 01:40:57 EDT
This is very difficult to set up completely correctly. And your always
open to the possibility of an unpublished exploit being able to get
around your rules. And while I do not know if it is still possible, I
remember someone demonstrating injecting packets from one vlan to
another a few years ago. And as the infrastructure changes, you have to
make double sure that you are entirely correct. Conversely, if you use
physically separate hardware, it's a lot easier to get it right, or
close enough to right that it doesn't matter much.
-----Original Message-----
From: cableguy clueless [mailto:cluelesscableguy@gmail.com]
Sent: Friday, August 11, 2006 4:08 PM
To: pen-test@securityfocus.com
Subject: Clueless firewall configuration ?
Guys, I need to ask a favor, my boss knows nothing of IT infrastructure,
and our "cableguy" (manages the firewall through a third party contract)
proposed to him an architecture as follows :
2 cisco 6509 each with firewall blade in them. These function as core
switches for a 1000 users site with lots of vlans and FW roules between
the vlans (oh and we are a big production site that relies on these
cores to let our ciritical bussiness process machines communicate to the
servers).
He wants to create 2 vlans, 1 for untrusted traffic and 1 vlan for DMZ
machines and assign physical ports to these to connect to the internet.
The DMZ vlan would also have some physical ports. These ports would not
be on the core switch but on the access layer switches that are fiber
attached to the distribution switches that attach to the cores...
Does anyone care to comment on the security issues a setup as this would
pose? would this be pentest bonanza for you guys? and what would the
hackers make of a dmz vlan living in a big switch together with other
vlans?
I have some ideas myself, but would appreciate your take on this. I know
this is the pentest list but it is you guys who get to poke holes in
these designs...
CCG
------------------------------------------------------------------------
------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's Choice Award from eWeek. As attacks through web applications
continue to rise, you need to proactively protect your applications from
hackers. Cenzic has the most comprehensive solutions to meet your
application security penetration testing and vulnerability management
needs. You have an option to go with a managed service (Cenzic
ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download
FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm
your results from other product. Contact us at request@cenzic.com for
details.
------------------------------------------------------------------------
------
*****************************************************************************
The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized.
If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter.
*****************************************************************************
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:44 EDT