Postby kanderson » Tue Mar 06, 2007 12:12 pm
I'm saying that it would be far easier to have a single NIC in the server, and then forward the necessary ports straight through so that they are accessed the same from both sides. Since this makes your security footprint smaller, it's more likely that things won't be missed/forgotten/screwed up.
Is this the most secure solution possible? Perhaps not, but since you'll need most of those ports open from both internal and external, why use a second NIC? I guess I just don't see the benefit of increasing the complexity while not changing things from a security standpoint. For the firewall, with 2 nics (3 including Localhost), the script will be far more complex (read error prone). Additionally, troubleshooting it will be harder. And since the same ports are open for both Nics, I fail to see any benefit.
So open ports 22, 25, 80, 110, 143, 5729 on the firewall to your server Plug it into your DMZ, (or simply leave it in your LAN and forward the above ports as pinholes). Then from internal, traffic should go through the PIX to the server in your DMZ. Similarly, from external, inbound traffic should go to the server in the DMZ as well (though you may want to stop port 22 and/or others from outside).
That's easy to understand and follow, easy to set up, easy to troubleshoot. And it doesn't offer any additional points of entry as opposed to multi NIC. Since it's easier to understand, the likelihood of a mistake is smaller, and I'd argue that would probably lead to a more secure setup, as my experience has repeatedly shown that complexity breeds mistakes. Mistakes are Security's enemy.
Kev.