2

I know this is yet another question on how to setup network but I hope you are not bored of such questions yet.

The site is also an office, so it includes windows dc, windows ad, exchange, sql, file sharing, development app servers and other pcs.

In addition to office (internal) things, there are both test and prod environments consisting of a web server-app server-sql stack. There is also ftp service open to public.

I consider:

dmz1 - web server - exchange edge - ftp

dmz2 - app server - sql for app server

internal - dc and ad - exchange hub and transport - internal file sharing - sql for internal use - app servers for internal use - pcs

public -> dmz1, only web, ftp and smtp public -> dmz2 not possible public -> internal not possible

dmz1 -> dmz2 is possible from web servers to app servers by using http or ajp dmz1 -> internal is only possible for exchange, otherwise not possible

dmz2 -> internal not possible

Does this sound ok ? Any other recommendations ? It will be configured using either MS ISA or Jupiter SSG. Thank you.

mete
  • 157
  • 5

3 Answers3

4

From a generalist perspective, it looks like you've done due diligence on your overall network design. Here are some things I'd recommend you keep in mind:

  • Hone your firewall rules down very carefully. As you already stated, your DMZ2 is not accessible from the public network or private. That's great! You also stated that only certain servers can access certain other servers. That's even better! Make sure that only your app server can access your SQL server and even then only on the ports that you need it to. Hone each and every node's access needs down to the most atomic level!
  • Collect access logs from all of your devices and monitor them for events. Use Splunk perhaps? Even just Syslog. Make sure access and traffic data is kept long-term. Check for who is access your devices when and why.
  • Enable network analysis on your devices if possible. Netflow / sFlow. Collect the data and use software that is capable of displaying it in meaningful ways. Analyze what types of data are flowing into, within and out of your network. If nothing surprises you about the traffic that you see, you're not looking hard enough.
  • You should also hone down the individual software firewalls for each of those machines so that if, perchance, your hardware firewalls are compromised and/or an errant rule is put in place, the software firewalls are also blocking traffic that you don't want.
  • Document until your fingertips bleed, your eyes tear up and you want to do bodily harm to the person that invented Wikis and document control repositories. Then document some more. You are entering a maze of twisty passages all alike. You will need to be so OCD with your documentation that you'll need palettes of Tofranil air-dropped to you (OCD patients will know what Tofranil is. ;) ). If anyone on your team does not document properly in such a complex networking environment, taze them.
  • You may also want to consider encrypting data streams where possible. As far as your web tier is concerned, perhaps consider encrypting the streams with IPSEC. That may be a bit overkill, I admit.

The ultimate goal is not just to narrow down the attack surface, but to then watch the traffic that attempts to touch both the unavailable and available surfaces. It's a bit like making sure a bank has all the best locks, safes and mantraps, but then never monitoring the equipment to see if someone is attempting a heist. Assume that given enough unsupervised time, anyone can do anything.

Your web and database server are like golden vials of nitro glycerin. Assume that everyone wants them for their own profit and also want to explode your face with them in the process. Really, any public facing device is.

You're on the right track! Great job in segmenting your network. You're a head above your peers. Now try to stand head and shoulders above the norm.

Wesley
  • 32,320
  • 9
  • 80
  • 116
  • +1 for OCD documentation. Wiki's are your friends. So are network diagrams and possibly more importantly flowcharts. – JamesBarnett Jan 09 '11 at 07:33
  • @JamesBarnett - Oooo, flow charts. Good point. I don't use those. Thanks! – Wesley Jan 09 '11 at 07:57
  • 'Nonapeptide' I'm not great about using flow charts. But when trying to explain how traffic flow works with our firewall, DMZ, web filter to other admins I always start to think about making some. If you didn't set it up or troubleshot it frequently, then the can be tough to visualize traffic flow. – JamesBarnett Jan 09 '11 at 08:05
1

So here's my 2 cents. You seem to be on the right track with network segmentation. Here are some thoughts.

Where is your IDS going to sit? IF you have 2 DMZs and a internal zone, then it would seem to me you would want IDS sensors in front of each of those zones. However you then need allow traffic from your IDS sensors in the DMZ into the internal zone.

And while I'm at it how are you providing DNS services for the devices in the DMZ.

One final thought be very suspicious and lockdown your public FTP server tight, they can be easily abused.

JamesBarnett
  • 1,129
  • 8
  • 12
  • Thanks James for reminding about IDS. Actually I did not think about it yet because I am not sure there will be an IDS device at start. However, I was thinking to put IDS in front of DMZ1 later. I wasnt planning to put it before DMZ2 or internal actually, is it the practice to put it before each zone ? And for DNS, right, I did not think about that also. It should probably stay in DMZ1 right ? – mete Jan 09 '11 at 20:25
0

Yes, it's another one of those questions. You haven't been very specific in describing your needs/goals. The answer lies in your answer to questions such as (but not limited to):

How many users?

What services do you need to provide to those users?

What services do you need to provide to the outside world?

What are the business goals/requirements for implementing an IT infrastructure?

What does the DRP\BCP require?

Et., etc.

Your question in it's current form is like asking:

I'm baking a pie. I've got some apples and I'm thinking of using some flour and sugar. What do you think?

joeqwerty
  • 108,377
  • 6
  • 80
  • 171
  • 1
    ...maybe some spices? What do you think about spices in apple pies? I think spices would be good... – Wesley Jan 08 '11 at 23:21
  • I like spices.. – joeqwerty Jan 08 '11 at 23:26
  • Actually I though I wrote answers for these questions. internally 50 users, for them regular office services, email, internet and file share. for public, dynamic web http content (not pages but services), and ftp. Internet connection is probably 10mbit and I dont expect more than 50 req/s for public services. – mete Jan 09 '11 at 05:54