Skip to main content

....Security Designs....

More
19 years 11 months ago #6112 by Maskkkk
I'm using my home connection, and I'm trying to setup a web server and an email server.
I'm sharing a network with my family, and I'm also concerned about the security of their computers. (Since they are just end users). I'd also like to keep them from complaining that the internet connection is slow.

I've come up with some ideas for security...




Could you please tell me if either of these designs are good, which one is better, or if neither of these designs are any good at all.

P.S. I'm really new to networking so I'm not entirely sure what the right thing to do is yet....
P.S.S. Is the security tighter on the hardware firewall then on smoothwall? It sounds like it would be but I'm not sure about that either.

Thanks,

[img]http://home.pct.edu/~leeand00/Hole in the Ozone Layer.gif[/img]

- A Man is not an island...that's why we have fourms!
More
19 years 11 months ago #6113 by nske
Replied by nske on topic Re: ....Security Designs....
I don't see why you would need two routers. Unless the hardware router is something special, I would prefer to use just a linux or bsd box for all the routing and firewalling. Of course in general, an extra layer of control is not a bad thing if you have planed a good use for it, but this is just a small network.. :/

There are two ways to see the same coin: more layers give you more flexibility in configuration and more chances that an intrusion will be blocked in a case of misconfiguration-vulnerability in one of the devices. But more layers also give you more overhead, more configuration to do and thus more chances that you will do a mistake somewhere or that something will mailfunction. I think that second side leads to a more solid approach :)

Consequently, I would choose to use a reliable, well cooled and quite pc as a central router and firewall for all three interfaces and I would try to make an optimal ruleset based in a deny-everything default policy. Also, I would apply QoS to handle the traffic (prioritizing-limiting) and to keep everyone happy. ;)

So, based on your material, here's my picture for your network:



btw personally, I don't like hardware devices and I don't consider them any safer.

PS. Prioritizing and limiting the bandwidth resources can be an excellent discussion on it's own, so if you experiment with it please share your experiences about what you found optimal! :)

PS2. Is that DIA you are using? :D
More
19 years 11 months ago #6115 by Maskkkk
What is QoS?
(?Quality of Service?) Just guessing....

What sort of program would you use for that? (in linux of course)


Yeah I'm using DIA, and you know what? I almost like it better than Visio. It just makes alot more sense, like the start arrow and end arrow thing. In Viso you have to guess which is the beginning and which is the end of the arrow. In DIA you remeber which way you drew the arrow and it all becomes clear. There are also alot of cool programs for Dia that'll let you turn your drawings into code! Saves you days in software development.

P.S. Sig-no-mee, are you really from Greece?
P.S.S. I apologize if I butchered sig-no-mee with my english...

[img]http://home.pct.edu/~leeand00/Hole in the Ozone Layer.gif[/img]

- A Man is not an island...that's why we have fourms!
More
19 years 11 months ago #6117 by nske
Replied by nske on topic Re: ....Security Designs....
Yes, quality of service. In linux you can do it with the iproute tool. There is a good how-to here .

lol "ohi den to esfakses" (no you didn't butcher it :D)
More
19 years 11 months ago #6120 by sahirh
Replied by sahirh on topic Re: ....Security Designs....
Nske's diagram makes a lot of sense.. as he said you don't need to have a separate router...

Just wanted to add a couple of things..

1. Don't permit any connections from the DMZ (mail / web servers) to the internal LAN otherwise this will defeat the purpose of a DMZ.

2. Install an IDS sensor in both the internal segment and the DMZ. I would suggest you use snort ( www.snort.org ) for this. If I recall correctly, Smoothwall already has snort built in. I recommend you make the sensor dual homed, put no IP address on the sensor side, and connect the other side to a management console to handle your alerts and manage the sensor.. There is a nice windows IDS policy manager for snort, you can get it here:
www.activeworx.org

Sahir Hidayatullah.
Firewall.cx Staff - Associate Editor & Security Advisor
tftfotw.blogspot.com
Time to create page: 0.129 seconds