Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    How Many Firewalls Do You Need?

    By
    Larry Seltzer
    -
    June 27, 2003
    Share
    Facebook
    Twitter
    Linkedin

      Lets say youre a really small operation. Youve got one server and you want to connect it the Internet. Obviously youre going to need a firewall. Do you need a whole separate system for it?

      While many people will say that you should pull out an old 486 box and run IPTables for Linux on it, thats not what most people do. One thing they may do, as envisioned by Microsoft in their recently revealed Small Business Server 2003, is to run the firewall on the same box as their production and web server software.

      See PC Magazines story on the new release candidate of Small Business Server 2003.

      The same configuration was true in Small Business Server 2000 and Microsoft got some grief from some of their consultants for putting the firewall on the same box as the web server, the Exchange Server, and everything else. But thats the way Small Business Server works; everything runs on one server. The license and setup process prevent you from splitting off individual functions to separate boxes, although in the 2003 version it will be easier to buy a separate box with a separate copy of Windows and ISA to run on the same domain as Small Business Server.

      Its not just Microsoft who does this. I run Winproxy from Ositis Software. While I run mine on a separate box not a member of my domain, they have a lot of support and documentation for people running it on a busier server. And surely the same is possible with any number of other commercial and free firewall products.

      So why is it a problem to run a firewall in this way? Technically, what you do is to have two network cards in the server. The firewall sites in-between, probably performing NAT, guarding the traffic between the two networks. Whats the difference between this and having it on a separate box?

      Apart from performance considerations, the arguments would be that if the firewall were compromised the attacker would have easy access to the resources on the rest of the server. Its a tad more complicated than that, but even if its true, how much more protected is a server on a separate box when the firewall system has been compromised? Im sure its a harder attack to make, but I bet youre still in trouble. Once an attacker has compromised your firewall you probably need to assume the rest of the network is his oyster.

      The whole truth about ISA is that it does a lot more than firewall duty. Its also a proxy/cache server (the A is for Acceleration) and it integrates with Active Directory to let you set policies related to its use. For example, you can say that none of a particular group of users can surf the web during certain hours. I think Microsoft would not be offended if you use a Watchguard or Cisco firewall appliance and either shut off or de-emphasized the firewall functions on ISA. (You already paid for it, so what do they care?)

      But you dont have to. In fact, if youre aggressive and have time on your hands, you may want to run firewalls internally on your production servers as well as at the network boundaries. This is one answer to the problem above of how to protect yourself if your boundary firewall is compromised. Ironically, the boundary firewall has to have more liberal entry-exit policies for communication than you would have for any individual server. For example, a web server might be able simply to allow HTTP and HTTPS, and a firewall on that system could block everything else. This is a good way of protecting against many attacks, known and unknown, that could be used to gain control of the server. The attacker could only use HTTP or HTTPS to attack. And if an attack came from a compromised system inside your network you would still be protected.

      As explained on a fascinating thread on SecurityFocus Security-Basics list, there are upsides and downsides to running internal firewalls on your various servers. The main problem, in my mind, is that you have multiple firewalls to administer, and I think we all have real work to do rather than creating new administrative tasks. The upsides I explained above.

      So firewalls on the line-of-business server may be a bit of a compromise if theyre all you have, but theyre also much better than nothing. If you dont like them, spend a few hundred bucks and put a firewall box from Linksys or WatchGuard on the network and youll actually have security redundancy.

      Discuss this in the eWEEK forum.

      Security Supersite Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement—,he graduated from the University of Pennsylvania in 1983.He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×