<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSS Best Practices for Security in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791769#M15313</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dimitri,&lt;/P&gt;&lt;P&gt;I understand what you are saying, but the only people with access to change the default gateway on a server would be an admin, and the worst that would happen would be to break connectivity. The server would then bypass the firewall for an internal connection, but the internal host response would route normally resulting in the firewall sending a reset due to the connection not being in the state table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Apr 2007 18:20:35 GMT</pubDate>
    <dc:creator>dgahm</dc:creator>
    <dc:date>2007-04-23T18:20:35Z</dc:date>
    <item>
      <title>CSS Best Practices for Security</title>
      <link>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791767#M15311</link>
      <description>&lt;P&gt;We have CSS-11501s in our DMZs (separate ASA interface) doing load balancing for our public Web servers. There is a new server load balancing requirement on the internal network. Technically, I see no problems with using separate ports and VLANs on the existing appliances, but I am wondering if this would pass a network security audit?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any documents or references to support this kind of configuration would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2007 20:48:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791767#M15311</guid>
      <dc:creator>dgahm</dc:creator>
      <dc:date>2007-04-04T20:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: CSS Best Practices for Security</title>
      <link>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791768#M15312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi dave,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personnaly i wouldn't take the risk, because the css does operate like a router. So if somebody can force the routing so that the css is the next hop then everybody can connect to the internal vlan because the css routes unknown traffic. You could stop this kind of abuse by using acls on the css, but again that's not really approved by cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helped you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dimitri&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 11:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791768#M15312</guid>
      <dc:creator>diro</dc:creator>
      <dc:date>2007-04-05T11:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: CSS Best Practices for Security</title>
      <link>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791769#M15313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dimitri,&lt;/P&gt;&lt;P&gt;I understand what you are saying, but the only people with access to change the default gateway on a server would be an admin, and the worst that would happen would be to break connectivity. The server would then bypass the firewall for an internal connection, but the internal host response would route normally resulting in the firewall sending a reset due to the connection not being in the state table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Apr 2007 18:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791769#M15313</guid>
      <dc:creator>dgahm</dc:creator>
      <dc:date>2007-04-23T18:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: CSS Best Practices for Security</title>
      <link>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791770#M15314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dave,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you should maybe post your question to the security forum&lt;/P&gt;&lt;P&gt;If you create an inside network and a DMZ protected by firewall there is a reason.&lt;/P&gt;&lt;P&gt;If you allow a device [css or router] to bypass the firewall, you create a higher risk of potential attack.&lt;/P&gt;&lt;P&gt;Maybe a TCP connection would not be possible, but what about attacks using icmp or udp ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2007 09:12:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-best-practices-for-security/m-p/791770#M15314</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2007-04-24T09:12:58Z</dc:date>
    </item>
  </channel>
</rss>

