12-16-2004 12:54 PM - edited 03-09-2019 09:47 AM
Recently an external auditor suggested we should segment the internal network including all enterprise applications, desktop population, internal e-mail, remote access, and the wan using firewalls. Is anyone doing this? If so why?
Solved! Go to Solution.
12-16-2004 03:59 PM
The concept of the demilitarized zone (DMZ) provides protection for higher level servers and applications etc whilst permitting web and mail servers typically, access to and from the Internet. If these host become compromised, they do not provide an immediate stepping stone to the important internal servers.
Risk assessment of the company's resource will determine the level of access control neccessary. The highest instances of compromise are still determined to be from internal sources and may warrant access control measures applied to the desktop population depending on the company's circumstances and the security posture adopted.
Cheers,
Paul.
12-16-2004 03:59 PM
The concept of the demilitarized zone (DMZ) provides protection for higher level servers and applications etc whilst permitting web and mail servers typically, access to and from the Internet. If these host become compromised, they do not provide an immediate stepping stone to the important internal servers.
Risk assessment of the company's resource will determine the level of access control neccessary. The highest instances of compromise are still determined to be from internal sources and may warrant access control measures applied to the desktop population depending on the company's circumstances and the security posture adopted.
Cheers,
Paul.
12-17-2004 04:37 AM
Can you give a specific example where a company (other than those dealing with finance, public safety or national security) has implemented firewalling of all network segments?
12-29-2004 02:02 PM
Hmmm, I would say the WAN would certianly need to be Firewalled, but segmenting the internal network with firewalls is just going to slow down the internal operations. If i understand the question correctly, a better solution might be to segment different portions of the network with VLANS. Depending on your core switches, you could vlan each segment and use intervlan routing to control who goes where and keep all the traffic in each segment from mingling together.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide