Open a Port on Firewall for EDI on Production Server in Trusted Zone
I am working with a software vendor to implement EDI for our ERP system. They installed the EDI software on a production server in the internal network (trusted zone). Two connections were configured in the EDI application:
1. Remote Host - connect to a 3-party location (EDI provider) to push files.
2. Local Host - listen on port XXXXX to receive files from the remote host above.
In order for the remote host (EDI provider) to push files to us, we were asked to open port XXXXX on our firewall and forward to the production server. Although we can set up the firewall to allow only the IP of the EDI provider to access this port, I am still skeptical if this is secure enough.
The software vendor claimed that they have been doing the exact same things for their other customers and there is a security certificate installed on each side for authentication and encryption. I wonder if this is a common practice in the industry.
Should the EDI software be running In a DMZ? Can someone shed some lights on this please?
Re: Open a Port on Firewall for EDI on Production Server in Trusted Zone
Although it is common practice in SMB networks to forward internet traffic into the internal network, it's not a best practice. If the system get's compromised, the internal network is also easy compromised.
Systems like these should be placed in a DMZ. And given that building a DMZ is not a rocket-science and every firewall nowadays is capable of doing that, you should not accept this suggestion.
We are happy to share changes to the Cisco Threat Grid support experience! Our customers have spoken, and we have listened! You want a single, streamlined, easy to access tool to open, view, and update your cases across Cisco Services. That tool is Cisco’...
Where can I find out how to integrate my Cisco products with Threat Response?
There are quick start guides and instructional videos to help you get set up with your Cisco products and the Cisco Threat Response platform.
Inviting all Security & Networking professionals! We want you to tell us what devices you use to do your work and its screen resolution. Your response will help us improve network and security management tools.
Click here to take the 5-minute s...
This guide is intended to show some nifty and powerful use cases that a lot of customers either want or don’t know they want. There are tons of other content out there for specific knobs or capabilities, but this is looking to be a more complete...