Page 449 - StudyBook.pdf
P. 449

Topologies and IDS • Chapter 7  433


                      ■  Layered DMZ implementation
                      ■  Multiple interface firewall implementation
                    In the first method, the systems are placed between two firewall devices with
                 different rule sets, which allows systems on the Internet to connect to the offered
                 services on the DMZ systems, but prevents them from connecting to the com-
                 puters on the internal segments of the organization’s network (often called the pro-
                 tected network). Figure 7.5 shows a common installation using this layered approach.

                 Figure 7.5 A Layered DMZ Implementation






                                                               DMZ
                                Internet     Firewall
                             (External Network)



                                                     Mail Server  Web Server








                                                                 Firewall   Internal Network


                    The second method is to add a third interface to the firewall and place the
                 DMZ systems on that network segment. (See Figure 7.6) As an example, this is the
                 way Cisco PIX firewalls are designed.This design allows the same firewall to
                 manage the traffic between the Internet, the DMZ, and the protected network.
                 Using one firewall instead of two lowers the costs of the hardware and centralizes
                 the rule sets for the network, making it easier to manage and troubleshoot prob-
                 lems. Currently, this multiple interface design is the preferred method for creating a
                 DMZ segment.
                    In either case, the DMZ systems are offered some level of protection from the
                 public Internet while they remain accessible for the specific services they provide
                 to external users. In addition, the internal network is protected by a firewall from
                 both the external network and the systems in the DMZ. Because the DMZ systems
                 still offer public access, they are more prone to compromise and thus they are not



                                                                              www.syngress.com
   444   445   446   447   448   449   450   451   452   453   454