background image
Firewall Design 569
The following services are available to the outside world in the DMZ:
·
Anonymous FTP servers
·
World Wide Web servers
·
Domain Name Service
·
E-mail servers
·
E-business servers
The choke router shown in Figure 15-7 should also be restricted with services. The choke router
separates the inside network from the DMZ for customers who might want to establish another
layer of security. It should allow only established sessions back into the inside network, and
perhaps mail and WWW traffic. If someone breaks into the public area (DMZ), the internal
users are still secure.
TIP
When designing for security through the perimeter router, allow only specific services to
specific hosts on the DMZ area.
Network Address Translation (NAT)
NAT was designed to provide IP address conservation and for internal IP networks that have
private IP addresses. NAT translates these private IP addresses into public addresses at the
firewall. Only public addresses can route through the Internet. NAT also can be configured to
advertise only one address for the entire internal network to the outside world. This is called
Port Address Translation (PAT). This provides security by effectively hiding the entire internal
network from the world.
Avoid IP Spoofing
Another design rule is to deny packets from outside your network that claim to have a source
address from inside your network. This type of attack is known as IP spoofing.
The idea behind this type of attack is that an attacker uses a trusted machine address in
conjunction with a mechanism that does address-based authentication. An example of this are
the UNIX tools rsh and rlogin. These protocols allow an administrator to establish a list of
trusted remote hosts whose users do not need to supply a password.
The point here is that along with blocking the IP network ranges 10.0.0.0, 172.16.00 through
172.16.31.0, and 192.168.0.0 from entering your network from the outside, it might be
necessary to block your internal networks from entering from the outside. There should not be
any users with these source addresses trying to enter your network.
87200333.book Page 569 Wednesday, August 22, 2001 1:41 PM