19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- simplified rules for the packet filters<br />

- additional security by a second packet filter (configuration 1 and 2)<br />

- availability increases if several gateways are used<br />

- extensive logging possible<br />

Disadvantages:<br />

- high price (as a powerful computer with one or two network<br />

interfaces and at least one packet filter is required)<br />

- if the packet filters are manipulated in a screened sub-net with an<br />

application gateway with an interface (see configuration 2, 4 and 6),<br />

a direct connection is possible bypassing the gateway. This can also<br />

be a desired function (e.g. in case of new services)<br />

As a result of the above advantages and disadvantages of the various<br />

configurations, only a screened sub-net with a dual-homed gateway<br />

(configuration 1) is recommended. In this case, the gateway is between the<br />

network requiring protection and the external network and must be passed in<br />

any case.<br />

So-called proxy processes run on the application gateway. <strong>The</strong>se set up the<br />

connection with the target computer after authentication of the user and filter<br />

the data in accordance with the information of the application layer.<br />

Connections without proxy processes are not possible.<br />

<strong>The</strong> more flexible but less secure option consisting of an application gateway<br />

with just one interface (configuration 2) should only be used if higher<br />

flexibility is absolutely necessary.<br />

<strong>The</strong> computers involved must be set up in such a way that only the essential<br />

programs run on them (minimal system), and that these programs are correctly<br />

configured and all known weaknesses are eliminated.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!