19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

internal structure of the protected network is concealed. This function can be<br />

assumed by the application gateway.<br />

This configuration ensures that internal mail cannot enter the external network<br />

and a unified address structure can be used..<br />

net to be<br />

protected<br />

packet filter packet filter<br />

internal<br />

mail<br />

internal<br />

mail server<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Dual-homed<br />

Application<br />

Gateway<br />

external<br />

mail server<br />

incomming mail outgoing mail<br />

insecure<br />

network<br />

Figure 3: Configuration of the mail servers<br />

Mail between computers in the network to be protected do not leave the<br />

network as they are passed on by the internal mail server which also<br />

manages the internal alias data base. Mail to external computers is sent via<br />

the gateway to the external mail server and then passed on. For mail from<br />

external computers, the MX entry (from the external DNS server, see Fig.<br />

4) refers to the external mail server. <strong>The</strong> external mail server passes the<br />

mail to the internal server. It may be possible for the function of the<br />

external mail server to be assumed by the gateway.<br />

Configuration of the DNS servers<br />

Domain Name Service (DNS) is used to convert computer names into IP<br />

numbers and vice versa and provides information on computer systems using<br />

the network. DNS information should be concealed from the outside world,<br />

i.e. Internet or other external networks. <strong>The</strong> most well-known method of doing<br />

this is by a special configuration of two DNS servers (name servers). One<br />

DNS server in the internal screened sub-net conceals the structure of the<br />

network requiring protection and communicates with a DNS server in the<br />

external screened sub-net, in order to transform names of external computers.<br />

As DNS clients do not necessarily have to communicate with a DNS server on<br />

the same computers, it is possible to have both processes run on different<br />

computers.<br />

<strong>The</strong> external DNS server must be configured in such a way that it claims to be<br />

the authority for the domain of the protected network (primary server). Of<br />

course, this system only knows what is intended to reach the outside world,<br />

i.e. names and IP numbers of external mail servers, the application gateway<br />

and the external information server. This is then a public DNS server.<br />

<strong>The</strong> internal DNS server must also be configured in such a way that it claims<br />

to be the authority for the domain of the protected network.. Unlike the<br />

external DNS server, this private DNS server manages all internal DNS<br />

information and passes on search enquiries from internal computers for<br />

external hosts to the external DNS server.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!