11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Summary<br />

Previous Table of Contents Next<br />

A packet-filtering router is usually what’s referred to as a firewall. These routers have rules as to what is<br />

and is not allowed into a network on a service-by-service basis. Newer, more specialized firewalls on the<br />

market allow for NAT and SMLI, as well as better logging and reporting features than traditional packetfiltering<br />

routers.<br />

Proxy servers differ from packet-filtering firewalls in that they’re not routers; they act as a workstation<br />

on the Internet, and they pass their results back to workstations inside your network. This makes for a bit<br />

more setup on the client end and has different trouble-shooting characteristics than a plain router (you<br />

need to establish that routing to the device is okay for both networks as well as that the proxy service<br />

running on the proxy server is alive and configured properly). Because a proxy server, like a spy ring<br />

receptionist, has two separate “phone systems,” you sometimes need to log into the proxy server in order<br />

to troubleshoot it.<br />

DNS can be a thorny issue; you’ll be well served figuring out what type of DNS resolution you have<br />

before you run into problems (so that you know how to verify DNS connectivity). Certain proxy servers<br />

will also proxy DNS resolution, making standard DNS troubleshooting tools unsuitable for<br />

troubleshooting Internet name resolution problems.<br />

<strong>Workshop</strong><br />

Q&A<br />

Q Our boss said to get a firewall, so we have one, and it seems reasonably good. Still, I’m<br />

concerned about the network internally, because we have lots of PCs with PC Anywhere that have<br />

arbitrary dial-in ports. I don’t have a lot of money to lock down our network, so I can’t invest in<br />

expensive network-monitoring programs or audit systems. What can I do?<br />

A Security people like to refer to most corporate networks as “crunchy on the outside, chewy on the<br />

inside,” meaning that most folks simply do not invest the time in applying security patches for known<br />

security holes. If you’re interested in how to improve your security without spending megabucks, check<br />

out http://www.cert.org. Many vendor-related security alerts (and how to get fixes) are listed there. You<br />

should also make a concerted effort to learn as much as you can about network security policies. Good<br />

books on this topic include Cheswick & Bellovin’s Firewalls and Internet Security and Garfinkel and<br />

Spafford’s Practical UNIX Security.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!