Author Topic: XP w. SP2...  (Read 2754 times)

  • Offline Mark

  • Posts: 3,748
  • Hero Member
XP w. SP2...
Reply #30 on: September 13, 2007, 22:28:25 PM
Quote from: DeltaZero
Also:

Most security updates - if you take the time to read them - prevent remote code execution.

Firewalls at the perimeter wont protect you from people that bring unclean machines in or malicious users inside your network.


Who in their right mind in a corporate environment only uses a firewall to protect the perimeter?

Every one of your vlans (If you run a layer 2 network or subnet if you run on layer 3) default gateways should ideally be terminated on an interface on the firewall, desktops should be on seperate vlans to servers, services and internetworking devices.

At the very least if you dont have enough interfaces on your firewall, you should have a tight access-list on your switches to prevent any internal meddling.

Access lists on the switches and a properly designed firewall rulebase will prevent this.


XP w. SP2...
Reply #31 on: September 13, 2007, 22:42:14 PM
Quote from: Mark
Quote from: DeltaZero
Also:

Most security updates - if you take the time to read them - prevent remote code execution.

Firewalls at the perimeter wont protect you from people that bring unclean machines in or malicious users inside your network.


Who in their right mind in a corporate environment only uses a firewall to protect the perimeter?

Every one of your vlans (If you run a layer 2 network or subnet if you run on layer 3) default gateways should ideally be terminated on an interface on the firewall, desktops should be on seperate vlans to servers, services and internetworking devices.

At the very least if you dont have enough interfaces on your firewall, you should have a tight access-list on your switches to prevent any internal meddling.

Access lists on the switches and a properly designed firewall rulebase will prevent this.




All the same, there are going to be people on the same vlan/subnet - legitimatley - who could potentially exploit security holes. There is no real alternative to patching!



  • Offline Serious

  • Posts: 14,467
  • Global Moderator
  • Hero Member
XP w. SP2...
Reply #32 on: September 13, 2007, 23:14:29 PM
Quote from: Mark
Quote from: DeltaZero
Also:

Most security updates - if you take the time to read them - prevent remote code execution.

Firewalls at the perimeter wont protect you from people that bring unclean machines in or malicious users inside your network.


Who in their right mind in a corporate environment only uses a firewall to protect the perimeter?



Quite a few of them, and some still do even though they operate Wi-Fi areas. Total stupidity of course but it happens. I have a firewall on the router, but every computer we own has zone alarm on it too, just to be safer.

I then check on every patch going and install them as well as having antivirus running and updated daily.

  • Offline Mark

  • Posts: 3,748
  • Hero Member
Re:XP w. SP2...
Reply #33 on: September 14, 2007, 09:48:46 AM
Im talking about enterprise class setups, not NAT devices and home firewalls.

Even the worst site I have visited has had their wireless on a DMZ off the checkpoint, and at best wireless for public internet access is handled by a totally seperate network hanging off some other part of their public address space.

In office lan wireless will be as tight as a ducks ass - mostly alvarion but cisco aeronet growing in popularity, then you have your switch access lists applied to every client also.


  • Offline Serious

  • Posts: 14,467
  • Global Moderator
  • Hero Member
Re:XP w. SP2...
Reply #34 on: September 14, 2007, 13:48:18 PM
So was I, there are still lots of them that dont even set up their equipment properly or attempt to identify and limit those who are using it. There are still far too many open networks out there.

The second bit is my own protection which is given as an example, sorry for the confusion.

    • Move It Fatboy
  • Offline Rivkid

  • Posts: 3,569
  • Hero Member
Re:XP w. SP2...
Reply #35 on: September 14, 2007, 14:01:04 PM
Quote from: Mark
Im talking about enterprise class setups, not NAT devices and home firewalls.

Even the worst site I have visited has had their wireless on a DMZ off the checkpoint, and at best wireless for public internet access is handled by a totally seperate network hanging off some other part of their public address space.

In office lan wireless will be as tight as a ducks ass - mostly alvarion but cisco aeronet growing in popularity, then you have your switch access lists applied to every client also.



Totally agree - no (decent) enterprise customer would just have a firewall out to the LAN and thats it. You firewall off every section - VLANS, different departments, even between perimeter and back end exchange servers. Also the use of ASA, MARS, and IDS sensor systems make your software patches so insignificant its unreal. As for wireless Cisco and Alvarion (also Artem and the now defunct Madge) offer some pretty solid security systems. Madges offering (now bought out but still available) is incredible and will automatically detect and block any unauthorised access and also deny outgoing connections to rogue APs.
Career, Wife, Mortgage... my sig was better when it listed guitars and PC's and stuff!

0 Members and 1 Guest are viewing this topic.