wblock@ said:
A firewall only needs two interfaces, or three if you want a DMZ. It's not clear what the last interface in that list above is supposed to be doing, but it's probably not necessary.
Yes, sure. With the third one I wanted to stress we want to "merge" two machines into one. In a separated scenario the third interface would physically belong to the server.
By the way, in this situation it wouldn't be a bad idea to use three NICs indeed. In my opinion the this would make the firewall configuration more human readable and less error prone.
throAU said:
I wouldn't go there personally.
For several reasons:
Your input is good and these are actually the points I wanted to discuss with you guys. Here is some comment on them:
throAU said:
- Application servers require more installed software than basic firewalls (which can get by with zero ports installed). More software means more to exploit, and also more to patch.
Yes and no. Despite running more software, for the outside world there is only one listening on the open ports - the firewall software, like with every firewall-only device. All the rest consume CPU and RAM but are non-existent until after the machine is hacked. So, more to exploit, doesn't really fit - there is always only the firewall to exploit. More to patch is also not true - a security hole or other updates HAVE to be installed. IMHO this is more straightforward on one machine than on two.
throAU said:
- Increased urgency to patch due to the machine facing the outside which will incur more regular internal service downtime (services run on the same box).
This is absolutely true.
throAU said:
- Every time you patch the box, there is an increased chance something will break due to more complex software dependencies, further incurring extended downtime.
Maybe... If something breaks, being it the firewall only, you have the downtime anyway, unless you let the server running and accessible by users.
throAU said:
- Performance - a firewall will process every packet hitting the box.
Performance is actually an advantage of running one machine only. This way one could better scale the machine by adding RAM or CPUs (or replacing it all-together) than trying to balance two boxes, maybe with fluctuating loads and demands.
throAU said:
- DDOS on your firewall will impact productivity apps hosted on the same box.
Yes, this is true. But you could monitor the load and "pull the plug" before critical levels are reached. Here I mean blocking all incoming connections unconditionally, which of course means that the DDoS was successful, but the server could be further used. With a separated firewall it is actually the same when a DDoS outperforms your hardware and network capacity. Or am I completely wrong?
throAU said:
IMHO, the "savings" due to running one less machine are more than outweighed by the additional complexity and risk.
In short: keeping your firewall as simple as possible reduces the chance of unintentional exposure due to configuration error and makes patching far less complex and less risky.
If you can make your external firewall a different OS (to prevent the same exploit being able to compromise both your edge and your inside hosts), even better.
My intention is by no means a saving of hardware. We would run both the server and the firewall under FreeBSD, so if something needs to be updated, it would in fact be better to fix one machine only instead of both (especially when you have several/dozens/hundreds of these combos). As for simplicity, IMHO, fixing one machine instead of two is less error prone (you have one running OS only) and most of the time faster. Does anybody agree with this?