Douglas A. Tutty wrote: ... > I don't understand the logic of having multiple firewalls on one box. > If one box can handle the throughput requirements of all the NICs, why > not just one big firewall?
There are lots of places where multiple firewalls are better than a single firewall. If one believed in the idea of "a perfect VM environment", it could make sense to do that. 1) Unrelated projects: If Project A and Project B are not related, keeping them on separate firewalls can simplify the rule sets and administration. 2) Separate administration: If you run a data center with lots of different people managing different systems, "They" can administer their systems without having access to (or messing with) "My" systems' firewall. When they screw up their rules, they don't break my systems (and I guess it works the other way, too. :) Note this has some cross-training benefit, too. I can be the Firewall Deity, but I do want to go on vacation. Fred may be a Firewall Jester, but with a bit of practice, he could possibly back me up very effectively. So, Fred manages a firewall for his projects, when he screws up, he learns lessons on a simple system, and when I am not there, he can babysit the "big" firewall, and if I get run over by a bus, he knows how to keep all the systems running. 3) Isolation: I had set up a firewall for a web app some time back. I had ZERO trust in the skills of the web developers, and even less for their security programming skills (and similar trust in my skills to audit their code). So, I stuck their app on its own firewall, completely isolated from our production environment. I also made sure that the various machines in the thing were each attached to their own leg of the firewall, so that we really had several layers of security between the Internet (bad guys) and the database (the valuable stuff). You would have to knock over Apache, then the app, then the DB to get to the data. Even then, they get to a DB Server which had ONLY THE BARE MINIMUM data required to accomplish the task at hand. If it wasn't for this design, you can be sure that database server would end up serving a lot of things as, $18k Oracle licenses don't grow on trees. :) (I'm actually rather amazed they went for this. If you look at all the money they spent on the non-free parts of this system, it ended up costing probably $10/hit this site has received). If this firewall ended up getting knocked over, they would still have no access to the real company jewels, just a few shiny pebbles. This entire system could also be picked up and moved to some other location without much difficulty, if we wanted to co-locate the system. If you spend too much money on a commercial firewall product, you might wish to convince yourself that "centralized administration" is best, and all that and want to run everything through one monster firewall, but for real-life, there are places where it makes more logical sense to split things up. Nick.