Douglas A. Tutty wrote:
...
> I don't understand the logic of having multiple firewalls on one box.
> If one box can handle the throughput requirements of all the NICs, why
> not just one big firewall?

There are lots of places where multiple firewalls are better than a
single firewall.  If one believed in the idea of "a perfect VM
environment", it could make sense to do that.

1) Unrelated projects: If Project A and Project B are not related,
keeping them on separate firewalls can simplify the rule sets and
administration.

2) Separate administration: If you run a data center with lots of
different people managing different systems, "They" can administer their
systems without having access to (or messing with) "My" systems'
firewall.  When they screw up their rules, they don't break my systems
(and I guess it works the other way, too. :)  Note this has some
cross-training benefit, too. I can be the Firewall Deity, but I do want
to go on vacation. Fred may be a Firewall Jester, but with a bit of
practice, he could possibly back me up very effectively.  So, Fred
manages a firewall for his projects, when he screws up, he learns
lessons on a simple system, and when I am not there, he can babysit
the "big" firewall, and if I get run over by a bus, he knows how to
keep all the systems running.

3) Isolation: I had set up a firewall for a web app some time back.  I
had ZERO trust in the skills of the web developers, and even less for
their security programming skills (and similar trust in my skills to
audit their code).  So, I stuck their app on its own firewall,
completely isolated from our production environment.  I also made sure
that the various machines in the thing were each attached to their own
leg of the firewall, so that we really had several layers of security
between the Internet (bad guys) and the database (the valuable stuff).
You would have to knock over Apache, then the app, then the DB to get to
the data.  Even then, they get to a DB Server which had ONLY THE BARE
MINIMUM data required to accomplish the task at hand.  If it wasn't for
this design, you can be sure that database server would end up serving a
lot of things as, $18k Oracle licenses don't grow on trees. :)
(I'm actually rather amazed they went for this.  If you look at all the
money they spent on the non-free parts of this system, it ended up
costing probably $10/hit this site has received).  If this firewall
ended up getting knocked over, they would still have no access to the
real company jewels, just a few shiny pebbles.  This entire system could
also be picked up and moved to some other location without much
difficulty, if we wanted to co-locate the system.


If you spend too much money on a commercial firewall product, you might
wish to convince yourself that "centralized administration" is best,
and all that and want to run everything through one monster firewall,
but for real-life, there are places where it makes more logical sense
to split things up.

Nick.

Reply via email to