next up previous
Next: 3.2.3 Levels of threat Up: 3.2 Access Security: Firewalls Previous: 3.2.1 Introduction

3.2.2 Design decisions

In configuring a firewall, the major design decisions with respect to security are often already dictated by corporate or organizational policy; specifically, a decision must be made as to whether security is more important than ease-of-use, or vice versa. There are two basic approaches that summarize the conflict:

The importance of this distinction cannot be overemphasized. In the former case, the firewall must be designed to block everything, and services must be enabled on a case-by-case basis only after a careful assessment of need and risk. This tends to impact users directly, and they may see the firewall as a hindrance. In the second case, the systems administrator is placed in a reactive mode, having to predict what kinds of actions the user population might take that would weaken the security of the firewall, and preparing defenses against them. This essentially pits the firewall administrator against the users in an endless arms race that can become quite fierce. Users can generally compromise the security of their login if they try or are not aware of reasonable security precautions. If the user has an open access login on the firewall system itself, a serious security breach can result. The presence of user logins on the firewall system tends to magnify the problem of maintaining the system's integrity. A second important statement of policy is implicit in the ``that which is not expressly permitted is prohibited'' stance. This stance is more ``fail safe,'' since it accepts that the administrator is ignorant of what TCP ports are safe, or what holes may exist in the manufacturer's kernel or applications. Since many vendors are slow to publicise security holes, this is clearly a more conservative approach. It is an admission of the fact that what you do not know can hurt you.


next up previous
Next: 3.2.3 Levels of threat Up: 3.2 Access Security: Firewalls Previous: 3.2.1 Introduction
Denis Arnaud
12/19/1997