T
Trust No One®
Hi Folks,
Appreciate input on this one.
My company recently done a feasibility on implementing Windows 2003 and AD
in our internet facing DMZ. Basically an external consultant came in and
produced a report. The report recommended setting up a separate AD forest
spanning both our DMZ and internal network, with member servers sited in the
DMZ subnets and the domain controllers located on the internal network. The
appropriate ports are then opened on the corporate firewall to permit
communication to/from the domain controllers, communications are secured via
IPSEC.
The consultant assured us that other corporate run similar configurations,
the advantage being that administration of the AD and maintenance of the DCs
is far easier as you won't need to cross the firewall; the domain
controllers can be pointed at the internal DNS servers.
Despite the assurances I'm troubled by the recommendation as
a) It introduces the possibility (however small) of an intruder using the
path to the domain controllers to hop from the DMZ into the internal network
should he/she manage to comprise one of the internet facing member servers.
b) Security rather than ease of administration should surely be the main
consideration.
c) ISTR RPC requires a significant range of ports to be opened? I know that
the range of ports can be locked down to a defined range rather the default
of dynamic, but a number of holes still need to be punched in order to
permit communication to the domain controllers.
I would have thought a completely separate DMZ forest with possibly a one
way trust to the internal AD forest would be the more secure way to go. I am
keeping an open mind at this stage however.
Any thoughts or comments on the consultant's recommendation? Is anyone on
the group successfully running with a split DMZ/Internal AD forest?
Best Wishes
Appreciate input on this one.
My company recently done a feasibility on implementing Windows 2003 and AD
in our internet facing DMZ. Basically an external consultant came in and
produced a report. The report recommended setting up a separate AD forest
spanning both our DMZ and internal network, with member servers sited in the
DMZ subnets and the domain controllers located on the internal network. The
appropriate ports are then opened on the corporate firewall to permit
communication to/from the domain controllers, communications are secured via
IPSEC.
The consultant assured us that other corporate run similar configurations,
the advantage being that administration of the AD and maintenance of the DCs
is far easier as you won't need to cross the firewall; the domain
controllers can be pointed at the internal DNS servers.
Despite the assurances I'm troubled by the recommendation as
a) It introduces the possibility (however small) of an intruder using the
path to the domain controllers to hop from the DMZ into the internal network
should he/she manage to comprise one of the internet facing member servers.
b) Security rather than ease of administration should surely be the main
consideration.
c) ISTR RPC requires a significant range of ports to be opened? I know that
the range of ports can be locked down to a defined range rather the default
of dynamic, but a number of holes still need to be punched in order to
permit communication to the domain controllers.
I would have thought a completely separate DMZ forest with possibly a one
way trust to the internal AD forest would be the more secure way to go. I am
keeping an open mind at this stage however.
Any thoughts or comments on the consultant's recommendation? Is anyone on
the group successfully running with a split DMZ/Internal AD forest?
Best Wishes