I have been working on evaluating our current network security situation at our company. Part of this is in response to some problems we have been having lately. At the moment we have a DSL connection at the office that is protected by a firewall appliance made by watchguard. This connection is used for our office's internet connectivity, but also for an smtp server hosted within the firewall on the internal network. We rent rack space at a web hosting company and have a server there that runs IIS and as well as SQL server in the same box. We also have an identical firewall appliance there protecting the server. There is also a constant VPN connection between the two firewall appliances used to pull customer data from the website to the office, and for administering the website.
My primary concern is the VPN connection between the office and the web hosting company. It would seem that in having these tied together like this we are essentially putting the web server inside the company's internal network.
My other concern is with SQL server being on the same box with IIS. Shouldn't SQL be hosted behind another firewall, or on the internal network?
I am concerned with having our internal exchange server recieving e-mail directly from the internet. Would it be a good idea to set up an SMTP virtual server, possibly on the web server?
My understanding is that there should the setup should go:
Internet -Firewall- DMZ -Firewall- Internal network
Then the web server should be on the DMZ, along with the SMTP virtual server, and possibly the SQL server. I guess where my confusion really comes in is how to I do that when the web server is in a different location. It would seem to me like I am going to need to buy an additional firewall here and set up the VPN connection on the first firewall in the office before the DMZ, to kind of link the VPN into the DMZ. anyone have any ideas on this? Thanks.
My primary concern is the VPN connection between the office and the web hosting company. It would seem that in having these tied together like this we are essentially putting the web server inside the company's internal network.
My other concern is with SQL server being on the same box with IIS. Shouldn't SQL be hosted behind another firewall, or on the internal network?
I am concerned with having our internal exchange server recieving e-mail directly from the internet. Would it be a good idea to set up an SMTP virtual server, possibly on the web server?
My understanding is that there should the setup should go:
Internet -Firewall- DMZ -Firewall- Internal network
Then the web server should be on the DMZ, along with the SMTP virtual server, and possibly the SQL server. I guess where my confusion really comes in is how to I do that when the web server is in a different location. It would seem to me like I am going to need to buy an additional firewall here and set up the VPN connection on the first firewall in the office before the DMZ, to kind of link the VPN into the DMZ. anyone have any ideas on this? Thanks.