tshinder -> RE: publising a secure web server internally (17.Mar.2006 4:19:04 PM)
|
quote:
ORIGINAL: oyvind Tom! Why not use ssl to ssl bridging? Well, it costs more CPU cycles, and it complicates the scenario a bit more. (I guess you are right about the certificates, though, I assume there's no problem with using a public one on the ISA and a private on on the mail frontend?) And I just cannot see why ssl to http bridging is unsecure! Both mail frontend and ISA resides in the same server rack, both connected to the same Catalyst 3560 switch, using VLANs. Server room is locked, nobody but me has access at any time. Sniffing the traffic is therefore impossible. Is there anything I have forgotten, Tom? I'd really like to know why such a setup is unsecure! Thanks! Øyvind Hi Oyvind, Yes, but you should be willing to pay the CPU cost for security. A single stolen username and password combination will make you wish you had deployed a secure configuration. The certificate issue is not complicated, and there are dozens of articles on this site on how to deploy things correctly and securely. However, if the ISA firewall and the mail server are directly connected, then that would be reasonably secure, although realize that VLANs are not secure HTH, Tom
|
|
|
|