Hello,
We have a network of about 2500 PC's. We provide Internet connectivity to all of these devices through a firewall of course. However, some people don't like to deal with the firewall or want faster access and have resorted to setting up connections through other providers such as DSL or cable. These rogue connections are then distributed using simple SOHO routers from the likes of Netgear or Linksys.
The problem is that these computers have two NICs so they are dual homed so they are on both our internal enterprise network AND connected to the smaller network fed by the Cable/DSL router for Internet connectivity. The boxes connected in this case range from Win98 to 2K to XP. I already of some specific concerns about how these networks are configured and how the actual boxes are configured but I'd like to hear what all of you have to say about this.
I'd like specifics but realize that you guys don't want to get too detailed to give the freaks out there too many ideas. Perhaps someone can point me in the right direction to do additional research. I'm hoping to find some white papers or perhaps some actual incidents I can read through and present to the powers that be.
(We realize this is a huge security problem but it's a very complicated issue in terms of personnel, sphere of influence, etc. so let's try to keep focused on the tech side of this)
Thanks
We have a network of about 2500 PC's. We provide Internet connectivity to all of these devices through a firewall of course. However, some people don't like to deal with the firewall or want faster access and have resorted to setting up connections through other providers such as DSL or cable. These rogue connections are then distributed using simple SOHO routers from the likes of Netgear or Linksys.
The problem is that these computers have two NICs so they are dual homed so they are on both our internal enterprise network AND connected to the smaller network fed by the Cable/DSL router for Internet connectivity. The boxes connected in this case range from Win98 to 2K to XP. I already of some specific concerns about how these networks are configured and how the actual boxes are configured but I'd like to hear what all of you have to say about this.
I'd like specifics but realize that you guys don't want to get too detailed to give the freaks out there too many ideas. Perhaps someone can point me in the right direction to do additional research. I'm hoping to find some white papers or perhaps some actual incidents I can read through and present to the powers that be.
(We realize this is a huge security problem but it's a very complicated issue in terms of personnel, sphere of influence, etc. so let's try to keep focused on the tech side of this)
Thanks