We have a client that has a Cisco 3725 for the internet router. The router has two connections to the internet that are hosted by different ISPS. The router runs BGP for load balancing and failover. The client has a Class C block of outside IPs and has assigned every computer, server and printer one of these outside IPs. I know that this was popular a few years ago but I feel that it is a security flaw. The router has ACLs that deny all traffic except what they want to pass however, I do not feel that this is the most secure solution. I would rather see a dedicated firewall and a trusted / DMZ type design. From the way that I see the design, the client has no IDS capability nor statefull packet inspection. I know that some of the newer IOS builds have more powerful firewall capabilities. Not sure what version the router is on currently. I assume that the client has the firewall feature set beacuse they have existing ipsec tunnels. My suggestion would be to protect the LAN comptuers and critical servers behind some NAT and IDS then put the machines that offer up outside services in the DMZ. Can anyone comment???? Thanks
Thanks
Thanks