Postby moredruid » Tue Feb 17, 2009 12:51 am
That setup may work depending on your environment/requirements.
Most importantly: will the server be connected to the internet serving anything? This is the most important consideration. If it will only proxy or route internet / mail from the office then you should be fine with the setup you described. If you want more you'll have to consider strengthening the security of that system. Ideally you will then want 2 servers: 1 very secure DMZ server connected to the internet (serving pages, mail etc.) and 1 normally secured server for your internal network.
You can of course combine all tasks (NOT recommended), but then you'll have to strengthen the security of your setup!
In linux-land there are lots of tools which make this possible, but you'll have to know what you're doing and keep in mind that security is NEVER a "solution", it can only be a "process" since the requirements may change on a daily basis, so you'll always have to keep up to date.
This is why admining 2 servers can be less of a task than only 1. Your DMZ server needs constant attention, however you can make trade-offs for security by having a good (working & tested) backup of your server, in case it gets rooted you can be back up within a few hours without losing too much data and without having compromised your workgroup server. If you have the roles combined in 1 server you must keep everything up to date, considering all changes you make with the current status quo, will it break something or not etc.
In short: it's easier to have an old computer (a 300 MHz Celeron with 256MB or maybe 512MB RAM will do very well) as your DMZ server doing it's serving that is allowed to "break" (a little, and hopefully not at all) facing the internet and another computer serving your workgroup/office.
echo '16i[q]sa[ln0=aln100%Pln100/snlbx]sbA0D2173656C7572206968616D41snlbxq' | dc
Galileo - HP Proliant ML110 G6 quad core Xeon 2.4GHz, 4GB RAM, 2x750GB RAID1 + 2x1TB RAID1 HDD