[SOLVED] How to secure a LAN and webmail server , proxy etc..
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
How to secure a LAN and webmail server , proxy etc..
Dear Experts,
I am trusted with a responsibility of securing network of my client and also look after some security issues they are facing with their webmail server, proxy etc. Kindly advise me in structuring of LAN taking care of security and settings to check for in webmail and proxy, apart from this suggest me some idea in implementing IDS & IPS. In case I miss out any detail please notify me I will provide that.
I am trusted with a responsibility of securing network of my client
Please allow me to ask a few counterquestions. If your client entrusted you with securing your clients network then shouldn't you at least possess basic admin knowledge of this? Haven't you already made an initial inventory of the network, networked devices, services, users, machines security posture and maintenance / security history? If not please start with giving us a brief overview of the above.
Quote:
Originally Posted by NM04
and also look after some security issues they are facing with their webmail server, proxy etc.
Please be specific. Post anything you think may (or may not) be related.
Please allow me to ask a few counterquestions. If your client entrusted you with securing your clients network then shouldn't you at least possess basic admin knowledge of this? Haven't you already made an initial inventory of the network, networked devices, services, users, machines security posture and maintenance / security history? If not please start with giving us a brief overview of the above.
Sir I do have knowledge but I think it is not sufficient I need a few more suggestion, The n/w they are creating is for their new office,for which the ISP has laid the fiber optics to the site, now its my duty to secure the Intranet their servers and services on these servers. I also need suggestion on creating a secure LAN Design.
Quote:
Originally Posted by unSpawn
Please be specific. Post anything you think may (or may not) be related.
their webmail (Zimbra) server acted abnormally, what happened was few other people in the same n/w were able to send mails from someone superior's account without having password.
The help you need is above your knowledge, and it would be a massive operation for us to help you.
We have the knowledge, but literally would need access to all your configs and set up to help you.
It is one thing to know IDS software, and then posting help on the issue, than asking help with IDS and IPS systems etc.
Let me see if I can provide you more details, till then can you help me with LAN design, and a few tools to check n/w & server vulnerabilities, weak points.
So what does this LAN comprise of? Only user machines? Or also servers? Do any servers have business critical roles? Is the LAN part of a WAN? Is there redundant connectivity? What hardware is already in use or slotted for use?
Quote:
Originally Posted by NM04
and a few tools to check n/w & server vulnerabilities, weak points.
Are there industry-specific compliance rules you must adhere to? What checklists and tools do you currently use?
So what does this LAN comprise of? Only user machines? Or also servers? Do any servers have business critical roles? Is the LAN part of a WAN? Is there redundant connectivity? What hardware is already in use or slotted for use?
This is a new site for which new fiber optics have been laid by the ISP, all I need to know where should I connect them first, border router>firewall>server>firewall>router>switches>users, this is one hierarchy I presented (kind of a LAN design, something like this I am expecting from you people, a better one).
Yes the LAN comprises of user machines, servers etc.
Quote:
Originally Posted by unSpawn
Are there industry-specific compliance rules you must adhere to? What checklists and tools do you currently use?
They say that there is no such compliance rules, but they also say that I am responsible if anything goes wrong. Eg. if any tool I downloaded and the tool misbehaved and created a vulnerability, any thing like that I will be held responsible.
I am yet to start using any tool in this n/w. till now I have used metasploit, nmap, most tools available in BT5 OR KALI.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.