LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-24-2014, 03:00 AM   #1
NM04
Member
 
Registered: Jan 2011
Distribution: Back Track,Fedora,centos
Posts: 240

Rep: Reputation: 14
Question How to secure a LAN and webmail server , proxy etc..


Dear Experts,
I am trusted with a responsibility of securing network of my client and also look after some security issues they are facing with their webmail server, proxy etc. Kindly advise me in structuring of LAN taking care of security and settings to check for in webmail and proxy, apart from this suggest me some idea in implementing IDS & IPS. In case I miss out any detail please notify me I will provide that.

Regards,
nm
 
Old 11-24-2014, 04:46 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by NM04 View Post
I am trusted with a responsibility of securing network of my client
Please allow me to ask a few counterquestions. If your client entrusted you with securing your clients network then shouldn't you at least possess basic admin knowledge of this? Haven't you already made an initial inventory of the network, networked devices, services, users, machines security posture and maintenance / security history? If not please start with giving us a brief overview of the above.


Quote:
Originally Posted by NM04 View Post
and also look after some security issues they are facing with their webmail server, proxy etc.
Please be specific. Post anything you think may (or may not) be related.
 
Old 11-24-2014, 11:46 PM   #3
NM04
Member
 
Registered: Jan 2011
Distribution: Back Track,Fedora,centos
Posts: 240

Original Poster
Rep: Reputation: 14
Quote:
Originally Posted by unSpawn View Post
Please allow me to ask a few counterquestions. If your client entrusted you with securing your clients network then shouldn't you at least possess basic admin knowledge of this? Haven't you already made an initial inventory of the network, networked devices, services, users, machines security posture and maintenance / security history? If not please start with giving us a brief overview of the above.
Sir I do have knowledge but I think it is not sufficient I need a few more suggestion, The n/w they are creating is for their new office,for which the ISP has laid the fiber optics to the site, now its my duty to secure the Intranet their servers and services on these servers. I also need suggestion on creating a secure LAN Design.
Quote:
Originally Posted by unSpawn View Post
Please be specific. Post anything you think may (or may not) be related.
their webmail (Zimbra) server acted abnormally, what happened was few other people in the same n/w were able to send mails from someone superior's account without having password.
 
Old 11-27-2014, 03:48 AM   #4
linuxgurusa
Member
 
Registered: Mar 2008
Location: Namibia, Swakopmund
Distribution: Redhat, Fedora, Centos, ClearOS, Mandrake
Posts: 151

Rep: Reputation: 29
I need to concur with unSpawn on this.

The help you need is above your knowledge, and it would be a massive operation for us to help you.
We have the knowledge, but literally would need access to all your configs and set up to help you.
It is one thing to know IDS software, and then posting help on the issue, than asking help with IDS and IPS systems etc.

Hope you understand ?
 
Old 11-27-2014, 10:37 PM   #5
NM04
Member
 
Registered: Jan 2011
Distribution: Back Track,Fedora,centos
Posts: 240

Original Poster
Rep: Reputation: 14
Let me see if I can provide you more details, till then can you help me with LAN design, and a few tools to check n/w & server vulnerabilities, weak points.

Regards,
nm
 
Old 11-30-2014, 04:26 PM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by NM04 View Post
Let me see if I can provide you more details,
Please do, verbosely.


Quote:
Originally Posted by NM04 View Post
till then can you help me with LAN design,
So what does this LAN comprise of? Only user machines? Or also servers? Do any servers have business critical roles? Is the LAN part of a WAN? Is there redundant connectivity? What hardware is already in use or slotted for use?


Quote:
Originally Posted by NM04 View Post
and a few tools to check n/w & server vulnerabilities, weak points.
Are there industry-specific compliance rules you must adhere to? What checklists and tools do you currently use?
 
Old 11-30-2014, 11:22 PM   #7
NM04
Member
 
Registered: Jan 2011
Distribution: Back Track,Fedora,centos
Posts: 240

Original Poster
Rep: Reputation: 14
Quote:
Originally Posted by unSpawn View Post
Please do, verbosely.
yes give me some time!


Quote:
Originally Posted by unSpawn View Post
So what does this LAN comprise of? Only user machines? Or also servers? Do any servers have business critical roles? Is the LAN part of a WAN? Is there redundant connectivity? What hardware is already in use or slotted for use?
This is a new site for which new fiber optics have been laid by the ISP, all I need to know where should I connect them first, border router>firewall>server>firewall>router>switches>users, this is one hierarchy I presented (kind of a LAN design, something like this I am expecting from you people, a better one).
Yes the LAN comprises of user machines, servers etc.

Quote:
Originally Posted by unSpawn View Post
Are there industry-specific compliance rules you must adhere to? What checklists and tools do you currently use?
They say that there is no such compliance rules, but they also say that I am responsible if anything goes wrong. Eg. if any tool I downloaded and the tool misbehaved and created a vulnerability, any thing like that I will be held responsible.
I am yet to start using any tool in this n/w. till now I have used metasploit, nmap, most tools available in BT5 OR KALI.

Regards,
nm
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: How to Set Up a Secure Proxy Server in Ubuntu Linux LXer Syndicated Linux News 0 07-02-2013 12:41 AM
secure communication between web browser and Proxy Server in linux humaira Programming 5 07-10-2010 08:03 PM
HTTPS Proxy to provide secure access to LAN pages? jantman Linux - Security 2 10-22-2007 09:21 PM
secure webmail arunswarup Linux - Software 1 10-27-2005 10:05 AM
Secure Proxy Configuration(squid) for a LAN to access Internet pune_abhishek Linux - Networking 5 11-30-2003 01:33 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:34 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration