uCosminexus Application Server, Security Management Guide

[Contents][Index][Back][Next]

4.11.2 Deploying a firewall and intrusion detection system

This subsection describes how to properly deploy and configure a firewall and intrusion detection system in order to improve system security.

Organization of this subsection
(1) Purposes of deploying a firewall and intrusion detection system
(2) Basic Web client configuration
(3) Basic EJB client configuration
(4) Configuration separating each server layer by a firewall (application-centralized)
(5) Configuration separating each server layer by a firewall (application-distributed)

(1) Purposes of deploying a firewall and intrusion detection system

A firewall controls access between the external and internal networks. To prevent unauthorized access from an external network, it blocks communication other than that which is permitted for predetermined clients or communications, in accordance with predetermined rules. To use a firewall, it is therefore necessary to clarify and specify the ports or IP addresses for which communication is permitted.

An intrusion detection system (IDS) monitors the communication line and uses communication patterns to determine whether access is authorized.

Deploying a firewall and intrusion detection system at appropriate points and configuring them helps to protect the system from the following security threats:

This subsection describes where to deploy a firewall and intrusion detection system for each system configuration listed in the following table and the points that need to be considered when configuring them.

Table 4-7 Considerations for deploying a firewall and intrusion detection system for different system configurations

System configuration Description
Basic Web client configuration This is a system configuration with a single application server. A Web browser is a client.
Basic EJB client configuration This is a system configuration with a single application server. An EJB client application is a client.
Configuration separating each server layer by a firewall (application-centralized) This is a system configuration with multiple application servers, each server layer separated by a firewall. All applications run on the same application server layer.
Configuration separating each server layer by a firewall (application-distributed) This is a system configuration with multiple application servers, each server layer separated by a firewall. Applications run on different application server layers.

When connecting the system to the Internet, we recommend you consider a configuration that uses a reserved DMZ and a reverse proxy so that no application server on the internal network can be directly accessed from external networks.

(2) Basic Web client configuration

This section describes where to deploy a firewall and intrusion detection system for a basic Web client configuration with a single application server.

When viewed from the network, the firewall should be deployed in front of the application server. In this configuration, a Web client on the network can only access the application server via the firewall.

The figure below shows an example of a firewall and intrusion detection system deployment for a basic Web client configuration.

Figure 4-4 Example firewall and intrusion detection system deployment for a basic Web client configuration

[Figure]

(a) Configuring the application server

For the application server, configure the following settings:

(b) Configuring the firewall

To control access between external networks and the Web server (Cosminexus HTTP Server) within the application server, configure the following settings:

(c) Configuring the intrusion detection system

To monitor communication between external networks and a public port on the Web server (Cosminexus HTTP Server) within the application server, configure the following settings:

(3) Basic EJB client configuration

This section describes where to deploy a firewall and intrusion detection system for a basic EJB client configuration with a single application server.

When viewed from the network, the firewall should be deployed in front of the application server. In this configuration, an EJB client on the network can only access the application server via the firewall.

The figure below shows an example of a firewall and intrusion detection system deployment for a basic EJB client configuration.

Figure 4-5 Example firewall and intrusion detection system deployment for a basic EJB client configuration

[Figure]

(a) Configuring the application server

For the application server, configure the following settings:

(b) Configuring the firewall

To control access between external networks and the application server, configure the following settings:

(c) Configuring the intrusion detection system

To monitor communication between external networks and a public port on the application server, configure the following settings:

(4) Configuration separating each server layer by a firewall (application-centralized)

Depending on the scale of the system, a single system might consist of multiple application servers and other servers. In such a configuration, it is necessary to ensure security at each layer.

This section describes a configuration in which Web, application, and database servers are arranged into different layers, with all applications running on the same application server layer. This type of configuration is called an application-centralized configuration.

The figure below shows an example of a firewall and intrusion detection system deployment for an application-centralized configuration. In this configuration, a total of three firewalls are deployed, one for each server layer. In the DMZ, a Web server with a built-in reverse proxy module (reverse proxy server) is deployed.

Figure 4-6 Firewall and intrusion detection system deployment in an application-centralized configuration

[Figure]

To reduce the number of firewalls, for example, to cut costs, a configuration as shown in the figure below is possible. In this example, firewall 2 is removed by consolidating the access controls to be performed by firewalls 1 and 2 into firewall 1.

Figure 4-7 Configuration with reduced firewalls

[Figure]

In this configuration, include the settings for firewall 2 into those for firewall 1.

(a) Configuring the application server

For the application server, configure the following settings:

(b) Configuring each firewall

This configuration uses the following three firewalls:

Settings to be configured for each firewall are as follows.

Configuring firewall 1

Firewall 1 is used to control access between external networks and the Web server (reverse proxy server) in the DMZ. Configure the following settings:

Configuring firewall 2

Firewall 2 is used to control access between the Web server and the application server. Configure the following settings:

For other communication settings, permit access as appropriate according to the particular system configuration. It might be necessary to permit DNS communication, etc.

Reference note
Reference
If a redirector module is built into a Web module that is within the DMZ, for example, and if a firewall is deployed between the Web server and the application server running the J2EE server, it is necessary to configure the following settings:
  • Permitting access from the Web server to the application server
    For the Web server communication port for the J2EE server (or the port receiving requests from the redirector), permit communication to the default port number (8007).
Configuring firewall 3

Firewall 3 is used to control access between the application server and the database. This firewall serves as the last line of defense to protect the most important information in the system.

Configure the following settings:

For other communication settings, permit access as appropriate according to the particular system configuration. It might be necessary to permit DNS communication, etc.

(c) Configuring the intrusion detection system

To monitor communication between external networks and the public port for the Web server that is inside the application server, configure the following settings:

(5) Configuration separating each server layer by a firewall (application-distributed)

This section describes a configuration in which Web, application, and database servers are arranged into different layers and all applications are run on different application server layers. This type of configuration is called an application-distributed configuration.

The figure below shows an example of a firewall and intrusion detection system deployment for an application-distributed configuration. In this example, the Web applications run on the same layer as the Web server because the machine serving as the Web server also serves as an application server. Enterprise Bean runs on the application server that is set up on a separate machine from the Web server.

Administration is performed by instances of Management Server deployed on each host. Therefore, a management host is deployed to each layer.

In this configuration, a total of four firewalls are deployed: one in front of the DMZ and one for each server layer. In the DMZ, a Web server with a built-in reverse proxy module (reverse proxy server) is deployed.

Figure 4-8 Firewall and intrusion detection system deployment in an application-distributed configuration

[Figure]

(a) Configuring the Web/application server

For the application server machine that also serves as a Web server (Web/application server), configure the settings as shown below. Note that this application server machine also runs Web applications.

(b) Configuring the application server

For the application server running Enterprise Bean, configure the following settings:

(c) Configuring each firewall

This configuration uses a total of four firewalls:

Settings to be configured for each firewall are as follows.

Configuring firewall 1

Firewall 1 is used to control access between external networks and the Web server (reverse proxy server) in the DMZ. Configure the following settings:

Configuring firewall 2

Firewall 2 is used to control access between external networks and the Web/application server on the internal network. Configure the following settings:

Configuring firewall 3

Firewall 3 is used to control access between the Web/application server and the application server. Configure the following settings:

Configuring firewall 4

Firewall 4 is used to control access between the application server and the database. This firewall serves as the last line of defense to protect the most important information in the system.

Configure the following settings:

(d) Configuring the intrusion detection system

To monitor communication between external networks and the public port for the Web server within the application server, configure the following settings: