[97210] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security gain from NAT

daemon@ATHENA.MIT.EDU (Dave Israel)
Mon Jun 4 17:02:10 2007

Date: Mon, 04 Jun 2007 15:22:11 -0400
From: Dave Israel <davei@otd.com>
To: Valdis.Kletnieks@vt.edu
Cc: NANOG list <nanog@nanog.org>
In-Reply-To: <13770.1180983241@turing-police.cc.vt.edu>
X-OTD-MailScanner-From: davei@otd.com
Errors-To: owner-nanog@merit.edu




Valdis.Kletnieks@vt.edu wrote:
> On Mon, 04 Jun 2007 11:32:39 PDT, Jim Shankland said:
>> *No* security gain?  No protection against port scans from Bucharest?
>> No protection for a machine that is used in practice only on the
>> local, office LAN?  Or to access a single, corporate Web site?
> 
> Nope. Zip. Zero. Ziltch.  Nothing over and above what a good properly
> configured stateful *non*-NAT firewall should be doing for you already.
> 

What the firewall *should* be doing?  The end devices *should* not need 
protection in the first place, because they *should* be secure as 
individual devices.  But they are not.  So you put a firewall in front 
of them, and that device *should* give them all the protection they 
need.  But sometimes, it doesn't.  So you make end devices unaddressable 
by normal means, and while it shouldn't give them more security, it 
turns out it does.  No matter how much it shouldn't, and how much we 
wish it didn't, it does.

The difference between theory and practice is that in theory, there is 
no difference, but in practice, there is.


home help back first fref pref prev next nref lref last post