need advice on firewall/VPN security options

posten

n00b
Joined
Dec 8, 2004
Messages
16
ok guys, I'll give a brief rundown on what we've got.

I'm the monkey/IT guy for my company. we've got one server running SBS 2003 and SQL server. we have a custom app that lets us manipulate our SQL database. our developer has hard-wired the SQL logins into that application. the app is mostly used on-site for local clients within our domain. however, the app can and has been used remotely, as long as port 1433 is open on the router. i know that may not be all that secure, but that's how it was written.

red flags? yes.

our topology is as follows...static IP business class, cisco UBR900 cable modem/router, old linksys befw11s4 candy-a$$ wireless router. wireless is disabled. one SBS 2003 server, a bunch of XP pro clients all in one domain.

only recently did we discover that a bot somewhere has been doing a brute-force password attack on standard SQL account names on SQL server via 1433. It's actually coming from St. Louis MO. I thinkwe've since closed that port. however, very soon we will have a lot of work and people will need remote access to run our app. we COULD run it on the server, but SBS2003 only comes with 2 TS liscences. however, our dual- AthlonMP 1.7s already make the server a little slow with 2 active TS connectinos. so that option is out.

we could build a few client machines, headless boxes with XP pro on them that people could TS into and run the app that way. however, our office is very small, and short of a rack of 1U boxes, it's not feasible. and new hardware costs money. and money is tight.

we have off-site workers that will need to use the app one way or another. unless we totally re-vamp our app, which I don't see happening, that means re-opening 1433 on the router. I'll be the first to admit i know next to nothing about the complex workings of firewalls. i talked with our developer about some options, VPN...firewalls. stateful packet filtering...would likely block attacks, but might have problems in that our people working remotely are most likely on residential DSL or cable connections with dynamic IPs...so we can't designate those as trusted in the firewall. was looking at the older watchguard SOHO firewalls...you know the redbox that came with 10 user lisc...considering that...but A) not sure if it will do everything we need, and B) have more than 10 machines locally...so that's more money for liscences.

I know next to nothing about VPN's...but from talking to our developer and a friend at MS, I think that's the way to go. somehow got to get some authentication going. however, I know next to nothing about setting one up.

any opinions/advice on this situation would be greatly appreciated.

Thanks,

Posten
 
While it does little for security, aside from avoiding bots, run SQL Server on an alternative port number.
 
I take it the app can be run from any box as long as it can the server correct? If so, quickest easiest way would be to setup a quick simple vpn. you could setup one by hand on a linux box to keep it free, but for quick and simple, you can get m0n0wall, setup PPTP in a matter of minutes. Then your users can connect to the VPN, run the app on their workstation without it being joined to the domain and they're good to go.
 
openvpn is a decent little app, worth looking into at least.

I swear by it. :)
 
You'll need to determine how much bandwidth would be required to support "x" concurrent users and if the application will have a decent response time.

Else I recommend setting up a dual processor member server running terminal server for remote users.
 
Back
Top