Double firewall security architecture

Hello,
i would like to ask a question that i've been thinking about since a while.
Within a secure network architecture, it is recommended to have an external and internal firewalls. one key adventage is the it removes the single point of failure.
Basically (theorically):
External firewall filters trafic between internet and DMZ
Internal firewall filters trafic between internal network and DMZ
In practice:
at which firewall to filter traffic flows coming from the internal network to internet, knowing that its not only web browsing traffic but all Saas application, remote administration, external backup and so one...
i would like to ask a question that i've been thinking about since a while.
Within a secure network architecture, it is recommended to have an external and internal firewalls. one key adventage is the it removes the single point of failure.
Basically (theorically):
External firewall filters trafic between internet and DMZ
Internal firewall filters trafic between internal network and DMZ
In practice:
at which firewall to filter traffic flows coming from the internal network to internet, knowing that its not only web browsing traffic but all Saas application, remote administration, external backup and so one...
Comments
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
I once worked in a small-to-medium sized environment that had a HA pair (active/standby) at the main site and a standalone fw at the DR site to protect the perimeter. All traffic traversed that fw via the respective interfaces (inside/outside/DMZ). We were lucky to get a web gateway put in place in our DMZ lol.
with two fw, if i get to do some filterings (of a traffic coming from internal) at the external fw, the fact is that that traffic goes throughout the first fw without being processed, what looks like a waist of bandwidth of that first firewall.
I'm trying to wrap my head around the need for two firewalls. Why not one firewall (with redundancy for High availability purposes) and then different security controls after that (IPS/IDS, WAF, etc) rather than two firewalls one after the other. Not sure what additional value the second firewall is providing (strictly speaking firewall i.e. IP/port filtering )
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
If you're using cisco NGFWs, what if there is an zero day for that? So having multi-firewalls requires from state-sponsored or nation-state actors more time and more efforts to break into networks.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
yep agreed, so the internal firewall is basically a next-gen firewall working more as an IPS/IDS etc, that's the design that I've seen and recommend
https://www.ncsc.gov.uk/whitepaper/security-architecture-anti-patterns
In a nutshell, vulnerabilities usually lie against the management interface layer (which should not be exposed to untrusted networks) and not from processing the header layer of the TCP/IP packet (remote code execution).
Zero trust architecture takes this so much deeper with no concept of DMZ's and a perimeter less environment; where accessibility to both SaaS apps and private apps is funnelled over a SASE. This is the future - check it out.
1. what are you protecting and what is the impact of loss?
2. What is the value to the company.
3. What threats can exploit these services
4. who has access, what permissions do they have and how can this be accomplished.
etc etc.
Leveraging sensible throughout to reduce latency and congestion plus failover when needed to a secondary boundary device (think BCP) makes sense. Which is different to daisy chain design.