
Originally Posted by
ShadowPeak.com
I covered this pretty thoroughly in my book, here is the text:
Perform IPS Inspection on all Traffic – This is typically the default setting. All
traffic regardless of direction has IPS inspection applied. This includes traffic passing
from one Internal network (like a DMZ) to another, as well as connections to or from
External interfaces. “Internal” in this context means any interface defined as Internal on
the firewall/cluster object’s topology screen in the SmartDashboard.
This is the default setting; it will essentially force almost all traffic passing through
the firewall into at least the Medium Path. Very little traffic will be subject to throughput
acceleration, and performance will be negatively impacted. There is even a warning
issued if you select this option; something to the effect of “Turning on this option may
have an adverse impact on performance”.
Protect Internal Hosts Only – When selected, IPS protections are only applied to
packets traveling to a network defined as “Internal”. “Internal” in this context means any
interface defined as Internal in the firewall/cluster object’s topology anti-spoofing screen
(DMZs as well). This includes traffic passing from one Internal network (like a DMZ) to
any other Internal network.
It does not matter whether the connection was originally initiated from an External or
Internal interface; any packet attempting to leave the firewall towards an Internal
interface will have IPS protections applied. Traffic whose destination is an External
interface (typically going to the Internet or perhaps a site-to-site VPN utilizing the
Internet) will not have IPS protections applied with Protect Internal Hosts Only set, and
will probably be able to take the Accelerated Path, assuming no other firewall features
are enabled that require Medium Path processing for that same traffic.
From purely a security perspective, one could argue that Perform IPS Inspection on
all Traffic is always the right setting (it is the default after all!). Of course we want the
IPS to prevent attacks against our internal and DMZ systems. But what about traffic
leaving your network bound for a system on the Internet? What about traffic entering a
VPN tunnel bound for a business partner or vendor across the Internet? Shouldn’t your
firewall ensure that possible attacks emanating from your internal network don’t target
your partners? One could assert that the remote parties should take steps to protect
themselves, but try telling that to a key business partner whose network just got crushed
by a worm or attack launched from inside of your own network! Also consider the
positioning of the subject firewall in your network; the correct setting is likely to be
different for a firewall deployed on the perimeter of your organization as opposed to
another firewall buried deep inside your internal network with no direct Internet access.
As with any topic in security, it is a matter of trade-offs. As we all know, the answer
to many security-related questions will very frequently begin with: “Well that
depends...”. This may frustrate upper management decision-makers, but ensures
excellent job security prospects for security administrators. Leaving the default setting
Perform IPS Inspection on all Traffic enabled is pretty common in most environments,
however if your Firewall Worker cores are perpetually overloaded and you can’t allocate
any more Firewall Workers due to a shortage of cores, consider setting Protect Internal
Hosts only for IPS inspection.
Bookmarks