ipMonitor 6.1
Firewalls & Proxy Servers
< BackIndexNext >



Many organizations use Firewalls to protect part or all of their network from outsiders. This is particularly important on TCP/IP enabled networks where people and computers inside the organization have access to the Internet. Firewalls prevent direct communication between computers within the organization's network and computers outside the network (and vice versa). To maintain security, organizations route network conversations through Proxy Servers which decide whether data can be forwarded both to and from the organization's network. Proxy servers often provide such features as document caching and access control.

Depending on your network, you may have to modify your network configuration in order to monitor and report the status of some or all network computers, services, resources and devices. In most cases network configurations fall into the following metaphor:

Safe zone and Militarized zone.

A Safe zone is an area considered to be protected against probing and attacks. All devices in the Safe zone are trusted, and do not directly communicate outside the safe zone, in fact they are put behind a barrier.

The Militarized zone is an area of network that is vulnerable to possible probing and attack. The devices that are on this part of the network are designed to withstand any such possibility since these are considered to be environmental factors. In most cases any such machines must be available "directly" for the purpose of their application.

Network traffic that must somehow bypass the Safe zone barrier is handled by a trusted device (two examples are a Bridge and a Proxy Server). Bridges and Proxy Servers are usually members of the both the safe and the militarized zone (both networks). For each network to which they belong, a unique network address exists. Bridges route, or allow network traffic through zones, without modification. Proxy Servers adjust network traffic to appear as if it originated from the same zone (or network).

Devices in the Militarized zone are usually production machines that must always run, subsequently the must be closely monitored.

Three ways to setup ipMonitor so that both the safe and militarized zones are monitored:

Method Comment
Install ipM on the "bridge" machine between both zones. In this scenario the software can only be viewed and controlled from the Safe zone.
  • Install ipMonitor on the "bridge" NT machine. This places ipMonitor on both the Safe and the Militarized zone, which allows monitoring to take place in both environments.
  • ipMonitor will listen on one TCP/IP network address; specify the network address from the Safe Zone.
  • If you use ipMonitor to Alert by alphanumeric pager or beeper you will need a modem and a telephone line at this machine.
Install ipM in each zone. (requires 2 licenses) This method will allow the Safe zone, and one trusted machine in the Militarized zone to control and view the software.
  • Buy an additional ipMonitor, and install on a separate NT machine in each zone.
  • In the Safe zone, configure the software in the normal manner.
  • In the Militarized zone, specify the TCP/IP network address to the local loop back: 127.0.0.1. Only the local machine can communicate with 127.0.0.1.
Install ipM in the safe
zone and open firewall
as required.
This method will allow only the Safe zone control and view the software.
  • Install ipMonitor in the Safe zone.
  • Construct a list of devices, machine names or addresses, protocols, and ports that need to be monitored in the Militarized Zone.
  • Request the network administrator for the Militarized zone to adjust the "Firewall" to allow one way communication originating from the ipMonitor machine to the listed devices. This usually involves adjusting privileges, routing tables, or access lists. The methods and ramifications are specific to each Firewall vendor. This method should be left to qualified persons only, since improper modification of security schemes may leave "holes" in the network. Use the following information to construct your fire wall list.