BobW wrote:
Steven,
Thanks for replying, but I am still confused how running it on ESXi makes it less secure. Assuming it was setup correctly (no ability to manage it from the outside), the exposed side of the firewall will appear as any other firewall to an outsider. Any ESXi exploits are not valid as you are not exposing ESXi, only the appliance. I just don't get it....
Publish servers through it, as far as anyone knows they just went through a physical firewall. If you are in a position where someone gets in and can pivot around you have a lot more trouble than a virtual firewall.
Thanks for your patience,
Bob
Bob I'm 99% with you, but I must admit there's part of me that, however irrational, I'm not entirely convinced I'd be comfortable with it. That said, we run SMTP gateways and VM's on a DMZ virtual switch so I don't really see how this is any different. There's a heck of a lot of "what if's" needed for something bad to happen I think.
... View more