I know this is yet another question on how to setup network but I hope you are not bored of such questions yet.
The site is also an office, so it includes windows dc, windows ad, exchange, sql, file sharing, development app servers and other pcs.
In addition to office (internal) things, there are both test and prod environments consisting of a web server-app server-sql stack. There is also ftp service open to public.
I consider:
dmz1 - web server - exchange edge - ftp
dmz2 - app server - sql for app server
internal - dc and ad - exchange hub and transport - internal file sharing - sql for internal use - app servers for internal use - pcs
public -> dmz1, only web, ftp and smtp public -> dmz2 not possible public -> internal not possible
dmz1 -> dmz2 is possible from web servers to app servers by using http or ajp dmz1 -> internal is only possible for exchange, otherwise not possible
dmz2 -> internal not possible
Does this sound ok ? Any other recommendations ? It will be configured using either MS ISA or Jupiter SSG. Thank you.
From a generalist perspective, it looks like you've done due diligence on your overall network design. Here are some things I'd recommend you keep in mind:
The ultimate goal is not just to narrow down the attack surface, but to then watch the traffic that attempts to touch both the unavailable and available surfaces. It's a bit like making sure a bank has all the best locks, safes and mantraps, but then never monitoring the equipment to see if someone is attempting a heist. Assume that given enough unsupervised time, anyone can do anything.
Your web and database server are like golden vials of nitro glycerin. Assume that everyone wants them for their own profit and also want to explode your face with them in the process. Really, any public facing device is.
You're on the right track! Great job in segmenting your network. You're a head above your peers. Now try to stand head and shoulders above the norm.
So here's my 2 cents. You seem to be on the right track with network segmentation. Here are some thoughts.
Where is your IDS going to sit? IF you have 2 DMZs and a internal zone, then it would seem to me you would want IDS sensors in front of each of those zones. However you then need allow traffic from your IDS sensors in the DMZ into the internal zone.
And while I'm at it how are you providing DNS services for the devices in the DMZ.
One final thought be very suspicious and lockdown your public FTP server tight, they can be easily abused.
Yes, it's another one of those questions. You haven't been very specific in describing your needs/goals. The answer lies in your answer to questions such as (but not limited to):
How many users?
What services do you need to provide to those users?
What services do you need to provide to the outside world?
What are the business goals/requirements for implementing an IT infrastructure?
What does the DRP\BCP require?
Et., etc.
Your question in it's current form is like asking:
I'm baking a pie. I've got some apples and I'm thinking of using some flour and sugar. What do you think?