"I've pondered this: if you put the server behind a separate firewall, and then forward all the ports necessary to the e-smith server to operate as a webserver/VPN/mailserver etc, then is it any more secure than connecting it direct to to the Internet?
The only advantage I can see is that a separate firewall is more easily able to "pull the plug" in the event of a sustained attack from the Internet, but otherwise a transparent firewall doesn't really add any extra security."
I think from a hackers point of wiew there will be a rather big difference.
Connecting the e-smith directly to the Internet and the lan to the e-smith givs a rather good place to start working for a hacker.
If he is able to get controll or root controll over the one e-smith server, he will have controll over practically all resourses and he will also have controll over a Linux platform that can be used at a platform for further attach against the lan resources.
On the other hand if you use a tree port wan/dmz/lan arrangement, the internet server and the lan resourses will be running on two different network segments with a firewall between. If you are able to work trough the firewall and get controll over the inernet server, you still have to fight the firewall to get access to the lan resourses. I also think it is a good idea to use not only one e-smith server, but two: The internet server running on the DMZ and the Lan server running on the LAN. Of course there should be no portforwarding from the Internet to the lan server.
Internet------Gateway firewall--LAN----Lanserver(s) pluss workstations
*****************************I
*****************************----DMZ---Internettservers
One other way of arranging theese things are like this:
Internet----Outher firewall---DMZ with internet server(s)---Inner firewall--Lan with server(s) and workstations
There are other reasons also one (or two) extre firewall machine might make things a little bit safer, problems related to buffer overflow, etc.
I have tested both alternative 1 and 2 and also alternative 2 with a tripple firewall arrangement at work with some users, and there were no sign of things get slowed down due to passing trough 1, 2 or 3 firewalls. All tree were nat routing firewalls. We are useing a double firewall arrangement today, and there is no problems at all with that. (Microsoft ISA server pluss RedHat 7.3). The tree firewall arrangement was only an experiment to see how that could work.
I will recomend this book about hacking tecnics and network security:
http://www.hackingexposed.com