cameramonkey
MIS
I have a client with a limited budget. They have a Fractional T1, and are hosting their own web/mail/dns. Currently they have no firewall *ghasp*. They have the ISP doing 1-1 NAT for the server IP addresses.
Up until now there really hasnt been much of a problem. The web/mail server is a locked down redhat box from 1998, so it was rock solid and secure. The engineer that put it together did some wonderful things to make it secure so we werent very concerned. The other servers are Macs, so more insulation and nothing really to worry about.
We installed a cobalt, and were going to put in a consumer grade NAT "firewall", but then they sprung the second web server that I wasnt aware of on me. That shot that down, for obvious reasons.
Here is the idea. They have 8 useable IP addresses. My idea was to install two of the consumer grade firewalls, each with a different real world IP on the outside. Tie them both together on the lan with internal IPs of .1 and .254 respectively. Use the first for DHCP, external web, mail, etc. Then, setup the second unit to provide services for the second set of public services. Set that other server up statically, using that second router for its gateway. That way, all users can see both servers on the same internal network, and both servers are accessible from the outside as well.
Anyone see any problems with this?
sample config (fake IPs of course)
Lan network 192.168.1.0/24
router 1 (12.3.45.67wan/192.168.1.1 lan)
12.3.45.67:80->192.168.1.10
12.3.45.67:443->192.168.1.10
12.3.45.67:21->192.168.1.10
12.3.45.67:110->192.168.1.20
etc...
Router 212.3.45.68wan/192.168.1.254 lan)
12.3.45.68:80->192.168.1.30
12.3.45.68:21->192.168.1.30
Up until now there really hasnt been much of a problem. The web/mail server is a locked down redhat box from 1998, so it was rock solid and secure. The engineer that put it together did some wonderful things to make it secure so we werent very concerned. The other servers are Macs, so more insulation and nothing really to worry about.
We installed a cobalt, and were going to put in a consumer grade NAT "firewall", but then they sprung the second web server that I wasnt aware of on me. That shot that down, for obvious reasons.
Here is the idea. They have 8 useable IP addresses. My idea was to install two of the consumer grade firewalls, each with a different real world IP on the outside. Tie them both together on the lan with internal IPs of .1 and .254 respectively. Use the first for DHCP, external web, mail, etc. Then, setup the second unit to provide services for the second set of public services. Set that other server up statically, using that second router for its gateway. That way, all users can see both servers on the same internal network, and both servers are accessible from the outside as well.
Anyone see any problems with this?
sample config (fake IPs of course)
Lan network 192.168.1.0/24
router 1 (12.3.45.67wan/192.168.1.1 lan)
12.3.45.67:80->192.168.1.10
12.3.45.67:443->192.168.1.10
12.3.45.67:21->192.168.1.10
12.3.45.67:110->192.168.1.20
etc...
Router 212.3.45.68wan/192.168.1.254 lan)
12.3.45.68:80->192.168.1.30
12.3.45.68:21->192.168.1.30