I'm in the middle of designing the topology for a new network. I wanted to see what you thought of the design I've chosen to implement. I'll draw up a diagram if this is any way confusing, just ask.
Internet > Firewall1(10.0.0.1) > DMZ/Web Server > Firewall2(192.168.1.0) > Internal network
I was planning on having just having one web server in the dmz with dual nics... one going to Firewall1 and the other to Firewall2.
A few questions regarding my setup:
Is using two different private IPs like this a good idea, or is their a better option?
How would I go about accessing the internal network with SSH from the internet? I've found a few resources mention tunneling and just port forward SSH all the way through, is this the ideal way?
Thanks in advance for any thoughts/experiences!
X
Internet > Firewall1(10.0.0.1) > DMZ/Web Server > Firewall2(192.168.1.0) > Internal network
I was planning on having just having one web server in the dmz with dual nics... one going to Firewall1 and the other to Firewall2.
A few questions regarding my setup:
Is using two different private IPs like this a good idea, or is their a better option?
How would I go about accessing the internal network with SSH from the internet? I've found a few resources mention tunneling and just port forward SSH all the way through, is this the ideal way?
Thanks in advance for any thoughts/experiences!
X