I'm no where near a network expert, GaTech Freshman, not even Computer
Science Major, but I'll be setting up a similar network this summer and I
have a few questions. So far I have it drawn up like this:
t-1
to a
cisco 2600 router
to a
[DMZ] including WebServer, Mail Server, Primary DNS, Development Server &
NAT box to serve internet connections to the office staff.
Where should I add the SQL server? Would the Development Server be better
behind the NAT/firewall box? Does my overall plan make sense?
Martin
--
">mmodahl@resnet.gatech.edu
http://r73h65.res.gatech.edu
-----Original Message-----
From: ">owner-ale@ale.org [mailto:">owner-ale@ale.org]On Behalf Of Jeff
Hubbs
Sent: Monday, April 24, 2000 7:43 AM
To: ">strider@scifi-fantasy.com; ">ale@ale.org
Subject: RE: [ale] network security
What I'm alluding to is essentially a DMZ. I don't automatically refer to a
three-NIC Linux/ipchains firewall by that term because when I first saw the
term used, it was in the context of two separate hardware firewalls with a
Web server etc. in between the two. On the surface of it, I feel like the
three-NIC ipchains approach would be vastly preferable w.r.t. versatility -
the kind of versatility you could probably only obtain with three hardware
firewalls the "old" way.
- Jeff
--
To unsubscribe: mail ">majordomo@ale.org with "unsubscribe ale" in message body.