[ale] Netgear wireless router as hub

H. A. Story adrin at bellsouth.net
Sun Mar 5 22:33:20 EST 2006



Geoffrey wrote:

>H. A. Story wrote:
>  
>
>>Sounds like you are trying to over work this.  First you can have a DMZ 
>>on the LAN if you want and it can be on the same subnet. You just 
>>forward all ports to that machine.  You truly don't have a DMZ unless 
>>your ISP is providing you with more than one WAN IP address.
>>    
>>
>
>I don't believe that's correct.  You can have a dmz by having multiple 
>firewalls with different sets of rules.  Or, multiple nics in a firewall 
>with different rules for each.  Simply, servers that provide services to 
>the outside world (http, ftp..) sit in the dmz, whereas your internal 
>network sits behind it, either on a different nic or behind another 
>firewall.  The idea of the dmz is that the machines are protected, but 
>they do provide services to the outside world.
>
>Pictures:
>
>internet <-> bastion firewall <-> dmz <-> internal network
>                                    \_ webserver
>
>  
>
Sorry, My understanding of a DMZ is  public route able IP.  Not 
forwarded ports from a firewall.  Found a few web pages that also 
correct my thinking on this.  It had to have come form my Sonic Wall 
days.  On the pro-units there is a DMZ port. When you have a T1 with 
more than one WAN IP, you can plug into that port and have access to 
those WAN IP addresses.  Needed when you have VPN protocols of 
incompatible nature and you can't have those NATed.  Unlike older 
Linksys that had a 5th port labeled DMZ that pretty much passed 
everything to that port, if I remember correctly.  The device on that 
port was still on the same LAN.

>>Next I 
>>wouldn't put anything in the DMZ unless I was wanting to watch log files 
>>grow, since I don't' have a green thumb.
>>You should read Bob's box. :)  I really would NEVER suggest anyone 
>>putting a server in the DMZ.
>>    
>>
>
>I don't quite understand that statement.  The DMZ does sit behind a 
>firewall of some type.  A typical network would have a bastion firewall 
>between the internet and the dmz.  It would then have a choke firewall 
>between the dmz and the internal network.
>  
>
I was referring to the http,ssh,ftp,etc....  logs from all the port 
scans.  Maybe I should pull the book out and re-read this part.

>What is the purpose of a dmz if nothing is there???
>
>Typically, I have a firewall that leads to a dmz.  In that dmz you might 
>have a webserver.  The dmz subnet does not contain any routable ips. 
>Web requests are simply forwarded to the webserver from the firewall.
>
>That firewall is then connected to another firewall that sits between 
>the dmz and the local network.  The dmz and local network have different 
>subnets, neither that are routable.  It's a perfectly workable solution.
>
>  
>
Doesn't that mean next too not between, Logically?

                                     /> (eth1)internal network
Internet <-> (eth0) bastion firewall 
                                     \> (eth2)DMZ "webserver"

Sorry, re-reading this I see you could have it either way.   I am not a 
fan of double NATing myself.  But it appears that the dual firewall 
method preferred. Again, I would rather let some one else do the 
web/email hosting if I was a large enough organization. 

More reading.  :)  All this RAID and Firewall reading..  I thought it 
was a weekend.

http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci906407,00.html






More information about the Ale mailing list