Solved

Add a new internet net behind a firewall

Posted on 2001-06-05
7
168 Views
Last Modified: 2013-11-16
Please take a look of the network diagram
http://free4home.dns2go.com/~adrian/screen02.jpg


currently, there are two segments behind the firewall,
the internet 1 and dmz network

Now our office going to expand so, a new "Internal net 2" will be added that attached to existing internet 1
a router will be placed in between

my question is how to config the checkpoint firewall to that internet net 2 can browse the Internet and internet 1 and internet net 2 can browse each other


since the new segment is not attached directly to the firewall, so I have no knowledge how to config the firewall at this time
0
Comment
Question by:adrianmak
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 4

Accepted Solution

by:
jwalsh88 earned 50 total points
ID: 6155692
It will be no different you will just have to make some new rules in the rule base.  If I was you I would have one create a network object for each of your internal networks.  192.168.100.0 and 192.168.50.0 and put them in a container called internal and put them in where ever you currently have rules setup just for 192.168.100.0.  Also, make sure that the machine that checkpoint is installed on has a route to 192.168.50.0 configured.  I am going to admit that this seems to be a simple problem.  Did you setup the firewall?

Here is an excellent resource for checkpoint:

http://www.phoneboy.com

If you want something more specific I can help you write the rule base but you will have to post your email address as I don't think it would be a good idea to be posting firewall policies on the internet.

Hope this helps
0
 
LVL 5

Expert Comment

by:Droby10
ID: 6156140
looking at your diagram, the easiest way short of defining the new network and creating a rule-base for that network, would be to let the router perform nat (translating the 192.168.50.1xx addresses to it's other interface 192.168.100.1)...

then ensure that you have included that address in your network definition for the existing rules concerning that netblock.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6156475
Why not just knock a bit off the subnet mask and expand the address space?  Is the router necessary?  Then all you would have to do is redefine the network object in the Checkpoint.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 4

Expert Comment

by:jwalsh88
ID: 6156512
I really wondered why there is a router there.  I am not sure what purpose it is serving.
0
 

Author Comment

by:adrianmak
ID: 6158301
jwalsh88 ,

this is my email address, adrianmak@iname.com
could you please give me some rules ?

I have something not clear

1st, on existing localnet 1, all PCs theirs default route is point the the firewall , so if a pc want to access a host at the new localnet 2, what is the routing ? This is the point I am not quite understand
0
 

Author Comment

by:adrianmak
ID: 6162109
The localnet 2 actually is another office located somehwere, the two office will connected with a leased line. Localnet 2 will access the existing office intranet and will also access the Internet thru existing office
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6164082
All you really need to do then is make sure that the router to the lease line has the correct routes, add a route on the Checkpoint for the locaLnet 2 that points to the router.  Define a network object in the Policy for localnet2, and add that object to your outbound rules and anti-spoofing.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question