Solved

Add a new internet net behind a firewall

Posted on 2001-06-05
7
171 Views
Last Modified: 2013-11-16
Please take a look of the network diagram
http://free4home.dns2go.com/~adrian/screen02.jpg


currently, there are two segments behind the firewall,
the internet 1 and dmz network

Now our office going to expand so, a new "Internal net 2" will be added that attached to existing internet 1
a router will be placed in between

my question is how to config the checkpoint firewall to that internet net 2 can browse the Internet and internet 1 and internet net 2 can browse each other


since the new segment is not attached directly to the firewall, so I have no knowledge how to config the firewall at this time
0
Comment
Question by:adrianmak
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 4

Accepted Solution

by:
jwalsh88 earned 50 total points
ID: 6155692
It will be no different you will just have to make some new rules in the rule base.  If I was you I would have one create a network object for each of your internal networks.  192.168.100.0 and 192.168.50.0 and put them in a container called internal and put them in where ever you currently have rules setup just for 192.168.100.0.  Also, make sure that the machine that checkpoint is installed on has a route to 192.168.50.0 configured.  I am going to admit that this seems to be a simple problem.  Did you setup the firewall?

Here is an excellent resource for checkpoint:

http://www.phoneboy.com

If you want something more specific I can help you write the rule base but you will have to post your email address as I don't think it would be a good idea to be posting firewall policies on the internet.

Hope this helps
0
 
LVL 5

Expert Comment

by:Droby10
ID: 6156140
looking at your diagram, the easiest way short of defining the new network and creating a rule-base for that network, would be to let the router perform nat (translating the 192.168.50.1xx addresses to it's other interface 192.168.100.1)...

then ensure that you have included that address in your network definition for the existing rules concerning that netblock.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6156475
Why not just knock a bit off the subnet mask and expand the address space?  Is the router necessary?  Then all you would have to do is redefine the network object in the Checkpoint.
0
Simple, centralized multimedia control

Watch and learn to see how ATEN provided an easy and effective way for three jointly-owned pubs to control the 60 televisions located across their three venues utilizing the ATEN Control System, Modular Matrix Switch and HDBaseT extenders.

 
LVL 4

Expert Comment

by:jwalsh88
ID: 6156512
I really wondered why there is a router there.  I am not sure what purpose it is serving.
0
 

Author Comment

by:adrianmak
ID: 6158301
jwalsh88 ,

this is my email address, adrianmak@iname.com
could you please give me some rules ?

I have something not clear

1st, on existing localnet 1, all PCs theirs default route is point the the firewall , so if a pc want to access a host at the new localnet 2, what is the routing ? This is the point I am not quite understand
0
 

Author Comment

by:adrianmak
ID: 6162109
The localnet 2 actually is another office located somehwere, the two office will connected with a leased line. Localnet 2 will access the existing office intranet and will also access the Internet thru existing office
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6164082
All you really need to do then is make sure that the router to the lease line has the correct routes, add a route on the Checkpoint for the locaLnet 2 that points to the router.  Define a network object in the Policy for localnet2, and add that object to your outbound rules and anti-spoofing.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

697 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question