Solved

DMZ SMTP Gateway and rules

Posted on 2004-08-25
2
289 Views
Last Modified: 2010-04-08
So i have my SMTP gateway server on the DMZ, with a rule that allows 25 traffic in to the DMZ.  I then have the SMTP server pointing to a smart host on the inside network which is my exchange server.  I only have one NIC.  I am going to assign that NIC a public DMZ address and set the gateway to the firewall.  I will then setup another rule allowing the traffic in from the firewall DMZ to the lan.  Will the firewall be able to route the smtp traffice back into the LAN?  it is a sonicwall 3060.  Or do i need to set the server with 2 NICS?  How does that work?  Two NICS does not make sense to me.  I am assuing the firewall can route the traffic back into the LAN.
thanks

trying to learn how this works with a server in the DMZ and One NIC
0
Comment
Question by:YankeeFan03
2 Comments
 
LVL 11

Accepted Solution

by:
PennGwyn earned 250 total points
ID: 11897620
Yes, that's all correct.  The idea of a multi-legged firewall is to route traffic between the DMZ and the internal network back through the firewall for filtering.  A second NIC would offer a path that bypasses this security.

0
 

Author Comment

by:YankeeFan03
ID: 11897697
great thankyou
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Probable TCP NULL scan detected 10 289
Logging pfSense on Kiwi 4 71
Checkpoint Endpoint Managment 3 76
Content Filtering by Search Term with a Smoothwall Firewall 1 123
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

822 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question