Solved

Routing traffic from perimeter networks

Posted on 2006-06-29
3
462 Views
Last Modified: 2012-06-27
Hi,

We have a sonicwall for our perimeter network and then an ISA server that sits in front of our internal network. I'm having difficulty getting the computers in the perimeter network to see the internal network. Can someone help or maybe point me in the right direction?

We have a T-1 coming into the sonicwall and from the sonicwall to a switch. Sitting behind the sonicwall on the switch are 3 servers and an ISA server. The internal network and ISA can only see the sonicwall but nothing else. Is there a way to route traffic from the other 3 servers to the internal network without having to get a router?

Here are the IP configuration:

            WAN IP
              |
          192.168.10.1 sonicwall lan ip
             |          |          |
     192.168.10.2    192.168.10.3  192.168.10.5
     ISA server       server1        server2
         |
     192.168.100.1 ISA Internal IP
         |
 Internal LAN 192.168.100.XXX
0
Comment
Question by:hiephop
3 Comments
 
LVL 16

Accepted Solution

by:
The--Captain earned 250 total points
ID: 17013688
AFAIK, the sonicwall *is* a router, as well as a firewall, and just needs to be configured properly - I have one of these (still in the box, since I roll my own linux firewalls), but since I've seen a number of questions about these devices popping up lately, I suppose I should go plug it in ;-)

Cheers,
-Jon
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question