Improve company productivity with a Business Account.Sign Up

x
?
Solved

Routing traffic from perimeter networks

Posted on 2006-06-29
3
Medium Priority
?
507 Views
Last Modified: 2012-06-27
Hi,

We have a sonicwall for our perimeter network and then an ISA server that sits in front of our internal network. I'm having difficulty getting the computers in the perimeter network to see the internal network. Can someone help or maybe point me in the right direction?

We have a T-1 coming into the sonicwall and from the sonicwall to a switch. Sitting behind the sonicwall on the switch are 3 servers and an ISA server. The internal network and ISA can only see the sonicwall but nothing else. Is there a way to route traffic from the other 3 servers to the internal network without having to get a router?

Here are the IP configuration:

            WAN IP
              |
          192.168.10.1 sonicwall lan ip
             |          |          |
     192.168.10.2    192.168.10.3  192.168.10.5
     ISA server       server1        server2
         |
     192.168.100.1 ISA Internal IP
         |
 Internal LAN 192.168.100.XXX
0
Comment
Question by:hiephop
1 Comment
 
LVL 16

Accepted Solution

by:
The--Captain earned 1000 total points
ID: 17013688
AFAIK, the sonicwall *is* a router, as well as a firewall, and just needs to be configured properly - I have one of these (still in the box, since I roll my own linux firewalls), but since I've seen a number of questions about these devices popping up lately, I suppose I should go plug it in ;-)

Cheers,
-Jon
0

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
This program is used to assist in finding and resolving common problems with wireless connections.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question