Solved

Giving DUN users access IIS WEB server but not downstream SQL server.

Posted on 2006-07-06
3
201 Views
Last Modified: 2013-12-04
HI Brainies
I need to provide security protection to our system. ( All Microsoft software )
 I wish ....  DUN users to  connect to  a RAS server with IIS. This server gets its data for ASP pages from a SQL server. How do I allow these DUN users to only see web pages with no security issue with  them stuffing up the downstream SQL server.
 I assume also I cannot do all this on the one box from a security point.

Thanks in advance
Rodney
0
Comment
Question by:comerro1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 17066888
on your RAS server, assign a dedicated subnet for those DUN users with no default gateway assigned, so all the DUN users will only access this separated subnet (e.g. 192.168.1.x). the IIS web server of course needs to assigned a fixed IP on this subnet too. the IIS server may be a multihome host, which connects another subnet (e.g. 192.168.2.x) on where the SQL server stays.

the topology diagram may be as follows:

DUN users -> (PBX) -> RAS server <-> DUN subnet <-> IIS <-> SQL subnet <-> SQL server
                                                         192.168.1.x                    192.168.2.x

hope it helps,
bbao
0
 

Author Comment

by:comerro1
ID: 17069427
Hi Bbao
Do I load 2 ips on the 1 NIC or use 2 NICs in the RAS box?

Rodney
0
 
LVL 37

Accepted Solution

by:
bbao earned 500 total points
ID: 17070017
2 IPs on the same NIC shoud be OK but not recommended because 1) security considerations 2) compatibility.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question