How to seperate a server from rest of network

So my setup is as follows:
Cable Modem goes to a Freedom9 Freeguard100 UTM Firewall
Lan Port 1 on Firewall goes to Dell Managed 24 Port switch (switch1) and is a 192.168.1.x network
DMZ port of firewall goes to another Dell Managed 24 port (switch2) and is a 192.168.2.x network

192.168.1.x can see the 192.168.2.x network but 192.168.2.x cant see the 192.168.1.x, and the 192.168.1.x is work servers and work machines, where 192.168.2.x is the client machines and client nas server

192.168.1.x has its own DHCP server (Domain Controller)
192.168.2.x has its DHCP through the NAS Server (win2k3 box).

What I have now is a ESX Server just running so that I can mess around with different OS and not have to build and take down a machine.  What I want to do is have this ESX server be able to be accessed from the 192.168.1.x side but not interfere with the current networking.

When I loaded ESX and loaded the first guest O/S (SBS2003), it through a warning during setup about having a current DHCP server loaded.  So I want to find a way to separate the ESX server from the rest of the 192.168.1.x network so that if i load another DHCP server it wont affect the current servers.

How can I go about doing this?  Both switches are managed but currently aren't in managed mode.

I want the ESX server to be able to browse the internet but stay separate from the other equipment while still being able to be accessed from my work desktop and stuff.

Thanks,
Fluid Imagery

Fluid_ImageryAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Erik BjersPrincipal Systems AdministratorCommented:
Your best bet would be to put it on the DMZ (unless you alredy have a DHCP server on the DMZ).

I don't know anything about your firewall but it looks like the firewall has more than just 2 ethernet ports.  You may be able to enable one of the other ports and configure a third network say 192.168.3.x, allow this network to access the internet, allow your internal network (or just your host) to access the third network, but don't allow the third network to access your internal network.

eb

0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Zenith63Commented:
The 4 ports on the back of that firewall act as a four port switch unfortunately, not individual interfaces so you can't use it to create seperate networks.

Those switches may be able to do VLANs sounds like what you're after, but "Dell Managed 24 Port switch" is a bit vague to be sure as Dell sell lots of different switches.  If you can look it up from the part number and see if it supports VLANS you should look into that.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Networking

From novice to tech pro — start learning today.