How to seperate a server from rest of network

So my setup is as follows:
Cable Modem goes to a Freedom9 Freeguard100 UTM Firewall
Lan Port 1 on Firewall goes to Dell Managed 24 Port switch (switch1) and is a 192.168.1.x network
DMZ port of firewall goes to another Dell Managed 24 port (switch2) and is a 192.168.2.x network

192.168.1.x can see the 192.168.2.x network but 192.168.2.x cant see the 192.168.1.x, and the 192.168.1.x is work servers and work machines, where 192.168.2.x is the client machines and client nas server

192.168.1.x has its own DHCP server (Domain Controller)
192.168.2.x has its DHCP through the NAS Server (win2k3 box).

What I have now is a ESX Server just running so that I can mess around with different OS and not have to build and take down a machine.  What I want to do is have this ESX server be able to be accessed from the 192.168.1.x side but not interfere with the current networking.

When I loaded ESX and loaded the first guest O/S (SBS2003), it through a warning during setup about having a current DHCP server loaded.  So I want to find a way to separate the ESX server from the rest of the 192.168.1.x network so that if i load another DHCP server it wont affect the current servers.

How can I go about doing this?  Both switches are managed but currently aren't in managed mode.

I want the ESX server to be able to browse the internet but stay separate from the other equipment while still being able to be accessed from my work desktop and stuff.

Fluid Imagery

Who is Participating?
Erik BjersConnect With a Mentor Principal Systems AdministratorCommented:
Your best bet would be to put it on the DMZ (unless you alredy have a DHCP server on the DMZ).

I don't know anything about your firewall but it looks like the firewall has more than just 2 ethernet ports.  You may be able to enable one of the other ports and configure a third network say 192.168.3.x, allow this network to access the internet, allow your internal network (or just your host) to access the third network, but don't allow the third network to access your internal network.


The 4 ports on the back of that firewall act as a four port switch unfortunately, not individual interfaces so you can't use it to create seperate networks.

Those switches may be able to do VLANs sounds like what you're after, but "Dell Managed 24 Port switch" is a bit vague to be sure as Dell sell lots of different switches.  If you can look it up from the part number and see if it supports VLANS you should look into that.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.