Solved

dmz subnet is outside of wan subnet sonicwall NSA 2400

Posted on 2009-03-30
3
1,687 Views
Last Modified: 2012-05-06
then assigned ip addresses provided to us are 123.123.123.1/255.255.255.224 while the wan ip address 111.111.111.229/255.255.255.252  

x0:lan - 192.168.168.1/255.255.255.0
x1:wan - 111.111.111.229/255.255.255.252
x2:dmz(?)
x3:
x4:
x5:

how do I apply the 123.123.123.1/255.255.255.224 addresses to the dmz? and to nat addresses?   I know how when I set the subnet to wan 255.255.0.0 but that results is blocked traffic and obviously incorrect.  so I already have the address objects etc. defined.  
I just need to know how to apply the assigned ip range to an interface which falls outside of the wan subnet.

0
Comment
Question by:DVDude_1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Expert Comment

by:ccomley
ID: 24027257
Set the DMZ up as a SEPARTE private range, and NAT taht on to a differen't ip addres or set of addresses in the publich range available. e.g.

LAN = 192.168.168.1/24
WAN = 111.111.111.229/28
DMZ = 172.30.0.1/24

LAN email server (say) at 192.168.168.33  - NAT 1:1 mapping to 111.111.111.231
DMZ web server (say) at 172.30.0.24  - NAT 1:1 mapping to 111.111.111.232

0
 
LVL 1

Author Comment

by:DVDude_1
ID: 24043727
so move it completely from an externla dmz to an internal network with natting...  ok..   just asking because the setup of the 2400 is quite a bit different that the 2040pro(standardOS) that it is replacing.
0
 
LVL 17

Accepted Solution

by:
ccomley earned 500 total points
ID: 24048162
Yes. Well, like the 2040, you *can* if you choose set the interface up as Transparent but unless you are running something which REALLY doesn't like NAT, a private range and NAT mapping would be by far the easiest route.

Then your LAN to DMZ routes, if any, are simply from private range to private range.

It's still "external" as far as your LAN zone(s) are concerned, i.e. traffic from DMZ to LAN still has to re-pass the firewall and be matched by DMZ-to-LAN rulesets or it won't happen, so a compromise of a DMZ host does not expose your LAN to the baddies.

0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Make the most of your online learning experience.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question