Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

dmz subnet is outside of wan subnet sonicwall NSA 2400

Posted on 2009-03-30
3
Medium Priority
?
1,710 Views
Last Modified: 2012-05-06
then assigned ip addresses provided to us are 123.123.123.1/255.255.255.224 while the wan ip address 111.111.111.229/255.255.255.252  

x0:lan - 192.168.168.1/255.255.255.0
x1:wan - 111.111.111.229/255.255.255.252
x2:dmz(?)
x3:
x4:
x5:

how do I apply the 123.123.123.1/255.255.255.224 addresses to the dmz? and to nat addresses?   I know how when I set the subnet to wan 255.255.0.0 but that results is blocked traffic and obviously incorrect.  so I already have the address objects etc. defined.  
I just need to know how to apply the assigned ip range to an interface which falls outside of the wan subnet.

0
Comment
Question by:DVDude_1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Expert Comment

by:ccomley
ID: 24027257
Set the DMZ up as a SEPARTE private range, and NAT taht on to a differen't ip addres or set of addresses in the publich range available. e.g.

LAN = 192.168.168.1/24
WAN = 111.111.111.229/28
DMZ = 172.30.0.1/24

LAN email server (say) at 192.168.168.33  - NAT 1:1 mapping to 111.111.111.231
DMZ web server (say) at 172.30.0.24  - NAT 1:1 mapping to 111.111.111.232

0
 
LVL 1

Author Comment

by:DVDude_1
ID: 24043727
so move it completely from an externla dmz to an internal network with natting...  ok..   just asking because the setup of the 2400 is quite a bit different that the 2040pro(standardOS) that it is replacing.
0
 
LVL 17

Accepted Solution

by:
ccomley earned 1500 total points
ID: 24048162
Yes. Well, like the 2040, you *can* if you choose set the interface up as Transparent but unless you are running something which REALLY doesn't like NAT, a private range and NAT mapping would be by far the easiest route.

Then your LAN to DMZ routes, if any, are simply from private range to private range.

It's still "external" as far as your LAN zone(s) are concerned, i.e. traffic from DMZ to LAN still has to re-pass the firewall and be matched by DMZ-to-LAN rulesets or it won't happen, so a compromise of a DMZ host does not expose your LAN to the baddies.

0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question