Solved

dmz subnet is outside of wan subnet sonicwall NSA 2400

Posted on 2009-03-30
3
1,676 Views
Last Modified: 2012-05-06
then assigned ip addresses provided to us are 123.123.123.1/255.255.255.224 while the wan ip address 111.111.111.229/255.255.255.252  

x0:lan - 192.168.168.1/255.255.255.0
x1:wan - 111.111.111.229/255.255.255.252
x2:dmz(?)
x3:
x4:
x5:

how do I apply the 123.123.123.1/255.255.255.224 addresses to the dmz? and to nat addresses?   I know how when I set the subnet to wan 255.255.0.0 but that results is blocked traffic and obviously incorrect.  so I already have the address objects etc. defined.  
I just need to know how to apply the assigned ip range to an interface which falls outside of the wan subnet.

0
Comment
Question by:DVDude_1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Expert Comment

by:ccomley
ID: 24027257
Set the DMZ up as a SEPARTE private range, and NAT taht on to a differen't ip addres or set of addresses in the publich range available. e.g.

LAN = 192.168.168.1/24
WAN = 111.111.111.229/28
DMZ = 172.30.0.1/24

LAN email server (say) at 192.168.168.33  - NAT 1:1 mapping to 111.111.111.231
DMZ web server (say) at 172.30.0.24  - NAT 1:1 mapping to 111.111.111.232

0
 
LVL 1

Author Comment

by:DVDude_1
ID: 24043727
so move it completely from an externla dmz to an internal network with natting...  ok..   just asking because the setup of the 2400 is quite a bit different that the 2040pro(standardOS) that it is replacing.
0
 
LVL 17

Accepted Solution

by:
ccomley earned 500 total points
ID: 24048162
Yes. Well, like the 2040, you *can* if you choose set the interface up as Transparent but unless you are running something which REALLY doesn't like NAT, a private range and NAT mapping would be by far the easiest route.

Then your LAN to DMZ routes, if any, are simply from private range to private range.

It's still "external" as far as your LAN zone(s) are concerned, i.e. traffic from DMZ to LAN still has to re-pass the firewall and be matched by DMZ-to-LAN rulesets or it won't happen, so a compromise of a DMZ host does not expose your LAN to the baddies.

0

Featured Post

Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question