Solved

Public Firewall

Posted on 2011-03-05
1
348 Views
Last Modified: 2012-05-11
We recently implemented Paralells, plesk.  You cannot NAT Plesk containers.  All containers are public IP's.  The class C public IPs sit on the colo's router and then this plugs into my switch using a cat5 cable the colo facility provides.  The servers are plugged into the switch too, all having public IP's.  I can certainly put a firewall in place and change the gateway on the NIC's on the servers and have the outbound traffic pass thourgh the firewall.  The QUESTION is about inbound traffic, how can you have the firewall filter inbound traffic, when it is all public IP broadcast traffic?
0
Comment
Question by:centuric
1 Comment
 
LVL 57

Accepted Solution

by:
giltjr earned 500 total points
ID: 35044301
You would need to implement a firewall that works in bridge mode and not as filtering router.  In bridge mode they are "transparent" at layer 3 so there is no IP routing or NAT'ing avalaible, but you can still filter traffic.

I have not read it in detail, but I did find how to implment a bridging firewall in Linux using netables.

     http://www.spenneberg.com/talks/linux-kongress2002/ralf-spenneberg.bridgewall.pdf

I'm not sure what commercial firewalls will work in bridge mode.  I know PIX (now ASA) from Cisco does and I am sure some of the other big names (like Juniper and Checkpoint) do also.
0

Featured Post

ScreenConnect 6.0 Free Trial

At ScreenConnect, partner feedback doesn't fall on deaf ears. We collected partner suggestions off of their virtual wish list and transformed them into one game-changing release: ScreenConnect 6.0. Explore all of the extras and enhancements for yourself!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS and NSLOOKUP 21 74
How do I determine past ip addresses of multiple computers logged onto my network? 5 73
Login into my PC 5 37
How to simulate latency? 5 23
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Learn how the use of a bunch of disparate tools requiring a lot of manual attention led to a series of unfortunate backup events for one company.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question