Solved

Firewall setup for file and print sharing

Posted on 2011-03-09
8
341 Views
Last Modified: 2012-06-21
I have a program that stores data in a folder on its C drive.  This is a Windows 7 machine. The folder is shared out.  There is also a networked blotter printer that is used just for printing out the files in this share.  The printer is shared out on the Windows 7 machine as well.  This would be network A.

There are two remote networks, say B and C, that need to connect to this file share.  Each network has a Windows-Explorer like program that accesses the file share and opens up these files, which are all proprietary file formats.  Inside the network which contains the Windows 7 machine, there's no problem.

I need to set up these networks so that the users on the remote network will be able to access the file share on the Windows 7 machine.  I have a decent understanding of routers, so I know I need to open up the WAN port on the network A router and set up forwarding so traffic is directed to the static of the Windows 7 machine.  We still have a few public IPs available to us in our ISP-assigned range, so I'm going to dedicate an IP just for this traffic.  Plus, I'm going to set up the firewall rules so only the IPs associated with network B and C are allowed to access the IP on the network A router.  

What I would like to know is what port to actually open.  Since there's a printer involved, the setup would have to allow users on network B and C to print to this printer.  They are all near each other (neighbor buildings), so someone might print to this printer and come by to pick it up.
0
Comment
Question by:sedberg1
  • 3
  • 2
  • 2
8 Comments
 
LVL 8

Accepted Solution

by:
nwtechdesk earned 500 total points
ID: 35088873
If it were me, I'd set up three routers with vpn capability and plug in the values so that both remote offices are connected to the main.  BY using the router's vpn, you don't have to install any equipment on the individual pc's and you don't have to micro-manage the ports on the firewall.
0
 

Author Comment

by:sedberg1
ID: 35089047
One of the networks is a police department, which means a VPN might not be a possibility for state mandates regarding security.  The police department would be one of the remote networks, so they would be able to get to the file share, but not vice versa.
0
 
LVL 13

Expert Comment

by:kdearing
ID: 35089525
The problem is that opening up NetBios ports on your firewall is definitely not a good idea.
A VPN is the best solution.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:sedberg1
ID: 35089884
With the VPN, this is what I'm thinking then...

site-to-site between network A to B and C.  The VPN is site-to-site so, the whole network would be trusted on the B and C site but route traffic to only allow access to the Windows 7 machine.  Also allow traffic to the printer.  Since it's a trusted network, there would be no need to open any particular port.  However, I do not want users from A to get to B and C.  Only the one way from B and C to A.  Is that one-way type of VPN possible?
0
 
LVL 13

Expert Comment

by:kdearing
ID: 35090069
You can set up security rules in the firewall to determine who can access what.
0
 

Author Comment

by:sedberg1
ID: 35099393
So this is how we are going to do it:
1. Set up site-to-site VPNs from network A to network B and then network A to network C.
2. Create static IP addresses for the workstations of users who need access
3. Set up address objects on the firewalls of the users' workstations
4. After verifying the site-to-site is running, create the routes to only allow the address objects access.
5. Create accounts for users to access the file share.
6. Map a drive on the users' workstation in B and C using a login script.  
7. Since the users on B and C would be in different domains, rather than have them be constantly prompted to log into the file share, put the login credentials on the login script.

That was it.  Thanks for your help!
0
 
LVL 8

Expert Comment

by:nwtechdesk
ID: 35310914
The VPN is the correct solution.  The police dept rules would preclude most any other solution as not secure.  Sedberg's plan posted 3/10 looks good.
0

Featured Post

Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Join & Write a Comment

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now