Solved

Network Security and best Firewall configuration

Posted on 2011-09-04
4
398 Views
Last Modified: 2012-06-22
Hi Expert,

I am trying to design a secure network between two sites connect with each other via internet.

And i would like to ask How i can provide secure communication between them.

one site is under heavy load, it  needs  load balance( using two switches and routers)

the design will be like:
site 1 --- > Firewall --> Router -- > Internet

Site 2 :
interner ...>
Router 1 ---> Firewall1 --> Switch1 --> server1 , server 2
Router 2 ---> Firewall2 --> Switch2 --> server3 , server4

is this design good ? if not what are suggestions?

Regards configure firewall: can i used options like NAT, packet filter in addition to configure fw as vpn gateway at same time ?? ((i am little confuse in this points))

what will be best configuration to provide secure communication between sites?


more question, any help software to draw sketch design for such scenario instead of suing ms word

thanks





0
Comment
Question by:ang3lus
  • 2
4 Comments
 
LVL 1

Accepted Solution

by:
tommyeriksen earned 250 total points
ID: 36480667
I'd recommend to connect the two networks using a VPN-tunnel configured in your firewalls. You can use NAT on both sites if you want, but you will probably have to configure your firewall to allow the traffic you want between the sites. To draw up a scetch, I use Microsoft Visio.

If you want a simpler solution for just connecting some computers on different sites in a secure VPN-network, I'd recommend to use Logmein Hamachi. (www.logmein.com)
0
 
LVL 93

Assisted Solution

by:John Hurst
John Hurst earned 250 total points
ID: 36480669
The basic design as shown above is fine to get started.

What do you have / are you planning for Firewall 1 and 2?

For smal clients, I use Juniper Netscreen SSG5 firewalls and then put in an IPSec VPN tunnel between the sites. I use a good consultant to set up the tunnels and it works just fine.

... Thinkpads_User
0
 

Author Closing Comment

by:ang3lus
ID: 36535618
thanks
0
 
LVL 93

Expert Comment

by:John Hurst
ID: 36535633
I was happy to help out. Good luck going forward with your configuration. ... Thinkpads_User
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question