Solved

Looking for network consultation

Posted on 2011-09-06
5
390 Views
Last Modified: 2012-06-27
Hi
attach is a simple network diagram..and need your suggestions and comments to set up the right format and the right diagram for more secure and professional layout. My net
0
Comment
Question by:besmile4ever
  • 2
  • 2
5 Comments
 
LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 250 total points
ID: 36487717
Using the firewall, put the "Public Servers" in a DMZ and the private servers (I'm guessing the "Virtual Servers" are in-house) in the inside.
0
 

Author Comment

by:besmile4ever
ID: 36487726
where can i put the FW?
0
 
LVL 50

Expert Comment

by:Don Johnston
ID: 36487741
Between your equipment and the outside.
0
 
LVL 3

Accepted Solution

by:
pma111 earned 250 total points
ID: 36494987
Typical setup is

internet/outside <ext firewall> DMZ zone where public web server would go <int firewall> private network where your virtual servers are.
0
 

Author Closing Comment

by:besmile4ever
ID: 36518294
thnks.
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question