Solved

how to give access across two networks

Posted on 2012-12-31
3
259 Views
Last Modified: 2013-01-07
I have two networks that use the same firewall. I need to be able to have three users A B C on one network to access Server B on the second network.  See diagram. Issues.vsd
0
Comment
Question by:miamitech305
  • 2
3 Comments
 
LVL 12

Assisted Solution

by:DarinTCH
DarinTCH earned 100 total points
ID: 38733879
This should be relatively simple for even a basic firewall
as long as it has multiple interfaces

users A B C in zone 'Wireless' connect to interface fe 2/0 (port 2)

servers are in zone 'Trust' connected to interface fe3/0 (port 3)

then the communication between zones is set to ALL- PERMIT - bi-directional

start there then you can always make the rules more restrictive

these days most decent firewalls also act as Switches and routers at some level
0
 

Accepted Solution

by:
miamitech305 earned 0 total points
ID: 38738759
Thanks but i ending using a custom LMHOST file
0
 

Author Closing Comment

by:miamitech305
ID: 38750309
I found my own answer
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Direct Access 2012R2 Two Network Card Configuration Behind TMG 2010 3 52
Unifi AP 4 77
Allow IP range in sonicwall 1 19
Cisco ASA 3 30
With the purchase of CloudCommand by Comcast customers are left in a bind as subscriptions expire and render the AP's disabled. The following will explain how to flash your Ubiquiti AP's with CloudCommand firmware back to Ubiquiti firmware. HOWTO…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question