Solved

how to give access across two networks

Posted on 2012-12-31
3
262 Views
Last Modified: 2013-01-07
I have two networks that use the same firewall. I need to be able to have three users A B C on one network to access Server B on the second network.  See diagram. Issues.vsd
0
Comment
Question by:miamitech305
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Assisted Solution

by:DarinTCH
DarinTCH earned 100 total points
ID: 38733879
This should be relatively simple for even a basic firewall
as long as it has multiple interfaces

users A B C in zone 'Wireless' connect to interface fe 2/0 (port 2)

servers are in zone 'Trust' connected to interface fe3/0 (port 3)

then the communication between zones is set to ALL- PERMIT - bi-directional

start there then you can always make the rules more restrictive

these days most decent firewalls also act as Switches and routers at some level
0
 

Accepted Solution

by:
miamitech305 earned 0 total points
ID: 38738759
Thanks but i ending using a custom LMHOST file
0
 

Author Closing Comment

by:miamitech305
ID: 38750309
I found my own answer
0

Featured Post

Optimum High-Definition Video Viewing and Control

The ATEN VM0404HA 4x4 4K HDMI Matrix Switch supports 4K resolutions of UHD (3840 x 2160) and DCI (4096 x 2160) with refresh rates of 30 Hz (4:4:4) and 60 Hz (4:2:0). It is ideal for applications where the routing of 4K digital signals is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Multi-source agreements are important because they set standards that all manufacturers should follow to ensure that devices are compatible with multiple vendors. The multi-source agreement (MSA) is an agreement that establishes how multiple vendors…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question