John Porter
asked on
Accessing two subnets with two NICS
Hello Experts,
1. I have Internet coming into my workgroup on 192.168.0.x network
2. I have installed a firewall (WAN 192.168.0.x and LAN 192.168.3.x)
I have a computer that I want to be behind the firewall (192.168.3.x) and upstream of the firewall (192.168.0.x). I will use two separate Network Interface cards in this computer to accomplish this.
NIC1. 192.168.0.x DHCP (Live to Internet upstream of firewall)
NIC 2 192.168.3.5 (Live to Internet on firewall Internal LAN)
The reason being that this network is in a remote location. I want to be able to log in remotely to check firewall settings (even if the firewall is not getting a WAN signal for some reason)
My question:
I want to make sure I am not creating any networking or security issues by doing this.
Isn't this basically Network Address Translation on this computer ?
Can anyone clarify this for me?
Thanks!
1. I have Internet coming into my workgroup on 192.168.0.x network
2. I have installed a firewall (WAN 192.168.0.x and LAN 192.168.3.x)
I have a computer that I want to be behind the firewall (192.168.3.x) and upstream of the firewall (192.168.0.x). I will use two separate Network Interface cards in this computer to accomplish this.
NIC1. 192.168.0.x DHCP (Live to Internet upstream of firewall)
NIC 2 192.168.3.5 (Live to Internet on firewall Internal LAN)
The reason being that this network is in a remote location. I want to be able to log in remotely to check firewall settings (even if the firewall is not getting a WAN signal for some reason)
My question:
I want to make sure I am not creating any networking or security issues by doing this.
Isn't this basically Network Address Translation on this computer ?
Can anyone clarify this for me?
Thanks!
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Generally speaking I would not think you would need that as anything in the dmz zone 192.168.3.x network should be accessible through the firewall but for resiliency and emergencies yeah you could enable it only when needed
ASKER
Thanks
ASKER
So I could greatly reduce the security risk By disabling the NIC to the firewall LAN (192.168.3.x) and only enabling it on occasion when I might need it right?