coptechs
asked on
Using Windows Firewall to separate 2 networks on PC with dual NICS?
I have a PC that needs access to our production network as well as a separate network in a meeting room. The production network uses the 172.20.xxx.xxx IP schema and the other 192.168.xxx.xxx. The meeting room network is just a simple cable modem open to the Internet with only the routers built in firewall turned on. The production network is behind a Cisco ASA.
If I set 1 NIC up on the prod network and the other on the meeting room network, can I use Windows Firewall to keep the traffic from the meeting room network from accessing the production network with only a few exceptions for the 1 or 2 applications I need? If so, how?
If I set 1 NIC up on the prod network and the other on the meeting room network, can I use Windows Firewall to keep the traffic from the meeting room network from accessing the production network with only a few exceptions for the 1 or 2 applications I need? If so, how?
Windows will bot route traffic between either network by default. That actually takes active configuration. And that means windows server and honestly, windows isn't a great router (and is an expensive use of a windows server license.)
ASKER
The machine has Windows 7 and my concern is someone connected to the meeting room network having the ability to get onto the production network. I'm not using the Windows machine as a router.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
What would make it pretty is would be to use different network profiles (talking about "public" vs. "domain" vs. "private") for the different NICs. That would enable you to simply use two firewall rulesets (for example one for profile domain and one for profile public) that allow different things. We did that once and it just worked.
ASKER
Thank you.