Having multiple legs on a firewall is not a bad idea. It really depends on
the design considerations and end goal. I always try to place my publicly
accessible systems on a third secure leg, away from both the big I(nternet)
and the local LAN. As far as the fourth leg, thats probably not a bad idea
either for another area you want to keep separate from the rest of the
separate networks. The second firewall might be considered for redundancy,
depending on the system availability and budget requirements/needs. Hope
this helps.
-----Original Message-----
From: Richard.Magowan [SMTP:[EMAIL PROTECTED]]
Sent: Tuesday, September 07, 1999 10:44 AM
To: Firewalls
Cc: Richard.Magowan
Subject: Protecting Myself From Multiple Networks
Is this a legitimate configuration? Four Ethernet connections on a firewall
server, 1 to the private network, second to the Internet, third and 4th to
other private IP networks (not mine, but not Internet addressable either).
The firewall box is an Ultra 10 running Checkpoint code. Does this config
make any kind of sense or should I just build separate firewalls for each
pair, i.e. 1 to the private and two to the "other" network. Can one even
setup rules to work with this kind of environment? Thanks.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
application/ms-tnef