Subnets do not have to be all the same size; you can (for lack of better term) 
"sub-subnet".

Remember that the MOST-specific (most mask bits) routing rule applies first

Remember that each subnet has two reserved IPs: the first (net) and last (broadcast).

Assuming you are using class C 192.168.200.*
Assuming eth0 (10.10.10.10) is the outside
Assuming eth1 (192.168.200.33) is the perimeter
Assuming eth2 (192.168.200.1) is the intranet

Use  30 perimeter hosts (192.168.200.33-62)
Use 222 intranet hosts (192.168.200.1-254 less perimeter subnet)

(I use 33-62 so that there is no confusion about which *subnet* is involved)

on the router
  route 192.168.200.32/255.255.255.224 to 192.168.200.33
  route 192.168.200.0/255.255.255.0 to 192.168.200.1
  route 0.0.0.0/0.0.0.0 to 10.10.10.10

on the intranet
  route 192.168.200.32/255.255.255.224 to 192.168.200.1
  route 192.168.200.0/255.255.255.0 to NIC
  route 0.0.0.0/0.0.0.0 to 192.168.200.1

on the perimeter
  route 192.168.200.32/255.255.255.224 to NIC
  route 0.0.0.0/0.0.0.0 to 192.168.200.33

>I'm trying to get a plan together to set up a firewall on a network and have some 
>issues that I haven't sorted out yet.  Perhaps someone can help me.
>
>Currently the network is on a full Class C address space, with a router to the 
>internet.  The router provides the current security, but it's very limited.  There is 
>no NAT going on and preferably it should remain that way (just want to filter 
>traffic).
>
>My idea is to create a screened subnet using a merged interior/exterior router in 
>addition to the existing router.  The merged router (firewall) ends up being a 
>triple-homed host (FreeBSD box), with a NIC to the internet, a NIC to the perimeter 
>network, and a NIC to the internal network.  The internet router only talks to the 
>FreeBSD box, which permits some communication with servers on the perimeter network 
>(FTP, WWW, mail, etc), and keeps a tighter watch on traffic to and from the internal 
>network (even if it's from the perimeter network, in case one of those servers 
>becomes compromised).
>
>With me so far?
>
>Ok.  So to firewall, we need to route, and to route, we need to subnet.  Barring any 
>faults in my ideas so far, I'm stumped as to how to subnet the current Class C to 
>easily permit this and make best use of the address space.  So far they've been 
>spoiled with their addressing, but no more after this.  I've never had to subnet into 
>a Class C before, so I did my homework and it would seem that subnets must all be of 
>equal size.  This is bad, because the perimeter network only needs to support a few 
>hosts, while the internal network needs to support a much larger number (I don't need 
>a third subnet, figuring I can use a private address space such as 10.0.0.1 <-> 
>10.0.0.2 for the segment between the internet router and the FreeBSD box, correct?).
>
>Of course, as I'm just diving into subnetting, I'm still a little confused.  If I 
>were to divide into 2 subnets, would it be 62 or 126 hosts per subnet?  62 would be 
>too small, while 126 would be annoying but perhaps liveable (not to mention a waste, 
>as the perimeter network doesn't need anywhere near that).
>
>Now, if I could subnet for up to 14 hosts on the perimeter network, and leave... 
>what, 182? hosts on the internal network... that would be ideal.  But I'm out of my 
>league trying to figure out if such a thing is possible.  Is it?  How?

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to