Hi

On Mon, Mar 11, 2013, at 06:32 PM, Tom Eastep wrote:
> I would also like to recommend separate LANs for the servers and other
> client systems. I dislike not having a firewall between the two, because
> your internet-facing servers are the most likely targets of hackers.

Logically separate LANs are certainly an option.  As for physically
separated, for now, we're interface limited.

So, iiuc, something like:

--------------------------------
Firewall Box:
        ext intfc: eth0, x.x.x.17/24, Gateway x.x.x.1
                DNS daemon, listen @ 192.168.0.100/24
        int intfc: eth1, 172.16.1.100/24

Mail Server Box:
        intfc: eth0, 192.168.1.25/24
        
Xen Server Box:
        Dom0
                intfc: eth0, 172.16.1.200/24
                br0 -> 
                        DomU1
                                intfc: eth0, 10.0.1.200/24
                        DomU2
                                intfc: eth0, 10.0.2.200/24

Desktops
        intfc: eth0, 172.16.1.XX
--------------------------------

would provide (some of) that separation ?

that, i presume, adds a bunch of shorewall config complexity for rules
and routes.

also, fwiw, the 'switch' between the firewall box and the rest of the
physical LAN *is* a managed switch, vlan capable.  QoS -- generally and
VoIP-specific -- is also "in there" to deal with, with tagging &
allocation across the LAN(s).

for now  I'm treating it as a dumb switch until I get further along.

darx

------------------------------------------------------------------------------
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
endpoint security space. For insight on selecting the right partner to 
tackle endpoint security challenges, access the full report. 
http://p.sf.net/sfu/symantec-dev2dev
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to