D
Dave
Hi folks,
I need some help. I am about to set-up a new back-to-back DMZ using 2
firewalls. I need to get my VPN clients to be able to browse the
Internal LAN. My understanding is this....
External FW has IPSEC L2TP encapsulated end point.
External Firewall provides IP Address assignment of clients as
192.168.1.10-15/24.
External Firewall has route pointing to Internal Firewall and only VPN
clients can use it.
DMZ's IP Address subnet is 192.168.1.1-9/24.
The Internal Firewall has a rule which states anything comming from
192.168.1.10-15 can get through open ports (open ports are the ports
that windows uses for kerboros and netbios browsing etc etc..)
Could someone please confirm I'm doing this right?? I'm new to DMZ's
although not new to VPN's and windows 2000 etc. I will be happy to
provide more information if you require it. Is this a secure method or
is there a better way??
I need some help. I am about to set-up a new back-to-back DMZ using 2
firewalls. I need to get my VPN clients to be able to browse the
Internal LAN. My understanding is this....
External FW has IPSEC L2TP encapsulated end point.
External Firewall provides IP Address assignment of clients as
192.168.1.10-15/24.
External Firewall has route pointing to Internal Firewall and only VPN
clients can use it.
DMZ's IP Address subnet is 192.168.1.1-9/24.
The Internal Firewall has a rule which states anything comming from
192.168.1.10-15 can get through open ports (open ports are the ports
that windows uses for kerboros and netbios browsing etc etc..)
Could someone please confirm I'm doing this right?? I'm new to DMZ's
although not new to VPN's and windows 2000 etc. I will be happy to
provide more information if you require it. Is this a secure method or
is there a better way??