We have a server that requires two IP addresses (on the same subnet), and both are bound to a singular NIC. All data sent to and from this server flows through a firewall.
Let's say that this server is configured with 192.168.1.10 and 192.168.1.20. If a host connects to 192.168.1.10, it appears as though Windows 2000 randomizes its reply address and will often use 192.168.1.20 as its source address in the reply. Not a huge deal in an unmonitored environment, but it is a problem with the firewall, as its stateful inspection breaks immediately since the reply address isn't as expected.
Does anybody have a solution that forces the server to always reply with the address it has received the traffic on? I know we can relax the rulesets on the firewall, but this isn't the direction we'd prefer to go.
Thanks!
Let's say that this server is configured with 192.168.1.10 and 192.168.1.20. If a host connects to 192.168.1.10, it appears as though Windows 2000 randomizes its reply address and will often use 192.168.1.20 as its source address in the reply. Not a huge deal in an unmonitored environment, but it is a problem with the firewall, as its stateful inspection breaks immediately since the reply address isn't as expected.
Does anybody have a solution that forces the server to always reply with the address it has received the traffic on? I know we can relax the rulesets on the firewall, but this isn't the direction we'd prefer to go.
Thanks!