Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Chriss Miller on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Basic SOHO Network design

Status
Not open for further replies.

fcthoresen

IS-IT--Management
Joined
Apr 10, 2002
Messages
1
Location
US
We currently have a small office network that looks like the following.

DSL--DSLModem--et0/2514/eth1--hub(LAN)
| |
SMTP/Web Exchange
Users

We have 10 static (public) IP's from our ISP. They are being used on the DSLModem, the web and email servers and eth0 on the 2514.

We are not running any internal DNS, we rely on our ISP's.

I would like to make this design more secure and have looked into the following options.

1) Add a firewall after the DSL Modem
(Must do!)
2) Move everything including the
web/email behind the 2514 router
(private side)

My problems relating to this are that I don't quit know how to get either of these options to work. I have a small class c subnet that has been provided to us from our ISP (10 addresses).

Can the firewall be setup to have IP's, one on each interface that are in the same subnet? In which the firewall rules will govern which traffic will be passed through it?

Can the email and web servers be moved to the private side of network, in which case port forwarding would be set up on the Cisco 2514 for those services? Would the web/email servers have the same IP address' in their DNS entries provide by my ISP, which in turn would be the IP Address of the Cisco router as well? Thereby having only 1 visible address to the outside world.

As it stands now, the hack design we have works OK but is very insecure. I have also recently tried to eliminate the open relay on my SMTP server, but I haven't been able to fix it completely.

My apologies for the long posting, but I have not been able to find information that is helpful in these basic areas on the web or in any books.

Thanks.

 
DSL---DSLmodem--Firewall---hub---2514----LAN
|----mail

This is a pretty classic design. I run this myself but not for mail, I have a telnet server sitting in the DMZ. Still a private IP address. Depending on the firewall, you can assign a public IP to the one to one NAT and map it to a private ip in the DMZ.. map the port of a single ip to the DMZ.. this is what I've done. Public IP with port 23 mapped to a private IP inside the DMZ..

The 2514 provides yet another layer of NAT with a couple of static maps plus access list filtering.

MikeS
Find me at
"The trouble with giving up civil rights is that you never get them back"
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top