I've got a PIX firewall with three NICs, one for the Internet, DMZ, and 
internal network.  In my DMZ I'm trying to figure out whether or not I 
should use valid public IPs or use private IPs and then NAT.  The pros and 
cons that I've been able to come up with in my head don't seem very 
significant (i.e., going either way seem almost equally as good as I'm not 
short on valid public IPs).

So I turn to the collective knowledge of the mailing list for arguments 
supporting and against using public addresses or private addresses in my 
DMZ.  After searching the archives of this mailing list, it seems people 
reasons for one approach or the other may be more religious than technical, 
so I hope I don't spark off a holy war here. :)

Below are my two lists of pros and cons.  The 2nd list addresses whether or 
not I internally advertise my DMZ hosts as having public or private 
addresses.  This is separate issue from what kind of IPs they actually have, 
since with the PIX I can NAT between the DMZ and the Internet, internal net, 
or even both.

Note: My internal network uses private addresses.
Disclaimer:  I speak in PIX terms, since that's what I'm using.  The 
concepts here should be applicable to any firewall though.


[Should I use private IPs in my DMZ and then NAT?]
-NAT Pros
   -Can have more hosts in the DMZ
   -If, for some reason, we put a host in the DMZ that we didn't want 
publicly accessible, it'd be a little harder to get at it.
-NAT Cons
   -NAT could take a slight performance hit re-writing the packets
   -Not all protocols are NATable
      -Not an issue in the foreseeable future, as currently SMTP and HTTP is 
the only traffic I see going to the DMZ.
   -A little simpler to admin if you're not NATed.
      -If you assign the web server ip 113.13.13.13, then by jove that's 
what's its address is to everyone (i.e. you don't hafta set up a NAT).
   -It just seems "cleaner" to use a public IP.


[Advertise DMZ hosts as private or public addresses internally?]
-Private pros
   -Routing tables would be simpler (i.e., wouldn't need to add a public 
113.13.13.0 route to all of our remote routers and/or PIXes).
      -Actually we'd probably set up routes for all of our company's public 
IP's anyway, so this is really a non-issue.
   -No risk of a VPN client's private traffic trying to go un-encrypted over 
the Internet.
      -If you use a public IP, and the VPN client's route to the public IP 
isn't over the VPN, then the traffic could potentially go over the Internet 
in cleartext.  If you used private IPs, then even if you don't have a VPN 
session up the traffic isn't going anywhere, as private addresses aren't 
routable.  Note that this cleartext traffic would be blocked at the firewall 
anyway.
-Private cons
   -Must maintain two separate DNS's (split DNS) for the outside (public) 
and inside (private) worlds.
      -Not actually an issue for us, as we're doing this already.
   -If the DMZ hosts actually have real IPs, then advertising private IPs 
would force us to do NAT.
      -NAT could take a slight performance hit re-writing the packets
      -Not all protocols are NATable
         -Is SSH NATable?
      -NAT would add another couple lines to the PIX config (not a big 
deal).
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to