Ian,

Actually, you don't have to publically address your outside firewall
interface at all(provided your firewall is not terminating your Internet
circuit.)  If your firewall simply talks to a border router (which is
usually the case), then it's quite easy to set up a privatly IP'd
transport network between the firewall and the router.  Then you can use
all of your public space in the DMZ.  I wouldn't recommend that for all
situations, but it's definitely do-able (I have around 50 firewalls and
most of them are private externally and internal, with public DMZ
segments.)

Just a thought.  Hope it helps!

Jason

>  
>    RE: [FW1] Opinon Requested - to NAT or not to NAT DMZ Addresses
>    Date: Mon, 13 Nov 2000 10:15:12 -0800
>    From: Ian Campbell <[EMAIL PROTECTED]>
>      To: "'Frank Darden'" <[EMAIL PROTECTED]>, "'CryptoTech'" <[EMAIL PROTECTED]>,
>         Brian Burns <[EMAIL PROTECTED]>
>     CC: [EMAIL PROTECTED]
> 
> Just as a logistical issue\question as well:
>  
> Generally you'll have one NIC as your external interface and your DMZ hanging off 
>another. Your external int must have one of your
> public addresses, so how do you assign public addresses from this same subnet to a 
>different NIC on your FW?
>  
> Ian
> 
>      -----Original Message-----
>      From: Frank Darden [mailto:[EMAIL PROTECTED]]
>      Sent: Sunday, November 12, 2000 7:54 AM
>      To: 'CryptoTech'; Brian Burns
>      Cc: [EMAIL PROTECTED]
>      Subject: RE: [FW1] Opinon Requested - to NAT or not to NAT DMZ Addresses
>      Importance: High
> 
>      Speed, and capability as well. You need to know (or at least have a rough idea) 
>how many concurrrent connections
>      will be going through the firewall. NAT can seriously drain the 25,000 default 
>connections because it requires 2x
>      the connections running through the firewall. This ordinarily does not present 
>a problem on smaller sites, however if
>      you anticipate your site will be hugely popular (dont we all) such as a large 
>ecommerce site, you might want to
>      consider not natting to the DMZ. There are ways to go beyond 25,000 
>connections, that are documented at Phoneboy.
>      But then you start having preformance issues as indicated by CryptoTech. I 
>suppose there are some advantages to
>      natting the DMZ such as flexibility in addressing, and limiting the ability for 
>you or others to to shoot yourself in the
>      foot, and the #1 reason lack of valid address space. Many times the situation 
>is one that you have little or no choice to
>      NAT the DMZ. However if you do have the choice, and practice reasonably good 
>management of the firewall and DMZ,
>      I see no reason to NAT the DMZ. Bear in mind if you do not NAT the DMZ your 
>antispoofing rules become more
>      critical than ever before.
>       
>       
>      Frank
>       
> 
>           -----Original Message-----
>           From: CryptoTech [mailto:[EMAIL PROTECTED]]
>           Sent: Saturday, November 11, 2000 9:20 AM
>           To: Brian Burns
>           Cc: [EMAIL PROTECTED]
>           Subject: Re: [FW1] Opinon Requested - to NAT or not to NAT DMZ Addresses
> 
>           Speed.  Firewall load.  Latency.  NAT modifies every packet involved in 
>the rule, and thus add
>           latency.  If you are running 100mb or higher, you probably don't want to 
>use nat 
> 
>           HTH, 
>           CryptoTech 
> 
>           Brian Burns wrote: 
> 
>             I am doing a redesign of our existing network and have been asked to use 
>private addressing with
>             NAT. I am not pro/against it - but I have always used valid addresses on 
>my DMZ servers. So... why
>             would one want to use NAT on your DMZ devices? Comments? Brian


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to