I'm being cast headlong into unfamiliar waters here, and being desperate for
some air, thought I'd come here for some help. :)
Anyway, my employer is going through some whiplash-inducing growth spurts,
and as a result, the simple "Internet T-1 -> Linux Firewall/NAT -> LAN"
setup just isn't going to cut it anymore.
First, we're bringing in 2 additional T's and want to use BGP to provide for
some measure of failover to an Class C portable IP block we own. My
question regarding this is, what do I need to do on my Linux firewall/NAT
box so that it knows how to send outbound packets?
Second, we currently have two seperate DMZ networks, one for corporate
Internet servers, and one for client-accessible Internet servers.
Currently, both these networks, and our internal LAN, (and all of our
IPSec-connected remote offices) are all subnets in the 10.* range, and
NATted to the outside. I'm using Shorewall on RH9 (Linux 2.4) to handle
the firewalling and SNAT/DNAT for the DMZs and NAT for the LAN, and
FreeS/WAN for the IPSec WAN.
What I would _like_ to do is build an "invisible" firewall between the
routers provided with each of the three T-1 lines (yes, each T has it's own
Cisco 2600-series router). Ideally, two, in some sort of fail-over
configuration. I want to split the firewalling from the routing primarily
to remove the chance of breaking one when working on the other, but this is
not a set-in-stone requirement.
So, given my poor ascii-art skills, the layout might look something like
this:
^^^}-{T1(a)}--[cisco(a)]--+ +--{Service DMZ}
'N } | |
e }-{T1(b)}--[cisco(b)]--+-[[firewall]-[router]]-+--{Corporate DMZ}
t } | |
vvv}-{T1(c)}--[cisco(c)]--+ +--{LAN}
|
+--{future growth}
Now, for the sake of argument, we'll call our portable Class C
192.168.191.0/24. I hope to share it between the service DMZ and the
corporate DMZ. The two DMZs need to be seperate for security concerns, and
I'll need to do some amount of firewalling between the DMZs, and between
the DMZs and the LAN, in addition to the firewalling between the Internet
and our networks.
So, here's my list of questions:
Would it be better to forgo the edge firewall, and simply put firewalls on
each network that connects to the Internet or another internal network?
If so, should the NAT for the LAN be handled by the LAN's firewall, or the
router?
Since we really need to be able to connect from any network to any network
internally, would I put the IPSec links in the linux router?
Am I making this all too complex? Should I just combine the firewall &
router into a single box, build a fail-over twin for it, and have it run
the IPSec links, the proxy-arp for psuedo-bridging to the DMZs, the NAT for
the LAN->Internet communications and all the internal routing?
And where the hell does BGP for the T-1s fit into this mess?
I guess I'm more lost than I thought. :(
Any help or advice is appreciated.
TIA,
Gregory
--
Gregory K. Ruiz-Ade <[EMAIL PROTECTED]>
OpenPGP Key ID: EAF4844B keyserver: pgpkeys.mit.edu
_______________________________________________
LARTC mailing list / [EMAIL PROTECTED]
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/