Hello Simon, many thanks for your informative reply.
I try to share some more information of what I'm planning to do. I can confirm that I have only 1 static public IPv4 (provided by my ISP). With my current hardware (ALIX2D13) and software VyOS 1.1.8 this works fine with a standard firewall+router setup. The number of webservices is (still) low, and with configured forward proxy (HAproxy <https://wiki.archlinux.org/title/HAproxy>) in addition to the selective ports (80, 443, 465, 587, etc.) opened this DMZ works as expected. This firewall solution will be replaced by Shorewall running on a recent Debian release. In addition I will setup another firewall behind the router with the dynamic public IPv4. And behind this firewall different local networks will be available (e.g. LAN, Management). As a result I have physically seperated the DMZ from other local networks + 2 different firewall software stacks. I'm planning to extend services in the LAN with K8s and services for logging and monitoring. With regards to the transparent / bridge firewall I think to skip this because I cannot determine if my ISP is offering WAN-routing that is a pre-requisite for a transparent / bridge firewall. Regards Thomas Am 01.01.22 um 20:05 schrieb Simon: >> I'm considering the following firewall setup on a public IPv4 provided by my >> ISP: >> Transparent / bridged firewall >> >> The local network should be considered as a DMZ, means any service running >> in this network is accessable from WAN. >> Having only on public IPv4 I need to add a forward proxy service in the DMZ >> in order to use multiple services (e.g. mail, cloud). >> >> Can you please advise if this setup is reasonable for this use case? >> Or should a standard setup with a routed firewall be preferred? > Do you only have one public IPv4 address ? If so, then a bridged setup > probably doesn’t make sense. > With a previous work hat on I ran several bridges firewalls - but these were > on networks with multiple IPv4 addresses and with services either directly > active on public IPs, or with “something else” does NAT, port forwarding, etc > behind it. And in each case, I had a need to do some traffic monitoring in a > setup where I couldn’t introduce the routing changes needed for a routed > setup. > > From memory, there are some things that don’t work well/easily/at all with a > bridged setup - because the IP stack isn’t forwarding packets at the IP level > (i.e. in the IP stack - level 3), it’s bridging them (forwarding) at the > packet level (i.e. at level 2). > > If you give a bit more information on what exactly you need to do then we can > probably offer suggestions on how best to achieve that - but at the moment > there’s insufficient information to say which of several topologies would be > most appropriate. But bear in mind that often there is no “right” or “wrong” > way - just different level of “best fit” for whatever definition of “best” > you apply. > > > As for your other question, I don’t think Shorewall really has any hardware > requirements of it’s own. Other than memory (mostly RAM for storing of active > rules etc - but also CPU if it’s handling lots of traffic with lots of > rules), it’s dependent on the OS to provide the various network layers it > interacts with. So if the OS runs OK, has all the right drivers for the > hardware, and there’s enough resources to handle whatever complexity of rules > you apply - then Shorewall should be fine. > At one time I had an Alix board acting as a backup firewall for a hosting > environment with 20mbps uplink and a significant number of traffic shaping > rules. The only time it fell over was when we were hit with an NTP > amplification attack (someone was flooding our link with small NTP requests > and causing massive outbound NTP traffic to a 3rd party) which made our Intel > based primary box fall over and then the Alix struggled to handle the packet > rate. > > > Simon > > > > _______________________________________________ > Shorewall-users mailing list > Shorewall-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/shorewall-users
_______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users