[OT] VPN/DMZ best practices

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



There is such a wealth of knowledge and personal experience on this list
that I'd like to get your opinions on our current situation.

Currently, we have a simple tri-homed firewall with the internal network
on one interface, the dmz on another, and the dirty internet on the
last.  Also, there is a spare interface on the box which is unused.  We
use CentOS and manually maintain our rule sets and routes since it's not
really that complex.

I'd like to setup a vpn connection between our office and a remote
office, as well as, allow remote users to vpn into there desktops and
map samba shares.  I would prefer to tie in the openvpn software with
our internal openldap server.  Our dmz is currently not in use at all
but will be soon, hosting our software.  Having said all of this, what
insights do you have for the following:

1.  What are your recommendations for where the vpn (openvpn on linux)
appliance should reside?  In the dmz?  Internally and configure the
firewall to allow (and nat) vpn connections?  On the unused interface in
a different dmz than our hosting software?  Somewhere else?

2.  Should I abandon the single firewall approach and instead use two
firewalls in a more traditional setup (gateway firewall -> dmz ->
internal firewall)?  If so, where should the vpn appliance go?

I'll probably have more questions based on your answers and I look
forward to the responses.  Thanks.
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux