Setting up a router in front of my server
Tom Metro
blu at vl.com
Sun Apr 3 03:37:44 EDT 2005
David Kramer wrote:
> I'm reading up on the whole DMZ concept, and it seems like a straight
> pass-through, so what does that buy you over hooking up the machine
> straight to the DSL modem? It means I don't have to configure
> individual ports to go to my server, but it adds no protection to my
> server either.
As dsr pointed out in his post, most consumer routers, such as your
WRT54G, stretch the meaning of DMZ such that it does what your wrote
above (pass-through) rather than providing meaningful isolation. (In
addition to isolation, a typical business-grade firewall would also
provide filtering of fractured packets, ping of death, etc. for the
hosts in the DMZ.)
What's strange is that devices like the WRT54G actually have the
necessary hardware to support a real DMZ, and are just lacking the
software. I guess because they feel a real DMZ is either not needed or
too confusing for the typical home user?
My understanding is that although the WRT54G only has two physical
interfaces - one for the wireless LAN and one for everything wired -
internally the wired ports are attached to a switch that understands
virtual LAN tagging, which allows you to link specific ports of the
switch to virtual Ethernet devices in the operating system. Thus you can
isolate the ports from each other at the hardware level.
So if you did want a real DMZ you could seek out one of the third party
firmware packages (see BLU list archives) that run on the WRT54G. I plan
to do this with my WRT54G one of these days. (Currently I'm using it
just as a wireless access point behind another firewall.)
> I assume I should continue to run SuseFirewall on my server even if it's
> protected by the router, right?
I agree with others that running a software firewall on each individual
machine is a good idea.
-Tom
More information about the Discuss
mailing list