[BlueOnyx:04830] Re: Firewall for Datacenter
Michael Stauber
mstauber at blueonyx.it
Mon Jun 28 15:56:05 -05 2010
Hi Christoph,
> IMHO, NAT gives no benefit at all but creates some interesting new
> problems. But thats really just my 2 centimes, maybe you can elaborate on
> what benefits NAT would bring to Geralds situation ?
NAT has some interesting benefits both in regards to handling and security.
Basically you bind all public IPs to the firewall and then simply "route" a
specific public IP's port(s) to a specific private (internal) IP.
Security wise this can be a plus: Ports which you have not routed are
effectively closed and therefore inaccessible.
Or say there is a server that you need to take down for maintenance. Just
route the specific ports to a standby box until you're done. No need to change
the DNS or IP addresses on the boxes you're working on.
But NAT adds quite a bit of management overhead. You need to carefully keep
tabs on what you route where, especially if a team of network operators
manages the network. It gets even more complicated if you throw in paying
customers for which you need to manage the port forwarding. Simply forwarding
all ports from the public IP to the private IP then negates some of the added
security benefits that NAT offers, but if you don't, then you'll have a much
higher support overhead with paying customers ("Hey, I installed Webmin, but
nothing comes up at port 10000 when I try to connect to it!").
The other "interesting" problem that Gerald already mentioned: If you run
mailservers on a NAT'ed network and NAT'ed server A tries to email to NAT'ed
server B, then it tries to send to the public IP address of B. That email then
may never make it through, as A should have used B's private internal IP
address for the connection. Or you need a firewall that supports "red" traffic
on the "green" interface and routes it as well.
If yours doesn't, then you need an internal DNS servers with all the records,
but that responds with the internal (NAT'ed) IPs instead of the public ones.
Which is probably is hardly doable in a scenario such as the one that Gerald
is looking at.
So yeah: NAT is a mixed bag. In a corporate environment or when you do managed
hosting, then it can be a very viable and interesting solution. But it throws
in another level of complexity that may not be worth the hassles in other
scenarios.
As for serious firewall recommendations ... I saw the name "Smoothwall" pop up
and almost spilled my coffee.
I've been using Smoothwall Corporate Firewall (with a few of their plugins)
for a couple of years and my verdict on it wouldn't really be suitable for a
public mailing list. Sorry, but on that I couldn't make do without letting
slip a profanity at the begining or end of every second sentence.
So my recommendation there would be to look at something else instead. :o)
--
With best regards
Michael Stauber
More information about the Blueonyx
mailing list