beautypg.com

Transparent mode scenario 2 – Amer Networks E5Web GUI User Manual

Page 349

background image

Name: http_allow

Action: Allow

Service: http

Source Interface: lan

Destination Interface: any

Source Network: 10.0.0.0/24

Destination Network: all-nets

3.

Click OK

Scenario 2

In the second scenario, the Clavister Security Gateway in transparent mode separates server
resources in the DMZ from an internal local network. Each is connected to a separate interface
without the need for different address ranges.

All hosts connected to lan and dmz interfaces share the 10.0.0.0/24 address space. As this is
configured using transparent mode, any IP address can be used for the servers and there is no
need for the hosts on the internal network to know if a resource is on the same network or
placed in the DMZ.

The clients on the internal network are allowed to communicate with an HTTP server on the DMZ
network. At the same time, the DMZ HTTP server is reachable from the public Internet. The
Clavister Security Gateway is transparent between the dmz and lan interfaces but traffic is still
controlled by IP rules.

Figure 4.27. Transparent Mode Scenario 2

Chapter 4: Routing

349

This manual is related to the following products: