Firewall Wizards mailing list archives

RE: DMZ Archtecture - Using public address space vs. using Private Ad dress space and NAT


From: "Benjamin P. Grubin" <bgrubin () pobox com>
Date: Fri, 3 Aug 2001 16:27:03 -0400

IMHO, this is not a particularly strong reason to make a high-impact
architectural decision like RFC1918 and NAT.  Major upheavals like
moving a site from one ISP's address space to another is a big challenge
for many reasons, changing the addresses should be a microscopic issue
in comparison.

The design issue is to ensure that all scripts, configuration files, and
things like web referrals and URLs all use symbolic addresses.
Hardcoding IP's is a real problem, and it'll bite you at some point no
matter what address space you use.  The IP's that must be hard-coded
should be very carefully tracked, change controlled, and kept to an
absolute minimum.  Hardware expansion, disaster recovery, load
balancing, site moves and minor architectural changes can all be made
hell by hardcoding IP's everywhere.

Just my $.02

Cheers,
Ben

-----Original Message-----
From: firewall-wizards-admin () nfr com 
[mailto:firewall-wizards-admin () nfr com] On Behalf Of ruka +
Sent: Thursday, August 02, 2001 11:47 AM
To: bernard_stapleton () exchange au ml com; 
firewall-wizards () nfr com; 'firewall-wizards () nfr com
Subject: RE: [fw-wiz] DMZ Archtecture - Using public address 
space vs. using Private Ad dress space and NAT


Another reason for using private address space+NAT is a 
possible future migration for another ISP. It's just a matter 
of changing the NAT rules in the firewall.

If using public addresses in the DMZ machines, you'll have to 
change config files, scripts using IP addresses, and only 
devil knows what  problems can surface. ;->

"Stapleton, Bernard (Australia)" 
<bernard_stapleton () exchange au ml com> "'firewall-wizards () nfr com'" 
<firewall-wizards () nfr com>Date: Thu, 2 Aug 2001 01:04:28 +0900

Everyone,

We have started an interesting conversation at work at the moment, 
regarding whether to use public address space in our DMZs.

The idea of using public address space has its pros and cons.

Pro:

No address conflict with connecting to external partners. They can 
route this space internally and so can you, without fear of conflict 
with another party. No need for address translation / 
simplification of 
management Ease of passing protocols that are difficult to firewall

Cons

Security risk if firewall host still routes if firewall software 
shutdown More complex management

I was wondering if anyone on this list has anything to say 
about this 
topic? I would like to know what people might be doing internally 
themselves, and why they came to that decision.

Thanks

Berny



All opinions / arguements and anything else otherwise stated in this 
email are my own, and not of my employer.

_______________________________________________
firewall-wizards mailing list
firewall-wizards () nfr com 
http://list.nfr.com/mailman/listinfo/firewall-wizards




------------------------------------------------------------
--== Sent via Deja.com ==--
http://www.deja.com/ _______________________________________________
firewall-wizards mailing list
firewall-wizards () nfr com 
http://list.nfr.com/mailman/listinfo/firewall-> wizards



_______________________________________________
firewall-wizards mailing list
firewall-wizards () nfr com
http://list.nfr.com/mailman/listinfo/firewall-wizards


Current thread: