Using 3rd nic as Blue as "Vlan: causing issues on green

I have a 4 nic IPfire, red, green, blue setup. I am trying to use the Blue as a 2nd green. The 2nd green is simply to isolate an application server from the Green network(different IP subnet), but I want traffic to go back and forth(which is working). I’m having network mapped drive issue from another server(file server on green) it is killing users mapped drives. wondering if I should use a 2nd staitc WAN and a second ipfire, use ipsec to connect them, instead of Blue - any thoughts on this?

Thanks for any help!

Brian

IpFire currently allows you to define four zones (red - Internet, green - local LAN, blue - e.g., WLAN, and orange - DMZ). If you want to isolate a server, connect it to the orange zone.

Thanks for answering!!! I don’t want the server exposed to the internet, only want back and forth access to green. If I put it on the DMZ, will it be blocked from internet by default?

Here is a picture(terrible) of what I am trying to do. I want to isolate the app server from the green. I do not want internet access to app server. I want green to be connect to App server. Hope this makes a little more sense? All switches are unmanaged..

Thanks,

Brian

The DMZ is used to host servers. By design, the Internet does not have access to the Orange network (DMZ). Access is defined using access rules; whatever rule you define, it will work for you.
By design, no rules are defined that allow communication from the DMZ to the LAN (green).
From the LAN to the DMZ, yes.

green 192.168.100.xxx, app server network 192.168.200.xxx

You connect one switch to the LAN, and then a PC to it (I don’t know what the other two in the picture are). You connect the second switch to the DMZ, and then the application server, and you can also connect the file server to the DMZ.

so connect orange to switch then to app server.

  1. Will app server(on orange) be exposed to the internet? Do not want this.
  2. Green should have access to orange, but do I have to put in a rule to let app server interact with green? Green(users) are using a software client to connect to app server. Thanks Brian
  1. No, not be exposed as default.
  2. The firewall is stateful, which means that no rules are created from DMZ to GREEN.

What is LT and P??? ?

1 Like

LT=laptops, PC=Pc’s, just the normal green network devices…

so all i would need to do is setup a rule to allow orange to access green…

In the figure from right to left: PC, Laptop, ???, File Server.
What’s the third one from left to right? Printer ?

You need to be clearer about your use case.

1 Like

yes = printer

Another question is whether you want to print from the application server, if so, it is better to connect the printer to the DMZ as well

I have an app server(windows server) that I need to get off the green(and domain, which is done) onto another local network. Its an old server that cannot be upgraded, so corporate policy is they want it off the Green, but we still need to use the app server for day to day business until it eventually gets replaced.

If the orange solution works, great, i will test that tonight. If not, I will configure another ipfire, use another WAN Static IP(we have a block of 5 and only using 1) and simply ipsec tunnel between the two ipfires. I have no control on when they will switch, i just need to keep everything running…

This new IPFire and ipsec is overkill unless you want to move your server beyond the capabilities of your cabling :slightly_smiling_face:

thanks, so you believe with the little information i have given(i’m not being funny!), orange should do the trick for me?

Thanks for all your input!

Brian

I think so. I also asked if the server would communicate with the printer. If so, I would connect the printer to the DMZ as well. Otherwise, you’ll have to create a DMZ rule for the printer.

1 Like

great! Thanks again!!! Really appreciate the help…

Brian

I don’t think it’s the best idea to put your outdated Windows application server on the Orange (DMZ) network.
Instead, put it on the Blue network and create the necessary rules for Blue access to that server.

The Green network has access to the Blue network by default.

Regarding the mapping problem, I think it’s related to the Windows server being the default master browser; by isolating it from the green, you lose your mappings.

1 Like