<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring 7102dl in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928093#M10217</link>
    <description>Edit:&lt;BR /&gt;&lt;BR /&gt;The firewall wizard created two zones, a Public and a Private. Eventually I will create another zone (DMZ). But I just wanted to make sure that www requests are allowed in and forwarded to our web server.</description>
    <pubDate>Thu, 25 Jan 2007 17:34:13 GMT</pubDate>
    <dc:creator>Sam Chhlang</dc:creator>
    <dc:date>2007-01-25T17:34:13Z</dc:date>
    <item>
      <title>Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928087#M10211</link>
      <description>I'm fairly new to networking so hopefully I can explain my problem so that you guys can understand. I'm trying to setup a 7102dl router to a T1 line. We have the T1 module installed. I also want to setup a DMZ for our web server. My question is, do I configure the T1 interface for internet access, the eth 0/1 interface for internal, and eth 0/2 for the DMZ? And to setup a DMZ, do I create a security zone for it? Also, will I have internet access by just using the firewall wizard through the web GUI? and do I need to create ACLs?</description>
      <pubDate>Thu, 18 Jan 2007 03:21:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928087#M10211</guid>
      <dc:creator>Sam Chhlang</dc:creator>
      <dc:date>2007-01-18T03:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928088#M10212</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Your scenario will be like this:&lt;BR /&gt;&lt;BR /&gt;- Create a DMZ in security Zones.&lt;BR /&gt;- Configure the T1 interface for internet access.&lt;BR /&gt;- Configure DMZ to have one of the Ethernet interfaces.&lt;BR /&gt;- Configure the other Ethernet interface for your LAN.&lt;BR /&gt;&lt;BR /&gt;You need now to configure firewall polices for these 3 Zones, so from LAN to Internet you can use the wizard.&lt;BR /&gt;&lt;BR /&gt;I'm not sure if you can configure DMZ access through the firewall wizard also, so i think you should do it from the CLI.&lt;BR /&gt;&lt;BR /&gt;I believe that VPN to DMZ can be configured by the VPN wizard.&lt;BR /&gt;&lt;BR /&gt;Good Luck !!!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Jan 2007 04:25:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928088#M10212</guid>
      <dc:creator>Mohieddin Kharnoub</dc:creator>
      <dc:date>2007-01-18T04:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928089#M10213</link>
      <description>Hi Sam,&lt;BR /&gt;&lt;BR /&gt;Typically, you would use NAT to grant your "inside, secure" network access to the outside world. Using NAT (network address translation), only addresses from the inside network can access the outside (Internet). If you want people from the outside accessing servers on the inside, you have to create DMZs. Look at the documentation below for some examples.&lt;BR /&gt;&lt;A href="ftp://ftp.hp.com/pub/networking/software/ProCurve-SR-IP-Firewall-Config-Guide.pdf." target="_blank"&gt;ftp://ftp.hp.com/pub/networking/software/ProCurve-SR-IP-Firewall-Config-Guide.pdf.&lt;/A&gt;&lt;BR /&gt;The DMZ will allow users from the Internet to access your servers, but they cannot get to your internal network. Typically mail and webserver would be in a DMZ.&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;BR /&gt;&lt;BR /&gt;Olaf&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Jan 2007 11:43:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928089#M10213</guid>
      <dc:creator>Olaf Borowski</dc:creator>
      <dc:date>2007-01-19T11:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928090#M10214</link>
      <description>olaf wrote:&lt;BR /&gt;&lt;BR /&gt;"...If you want people from the outside accessing servers on the inside, you have to create DMZs"&lt;BR /&gt;&lt;BR /&gt;Q1) can you not just allow, via one to one nat ACLs that allow particular ports to forward to particular internal IPs (ie: hit 207.1.1.15 on port 80 and you get 10.1.1.15 on the 'lan'&lt;BR /&gt;&lt;BR /&gt;i ask b/c i have a question, i'll post seperately, and not hijack this one, but that part is pertinent to both (ie: if he want's to set up vpn or rdp to his 'lan')&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;thanks.&lt;BR /&gt;Fernando</description>
      <pubDate>Fri, 19 Jan 2007 14:26:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928090#M10214</guid>
      <dc:creator>fernando sabio</dc:creator>
      <dc:date>2007-01-19T14:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928091#M10215</link>
      <description>Yes you can do what you propose. Drawback: If someone gains unauthorized access to you WEB server, they have access to your LAN. If the server is on a different network,  you have more control meaning you can specify what can and cannot be done between your internal network and the DMZ network.&lt;BR /&gt;&lt;BR /&gt;"have to" was maybe too strong. "Should" is better.</description>
      <pubDate>Fri, 19 Jan 2007 15:11:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928091#M10215</guid>
      <dc:creator>Olaf Borowski</dc:creator>
      <dc:date>2007-01-19T15:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928092#M10216</link>
      <description>I am able to get internet access to work, but I cannot get HTTP requests from the outside to hit our web server. Here is the config, can someone take a look and tell me what I need to change?&lt;BR /&gt;&lt;BR /&gt;ip access-list standard wizard-ics&lt;BR /&gt;  remark Internet Connection Sharing&lt;BR /&gt;  permit any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended self&lt;BR /&gt;  remark Traffic to ProCurve SR&lt;BR /&gt;  permit ip any  any    log&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended wizard-pfwd-1&lt;BR /&gt;  remark Port Forward 1&lt;BR /&gt;  permit tcp any  host xx.xxx.xxx.106 eq www  log&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended wizard-pfwd-2&lt;BR /&gt;  remark Port Forward 2&lt;BR /&gt;  permit tcp any  host xx.xxx.xxx.106 eq ftp  log&lt;BR /&gt;!&lt;BR /&gt;ip policy-class Private&lt;BR /&gt;  allow list self self&lt;BR /&gt;  nat source list wizard-ics interface ppp 1 overload&lt;BR /&gt;!&lt;BR /&gt;ip policy-class Public&lt;BR /&gt;  nat destination list wizard-pfwd-1 address 192.168.1.xxx&lt;BR /&gt;  nat destination list wizard-pfwd-2 address 192.168.1.xxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 ppp 1&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 xx.xxx.xxx.105&lt;BR /&gt;!</description>
      <pubDate>Thu, 25 Jan 2007 17:18:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928092#M10216</guid>
      <dc:creator>Sam Chhlang</dc:creator>
      <dc:date>2007-01-25T17:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928093#M10217</link>
      <description>Edit:&lt;BR /&gt;&lt;BR /&gt;The firewall wizard created two zones, a Public and a Private. Eventually I will create another zone (DMZ). But I just wanted to make sure that www requests are allowed in and forwarded to our web server.</description>
      <pubDate>Thu, 25 Jan 2007 17:34:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928093#M10217</guid>
      <dc:creator>Sam Chhlang</dc:creator>
      <dc:date>2007-01-25T17:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring 7102dl</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928094#M10218</link>
      <description>I can give you a sample. you can check it out.&lt;BR /&gt;sample:&lt;BR /&gt;ProCurve University San Francisco Network&lt;BR /&gt;192.168.1.0/24&lt;BR /&gt;&lt;BR /&gt;Outbound public address: 16.1.1.1&lt;BR /&gt;Inbound HTTP global address: 16.1.1.2&lt;BR /&gt;&lt;BR /&gt;config:&lt;BR /&gt;&lt;BR /&gt;interface eth 0/1&lt;BR /&gt;  ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;  access-policy Inside&lt;BR /&gt;&lt;BR /&gt;interface ppp 1&lt;BR /&gt;  ip address 16.1.1.1 255.255.255.248&lt;BR /&gt;  access-policy Outside&lt;BR /&gt;&lt;BR /&gt;ip policy-class Inside&lt;BR /&gt;  nat source list MatchAll interface PPP 1 overload&lt;BR /&gt;&lt;BR /&gt;ip policy-class Outside&lt;BR /&gt;  nat destination list InWeb address 192.168.1.10&lt;BR /&gt;  discard list MatchAll&lt;BR /&gt;&lt;BR /&gt;ip access-list standard MatchAll&lt;BR /&gt;  permit any&lt;BR /&gt;&lt;BR /&gt;ip access-list extended InWeb&lt;BR /&gt;  permit tcp any host 16.1.1.2 eq 80&lt;BR /&gt;</description>
      <pubDate>Thu, 25 Jan 2007 20:51:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/configuring-7102dl/m-p/3928094#M10218</guid>
      <dc:creator>Lei.Ma</dc:creator>
      <dc:date>2007-01-25T20:51:10Z</dc:date>
    </item>
  </channel>
</rss>

