> | [mail 192.168.0.1] > 206.147.x.x 192.168.0.100 | [www 192.168.0.10] > -DSL--[Firewall]------[Switch]----| [workstation a 192.168.0.20] > | [workstation b 192.168.0.21] > > Now, the NAT thinggie is port-forwarding stuff over to the internal > network. For example, www.yaron.org is DNSed as 206.147.x.x. The firewall > forwards port 80 to the internal 192.168.0.10. (delayed response -- was out of town) Why not put put the ("bastion host") mail and www servers into the "DMZ" network, between the DSL router and firewall machine? This could eliminate the need for port forwarding and close potential avenues of attack on your internal network. The DSL router (Cisco 675?) should be able to handle some port forwarding. -- ============== SIGN the Linux Driver Petition: Joel Schneider http://www.libranet.com/petition.html jts at tc.umn.edu SIGN the Mars Petition: ============== http://www.thinkmars.net/petition.html --------------------------------------------------------------------- To unsubscribe, e-mail: tclug-list-unsubscribe at mn-linux.org For additional commands, e-mail: tclug-list-help at mn-linux.org