communicate with the NetDefend Firewall because ARP won't function between the clients and the
interface.
To solve this problem we would add a new route to NetDefendOS which would have the following
parameters:
•
Interface: The interface on which the second network is found.
•
Network: The IP address range of the second network.
•
Local IP Address: An address within the second network's IP range.
When the Default Gateway of the second network's clients is now set to the same value as the Local
IP Address of the above route, the clients will be able to communicate successfully with the
interface. The IP address chosen in the second network is not significant, as long as it is the same
value for the Default Gateway of the clients and the Local IP Address.
The effect of adding the route with the Local IP Address is that the NetDefendOS will act as a
gateway with the Local IP Address and respond to, as well as send out, ARP queries as though the
interface had that IP address.
The diagram below illustrates a scenario where this feature could be used. The network 10.1.1.0/24
is bound to a physical interface that has an IP address within the network of 10.1.1.1. If we now
attach a second network 10.2.2.0/24 to the interface via the switch, it is unbound since the interface's
IP address does not belong to it.
Figure 4.2. Using Local IP Address with an Unbound Network
By adding a NetDefendOS route for this second network with the Local IP Address specified as
10.2.2.1, the interface will then respond to ARP requests from the 10.2.2.0/24 network. The clients
in this second network must also have their Default Gateway set to 10.2.2.1 in order to reach the
NetDefend Firewall.
This feature is normally used when an additional network is to be added to an interface but it is not
desirable to change the existing IP addresses of the network. From a security standpoint, doing this
can present significant risks since different networks will typically be joined together through a
4.2.1. The Principles of Routing
Chapter 4. Routing
151
Summary of Contents for DFL-1600 - Security Appliance
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Page 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...