INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO
ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT.
EXCEPT AS PROVIDED IN INTELS TERMS AND CONDITIONS OF SALE FOR SUCH
PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS
ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF
INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS
FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY
PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL
PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE
SUSTAINING APPLICATIONS. INTEL MAY MAKE CHANGES TO SPECIFICATIONS
AND PRODUCT DESCRIPTIONS AT ANY TIME, WITHOUT NOTICE.
INTEL CORPORATION ASSUMES NO RESPONSIBILITY FOR ERRORS OR OMISSIONS
IN THIS DOCUMENT. NOR DOES INTEL MAKE ANY COMMITMENT TO UPDATE THE
INFORMATION CONTAINED HEREIN.
Year 2000 capable
An Intel product, when used in accordance with associated documentation, is “Year 2000
Capable” when, upon installation, it accurately stores, displays, processes, provides, and/or
receives data from, into, and between 1999 and 2000, and the twentieth and twenty-first centuries,
including leap year calculations, provided that all other technology used in combination with said
product properly exchanges date data with it. Intel makes no representation about individual
components within the product should they be used independently from the product as a whole.
Copyright
*Other product and corporate names may be trademarks of other companies and are used only
1999, Intel Corporation. All rights reserved.
for explanation and to owners' benefit, without intent to infringe.
4.4.3.1Receive (Rx) Filters on the Connection to the Internet......................................24
4.4.3.2Transmit (Tx) Filters on the Connection to the Internet.....................................27
07-12-99 Version 1.02
DMZ Firewall Solution for the Express Router
1 Introduction
1.1 About This Document
This document explains how to configure a secure Internet solution using the second LAN
interface of the Intel
two example solutions, a Single IP Address Solution and Multiple IP Address.
It assumed that you have a solid understanding of networking concepts and experience in using
the Express Router.
1.2 References
[1] Intel Express Router User Guide
The user guide for your router explains in detail the basic configuration procedures used in
the set up of the DMZ.
[2] Brent Chapman, Elizabeth D. Zwicky, “ Building Internet Firewalls”, 1995 O’Reilly &
Associates. ISBN: 1-56592-124-0
Express router as a DMZ. The DMZ setup is explained through the use of
1.3 What is a DMZ
For an Intel Express Router having two LAN ports, you can setup a DMZ (DeMilitarized Zone)
to increase security on your private network. A DMZ is a network off one of the LAN ports that
acts as a kind of buffer between the external (public Internet) network and your secure network
on the other LAN interface. The DMZ gives access to services required from both the external
network and the secure network. The services are typically HTTP/FTP (Web) servers for public
access, an HTTP/FTP proxy server, an SMTP server and a News (proxy) server. Mail servers and
News servers for internal use are placed on the secure network. Through the use of IP filters, you
prohibit access from the Internet to your secure network while still providing access to services
on the DMZ.
192.168.151.0
Demilitarized Zone
Http/FTP
(Web)
server
Internet users are allowed
to access your Web
and FTP servers
Http/FTP
10/100
proxy
server
LAN2 port
News
proxy
server
SMTP
server
192.168.152.0
Main LAN
File
server
Mail
server
10/100
PC
PC
Internet
Intel Express
LAN1 port
router
IP filters on the router
block unwanted traffic
destined to the main LAN
07-12-99 Version 1.03
DMZ Firewall Solution for the Express Router
The purpose of this setup is to prohibit any direct data transmission between the Internet and the
secure network. All data must go through proxy servers on the DMZ.
We recommend that you set up the DMZ on the LAN2 (10 Mbps) port and your secure network
on the LAN1 (100/10 Mbps) port.
This document provides two DMZ solutions when connecting to the Internet, one using a single
external IP address and the other using a number of IP addresses (at least four IP addresses are
needed, including network identification and broadcast address).
Note: Solutions using dynamic address assignment by the ISP are not supported.
1.4 IP Filters in the Express Router
IP filters in the Express Router are defined on a link basis. Separate filters are configured for
received data (data packets from a link to the router) and transmitted data (data packets from the
router to a link). Use the diagram below to help determine the direction of data with respect to the
router and the types of filter required (Rx or Tx).
LAN2
Internet
Rx
Tx
Rx
Tx - transmitted data
Rx - received data
Intel Express
Router
Tx
Tx
Rx
LAN1
2 General Setup and Considerations
2.1 IP Address Selection
The IP addresses on the secure network and the DMZ network can be any valid IP addresses, but
we recommend that you use designated private IP addresses or registered IP addresses. Private IP
addresses are those addresses included under Class A network 10, Class B networks 172.16
through 172.31, and Class C networks 192.168.0 through 192.168.255. Registered public IP
addresses are provided by your Internet service provider (ISP). Using registered IP addresses on
the DMZ network avoids conflicts with duplicate addresses on the Internet. On the secure
network it is preferable to use designated private IP addresses. However, if you already have
unregistered public IP addresses on your private network (for example 89.20.0.0 and 90.2.0.0),
you must use Network Address Translation (NAT) to translate these addresses to private IP
addresses.
For the single IP address solution, NAT is needed to map the network services from one public IP
address to one or more private IP addresses on the DMZ network. This makes it possible to have
several public servers on DMZ using the same public IP address.
07-12-99 Version 1.04
DMZ Firewall Solution for the Express Router
2.2 Routing Setup
Do not use RIP on the WAN interface or the DMZ interface. This prevents intruders from
corrupting the routing table.
If there is more than one internal network, the router must not be used as primary gateway
because the router configuration only allows the router to forward packets to the DMZ network .
2.3 DNS Setup
Some of the services on the DMZ network require external DNS queries. The most common mail
solution is to have a domain with an "MX" record and an "A" record pointing to the SMTP server
on the DMZ network. The DNS server is normally maintained and hosted by the ISP. The
solutions provided in this document do not support a DNS server on the DMZ network.
For more details about DNS please refer to [2].
2.4 E -mail (SMTP) Setup
Locate an SMTP server on the DMZ network to communicate with any host on the Internet and
an internal E-mail server on the secure network. Configure the SMTP server to use an MX record
in order to send the mail direct to the destination SMTP server.
2.5 FTP Setup
An HTTP/FTP proxy server on the DMZ network must use passive FTP for connections to the
Internet. Otherwise the filters will block the FTP data channel running on port 20. Because the
HTTP/FTP is an application proxy, support for DNS is required to resolve fully qualified domain
names into IP addresses.
2.6 HTTP Setup
An HTTP/FTP proxy normally runs on port 80 or 8080. However, the filter settings for the
following setups are based on port 80. Because the HTTP/FTP is an application proxy, support
for DNS is required to resolve fully qualified domain names into IP addresses.
2.7 News (NNTP) Setup
If you are using a News (NNTP) server on your secure network, it is required that you locate a
News (proxy) server on the DMZ. With this setup, the News server on the secure network
communicates with the News (proxy) server on the DMZ which, in turn, communicates with an
external News server on the Internet. The advantage of this setup is that all private news groups
are placed on the internal server, protected from the Internet.
2.8 Management Access Setup
To ensure security, you must disable management access (SNMP, Telnet, and TFTP)
on the WAN (Internet) link and the LAN2 (DMZ) link. For additional security, disable
management access on the LAN1 link also. With this setup, all management tasks can
only be performed from the console port.
07-12-99 Version 1.05
DMZ Firewall Solution for the Express Router
3 DMZ Single IP Address Solution
This solution explains how to set up a DMZ solution when the Internet service provider (ISP) has
assigned a single IP address to your network.
News
(proxy)
server
10.2.0.4
LAN1 port
10.5.0.10
Secure LAN
10.5.0.0
Mail
server
10.5.0.1
News
server
10.5.0.2
Users
DNS
server
194.25.6.4
News
(NNTP)
server
196.24.5.8
Internet
HTTP/FTP
DMZ
10.2.0.0
(Web)
server
10.2.0.1
HTTP/FTP
proxy
server
10.2.0.2
Intel Express
Router
SMTP
server
10.2.0.3
LAN2 port
10.2.0.10
In the example, the DMZ network connects to the LAN2 port and is on the 10.2.0.0/16 subnet.
The LAN2 port has been assigned an IP address of 10.2.0.10. The secure private network
connects to the LAN1 port and is on the 10.5.0.0/16 subnet. The LAN1 port has been assigned an
IP address of 10.5.0.10.
Note: The services available on the DMZ can be placed on a single server. If this is done, you
must configure NAT entries and filters accordingly.
3.1 Static Routing Setup
Configure static routing as follows:
• Configure static routing on the Internet connection, LAN1, and LAN2. This is done in
Advanced Setup by setting the Routing Protocol parameter to None/Static.
• Define a static route on the WAN interface to the Internet. Use the default static route setting
(network address of 0.0.0.0 and netmask 0.0.0.0) as shown in the example below.
3.2 Network Address Translation (NAT) Setup
The devices on the DMZ have been assigned private IP addresses. You must set up NAT to
translate the private IP addresses on the DMZ to the external IP address assigned by the ISP. This
will map services (i.e. port numbers) on the external IP address to servers on the DMZ.
07-12-99 Version 1.06
DMZ Firewall Solution for the Express Router
NoteThe order of the NAT entries is important.
NAT entries are defined as follows:
EntryFunctionSettings
1Directs all incoming HTTP
requests to the Web server.
2Directs all incoming FTP
requests to the Web server.
3Directs all incoming SMTP
requests to the SMTP server
4Directs all incoming NNTP
requests to the News server.
5Directs all other incoming
traffic to the DMZ.
Mapping type: Static Port (Single IP)
Internal address:10.2.0.1
Internal port:80
External IP address:<IP address from ISP>
External port:80
Mapping type: Static Port (Single IP)
Internal address:10.2.0.1
Internal port:21
External IP address:<IP address from ISP>
External port:21
Mapping type: Static Port (Single IP)
Internal address:10.2.0.3
Internal port:25
External address:<IP address from ISP>
External port25
Type: Static Port (Single IP)
Internal address:10.2.0.4
Internal port:119
External IP address:<IP address from ISP>
External port:119
Type: Network to single IP
Internal address:10.2.0.0
External IP address:<IP address from ISP>
3.3 IP Filters Setup
This section describes the required IP filters for the LAN1, LAN2 and connection to the Internet.
3.3.1 LAN1 Filters
3.3.1.1 Receive (Rx) Filters on LAN1
Configure these receive filters for the LAN1 port, shown as they appear in Advanced Setup.