Many firewalls make certain assumptions and use several standard conventions. Understand the standard terminologies and you’ll have an easier time when setting up your firewall.
Nearly every firewall’s first level of protection is NAT, or Network Address Translation. This means that an external address is “translated” from external to internal addresses, so the public never has direct access to your internal network or computers. Say if you have an external address of 18.104.22.168. You really don’t want your internal machines to use the same network as the Internet, to you? So you set up your internal computers with an address range of 192.168.20.x. Any time someone on the Internet wants to get a file from your internal server, the address is translated by the firewall.
You can also think of each network as secret departments in a covert government organization. Each department only has security clearance to talk with one another. Say the Bioweapons department needs resources from Engineering… but they don’t have security clearance. The only person who has clearance for each department is the 4-star general, and each department must go through him. It’s not exactly like that, but it’s a decent analogy of how different segmented networks are seperated from each other.
Firewalls use standard conventions when referencing areas of the network. There are four basic network types, all of which can be managed by the firewall at the same time. These networks are called:
You can have a wireless access point on your green (internal) network in a home situation. A seperate Blue network is helpful if you have a public access point, but only want those people to access the Internet, and that’s it. Internet cafés and other public access points would use a Blue network to allow customers access to the outside world, but not let you snoop their internal network.
The Orange Network (DMZ) is where you put your web servers, VOIP router, and other appliances that the outside world should be able to see. There are several assumptions made about the computers on this network, referred to as the Orange Mantra:
Segmenting your network like this adds more security. If someone comes into your house and uses one of your local computers (on the green network), then they don’t automatically have full control of your web servers. Your Orange servers will be on a completely seperate network, with a completely different IP range, and completely different set of network cables. If you have only one server in the DMZ, then you can get away with a cross-over network cable between the firewall and the Orange Server. If you have more than one server in the DMZ, then you must use a seperate network switch (not the same one your green network is on).
Now that you know the caveats of each network, you can determine which type of firewall setup you need. If all you need is a firewall that is more configurable than the cheap Netgear box you have, then all you need is a Red + Green setup. Here is a table with the different network setups and their intended purposes:
Remember, you don’t HAVE to have a blue network to have wireless access. You can put a wireless access point on the green network, and it will have the same subnet as your wired computers on the green network. Having a blue network just keeps wireless users on a seperate address range.
Next we’ll discuss hardware considerations based on the type of network you want to set up.