Owner`s manual
Continued
53
If you wanted to rewall these hosts from the Internet without using Proxy ARP, you would
need to subnet your addresses and therefore lose two more addresses for the new network
and broadcast, plus half of your remaining IP’s would be in the non-rewalled half.
Another method would be to have the rewall do port forwarding between all of the
addresses to non-routed IP’s (192.168.x.x) for your servers. Done properly, this would be
work. It isn’t as transparent and may break some protocols like active FTP.
By using Proxy ARP, you can set up your systems in a DMZ to separate them from your client
systems. This is also the least invasive method to set up, since you can keep the same IP’s on
all of the servers as you had when things were not rewalled.
snmP
You can enable SNMP on your LAN interface on this screen. This is useful if you have a
network management or monitoring system that takes advantage of it.
The System location and System contact boxes can be left blank, but can assist you in
determining which device you are monitoring if you have several monitored hosts.
The Community is generally set to public, but if you are concerned about security, you should
set this to something difcult to guess, containing numbers and letters. This community name
is still passed over the network in clear text, so it could be intercepted, though the most
anyone could get with that community name is information on the setup and utilization of
your rewall. In most environments, this is likely to be of little to no concern, but is something
to keep in mind.
Cortexa 7202 ConfIguratIon utIlIty