We have a web server we need to allow access to our external clients/employees.
We have a DB server that it needs to talk to. Right now, what we do is we have NAT fwding on a box (also acts as a db server) that ppl from the outside can get to via an external IP. On the firewall, we forward the required ports for this external IP to the internal IP of the server.
i.e. 64.220.220.220 -> 192.168.100.20 (port 80, 1521, etc...)
So, what the heck is the difference between doing that and putting the box on the DMZ and restricting access to the box via certain ports? I only need port 80 open on the box but the box needs to talk to our DB server which is on our LAN. Should we just bypass the DMZ since the box needs to talk to an another box (the db server)?
We have a DB server that it needs to talk to. Right now, what we do is we have NAT fwding on a box (also acts as a db server) that ppl from the outside can get to via an external IP. On the firewall, we forward the required ports for this external IP to the internal IP of the server.
i.e. 64.220.220.220 -> 192.168.100.20 (port 80, 1521, etc...)
So, what the heck is the difference between doing that and putting the box on the DMZ and restricting access to the box via certain ports? I only need port 80 open on the box but the box needs to talk to our DB server which is on our LAN. Should we just bypass the DMZ since the box needs to talk to an another box (the db server)?
