Adding an Inbound and Outbound Firewall

In this scenario, Acme Company is running TCP/IP and the Internetwork Packet ExchangeTM (IPXTM) protocol on the network. Acme wants to use Novell BorderManager 3.7 as both an inbound and an outbound firewall. Acme wants to do the following:

The following Novell BorderManager 3.7 components are used to implement this scenario, as shown in the following figure:

Figure 24
Inbound and Outbound Firewall

To implement Novell BorderManager 3.7 as a firewall on the network, Acme Company must perform the following general sequence of steps:

  1. Install Novell BorderManager 3.7 and enable packet filtering on public interfaces during the installation.

    For more information and Novell BorderManager 3.7 installation procedures, refer to the Novell Novell BorderManager 3.7 installation documentation.

  2. Using FILTCFG, do the following:
    • Specify filter exceptions for the SMTP server. Allow outbound SMTP requests and inbound SMTP responses.
    • Specify filter exceptions for an external DNS server. Allow outbound DNS requests and inbound DNS responses.
    • Specify filter exceptions for the Web server. Allow inbound HTTP requests or responses destined for the Web server's IP address and allow outbound HTTP requests or responses coming from the Web server's IP address.

    For more information and packet filtering configuration procedures, refer to the packet filtering online documentation.

  3. Using NetWare® Administrator, Novell BorderManager 3.7 Services page, enable and configure the Transparent proxy application on the Novell BorderManager 3.7 server.

    For more information and configuration procedures, refer to the proxy services online documentation.

  4. (Optional) Using NetWare Administrator, Novell BorderManager 3.7 Services page, enable and configure the HTTP reverse, or acceleration, proxy to enhance performance.

    For more information and configuration procedures, refer to the Proxy Services online documentation.

  5. (Optional) Using NetWare Administrator, enable and configure access control rules for the intranet users.

    For more information and configuration procedures, refer to the access control online documentation.