I use Astaro as my firewall/proxy server for my home network of about 9 machines.
I have 4 NICS in it: External Internal - Wired workstations DMZ - Servers WLAN - wireless network
I run behind it a web server, and email server. Along with an internal only DNS server, NTP server, SAMBA file server.
The WLAN only allows access to the VPN, which I use for added wireless security on top of the WEP and MAC filtering.
My astaro box is a Athlon 550 with 384MB RAM and 6GB HD. Connected to a 16Port 10/100 managed swith that is setup with 3 VLANs (external, internal, dmz) and its for net connection is direct to a Linksys WAP11 Access Point.
I use Astaro as my firewall/proxy server for my home network of about 9 machines.
I have 4 NICS in it: External Internal - Wired workstations DMZ - Servers WLAN - wireless network
I run behind it a web server, and email server. Along with an internal only DNS server, NTP server, SAMBA file server.
The WLAN only allows access to the VPN, which I use for added wireless security on top of the WEP and MAC filtering.
My astaro box is a Athlon 550 with 384MB RAM and 6GB HD. Connected to a 16Port 10/100 managed swith that is setup with 3 VLANs (external, internal, dmz) and its for net connection is direct to a Linksys WAP11 Access Point.
ASL 4.002 running as a home gateway with a power license.
previous config (under 3.2) was 3 nics, outside, lan and dmz, but there were problems with trying to get multicast between the lan and dmz, also the hardware only had 3 slots, so a video card was not possible with 3 nics. So I backed off to 2 nics and moved the dmz servers onto the lan. Now I'm up to 4.002, I'm moving *all* the kit that needs to talk multicast to the dmz, and will connect it all up using 2 nics, and some 802.1q vlan tagging, as I've borrowed a cisco 2924XL cat to play with.
Config will therefore move to:
2 nics
eth0 - outside
eth1.154 - lan (internal network -- client workstations etc)
eth1.148 - dmz (web server, ftp server, mail server, other support services)
asl runs on a PII 400 with 128meg, a 6gig eide disk and 2 3c905 nics connected to a cisco 2924xl with 2 vlans, in turn connected to a dsl router.
External Interface DMZ Internal LAN 1 Internal LAN 2
Protecting Web-, Mail- and Outlook Web Access-Server in DMZ, a production LAN with about 20 clients, a test LAN with about 5 clients. Administrative VPN connection to all servers.
ASL is running on a Compaq DL380 and is up without any problems for more than 200 days now [:)]