Use VPN Client or open ports for DMZ to access internal Network?
I've spoken with my management and they want to still use the same username and Password database for the machines (FTP/WEB) in the DMZ so the employees can have access to them from the internal network without having to have a second username and password.
If I put the machines in the internal net and they get hacked, then the hacker gets all the network. If I put them in the DMZ and then allow them to Authenticate with one of the AD machines. I only open up a few ports for one machine. This sounds like it would take more to hack through so the management wants this option.
So the machines in the DMZ need to Authenticate to an AD server on the Inside. So I have two options. I can install a VPN Client on the machine and have it have access to the internal netwotk, or I can open up the ports on the firewall for the specific machines that need to do Authentication.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...