Difference between revisions of "DangerZone Network"
(→Internet) |
|||
Line 16: | Line 16: | ||
The adapter named <tt>eth-pub</tt> has a direct connection to the top-level switch at SkullSpace, and has been assigned the IP <tt>206.220.196.62</tt>. | The adapter named <tt>eth-pub</tt> has a direct connection to the top-level switch at SkullSpace, and has been assigned the IP <tt>206.220.196.62</tt>. | ||
+ | |||
+ | Only three services are exposed to the Internet: | ||
+ | |||
+ | # SSH | ||
+ | # VPN | ||
+ | # HTTP | ||
+ | |||
+ | All other incoming traffic is blocked. | ||
==VMs== | ==VMs== |
Revision as of 22:27, 22 May 2013
Contents
Overview
This article explains the layout of the networks in the DangerZone from the perspective of the gateway.
Wifi Public switch NICs on box vmserver gateway
Networks
There are four different networks that the gateway has to deal with.
Internet
The adapter named eth-pub has a direct connection to the top-level switch at SkullSpace, and has been assigned the IP 206.220.196.62.
Only three services are exposed to the Internet:
- SSH
- VPN
- HTTP
All other incoming traffic is blocked.
VMs
The VMs exist in the 10.255.0.0/16 subnet, with 10.255.0.1 assigned to the eth-vms adapter. All IP addresses in this range are statically assigned
VPN
When a user wishes to access the DangerZone from the Internet, the web interface must be used to generate an OpenVPN certificate. VPN users are statically assigned addresses in the 10.1.0.0/16 range. The adapter tun0 has been assigned the IP 10.1.0.1.
Wifi