• February 28, 2025, 02:13:49 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: NIC configuration  (Read 7431 times)

rarewolf

  • Level 1 Member
  • *
  • Posts: 13
NIC configuration
« on: June 06, 2010, 05:18:21 AM »

I'm seriously considering this storage for a university lab environment.  However, ideally it would have 2 NICs:

(1)  1000mb/s connection to computer that acquires the data, but which cannot be on the university network.
(2)  100mb/s connection to the university network, configured for secure and privileged users.

It just occurred to me that a router my suit these requirements(?)  Please advise ...

TIA  :)
Logged

jamieburchell

  • Level 6 Member
  • *
  • Posts: 947
Re: NIC configuration
« Reply #1 on: June 06, 2010, 01:49:23 PM »

I'm seriously considering this storage for a university lab environment.  However, ideally it would have 2 NICs:

(1)  1000mb/s connection to computer that acquires the data, but which cannot be on the university network.
(2)  100mb/s connection to the university network, configured for secure and privileged users.

It just occurred to me that a router my suit these requirements(?)  Please advise ...

TIA  :)

Could you plug the PC and NAS in to a gigabit switch, connected to your uni network and deny access to the PC with firewall rules?
Logged
If your little 323 is not working right,
You've racked your brains and been up all night
Take a deep breath and wipe away the sweat,
Login as web admin and try a factory reset!

rarewolf

  • Level 1 Member
  • *
  • Posts: 13
Re: NIC configuration
« Reply #2 on: June 06, 2010, 02:55:20 PM »

Could you plug the PC and NAS in to a gigabit switch, connected to your uni network and deny access to the PC with firewall rules?

Sounds similar to a router remedy ... sorry to be such a noob ... could you point me at an example of a "gigabyte switch"?
Logged

gunrunnerjohn

  • Level 11 Member
  • *
  • Posts: 2717
Logged
Microsoft MVP - Windows Desktop Experience
Remember: Data you don't have two copies of is data you don't care about!
PS: RAID of any level is NOT a second copy.

rarewolf

  • Level 1 Member
  • *
  • Posts: 13
Re: NIC configuration
« Reply #4 on: June 07, 2010, 02:42:27 AM »

Here's a whole bunch of them.

Thanx  :)

Another noob-y question ... of the 7 of them that are actually switchs, what does it mean that their "network management" is either managed or unmanaged, and why does "managed" increase the cost by $1000?

TIA  :)
Logged

fordem

  • Level 10 Member
  • *****
  • Posts: 2168
Re: NIC configuration
« Reply #5 on: June 07, 2010, 05:07:08 AM »

An unmanaged switch will just provide the basic switch functionality.

A managed switch has the ability to monitor a number of network usage parameters and report these to a management station which can then alert you to potential problems, hopefully before they become full blown network failures.

Most managed switches will also have additional features that allow for redundant links (LAG/Trunking/STP), added security (VLAN/802.1x), etc.

Managed switches are more expensive than an unmanaged switches because they must have the "intelligence" required to perform the management tasks.
Logged
RAID1 is for disk redundancy - NOT data backup - don't confuse the two.

gunrunnerjohn

  • Level 11 Member
  • *
  • Posts: 2717
Re: NIC configuration
« Reply #6 on: June 07, 2010, 05:21:23 AM »

Very few home users will have any use for managed switches or can justify the expense.
Logged
Microsoft MVP - Windows Desktop Experience
Remember: Data you don't have two copies of is data you don't care about!
PS: RAID of any level is NOT a second copy.

dosborne

  • Level 5 Member
  • *****
  • Posts: 598
Re: NIC configuration
« Reply #7 on: June 07, 2010, 10:16:43 AM »

Often, a second router is a cheaper solution. I run 3 routers and 2 unmanaged gigabit switches on my home setup.
Logged
3 x DNS-323 with 2 x 2TB WD Drives each for a total of 12 TB Storage and Backup. Running DLink Firmware v1.08 and Fonz Fun Plug (FFP) v0.5 for improved software support.

OlegMZ

  • Level 2 Member
  • **
  • Posts: 50
Re: NIC configuration
« Reply #8 on: June 07, 2010, 12:07:11 PM »

I'm seriously considering this storage for a university lab environment.  However, ideally it would have 2 NICs:

(1)  1000mb/s connection to computer that acquires the data, but which cannot be on the university network.
(2)  100mb/s connection to the university network, configured for secure and privileged users.

It just occurred to me that a router my suit these requirements(?)  Please advise ...

TIA  :)

2 NIC host between secure and insecure network segments is not a good idea...unless it is firewall  :)

All guest hosts should be placed into separate "guest" network which should be separated from secured network with firewall. Connectivity between segments should be tightly controlled on firewall by opening necessary ports  to specified segments or hosts. Ideally there should be dedicated DMZ subnet to which firewall will control access from both secured and unsecured segments and hosts on the DMZ should have no or very limited access to other networks. Idea is - if someone breaks into host on DMZ (say your web server) it will not be able to access anything else from it.

If you want cheap solution the easiest (but not the most secure) is to take some 1G capable LAN/WAN router like Dlink DIR-655. You do not need wireless, so if it is possible to find some consumer grade inexpensove wired-only 1Gb router with built-in firewall capabilities - it is fine. Otherwise just disable wi-fi right away.

Common idea is to treat your insecure PC and your NAS as internal home LAN and treat your university network as external WAN network (ISP connection).

Now you connect this router with its WAN port to your internal secured network, and assign a static IP from that network to this (WAN) port, including mask and default gateway.
Make sure that internal (LAN) address space of your router is not overlapped with "WAN" (university) subnet.

Next step is to plug your NAS and "insecure" PC to LAN ports of your router and (preferably) configure NAS IP as static. Since that moment all PCs on your router LAN will be able to communicate to NAS and TO ALL YOUR SECURED NETWORK (a bit of a problem here!!!) as the router will be NAT-ing they packets to its WAN IP.

Now all you need to do to allow devices on your university network to access NAS is to create static NAT translations from your university network back to IP of your NAS box as you would if you planned to access your FTP or HTTP server on NAS at home from the internet.

All devices on university network will see the router and NAS as one of hosts on internal network, so there is no problems with routing.

But there are problems with security, because instead of protecting secured network from insecure PCs you in fact protect them from hosts on university network. You could fix this if the router was able to set some kind of incoming access-list on its LAN interface (in LAN to WAN direction).
BTW what PROBABLY might work is if you create static NAT rule to fully translate your router public (WAN) IP to NAS IP (not port by port but full IP), although I do not know if it will let you do so.

You could "rotate" the router, setup it in opposite direction and use 1G switch for NAS and PC, but there will be some routing problems in this case.

Anyway security in this case is another problem and you'd better consult with university network admins before doing anything. Normally rogue devices are not allowed as may introduce security breach  :)


 



Logged

rarewolf

  • Level 1 Member
  • *
  • Posts: 13
Re: NIC configuration
« Reply #9 on: June 07, 2010, 02:15:57 PM »

Thank you OlegMZ!!   ;D
Logged