Static IP Mapping with Fios

Home Forums Networking DSL, Cable, and other Broadband Issues Static IP Mapping with Fios

Viewing 1 post (of 1 total)
  • Author
    Posts

  • jtullous
    Member
    #138103

    What I got is Fios being installed and need to use all 5 of my static IP addresses for Different subnets.

    I need to point one of the static IP to my internal network for day to day operations and does include an array of Ports used.

    But Also need to use the other Static IP to go to different subnets.

    Reason being we stage servers here in house and they cannot talk to each other or they trip out. We do have a make shift thing in place but we lack the ability to work remotely on these systems through port 3389.

    Now I have been told we can do this with Static IP’s and somethign with mapping them. But I do not know what I need in order to do this.

    Fios gave us a Westell Ultralite Series3 Model 9100em router and not sure if this piece of equipment can do what I need it to do.

    Basic out look of this… this is an example.

    ip:111.111.111.1


    go to 192.168.1.x subnet
    ip:222.222.222.2


    go to 192.168.2.x subnet
    ip:333.333.333.3


    go to 192.168.3.x subnet

    and so on.

    Each subnet will be using the same ports also like 3389 for remote Administration and HTTP.

    So if anyone know what I am talking about and looking for and can help me out on this it would be great.

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: