Thank you dream slacker. Clearly explained and No VLANs!
One thing I am fuzzy on though
why should i set the actiontec LAN IP to 192.168.2.254 and not 192.168.1.254?
It will be the gateway for all the pc's and the server so they will need to see it. And they are ALL on 192.168.1.x and their subnet masks will be 255.255.255.0.
The reason for that is the firewall will be the gateway for the servers/ clients. i.e. They simply need to know that they send their traffic to the firewall and it will handle the rest. That's why the firewall on LAN (facing the clients and server) holds the old gateway IP.
By changing the Actiontec subnet instead, you do not need to manually change the IP settings for your server/ clients. This means less downtime on the server and less work.
I understand that in your explanation you had set the outward facing IP of the firewall to 192.168.2.253 so it had to be on the same subnet as the actiontec. As you said here,
But if the actiontec is 192.168.2.253 and the server(NAS) connected to it is 192.168.1.10, then the server will not be able to find the actiontec. and it won't be on the network. i guess i should just try it and maybe set the subnet mask of the server to 255.255.0.0?
As mentioned before, the server/ clients only need to know how to reach the firewall. The firewall will handle the routing - it simply needs to send all outbound traffic to the Actiontec. Do not set the subnet mask to 255.255.0.0 as this will create overlapping networks and cause problems.
You did say this:
I found where to do this but the concept is confusing. In the actiontec there is an advanced tab which opens a page with several icons, one of which has two entries, routing and IP configuration. Clicking on new route allows me to enter destination, subnet mask, gateway and metric. If I am setting the gateway as 192.168.2.253 and the destination as 192.168.1.0, I am making a route from the LAN side of the HP switch to the outward facing IP of the firewall, this is where I am flummoxed. The packets will leave the LAN with a 192.168.1.x address in their header. They will flow through the netscreen firewall unmolested because of the rule i made. They will hit the actiontec and the static route will send them back to the netscreen?
The static route rule on the Actiontec basically tells it that if it has any traffic bound for the 192.168.1.x IPs, send it to the Netscreen which it can contact at 192.168.2.253. Let the Netscreen handle the traffic from there.
Above all these, you MUST make sure that NAT is turned off on the firewall (Netscreen). Otherwise, this will not work. Also, ensure that the Netscreen is set to route all non-local traffic to 192.168.2.254 (Actiontec LAN).
You might have to manually specify the route as:
Destination: 0.0.0.0 (Subnet containing all known IP addresses), Next hop gateway: 192.168.2.254 subnet mask: 255.255.255.0 metric: 15 (in theory, any number from 1 onwards will do since you only have 1 gateway)
To give you an idea of how this works (a bit of a Wall-of-text here):
Let's say your server is holding the IP: 192.168.1.10.
If it needs to access an internet based server e.g. 8.8.8.8 (Google DNS), it sends the packet out to the gateway it knows and can reach - "LAN" on the Netscreen (192.168.1.254).
The Netscreen looks at it and says "I can't reach 8.8.8.8 on my local interface subnets so I shall forward it to the next-hop gateway @ 192.168.2.254 (Actiontec LAN IP)". The default route is to send all traffic to the next-hop gateway @ 192.168.2.254.
The Actiontec receives this and does an NAT translation to it's WAN IP and sends it out to the WAN gateway (ISP). To the rest of the internet outside your network, it just sees that a request has come out of your WAN IP and bound for 8.8.8.8 through the routing tables out there.
In effect, this is how NAT works and why it is also sometimes called a Masquerade - because the NAT router makes it looks like the traffic comes out of it instead of the clients behind it.
Now, when the requested data comes back to the Actiontec, it knows that the data needs to go to 192.168.1.10. It looks up it's routing table and sees that it can and should reach that IP by forwarding the traffic to 192.168.2.253 (Netscreen "WAN") and does so.
The Netscreen sees that the traffic is bound for a client (the server) on it's "LAN" subnet and accordingly sends that traffic out the interface.
Now, the firewall rule does not trigger because the Actiontec LAN IP is not denied in the rule that blocks 192.168.2.1 - 192.168.2.252 (basically all other clients directly under the Actiontec subnet).