<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM Configuration - is this a working solution in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679064#M534994</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a quick follow up. If literally everything from the MSFC onwards ie. towards your WAN etc. is untrusted then you could firewall the whole MSFC. I only mention this because i noticed in your first post that you said you didn't want to firewall between the trusted vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only mention it as i don't want to give you bad advice. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Jul 2011 17:14:09 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2011-07-26T17:14:09Z</dc:date>
    <item>
      <title>FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679058#M534984</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I am about to deploy 2 FWSM's in Active/Standby mode into a pair of Cat65 Chassis running VSS &lt;/P&gt;&lt;P&gt;I have considered Transparent mode, however due to some of the limitations, this will not be a feasable scenario for the customer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We run multiple VLANS, however I want to try and avoid configuring all of the VLANS on the FWSM as I do not want traffic from the inside VLANS to another inside VLAN going through the FWSM, I do however want traffic from the inside VLANS to the outside or DMZ VLANS to go via the FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the scenario&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have 2 VLANS that we want to secure from users on the network&lt;/P&gt;&lt;P&gt;We want to add a DMZ interface&lt;/P&gt;&lt;P&gt;We do not want to perform any NAT between any of the networks (how can i disable this compleatly)&lt;/P&gt;&lt;P&gt;I want all internal VLAN's to route localy on the Cat65k and route all traffic to the outside or dmz via a &lt;STRONG&gt;Transit VLAN 40&lt;/STRONG&gt;&amp;nbsp; (Via the FWSM)&lt;/P&gt;&lt;P&gt;I want all external VLAN's to route localy on the Cat65k and route all traffic to inside or dmz interface via a &lt;STRONG&gt;Transit VLAN 110&lt;/STRONG&gt;&amp;nbsp; (Via the FWSM)&lt;/P&gt;&lt;P&gt;I want all dmz VLAN's to route locally on the Cat65k and route all traffic to inside or outside VLANS via a &lt;STRONG&gt;Transit VLAN 210&lt;/STRONG&gt; (Via the FWSM)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say for this example, the outside untrusted VLANS will be 90 and 100, the inside trusted vlans will be 20 and 30, the dmz vlan will be 200&lt;/P&gt;&lt;P&gt;The switch config for this will be for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Inside VLANS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface Vlan20&lt;BR /&gt;description INSIDE VLAN 20&lt;BR /&gt;ip address 10.1.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;description INSIDE VLAN 30&lt;BR /&gt;ip address 10.1.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan40&lt;BR /&gt;&lt;STRONG&gt;description INSIDE TRANSIT VLAN 40&lt;BR /&gt;&lt;/STRONG&gt;ip address 10.1.40.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Outside VLANS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface Vlan90&lt;/P&gt;&lt;P&gt;description OUTSIDE VLAN 90&lt;BR /&gt;ip address 10.1.90.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan100&lt;/P&gt;&lt;P&gt;description OUTSIDE VLAN 100&lt;BR /&gt;ip address 10.1.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan110&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description OUTSIDE TRANSIT VLAN 110&lt;BR /&gt;&lt;/STRONG&gt;ip address 10.1.110.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DMZ VLANS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt;description DMZ VLAN 200&lt;BR /&gt;ip address 10.1.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan210&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description DMZ TRANSIT VLAN 210&lt;/STRONG&gt;&lt;BR /&gt;ip address 10.1.210.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configure some firewall VLAN Groups&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;An Inside Group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;firewall vlan-group 1 40&lt;BR /&gt;firewall module 1 vlan-group 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;An Outside Group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;firewall vlan-group 2 110&lt;/P&gt;&lt;P&gt;firewall module 1 vlan-group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;A DMZ Group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;firewall vlan-group 3 210&lt;/P&gt;&lt;P&gt;firewall module 1 vlan-group 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, Im pretty sure im correct, please let me know if im off track here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I configure some interfaces on the FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 40 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 100&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 10.1.40.2 255.255.255.0&lt;BR /&gt;interface vlan 110&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 10.1.110.2 255.255.255.0&lt;BR /&gt;interface vlan 210&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif dmz&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 10.1.210.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and configure some routes on the FWSM&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;route inside 10.1.20.0 255.255.255.0 10.1.40.1 &lt;STRONG&gt;&amp;lt;switch IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;route inside 10.1.30.0 255.255.255.0 10.1.40.1 &lt;STRONG&gt;&amp;lt;switch IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;route outside 10.1.90.0 255.255.255.0 10.1.110.1 &lt;STRONG&gt;&amp;lt;switch IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;route outside 10.1.100.0 255.255.255.0 10.1.110.1 &lt;STRONG&gt;&amp;lt;switch IP Address&amp;gt;&lt;/STRONG&gt; &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;﻿route dmz 10.1.200.0 255.255.255.0 10.1.210.1 &lt;STRONG&gt;&amp;lt;switch IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;&lt;STRONG&gt;then some routes on the Switch&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;ip route 10.1.20.0 0.0.0.255 10.1.40.2&lt;STRONG&gt;&amp;lt;FWSM INSIDE IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;ip route 10.1.30.0 0.0.0.255 10.1.40.2&lt;STRONG&gt;&amp;lt;FWSM INSIDE IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;ip route 10.1.90.0 0.0.0.255 10.1.110.2&lt;STRONG&gt;&amp;lt;FWSM IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;ip route 10.1.100.0 0.0.0.255 10.1.110.2&lt;STRONG&gt;&amp;lt;FWSM IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;ip route 10.1.200.0 0.0.0.255 10.1.210.2&lt;STRONG&gt;&amp;lt;FWSM DMZ IP Address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;I am hopeing that this is a valid solution, and that someone may have some better ideas, please let me know if I am way off the mark.&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;I know still have to apply ACL's etc, I am mainly concerned about the traffic flow and the routing between the the VLAN both locally and via the FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;Thanks very much in advance for any feedback&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679058#M534984</guid>
      <dc:creator>rrockliff</dc:creator>
      <dc:date>2019-03-11T21:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679059#M534986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't route vlans 90 and 100 (untrusted) on the MSFC and then have them go to the FWSM to get to vlans 20 and 30 because all these vlans are directly connected interfaces on the MSFC so traffic would simply route around the FWSM eg. traffic from a client in vlan 90 would go to the vlan 90 interface on the MSFC and then be routed straight through to the inside vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding routes to the switch pointing to FWSM interfaces will make no difference because all the vlans have directly connected interfaces on the MSFC. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If vlan 90 and 100 are untrusted then they should be firewalled ie. you don't have a L3 vlan interface for these vlans on the MSFC, the L3 interfaces for these vlans would be on the FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this make sense ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 14:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679059#M534986</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-07-26T14:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679060#M534987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon&lt;/P&gt;&lt;P&gt;Makes perfect sense&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can it be achieved buy adding the Inside VLAN's to the inside firewall VLAN Group? (same for the outside and DMZ groups)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;An Inside Group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;firewall vlan-group 1 20,30,40&lt;BR /&gt;firewall module 1 vlan-group 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would these VLANs then switch locally without forcing them through the FWSM ?? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is not an option, should I be concerned about performance considering that this a 10Gb network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or is the only option here to move all of the VLAN interfaces on the FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the quick reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 15:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679060#M534987</guid>
      <dc:creator>rrockliff</dc:creator>
      <dc:date>2011-07-26T15:19:50Z</dc:date>
    </item>
    <item>
      <title>FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679061#M534989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Richard &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 2 ways to deploy the FWSM - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM -&amp;gt; MSFC -&amp;gt; vlans &lt;/P&gt;&lt;P&gt;MSFC -&amp;gt; FWSM -&amp;gt; vlans &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the commonest is the MSFC -&amp;gt; FWSM -&amp;gt; vlans. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at both - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; FWSM -&amp;gt; MSFC -&amp;gt; vlans 20 &amp;amp; 30 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; With the FWSM -&amp;gt; MSFC -&amp;gt; vlans you can route internally between your trusted vlans without having to go through the FWSM ie. you just route on the MSFC but for any vlans on the outside of the FWSM or DMZs on the FWSM they have to go through the FWSM to get to the MSFC. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above setup would mean no traffic restriction between vlans 20 and 30. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However there are caveats to this approach depending on your topology. If you have WAN connectivty to the rest of your network for example and the other parts of your network need access to vlans 20 and 30 you would need to make sure your WAN router connected to the MSFC and not via the FWSM otherwise you have just firewalled your entire network from vlans 20 and 30. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) MSFC -&amp;gt; FWSM -&amp;gt; vlans 90 &amp;amp; 100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and have vlan 90 and 100 behind the FWSM. To get to any other vlans these vlans need to go through the FWSM. This may be a better solution depending on the rest of your network topology. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again no traffic restrictions between vlans 20 &amp;amp; 30. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So with either solution you do not need to firewall all vlans just your untrusted ones. Which of the above to use depends on the rest of your setup ie. where your WAN links and other switches etc. are placed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 15:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679061#M534989</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-07-26T15:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679062#M534990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Again, Thanks Jon, this all makes sense. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topology is like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN Links sit on the Untrusted Network&lt;/P&gt;&lt;P&gt;Switches sit on the Trusted Network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So from what I am understanding from your reply's, the configuration should be like this&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configured on the MSFC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Outside Untrusted VLANS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface Vlan90&lt;/P&gt;&lt;P&gt;description OUTSIDE VLAN 90&lt;BR /&gt;ip address 10.1.90.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan100&lt;/P&gt;&lt;P&gt;description OUTSIDE VLAN 100&lt;BR /&gt;ip address 10.1.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;An Inside Group for L# interfaces on the FWSM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;firewall vlan-group 1 20,30&lt;BR /&gt;firewall module 1 vlan-group 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configured on the FWSM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Inside VLANS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface vlan 20 &lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.1.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 30 &lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think im still missing a point here, how do the untrusted VLANS route to the trusted VLANS, I assume we still need to create an outside interface on the FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your patience&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 16:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679062#M534990</guid>
      <dc:creator>rrockliff</dc:creator>
      <dc:date>2011-07-26T16:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679063#M534991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you need a dedicated vlan that connects the MSFC to the FWSM. So this vlan eg. vlan 50 would be created at L2 on the 6500 and then you create a L3 SVI for it as well ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int vlan 50&lt;/P&gt;&lt;P&gt;ip address 192.168.5.1 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then you also create the outside interface on the FWSM and give it an IP address of 192.168.5.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then you would simply add routes to the 6500 eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route &lt;VLAN 20="" subnet=""&gt; &lt;SUBNET-MASK&gt; 192.168.5.2 &lt;/SUBNET-MASK&gt;&lt;/VLAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for each vlan you are firewalling. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the setup you are proposing in your last post it is important to realise a couple of things - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) this will only protect vlans 20 and 30. If you have other vlans on the MSFC these will be accessible from the untrusted networks via the MSFC. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) you are limiting the throughput between vlans 20 and 30 because to communicate they have to go through the FWSM. I say limit but the FWSM does support up to 5Gbps throughput if i remember correctly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is going to be a problem you could flip the design and not firewall vlans 20 and 30 and instead firewall the whole MSFC with the FWSM as described in previous post but i think the design you propose is more suited to your setup. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other thing. I have used static routes above because you only have 2 vlans but you can run a dynamic routing protocol between the FWSM and MSFC if you want to exchange routes for vlans 20 &amp;amp; 30. But if it is only 2 vlans then statics should be fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously, using the example above, you would also need a default-route on the FWSM ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.5.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 16:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679063#M534991</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-07-26T16:47:25Z</dc:date>
    </item>
    <item>
      <title>FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679064#M534994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a quick follow up. If literally everything from the MSFC onwards ie. towards your WAN etc. is untrusted then you could firewall the whole MSFC. I only mention this because i noticed in your first post that you said you didn't want to firewall between the trusted vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only mention it as i don't want to give you bad advice. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 17:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679064#M534994</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-07-26T17:14:09Z</dc:date>
    </item>
    <item>
      <title>FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679065#M534996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi John, Its all comming togeather now and making much more sense &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not really important that the untrusted networks can talk to each other without being switched via the FWSM, but more critical that they must go via the FWSM to talk to the rusted networks (all up we are only looking at 4 trusted networks, plus a DMZ interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefor, from the discussion above and the great input that you have provided, my topology will look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Untrusted VLAN 90,100 etc &amp;gt; MSFC &amp;gt; FWSM&amp;nbsp; &amp;gt; Trusted VLAN 20,30 etc&lt;/P&gt;&lt;P&gt;Untrusted VLAN 90,100 etc &amp;gt; MSFC &amp;gt; FWSM &amp;gt; DMZ VLAN200 etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The untrusted VLANS are just plain old L3 Interfaces configured on the MSFC that will talk to each other via the Drirecly Connected Routes and talk to the Trusted VLANS via a static route. ie&lt;/P&gt;&lt;P&gt;ip route &lt;TRUSTED net="" ip=""&gt; &lt;MASK&gt; &amp;lt; FWSM OutsideIP &amp;gt;&lt;/MASK&gt;&lt;/TRUSTED&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The trusted VLANS are L3 interfaces configured on the FWSM that are treated as usual Firewall interfaces (same as a physical ASA/PIX and have a default route to the MSFC. ie&lt;BR /&gt;(route outside 0.0.0.0 0.0.0.0 &lt;MSFC&gt;&lt;/MSFC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Awesome information, thank you so much&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 23:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679065#M534996</guid>
      <dc:creator>rrockliff</dc:creator>
      <dc:date>2011-07-26T23:28:05Z</dc:date>
    </item>
    <item>
      <title>FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679066#M534998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Richard &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear it's making sense and happy to have helped. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck with the implementation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 00:21:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679066#M534998</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-07-27T00:21:20Z</dc:date>
    </item>
    <item>
      <title>FWSM Configuration - is this a working solution</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679067#M535000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, thank you verry much for clearing this up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another question regarding failover&lt;/P&gt;&lt;P&gt;As reccomended, I should create a VLAN for the Failover Link and a VLAN for the State Link. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a VSS I have made the assumption that these VLANs are created on the actual switch, no in the VSS instance. &lt;/P&gt;&lt;P&gt;And do these VLANs need an ip address on the FWSM, The documenation is not too clear on this point&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 05:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-configuration-is-this-a-working-solution/m-p/1679067#M535000</guid>
      <dc:creator>sctasmania</dc:creator>
      <dc:date>2011-07-27T05:21:28Z</dc:date>
    </item>
  </channel>
</rss>

