<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-help/m-p/1730064#M562738</link>
    <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I am new to using a FWSM.&amp;nbsp; I am familiar with the PIX and ASA's.&amp;nbsp; We have two Cisco 6509's with a FWSM installed in both.&amp;nbsp; Our network is shown in the diagram.&amp;nbsp; We use Blue Coat Packetshapers and Barracuda Proxy appliances.&amp;nbsp; I plan on setting up HSRP on both 6509's for traffic coming from our ISP Cisco 2811's as well as use HSRP for our DMZ and internal network.&amp;nbsp; I would like to setup the firewalls for statefull failover.&amp;nbsp; We will be using PAT for our internal users and one-to-one static NAT for our DMZ.&amp;nbsp; Here are my questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it better to setup the firewall's as transparent or routed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the firewall is built into the switch, how do I insert the Barracuda proxies?&lt;/P&gt;&lt;P&gt;&amp;nbsp; I can configure them as transparent or routed proxies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 20:31:33 GMT</pubDate>
    <dc:creator>gdrandles</dc:creator>
    <dc:date>2019-03-11T20:31:33Z</dc:date>
    <item>
      <title>FWSM Help</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-help/m-p/1730064#M562738</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I am new to using a FWSM.&amp;nbsp; I am familiar with the PIX and ASA's.&amp;nbsp; We have two Cisco 6509's with a FWSM installed in both.&amp;nbsp; Our network is shown in the diagram.&amp;nbsp; We use Blue Coat Packetshapers and Barracuda Proxy appliances.&amp;nbsp; I plan on setting up HSRP on both 6509's for traffic coming from our ISP Cisco 2811's as well as use HSRP for our DMZ and internal network.&amp;nbsp; I would like to setup the firewalls for statefull failover.&amp;nbsp; We will be using PAT for our internal users and one-to-one static NAT for our DMZ.&amp;nbsp; Here are my questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it better to setup the firewall's as transparent or routed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the firewall is built into the switch, how do I insert the Barracuda proxies?&lt;/P&gt;&lt;P&gt;&amp;nbsp; I can configure them as transparent or routed proxies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-help/m-p/1730064#M562738</guid>
      <dc:creator>gdrandles</dc:creator>
      <dc:date>2019-03-11T20:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Help</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-help/m-p/1730065#M562739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking at the diagram, it's not really clear how the Barracuda proxies are put in place. It looks like the packetshapers are already bridging in-line. Do you want the FWSMS to also be bridging between the same two L3 hops?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your diagram, the FWSM could easily be the default gateway for your 10.1.1.0/25 and 10.1.2.0/25 networks. Both configurations could work, but I think it is generally easier to troubleshoot L3 adjacencies than L2. Then again, changing around your routing topology can be more of a burden.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regardless which setup you choose, I would avoid any situation which places your hosts on a subnet with more than one gateway/router. For example, do NOT do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router (.254) --- hosts (.2-.253) --- FWSM (.1)&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;RouterA (.254) --- hosts (.2-.253) --- vlan10--FWSM--vlan20 --- RouterB (.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetric routing with the FWSM will break the stateful inspections and cause your traffic to fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 May 2011 22:36:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-help/m-p/1730065#M562739</guid>
      <dc:creator>brquinn</dc:creator>
      <dc:date>2011-05-10T22:36:10Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Help</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-help/m-p/1730066#M562741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brenden,&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; The Barracuda proxies have not been connected to the network because I am unclear where or how to attach them.&amp;nbsp; This network is also being built and currently has no users so I can configure whatever is needed.&amp;nbsp; In the past when I used an ASA it was easy to connect a proxy between the ASA and the inside router.&amp;nbsp; The inside router would then be the gateway for the users.&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;Users --&amp;gt; GW --&amp;gt; Proxy --&amp;gt; ASA --&amp;gt; BC Packetshaper --&amp;gt; ISP&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;Because the FWSM is not a physically seperate device, I do not understand how to setup the same logical topology or data flow.&amp;nbsp; I was thinking I create VLAN 100 and connect the LAN side of the proxy.&amp;nbsp; Point the default route to the LAN IP of the proxy.&amp;nbsp; Create VLAN 101 and FW vlan-group 1 101 and assign this the nameif "inside".&amp;nbsp; Point the WAN side of the proxy to the VLAN 101 IP as the default route.&amp;nbsp; I would then have to figure out how to setup HSRP on the outside to connect the "outside" FW VLAN to the ISP.&amp;nbsp; I would rather place the Proxy in transparent mode and not require it to do any routing.&amp;nbsp; Any help is appreciated.&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 May 2011 23:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-help/m-p/1730066#M562741</guid>
      <dc:creator>gdrandles</dc:creator>
      <dc:date>2011-05-10T23:37:05Z</dc:date>
    </item>
  </channel>
</rss>

