cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1269
Views
2
Helpful
5
Replies

FTD

KayaaKashyap
Level 1
Level 1

Hi,

what are the common/global/prerequisite ACLs should apply in greenfield project for DC network? where FTD is perimeter device for DC.

 

5 Replies 5

Ruben Cocheno
Spotlight
Spotlight

@KayaaKashyap 

If you are introducing a new perimeter at the DC without a rule set given, so probably i would enable permit any-any all protocols between the zones that you creating and use performance over security. And create a ruleset from the logs, and/or as requested per the client. Note: This will take a lots of time, depending on how chatty the server farm is locally (inter-zone) and to outside of the DC.

Tag me to follow up.
Please mark it as Helpful and/or Solution Accepted if that is the case. Thanks for making Engineering easy again.
Connect with me for more on Linkedin https://www.linkedin.com/in/rubencocheno/

The FW in DC can have role depend on direction of traffic is it from east to west or from north to south.

It can be in router  mode or transparent mode.

So we can not know excatly what ypu should allow.

MHM

Traffic is north south

Firewall is in router mode

My take on this would be none : - D in the sense that before we get to the implementation and configuration stage we would have gone through all the workshops and generated an LLD for that piece of work. Deploying edge or core firewalls in a DC implies a lot of works that need to be though about in advance, because the DC will have corporate services, will most likely be connected to other sites for data replication, it would have site-to-site VPN tunnels, remote access VPN, would be connected to an MPLS circuit and so on. Same applies to a greenfield site or a brownfield site, the concept and design behind it won't change much. In addition to that, you might have the inter-VLAN routing configured on those firewalls, in that case you would also need to design ahead of time how the inter-VLAN traffic should be dealt with.

Marvin Rhoads
Hall of Fame
Hall of Fame

I agree with @Aref Alsouqi and @Ruben Cocheno .

Start with none and then analyze logs (firewall logs or, even better, something like Secure Network Analytics or Secure Workload). Present the high level analysis to the respective system owners and have them validate the traffic seen is what is expected and then lock down the rules to allow only observed and validated traffic.

Review Cisco Networking for a $25 gift card