08-25-2009 10:16 AM - edited 03-11-2019 09:09 AM
If you want to manage a transparent firewall that resides in a different VLAN/IP subnet do you just add a route to the transparent firewall back to the managing host?
09-01-2009 02:11 PM
A typical Cisco IOS Firewall is a Layer 3 device with trusted and untrusted interfaces on different IP subnets. A Layer 3 firewall works well with Cisco IOS devices that function as routers with preexisting subnet separations. However, when a Layer 3 firewall is placed in an existing network, the network IP addresses must be reconfigured to accommodate the firewall.
A transparent Cisco IOS firewall acts as a Layer 2 transparent bridge with context-based access control (CBAC) and ACLs configured on the bridged interface. Because the Layer 2 firewall intercepts packets at Layer 2 and is "transparent" to the existing network, Layer 3 firewall limitations are not applicable.
09-02-2009 05:33 AM
Transparent firewall mode on the security appliance allows only two interfaces to pass through traffic. However, you can set up a dedicated management interface, which can be either a physical interface or a subinterface, as a third interface. This interface must be set up for the management-only command. Place this interface into your management VLAN.
Hope that helps.
09-04-2009 01:02 PM
Hello. PTI
Will this scenario support TACACS+ commands? Want to enable report generation in TAACS+ Administration.
09-04-2009 01:05 PM
Yes it should.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide