02-05-2018 06:15 PM - edited 03-03-2019 08:43 AM
Hello Guys,
I have a design question. I'm using a Cisco ASR1K as my Internet facing DMVPN Hub router. I know I should place a firewall in front of it. But why not just use built-in ACL to open necessary ports (i.e. UDP 500, 4500 and ESP) on the port? My ACL is also controlling from which public IPs traffic can come in.
Would it be sufficient? If not, what's the justification for placing a more advanced firewall? Any thoughts are welcome!
02-08-2018 05:27 AM
Any comments, thanks in advance!
02-08-2018 08:50 AM
02-08-2018 06:51 PM
I totally agree and on the same page as you, i already used fVRF for Hub and Spoke Internet connections since they are just being used as underlay network. We have policy that all spokes traffic need to be centralized, which means Hub is pushing a default route to all spokes. That's why I feel it's making more sense to add Firewall after VPN Hub router and before they enter my datacenter core layer.
As always, i appreciate your input but i'm open to hear any other opinions!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide