08-09-2004 01:30 PM - edited 03-09-2019 08:22 AM
This is probably a very newbie question, but I can't get my head around this.
I am looking for a way to provide a VLAN that would provide unrestricted access to the internet, but be separate from the rest of my network. The fun part of this is that I control the local router (msfc) and the firewall that's connected to the internet but not everything in between. Can anyone point me to an article/white paper on doing this?
08-11-2004 12:50 PM
I am not recommending this but you could create a vlan on your switch say vlan 999 which has an address range say 10.1.1.0 255.255.255.0. Put access-lists on your MSFC only allowing traffic from vlan 999 to talk to your firewall. You could then have a rule on your firewall saying permit traffic from network 10.1.1.0 255.255.255.0 to the internet with a relevant NAT statement. Then any users that want unrestricted access would have to be connected into VLAN 999 and given an IP address from this network range.
Most of the companies i have worked for don't permit none company owned a equipment on their networks and rightly so, if you wanted to go down this road then maybe look at an adsl line, 837 or 1712 router with firewall feature set, built in four port switch which you could directly patch a guest into. The router can supply DHCP addreses to the guest and they can get onto the internet but NOT using your production network infrastructure.
Rgds
Paddy
08-11-2004 04:35 PM
Paddy, thanks for the reply. Part of the reason I need to do this is to stem the tide of DSL lines being requested. Given the size of our company, the number of lines is out of control, and all the contractors can not be served by one or even a handful... We have the same rules around non-company assets, etc, which is why I am trying to find a secure way to do this. I want these users to be able to get to the Internet, not to anything else. In the solution you propose, would these people be able to get to anything but the firewall? How would I force their traffic to go there? Do you have any config examples?
08-12-2004 05:55 AM
Thinking about it some more, you would have to have access-lists on all of your production VLAN interfaces blocking any traffic from your guest vlan from being routed into your production vlans, as the order of operations on a router is check access-list first and then route so the access list on vlan999 forcing traffic from the guest vlan to the firewall only, would actually prevent any access to the internet.
To give you an example, say you have production VLAN2 10.2.2.0 /24 and guest VLAN3 10.1.1.0 /24, each have a vlan interface on your MSFC. You could configure an access-list on your MSFC to stop any guest traffic from going to/from production LAN. You should also configure an access-list on VLAN3 permiting guests only to use certain protocols e.g. HTTP and HTTPS
access-list 101 deny ip any 10.1.1.0 0.0.0.255
access-list 101 permit ip any any
access-list 102 deny ip 10.1.1.0 0.0.255 any
access-list 102 permit ip any any
and then appy the access-lists to the VLAN
interface VLAN2
access-group 102 in
access-group 101 out
access-list 103 permit tcp 10.1.1.0 0.0.0.255 any eq http
access-list 103 permit tcp 10.1.1.0 0.0.0.255 any eq https
interface VLAN3
access-group 101 out
These examples are assuming you have a default route on your MSFC pointing to your PIX firewall. Any http or https traffic from 10.1.1.0 would be routed to the firewall via your default route. If a guest tried to access VLAN2 then they would be blocked and vice versa.
If you have a proxy server then you could force traffic from vlan999 to only talk to the proxy server via an access-list, but you would have to set up each of your guests to use the proxy server when they want to access the internet.
Its a bit messy, you will also need a DHCP server with DNS servers etc.., depending on the location of your DNS server you may have to allow your guest network access to your production network for DNS queries....unless you use your ISPs DNS???
08-12-2004 12:15 PM
Obviously running non-trusted users on your LAN is not an ideal scenario, but here are 2 possibilities.
1. The above suggestions are close, but I suggest not applying the ACLs in that manner since it will hurt inter-VLAN performance if you apply ACLs on all of your interfaces. You simply need to apply an egress ACL on your new Internet only VLAN similar to the following:
access-list 101 deny ip any 10.0.0.0 0.255.255.255
access-list 101 deny ip any 172.16.0.0 0.240.255.255
access-list 101 deny ip any 192.168.0.0 0.0.255.255
access-list 101 permit ip any any
interface VLAN3
access-group 101 out
As paddy mentioned, be sure to factor in things such as DNS. If you have a DNS server they use, add a permit udp eq dns above the denys. Also, you should add more explicit denys if you use public IPs in your network.
2. If you can get a VLAN to carry across to the PIX and you are running 6.3, you could make the inside interface of the PIX a trunk and give the new VLAN a dedicated virtual interface on the PIX. From there, proceed as normal to allow only outbound traffic. From your initial description I suspect this will not work, but following is a link about VLANs on 6.3 PIXs.
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/config/bafwcfg.htm#wp1140519
-Eric
08-12-2004 02:15 PM
Eric, thanks for the ideas. The problem is, we are using public ip's inside our network. The thought of trying to deny every single subnet in the company is too daunting. I am pursuing another track now. I am thinking that I could build a tunnel from the internet only vlan interface to the PIX. I then would have to source-route all traffic from the internet vlan to go out the MSFC side of the tunnel. This should protect my production network from anyone on this vlan getting to anywhere else in the company.
I was hoping to avoid this, but it looks like my only bet.
08-12-2004 04:24 PM
Interesting idea. Are you running crypto code on the MSFC? If not, how are you planning on building the tunnel? I'd be curious to hear how this works out.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide