cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1767
Views
4
Helpful
11
Replies

EIGRP through firewall

Russell Starr
Level 1
Level 1

I hope I got the right forum/topic here. I have something I need to work around. I have two Cisco routers divided by an OpenBSD firewall. The two routers will need to speak EIGRP.

I was told this can be performed with a tunnel. I tried researching the possible solution, but I could not find an answer.

I understand EIGRP uses multicast for communication. Is this a matter of forwarding ports, tunneling multicast traffic, or what?

Here is a simplified/relevant network diagram.

(Cisco A)-----(OpenBSD/pf)-----(Cisco B)

Fairly easy concept... Cisco A and Cisco B need to become EIGRP neighbors and exchange routes.

Can someone please point me in the right direction?

I know I will get suggestions to remove the firewall, but thats not my choice.

Respectively,

Russ Starr

11 Replies 11

Harold Ritter
Cisco Employee
Cisco Employee

A coupls of things to consider:

- Running Eigrp through a Tunnel is creating a major breach in your FW.

- Eigrp uses multicast by default but can be configured to use unicast with the neighbor statement.

- Eigrp could be configured to run through the FW if configured with the neighbor statement but this is a hack and is not at all recommended.

- The best way to carry dynamic routing updates through a FW is to use BGP. BGP is TCP based and doesn't need to be directly connected to its peer. You could then redistribute in Eigrp on router A and B.

This is the recommended approach and we have tons of customers doing that.

Hope this helps,

Harold Ritter
Sr Technical Leader
CCIE 4168 (R&S, SP)
harold@cisco.com
México móvil: +52 1 55 8312 4915
Cisco México
Paseo de la Reforma 222
Piso 19
Cuauhtémoc, Juárez
Ciudad de México, 06600
México

Hi hritter,

The BGP option sounds nice.

But, I have a question about the eigrp method you suggested..

As much as I know, EIGRP hellos are sent out with a TTL of 2 which means it can't traverse another Layer3 IP capable device.

Is it tested and proved to work that EIGRP packet's TTL is increased when the neighbor command is used ?

Thanks in advance !

Arav

I have curious question. Why do you have a firewall between the two routers. Are you blocking one department from another department?

If I could understand the reason behind the network design, other alternatives could be suggested.

Thanks

Thanks everyone for the responses.

Using BGP will probably be our best bet. They are separated by a firewall because it is another company. We just need to control what traffic can go through. We use one of their servers for a special application. This is just one of those things that has been implemented before I got here.

I'd like to just throw on another ethernet interface on each router and I can control traffic through access lists.

In reality, that's probably what I'll end up doing. I asked after I had posted this originally, but it is now my choice to use the firewall. I don't think it is worth the extra configuration and trouble to have it there... especially since it doesn't speak EIGRP. The only thing I have to worry about is filtering packets. That means I'll have to sit down with a packet sniffer and the other company and establish what ports and protocols need to be allowed.

Thanks everyone for getting me on the right track. I'm still open to suggestions though.

A TTL of 2 is sufficient for packets to traverse the FW and get to the router on the other side..

TTL is equal to 2 for EIGRP packets whether you use a multicast (224.0.0.10) or unicast address.

But as I stated before, don't even think about it ;o)

Harold Ritter
Sr Technical Leader
CCIE 4168 (R&S, SP)
harold@cisco.com
México móvil: +52 1 55 8312 4915
Cisco México
Paseo de la Reforma 222
Piso 19
Cuauhtémoc, Juárez
Ciudad de México, 06600
México

I'll give you a very specific reason not to think about it... :-) You should never use an IGP to trade live routing information with a network outside your control. It doesn't matter if you have a firewall in the middle or not. Don't use EIGRP to trade routing information with a network outside your administrative control.

The place where we actually tell people to use EIGRP across a firewall is just to get a default route across, so you can tell liveness using the protocol you're already using. You could also advertise your public space out, for the same reason.

:-)

Russ.W

A TTL of 2 is sufficient for packets to traverse the FW and get to the router on the other side..

TTL is equal to 2 for EIGRP packets whether you use a multicast (224.0.0.10) or unicast address.

But as I stated before, don't even think about it ;o)

Harold Ritter
Sr Technical Leader
CCIE 4168 (R&S, SP)
harold@cisco.com
México móvil: +52 1 55 8312 4915
Cisco México
Paseo de la Reforma 222
Piso 19
Cuauhtémoc, Juárez
Ciudad de México, 06600
México

Thanks for the update to the scenario. My vote is static routes. I trust no one and would not want to have to rely on another company.

Static would be great but we have redundant paths to this other company. So we really have to portions of our network that look like this.

I don't think I can do auto failover without a routing protocol. Floating static routes really won't work because it doesn't know if a route is "bad" since it's routing it through another router.

Russ

There is a fairly new feature in IOS which may help you with this. It is called Object Tracking and can be used to determine whether remote objects (like remote IP addresses) are reachable. With Object Tracking you can tie a static route to the reachability of a remote address and as long as the address is reachable the static route is valid and if the address becomes unreachable the static route is withdrawn. This link has information that can help get you started:

http://www.cisco.com/en/US/products/sw/iosswrel/ps5413/products_feature_guide09186a00801d862d.html

HTH

Rick

HTH

Rick

Yes--as long as the pings will go through the firewall, and the icmp replies will come back, and you're willing to accept the timers you can get that way, etc. There's are ups and downs to each technique--using object tracking with pings, using EIGRP, using BGP, etc.

:-)

Russ.W

Review Cisco Networking for a $25 gift card