05-06-2015 06:42 AM - edited 03-07-2019 11:53 PM
Hi all!
I've got a question about adding a firewall to an existing network infrastructure. More specifically how (or if) you need to change your networks in order to pass traffic outside -> in and inside -> out successfully.
So lets say I have this setup:
I'll then be adding a firewall that has an 'outside' interface of 10.1.0.2 and an Inside interface with 2 virtual interfaces, one on vlan 10 (10.1.10.254) and one on vlan 20 (10.1.20.254).
Here's what I'm thinking I want to do to add the firewall:
Does this flow seem correct? The reason I ask is because I've tried to get this setup with 2 different firewalls (PIX and NetScreen) and for one reason or another I can't seem to get the traffic to flow back out to the internet. The request will come in to the router, get sent to the 'outside' interface of the firewall, but no traffic ever flows back in the form of a reply and the connections keep getting closed due to 0 bytes of reply/syn timeout/etc. I'm thinking I'm misunderstanding where the firewall needs to sit, whether it must be the default gateway of each VLAN, etc.
Thanks for any pointers! I've spent quite some time digging into this to get an understanding of how firewalls work for my lab setup.
Solved! Go to Solution.
05-07-2015 01:41 PM
A firewall should be used to provide segregation between your communities; obviously inside/ outside/ maybe dmz...but do you really need to filter the traffic which could flow between your inside VLANs? If not, then it is perfectly reasonable to position another router (3750 @ L3) behind the firewall to facilitate the inter-VLAN routing.
In this scenario you would place your SVIs on the 3750 and have a single point-to-point uplink to the firewall.
If you wanted to have a separate community on the inside you would configure a second VRF on your switch. This VRF would contain the SVIs for this other community. You would then need a second p-to-p uplink to the firewall, and these VRFs would communicate via the firewall and benefit from the protection it brings.
(see attached diagram).
cheers,
Seb.
Please rate helpful posts :)
05-07-2015 05:35 AM
Hi there,
It sounds like you might be doing too much NAT/ port forwarding.
If your router is configured to do the NAT for your entire internal network, then this is the only place you configure the port-forwarding. The NAT'd destination IP should be the actual 10.1.?.? address of your webserver.
The firewall will then only need ACLs to filter traffic.
Of course if your firewall is providing NAT for your internal VLANs, then yes, the router must forward traffic to the firewalls outside interface where it will be NAT'd again.
cheers,
Seb.
05-07-2015 08:37 AM
Ah ok, this makes sense. I appreciate the reply!
After you posted this I did some more reading and it turns out I was approaching this wrong. It looks like in order to use the firewall in Routing mode it must also be the default gateway for the networks it's servicing -- it isn't enough to just have the firewall have an interface on the pre-existing network VLAN. In order to do that I'd need to put the firewall in Transparent mode, NAT all incoming traffic to the transparent firewall Outside interface, then ACL it from there.
Ideally I'd have my Firewall in Routed mode and create my networks on the firewall itself, however it only has 100Mbps ports which from what I understand would make inter-VLAN routing incredibly slow -- especially if every VLAN is sharing 1 "inside" FastEthernet interface.
I'd like to be able to create my VLANs on my 3750 stack so inter-VLAN routing can utilize the large bandwidth the stack provides however I don't know how/if that'd work at the moment.
05-07-2015 01:41 PM
A firewall should be used to provide segregation between your communities; obviously inside/ outside/ maybe dmz...but do you really need to filter the traffic which could flow between your inside VLANs? If not, then it is perfectly reasonable to position another router (3750 @ L3) behind the firewall to facilitate the inter-VLAN routing.
In this scenario you would place your SVIs on the 3750 and have a single point-to-point uplink to the firewall.
If you wanted to have a separate community on the inside you would configure a second VRF on your switch. This VRF would contain the SVIs for this other community. You would then need a second p-to-p uplink to the firewall, and these VRFs would communicate via the firewall and benefit from the protection it brings.
(see attached diagram).
cheers,
Seb.
Please rate helpful posts :)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide