04-15-2021 02:57 AM - edited 04-22-2021 07:09 AM
Hello,
I am newbie, i replaced 2 switches with vlan33 protected by FW with 4 cisco 2x sg350x and 2x SX350X in Hybrid stack. The stack is now accessible from vlan1 and vlan33. Removing FW I have to filter accesses in http https from vlan1 to vlan33. how can i do it, i tried but i lock everything or cmq accessible
04-15-2021 03:04 AM
Removing FW I have to filter accesses in http https from vlan1 to vlan33
You are removing FW or you need FW rule to access VLAN 1and VLAN 33 to access devices ? can you clarify ?
what FW is this ?
explain what you have tried - where ?
04-15-2021 04:14 AM
before putting SG350X, SX350X in Hybrid Stack online I had 2 Dell 1052 switches with the same VLANs. Access to VLAN 33 (management) was managed by the policies on the PFSENSE firewall which had 2 network interfaces, one pointing to LAN (VLAN1, 192.168.0.254) other MANAGEMENT (VLAN33, 192.168.33.254). The policy allowed access for example from 192.168.0.40 to all MANAGEMENT (192.168.33.0). The stack has the same IPs, I would like to do the same thing. Allow access to VLAN33 only to certain IPs, for example 192.168.0.40. Now everyone can see http / https: //192.168.0.254 or 192.168.33.254.
04-15-2021 05:22 AM
Where you want to do this on switches ? or FW ?
04-15-2021 05:45 AM
Firewall (it was ONLY for access management between LAN and MANAGEMENT and navigation of the devices) and now I no longer have that VM, in addition to not changing the configuration of the infrastructure (gw, etc) to the switch I gave the same IPs.
04-15-2021 06:22 AM
Firewall you mean PFSENSE ? Do you have any smalll network diagram show how it is connected to suggest better.
04-15-2021 07:09 AM
04-22-2021 08:18 AM
Hi Balaji
something comes to mind as a solution ?
Tomasz
04-22-2021 09:05 AM
I may have missed this thread due to many in my list to address.
If both VLAN Gateway point to PFSENSE
you need ti build a FW to block rquired services not to talk each other
below guide can help you :
https://nguvu.org/pfsense/pfsense-baseline-setup/#firewall%20rules
04-22-2021 09:15 AM
i know .. i no longer have pfsense, its work i would like to do at cisco stack. then allow access to the page "https://192.168.0.254/cs4005acaf/mts/config/log_off_page.htm" only some IPs on the LAN (vlan1) and block access to VLAN33 (Management) "https://192.168.33.254/ cs4005acaf / mts / config / log_off_page.htm "
04-22-2021 09:56 AM
May be i missed you mean in the picture after migration you no Longer have PFSENSE you like to do the ACL in SG 550 Switches ( is this switches hold your Layer 3 VLAN now ?)
05-07-2021 03:33 AM - edited 05-07-2021 06:32 AM
Hello BB,
you don't miss the pfsense firewall, it's no longer in the current configuration. firewall managed ONLY accesses in HTTP / HTTPS from 192.168.0.0/24 (VLAN1) to 192.168.33.0 VLAN 33 for device checks and maintenance. The same job now I would like to do at the cisco stack. i saw video guide where it explains how to block all flow between 2 vlan. I would like to block only http and https do you have a specific guide?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide