02-22-2008 03:00 PM - edited 03-05-2019 09:19 PM
I have researched this quite a bit and am not able to find the right answer. I know other people are doing this but I might be over thinking it. Please look at my diagram. I am trying to extend a not so safe network across my Qwest MoE out to the internet with their own firewall and internet connection while keeping their traffic away from the corporate traffic.
I originally thought about extending the VLAN but I don't believe that you can or should extend them across routers or layer 3. My QMoE is essentially transparent at this point and will accept trunking if I wanted to do that though. I have several QMoE sites and am told that all traffic will traverse all sites however and that I shouldn't do that. Qwest offers their EVC solution which would set up a point to point link across their QMoE that would probably work but it comes at a cost.
Is there a way I could tunnel the dev traffic across the network or is that not the correct road to go down?
How do other people separate traffic and allow it to traverse private networks separated by routers?
Thanks for your help.
Solved! Go to Solution.
02-25-2008 04:39 PM
If you don't permit the developer network egress except to the Internet nor allow inbound developer Internet traffic anywhere but to the developer network (i.e. both blocked by ACLs), I believe the risk is very low, just mixing traffic across an L3 transit. Realize, unless you have completely separate network infrastructures, you're already mixing traffic on the same device with VLANs and on the router connected to the two different firewalls. I.e. there's some risk to doing that, but again with proper network device security, generally very low.
02-22-2008 06:08 PM
If your concern is directing the outbound traffic to the correct firewall, this could be done via policy based routing on the router with the firewall links. Inbound, route normally to the destination.
Do you have a concern about mixing traffic on a L3 transit link?
02-25-2008 08:25 AM
Yes, the mixing of the traffic is my concern? Do I not need to be concerned about it or will the policy based routing be secure enough?
For instance, if their network was compromised by a virus or hacker, I need to make sure they are not able to access the corporate network.
Thanks!
02-25-2008 04:39 PM
If you don't permit the developer network egress except to the Internet nor allow inbound developer Internet traffic anywhere but to the developer network (i.e. both blocked by ACLs), I believe the risk is very low, just mixing traffic across an L3 transit. Realize, unless you have completely separate network infrastructures, you're already mixing traffic on the same device with VLANs and on the router connected to the two different firewalls. I.e. there's some risk to doing that, but again with proper network device security, generally very low.
02-26-2008 02:12 PM
I guess that would seem like a viable solution then and I will try to implement it. As for routing back into the the dev network, would I have to place routing policies on the opposite interface of the routing out policy?
Thanks!
02-26-2008 04:45 PM
Shouldn't need policies inbound, just ACLs to control where the packets are allowed.
E.g. inbound traffic from the dev firewall should only have a dev destination address. If not, drop it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide