Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements
Webcast-Catalyst9k
New Member

Routing

I have attached a drawing for clarity. 

 

I currently have one firewall that connects my network to he internet with web and VPN access. What I am trying to do is test my web filter to the internet for the a subnet 10.2.254.0/24. I would like the route to the internet for just the 10.2.254.0/24 network to go to 192.168.1.3. For the rest of the network it would continue to use 192.168.1.2.

 

The goal is to only have 10.2.254.0/24 being filtered and sent to the test firewall. Eventually It will be the web firewall but currently I just need to test the web filter. 

 

Can this be done?

1 ACCEPTED SOLUTION

Accepted Solutions

1-write ACL like this#access

1-write ACL like this

#access-list 110 permit ip 10.2.254.0 0.0.0.255 any

2-define route-map like this:

#route-map pol permit 8

-map)#match ip adress 110

-map)#set ip next-hop <firewall address>

#route-map pol permit 10

3- apply defined route-map to inbound interface(interface that is connected to 10.2.254.0/24) of your router:

-if)# ip policy route-map pol

 

 

 

 

 

 

8 REPLIES

Unfortunately your drawing

Unfortunately your drawing does not provide much information.

 

If I understand correctly you want the traffic from on particular subnet to be re-directed to another firewall. My suggestion if possible you can use an WCCP and an ACL on the device (depending on the model of your device) just before the firewall to redirect your traffic.

 

If you can update the diagram, maybe we can be able to assist you better.

 

Thanks,

 

Manny.

 

New Member

The only difference is I am

The only difference is I am using 2 Nexus 7000  as the core router before the ASA 5525 firewalls. 

 

Yes that is correct, just one subnet's (10.2.254.0/24)  0.0.0.0 0.0.0.0 route to 192.168.1.3. The rest of the network would continue to use 0.0.0.0 0.0.0.0 192.168.1.2 as its default route which is currently in the nexus.

 

Sorry for the simplicity. I have been told that I just need to change the 192.168.1.2 to 192.168.1.3 but I do not what it for the rest of the network. 

What is this device between

What is this device between the new firewall and the Core?

 

New Member

Barracuda 410

Barracuda 410

 Check this out and I hope it

The most practical and flexible way is to deploy this using WCCP. On your filtering ACL you only allow that subnet and deny the rest.

Example from the cisco website:

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/15-02SG/configuration/guide/config/wccp.html

 

Switch(config)# ip access-list extended 100
 Switch(config-ext-nacl)# permit ip 10.2.254.0 255.255.255.0 any 
 Switch(config-ext-nacl)# exit
 Switch(config)# ip wccp web-cache redirect-list 100
 Switch(config)# interface xxx {the interface going to the barracuda}
 Switch(config-if)# ip wccp web-cache redirect out

Check this out and I hope it will help:

 

https://techlib.barracuda.com/display/BWFv60/WCCP+Deployment/printable

and

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_2/nx-os/unicast/configuration/guide/l3_cli_nxos/wccp.html

 

let me know if you need further assistance.

 

Thanks,

 

Manny.

New Member

I understand that is how to

I understand that is how to allow only 10.2.254.0/24 traffic out the interface. The issue I have is routing that subnet to another set of firewalls that has the barracuda connected for testing. The default route to 192.168.1.2 has to stay will it is in production. I need to set up the 10.2.254.0/24 to go out to the internet for last resort on 192.168.1.3. This is only for testing to verify that the connection is working and the filter is not blocking other options.

 

I say set because I have them 2 firewalls active/standby.

The example I gave above does

The example I gave above does not affect your current routing. What it will do is that all the traffic that if from the 10.2.254.0/24 subnet will be re-directed via WCCP out the interface that is facing those firewalls. 

 

In practice you need to put the Barracuda before the firewall, and then the external going traffic will be sent by the web-filter [Barracuda] on its external facing interface to the firewalls.

To the best of my knowledge this solution, provided should work just fine for this particular need. The flexibility is that you can add and remove subnets or hosts from your ACL without affecting other traffic whatsoever.

 

Remember it is not about routing the traffic but directing it to the correct place you want it to go.

 

Thanks,

 

Manny.

1-write ACL like this#access

1-write ACL like this

#access-list 110 permit ip 10.2.254.0 0.0.0.255 any

2-define route-map like this:

#route-map pol permit 8

-map)#match ip adress 110

-map)#set ip next-hop <firewall address>

#route-map pol permit 10

3- apply defined route-map to inbound interface(interface that is connected to 10.2.254.0/24) of your router:

-if)# ip policy route-map pol

 

 

 

 

 

 

193
Views
0
Helpful
8
Replies
CreatePlease to create content