We have a pair of 3750 (collector) swtiches trunked together with a pair of ASA5510 Firewalls connected to them. We want to attach different LAN segments to the Collector switches - which are at different security levels - and so cannot have access to each other through the collectors - but they all require access to the firewalls. We have considered using private vlans on the collectors but we need to be able to route from access switches on each segment to the firewalls. Protected ports on teh Collectors would work if it would span across the trunk - but they don't.
If we use a VACL on teh collector which allows anyone to talk to only the firewalls and the firewalls to talk to anyone would that provide any security beyone using a regular ACL. What are the secuirty risks of using VACL's that the network could be compromised?
Are the 3750's connected to ASA on layer 2 ? I saw that you mentioned that they are trunked together, but just wanted to confirm..
Incase you trunk this, you wouldnt need layer 3 VACL's on the switch, since the collector 3750 is only going to act as Layer 2 , with regards to the end users.. all desktops on the LAN would be having ASA as the default gateway, and ASA would be configured with appropriate NAT, Access-lists etc for it to allow traffic between one segment to another.. Yeah, if there are 10 PCs on the collector, on the same VLAN, they would be able to talk to each other, but inter vlan communication would be blocked unless allowed specifically in ASA...
incase you want to restrict communication on layer 2 betweeen end systems, you might have to look at MAC ACLs.. but really not sure if it is administratively feasible, since it involves lots of information and configuration.
Thank you - yes the collectors would be a L3 switch but with one Vlan. Ideally the Firewall and all the seperated LAN segments would have an interface on that Vlan. But we would not want the seperated LAN segments to be able to route to each other through the collectors - only to the Firewalls.
What is the security risk in using a VACL on the vlan - allowing only traffic from the Firewall out to all segments and all the segements to only talk to the Firewall?
Thanks for the explanation, but what do you mean by "Ideally the Firewall and all the seperated LAN segments would have an interface on that Vlan. " ? Are there more switches connected locally on the 3750 switch ?
In any case all the isolated segments seem to be layer 2 with respect to 3750.. for eg, u can have vlan 10, 20, 30 , 40 etc defined on the 3750 switch.. you have a trunk from 3750 to ASA firewall.. On the ASA firewall, you can configure layer 3 interfaces for vlan 10,20,30,40 as:
vlan 10 - 10.10.10.1/24
vlan 20 - 18.104.22.168/24
vlan 30 - 22.214.171.124/24
vlan 40 - 126.96.36.199/24 (say)
in this case, all traffic does flow through your ASA for access.. and you dont need to have VACLs confgiured on your 3750, since your vlans wouldnt cross each other on the 3750 ..
say you have your scenario altered- where 3750 takes all the VLAN SVI given above (10,20,30,40), and you would then have a seperate L3 between your 3750 and ASA.. in this case, yes, you can have VACLs blocking traffic on the 3750.. VACL is really good , and secure, but it increases a bit of administration...
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...