[c-nsp] External Firewall

Fred Reimer freimer at ctiusa.com
Mon Mar 24 16:09:04 EDT 2008


So the root question is why a Cisco 7200 router would perform better than a
PC running BSD, beefy as that PC may be?

Without questioning the merits behind spending time on this I'm not sure
what benefit a firewall would provide.  Exactly what are you looking for the
firewall to do?  You wanted to see "how it performs" with the firewall in
various locations.  Doing what?

Sorry I can't be of more help.  I understand what you are trying to find
out, but not what a firewall has to do with it.  You could possibly put a
firewall before and/or after in transparent mode.

Fred Reimer, CISSP, CCNP, CQS-VPN, CQS-ISS
Senior Network Engineer
Coleman Technologies, Inc.
954-298-1697


-----Original Message-----
From: Sridhar Ayengar [mailto:ploopster at gmail.com] 
Sent: Monday, March 24, 2008 3:12 PM
To: Fred Reimer
Cc: Masood Ahmad Shah; Cisco NSPs
Subject: Re: [c-nsp] External Firewall

Fred Reimer wrote:
> Why, exactly?  Performance of the firewall?

Yes.  I have two identical networks setup for one company in two 
different locations.  One has a Cisco router (said 7200) talking 
upstream to a big WAN pipe and downstream to two gigabit ethernet 
networks.  The second location has the same WAN and LAN configuration, 
WAN line distance and quality measurement numbers, etc.  The only 
difference it is a BSD PC.  The Cisco performs noticeably and measurably 
better in latency and throughput.  Neither is running firewall code.

Now, the BSD PC has gobs more processor horsepower, memory- and 
bus-bandwidth.  Why should the Cisco outperform it?

To find out, I wanted to set up a selection of scenarios in the lab. 
(1) I wanted to try setting up the firewall between the "internal" 
gigabit network and the 7200.  (2) I then wanted to setup the firewall 
between the WAN interface and the router to see how that performs.  (3) 
I wanted to setup what I described in my original message, with the 
firewall performing only stateful inspection functions, and allowing the 
router to perform packet switching functions without interference from 
the firewall once the session is operating.

As far as I can see, the advantage of (1) is that traffic heading to the 
"external" gigabit LAN wouldn't come across the firewall PC.  However, 
the disadvantage would be that traffic between the two LANs would have 
to pass through it.  That might be unacceptable.

The advantage of (2) might be that traffic between the "internal" and 
"external" LANs wouldn't come near the firewall PC.  Also, the WAN pipe 
may not require the throughput advantage of the Cisco.  (It may indeed, 
but it might not be as sensitive.)  However, this does add a couple 
dozen ms to the latency of the upstream connection.

As far as I can tell, (3) would be the best of both worlds, but I, for 
the life of me, can't figure out if there's a way to set a network up 
like that.

Any ideas?

Peace...  Sridhar

> -----Original Message-----
> From: cisco-nsp-bounces at puck.nether.net
> [mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Sridhar Ayengar
> Sent: Monday, March 24, 2008 1:31 PM
> To: Masood Ahmad Shah
> Cc: 'Cisco NSPs'
> Subject: Re: [c-nsp] External Firewall
> 
> Masood Ahmad Shah wrote:
>> Normally people would put like show below..
>>
>> WAN-Router<--------->Firewall<------>LAN-Switch
> 
> That's what I was hoping to avoid.
> 
> Peace...  Sridhar
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3080 bytes
Desc: not available
Url : https://puck.nether.net/pipermail/cisco-nsp/attachments/20080324/61a48229/attachment-0001.bin 


More information about the cisco-nsp mailing list