[c-nsp] Cisco noob -- design guidance request
C. Jon Larsen
jlarsen at richweb.com
Tue Sep 4 19:19:24 EDT 2007
>> Where is the access list that is going to prevent cross talk between the
>> subnets ? Otherwise rogueware on one tenants computer will attack the
>> other tenants. Simply splitting each tenant onto its own vlan is ncie but
>> its a far cry from secure if you tie the subnets into a router that is
>> happy to pass traffic between the vlans !!
>
> If these tenants are gonna be on the Internet than it also implies the
> possibility that tenants may want to provide content/access to other tenants.
> The situation is no different than if each tenant had their own individual
> router. Ie. you don't want to block traffic between subnets and vlans. What
> you do want to prevent are tenants attacking other tenants or other sites on
> the Internet or receiving spoofed traffic from outside their subnet/vlan.
> And the simplest way to prevent that is to enable unicast rpf checking on all
> interfaces. You don't need an ACL to do that but if you also want to block
> martian traffic you can still add an ACL on your border interface. urpf will
> already block martian traffic generated at your tenants edge so your ACL only
> needs to cover the martian traffic.
I agree with all of this. But the original post involved an access
scenario where the NAT would be on a server external to the router, which
means the private networks would have access to each other. Thats not
good.
More information about the cisco-nsp
mailing list