[c-nsp] Using Cisco 3825 as Firewall Replacement

Darin Herteen synack at live.com
Wed Apr 15 10:24:01 EDT 2009


I have a customer who's firewall recently bricked and is unusable. This
device had previously served as a VPN to their LAN from the outside
world, restricted access between internal VLAN's, and provided NAT for
internal addresses to reach the internet. They happened to have a Cisco
3825 laying around and I've been attempting to get this router
configured to duplicate the functionality of the now deceased firewall.

The customer is requesting the following setup:

VLAN 2 must not have internet access or access to VLAN 41
VLAN 42 must have internet access but no access to VLAN 41
VLAN 41 must have internet access and allowed access to VLAN's 2 and 42


My
intent has been to use Reflexive Access Control List(s) to allow
traffic originating from VLAN 41 into VLAN 2 & 42 and back. But
numerous configuration attempts seem to break the NAT for VLAN 41 &
42, but according to customer internal segmentation of VLAN's appeared
to work as requested but have since removed the RACL to restore connectivity.

The 3825 is currently configured as follows:

interface GigabitEthernet0/0.2
 encapsulation dot1Q 2
 ip address 192.168.15.254 255.255.240.0
 no cdp enable

interface GigabitEthernet0/0.41
 encapsulation dot1Q 41
 ip address 192.168.31.254 255.255.240.0
 ip nat inside
 ip virtual-reassembly
 no cdp enable

interface GigabitEthernet0/0.42
 encapsulation dot1Q 42
 ip address 192.168.47.254 255.255.240.0
 ip nat inside
 ip virtual-reassembly
 no cdp enable

interface GigabitEthernet0/1.30
 encapsulation dot1Q 30
 ip address x.x.x.137 255.255.255.248
 ip nat outside
 ip virtual-reassembly
 no cdp enable
 crypto map SDM_CMAP_1

ip nat inside source route-map SDM_RMAP_1 interface GigabitEthernet0/1.30 overload

route-map SDM_RMAP_1 permit 1
 match ip address 100

access-list 100 remark SDM_ACL Category=2
access-list 100 deny   ip 192.168.32.0 0.0.15.255 10.0.0.0 0.0.0.15
access-list 100 deny   ip 192.168.16.0 0.0.15.255 10.0.0.0 0.0.0.15
access-list 100 deny   ip 192.168.0.0 0.0.15.255 10.0.0.0 0.0.0.15
access-list 100 deny   ip any 10.0.0.0 0.0.0.15
access-list 100 permit ip 192.168.16.0 0.0.15.255 any
access-list 100 permit ip 192.168.0.0 0.0.15.255 any

The 3825 is running the following IOS:

(C3825-ADVIPSERVICESK9-M), Version 12.4(23)


Does anybody have any recommendations or advice to offer regarding this setup and whether or not it can be accomplished.

Thanks in advance,

Darin Herteen


_________________________________________________________________
Windows Live™: Keep your life in sync.
http://windowslive.com/explore?ocid=TXT_TAGLM_WL_allup_1a_explore_042009


More information about the cisco-nsp mailing list