Enterasys Networks XSR-3020 manual 1 XSR with Firewall Topology

Models: XSR-3020

1 110
Download 110 pages 4.16 Kb
Page 57
Image 57
Figure 3-1 XSR with Firewall Topology

 

 

 

 

 

Firewall Sample Configuration

 

Figure 3-1 XSR with Firewall Topology

 

 

 

 

 

 

220.150.2.32/28

 

Frame Relay S1

XSR-3020

220.150.2.35

220.150.2.37

 

 

 

Internet

206.12.44.16/28

 

 

FE1

 

FE2

 

 

 

 

 

 

 

 

 

 

220.150.2.17

 

 

 

 

 

 

 

 

 

Internal

 

 

 

 

 

 

220.150.2.36

 

220.150.2.16/28

DMZ

 

 

 

Web server

(HTTP)

220.150.2.19

Mail server

(SMTP)

220.150.2.18

In this configuration, the firewall provides protected access from the private to dmz networks. That is, access is restricted to Web and mail traffic only. The hosts in the private network are provided full access to the Internet but access is denied from the Internet to the private network. Also, all Java and ActiveX pages, IP options, IP broadcast and multicast packets are banned.

Begin by specifying network objects for private, dmz, and Mgmt networks:

XSR(config)#ip firewall network dmz 220.150.2.16 mask 255.255.255.240 internal XSR(config)#ip firewall network private 220.150.2.32 mask 255.255.255.240 internal

XSR(config)#ip firewall network Mgmt 220.150.2.35 mask 255.255.255.0 internal

Log only critical events:

XSR(config)#ip firewall logging event-threshold 3

Set policies between the dmz and external networks. Note that policy objects and names are case- sensitive and you must cite network names exactly:

XSR(config)#ip firewall policy a1 private dmz HTTP allow

XSR(config)#ip firewall policy a2 dmz private HTTP allow

XSR(config)#ip firewall policy a3 private dmz HTTP allow

XSR(config)#ip firewall policy a4 dmz private HTTP allow

Set the policies between the dmz and external networks:

XSR(config)#ip firewall policy a5 ANY_EXTERNAL dmz SMTP allow XSR(config)#ip firewall policy a6 dmz ANY_EXTERNAL SMTP allow XSR(config)#ip firewall policy a7 ANY_EXTERNAL dmz SMTP allow XSR(config)#ip firewall policy a8 dmz ANY_EXTERNAL SMTP allow

Set policies to allow any traffic from private to external and Mgmt networks:

XSR(config)#ip firewall policy a9 private ANY_EXTERNAL ANY_TCP allow XSR(config)#ip firewall policy Telnetsess Mgmt Mgmt Telnet allow bidirectional

Allow ICMP traffic to pass from the dmz to private, private to all external, and all external to private networks:

XSR(config)#ip firewall filter allowICMP private dmz protocol-id 1 XSR(config)#ip firewall filter allowICMP private ANY_EXTERNAL protocol-id 1 XSR(config)#ip firewall filter allowICMP ANY_EXTERNAL dmz protocol-id 1

XSR Getting Started Guide 3-13

Page 57
Image 57
Enterasys Networks XSR-3020 manual 1 XSR with Firewall Topology