Enterasys X-Pedition XSR-1805 Getting Started Manual page 53

X-pedition security router
Hide thumbs Also See for X-Pedition XSR-1805:
Table of Contents

Advertisement

Internet
In this configuration, the firewall provides protected access from the private to dmz networks. That
is, access is restricted to Web and mail traffic only. The hosts in the private network are provided
full access to the Internet but access is denied from the Internet to the private network. Also, all Java
and ActiveX pages, IP options, IP broadcast and multicast packets are banned.
Begin by specifying network objects for private, dmz, and Mgmt networks:
XSR(config)#ip firewall network dmz 220.150.2.16 mask 255.255.255.240 internal
XSR(config)#ip firewall network private 220.150.2.32 mask 255.255.255.240
internal
XSR(config)#ip firewall network Mgmt 220.150.2.35 mask 255.255.255.0 internal
Log only critical events:
XSR(config)#ip firewall logging event-threshold 3
Set policies between the dmz and external networks. Note that policy objects and names are case-
sensitive and you must cite network names exactly:
XSR(config)#ip firewall policy a1 private dmz HTTP allow
XSR(config)#ip firewall policy a2 dmz private HTTP allow
XSR(config)#ip firewall policy a3 private dmz HTTP allow
XSR(config)#ip firewall policy a4 dmz private HTTP allow
Set the policies between the dmz and external networks:
XSR(config)#ip firewall policy a5 ANY_EXTERNAL dmz SMTP allow
XSR(config)#ip firewall policy a6 dmz ANY_EXTERNAL SMTP allow
XSR(config)#ip firewall policy a7 ANY_EXTERNAL dmz SMTP allow
XSR(config)#ip firewall policy a8 dmz ANY_EXTERNAL SMTP allow
Set policies to allow any traffic from private to external and Mgmt networks:
XSR(config)#ip firewall policy a9 private ANY_EXTERNAL ANY_TCP allow
XSR(config)#ip firewall policy Telnetsess Mgmt Mgmt Telnet allow bidirectional
Allow ICMP traffic to pass from the dmz to private, private to all external, and all external to private
networks:
XSR(config)#ip firewall filter allowICMP private dmz protocol-id 1
XSR(config)#ip firewall filter allowICMP private ANY_EXTERNAL protocol-id 1
XSR(config)#ip firewall filter allowICMP ANY_EXTERNAL dmz protocol-id 1
Figure 3-1
XSR with Firewall Topology
S1
Frame Relay
206.12.44.16/28
FE2
220.150.2.17
220.150.2.16/28
Web server
(HTTP)
220.150.2.19
XSR-1805
220.150.2.35
FE1
DMZ
Mail server
(SMTP)
220.150.2.18
Firewall Sample Configuration
220.150.2.32/28
220.150.2.37
Internal
220.150.2.36
XSR Getting Started Guide 3-13

Advertisement

Table of Contents
loading

Table of Contents