Solved

2 External Interfaces on PIX with Wireless router on one External

Posted on 2009-04-02
4
292 Views
Last Modified: 2012-05-06
I have a PIX firewall with two external interfaces. One interface has our AT&T DIA and one has AT&T DSL. We have the PIX set up to use the DIA for the default route with metric 1 and the DSL for the default route on metric 2 (back up Internet connection basically). Currently, we have a wireless router on the DSL line mainly for our vendors/auditors when the come in so they can have access the the Internet.

I would like to make it so that you can VPN into the PIX on the DIA if we have a laptop on the wireless in part of the building without a network jack. With the security rules in place, I cannot connect to the DIA public IP from the DSL because of reverse path check.

However, I could add a default route on the outside interface for the ip address of my wireless router to the gateway ip address for the DSL modem.

i.e. modem=172.16.1.1 , router=172.16.1.3   ------   route outside 172.16.1.3 255.255.255.255 172.16.1.1
(example IP addresses. I have a public IP address for this router and modem)

This allows me to then connect to the VPN on the DIA public IP from the wireless on the DSL.

Now my question though, am I leaving myself open to a security issue?

The only incoming rules from the DSL interface are currently

~ implicit to permit scr 'any' dst 'less secure networks' to service ip, and
~ implicit deny rule any any

Thanks in advance for your comments/suggestions.


0
Comment
Question by:leeii15
  • 2
  • 2
4 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 24055029
Why not just VPN to the interface that's on the same subnet as the wireless router?
0
 

Author Comment

by:leeii15
ID: 24059105
Yeah I guess I could do that.

What I was trying to do which I failed to mention was to make it so that my users could continue to use the host name on our DIA (mail.mydomain.com) for their connection entry in the VPN client.

Another reason I was looking at this is because I have one user who is a contracted employee through a third party who does not connect to our network except for OWA. He has offices at each of our locations and he uses the DSL lines at those locations to connect to our OWA server. Well when he is our main location where the OWA server and firewall are at, he cannot connect to the OWA server using https://mail.mydomain.com/ becuase I would guess that the DSL is taking the next hop to the firewall but becuase of the reverse path check the firewall is denying the traffic.

The route addition I mentioned in my original post, resolves both issues but I just wanted to make sure that I wasn't opening myself up.

I guess I could just give my users an addition VPN Connection Entry for when they are on the DSL and port forward 443 for OWA and give my other user the URL for the OWA on the DSL interface.
0
 
LVL 28

Accepted Solution

by:
asavener earned 500 total points
ID: 24059311
OK.

Re-reading your original post, it appears to me that your failover configuration will only work if the primary outside interface goes down.  IMO, that's not terribly useful, so another option would just be to disable the secondary outside interface, and then do a manual failover if you have an extended outage.
0
 

Author Comment

by:leeii15
ID: 24060364
That is how we have it set up. It is failover to the DIA and as you mentioned it;s not terribly useful as the DIA has not dropped in the last 5-6 years. I hadn't thought about just disabling that interface and manual failover later.

Thank for the sugestion. I think I will go that route.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now