Solved

Best practice for VPLS service

Posted on 2013-11-16
1
752 Views
Last Modified: 2013-11-17
I am wondering what the best practice is for a VPLS connection.  Since the connection is a VPN LAN on the same LAN segment as my network is it really necessary to have a firewall between the VPLS end point and my network edge?

Thanks for any help...

Jerry
0
Comment
Question by:adminjam
1 Comment
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 39654180
there is some good discussion in this forum, primarily the FW filter for authorised protocol and permitted traffic. VPLS create that secure tunnel that all, also the local LAN should be segregated prior to the external facing of other site VPN LANs..

https://supportforums.cisco.com/thread/2171058

Your Firewalls at both Sites Can be placed at the WAN connecting between sits, use Multi-VRF lite in your internal LAN for both sites. this ensures segmentation and path isolation between the Small offices Locally. On both Firewalls, you Can Only allow VOIP communication between Sites and add permissions as per your requirement.

it would be good to place a FW in the LAN of each site, even if you dont have a L3 Switch locally to perform the Inter-Vlan routing between Offices, You Can then Leave this functionality to the Firewall, with right Access permition & (Security Level), a FW can do routing between your internal.

FW can do specific filter against VPLS too...overall is to tighen and not be reliant on one layer which can be just encrypted tunnels pt to pt only.

http://www.juniper.net/techpubs/en_US/junos/topics/reference/general/firewall-filter-match-conditions-for-vpls-traffic.html
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Join & Write a Comment

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now