- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Traffic flow in between C to S via Firewall. H...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Traffic flow in between C to S via Firewall. How?
Hello All,
Please refer to attached image and solve my query.
Traffic has to go from CLIENT to SERVER. The condition is. It has to go through FIREWALL.
How that would be accomplished?
- Tags:
- traffic flow
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Looks like I get to dig out an old FAQ once again.
I actually feature this exact FAQ in my Migrate to R80.x talks as a Troy McClure slide
The below is adapted from: Can't Talk to Translated IP from Internal Net
To force traffic through the Security Gateway, you need to:
- Block direct communication between the two from the router
- Direct the client to use an IP that routes the traffic to the Security Gateway (we'll pick 1.1.1.3 in this example)
- Create a "double NAT" rule, which will ensure the firewall stays between the two hosts.
Original Src | Original Dst | Original Svc | Xlated Src | Xlated Dst | Xlated Svc |
---|---|---|---|---|---|
10.0.0.1 | 1.1.1.3 | Any | 172.16.1.1(H) | 192.168.1.1 | Original |
All traffic coming from 10.0.0.1 that is destined for 1.1.1.3 will get hidden behind 172.16.1.1 (the internal IP address of the firewall) and have a destination of 192.168.1.1 (the real IP of the server).
The side effect of this is that for each connection to your "internal" server using the external IP address, you will see the network connection traverse your internal network twice:
- Once between the "server" and the Firewall
- Once between the firewall and the "client"
I haven't actually tried this in years, so it's possible this won't work.
But, if it's going to work, this is how you'd do it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Looks like I get to dig out an old FAQ once again.
I actually feature this exact FAQ in my Migrate to R80.x talks as a Troy McClure slide
The below is adapted from: Can't Talk to Translated IP from Internal Net
To force traffic through the Security Gateway, you need to:
- Block direct communication between the two from the router
- Direct the client to use an IP that routes the traffic to the Security Gateway (we'll pick 1.1.1.3 in this example)
- Create a "double NAT" rule, which will ensure the firewall stays between the two hosts.
Original Src | Original Dst | Original Svc | Xlated Src | Xlated Dst | Xlated Svc |
---|---|---|---|---|---|
10.0.0.1 | 1.1.1.3 | Any | 172.16.1.1(H) | 192.168.1.1 | Original |
All traffic coming from 10.0.0.1 that is destined for 1.1.1.3 will get hidden behind 172.16.1.1 (the internal IP address of the firewall) and have a destination of 192.168.1.1 (the real IP of the server).
The side effect of this is that for each connection to your "internal" server using the external IP address, you will see the network connection traverse your internal network twice:
- Once between the "server" and the Firewall
- Once between the firewall and the "client"
I haven't actually tried this in years, so it's possible this won't work.
But, if it's going to work, this is how you'd do it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Another way is to use VRF's on the router splitting the traffic and using a trunk between router and Firewall. Or directly connect either of the 2 or both networks directly to the Firewall and forget the router altogether.
