S E C U R I T Y Z O N E S A N D I N T E R F A C E S
Configuring Interface Modes
3-18
Security Appliance User Guide
Version 3R2
3
set route 0.0.0.0/0 interface br0 gateway 10.0.0.1
set policy from trust to untrust any any any permit
set policy from untrust to trust any any any deny
Transparent Mode VLAN Filtering
Some network administrators desire the ability to apply security policies
between various VLAN networks. Due to the performance hit that most
L3 switches take when doing L3/L4 ACL filtering administrators are less
likely to utilize their core switches for such task. The freeGuard Blaze
2100 can be deployed in such environments and be utilized as a VLAN
policy enforcer.
The freeGuard Blaze 2100 can be placed directly between the VLAN
switch/trunk and the external VLAN router, it can then
intercept/recognize various VLAN tagged packets and apply zone based
policies to these types of traffic. This is possible through the additional
lookup parameter activated in the Policy engine when configured in this
mode. The VLAN tag id which is bound to a zone and through proper
configuration, prompts the freeGuard Blaze 2100 to inspect the VLAN
traffic and be on the lookout for the 802.1q header. The freeGuard Blaze
2100 then correlates the q tag to the configured Zone and applies the
policy engine to this packet.
In
Figure 3-10
, the freeGuard Blaze 2100 is deployed in an environment
with 5 existing VLAN networks which represents 5 different departmental
networks:
• VLAN 100: Engineer
• VLAN 200: Accounting
• VLAN 300: Finance
• VLAN 400: Lab
• VLAN 500: Sales.