How To - Implement Transparent Subnet Gateway Using Proxy ARP
How To - Implement Transparent Subnet Gateway Using Proxy ARP
Deployment:
Consider a hypothetical example where Cyberoam needs to be deployed in a network which consists of Mail server and Web server placed in the Internet and a router sharing the same IP subnet. Below given network diagram shows how Cyberoam is deployed in the network. As router and internal servers share the same IP subnet to avoid the above mentioned routing problems, we have deployed Cyberoam between Internal network and Router. As per the diagram Mail server, Web server is having public IP address and configured in DMZ zone, where as Router is configured in WAN zone with same subnet IP address. Throughout the article we will use the network parameters as shown in the diagram below.
Configuration
Follow the below mentioned steps to implement transparent subnet gateways using Proxy ARP:
Parameters Description Parameters Physical Interface Network Zone IP Assignment Value PortC DMZ Static Description Physical Interface for PortC Select Zone to which Interface belongs Select IP Assignment type Available Options: Static Static IP Addresses are available for all the zones PPPOE PPPOE is available only for WAN Zone. If PPPoE is configured, WAN port will be displayed as the PPPoE Interface DHCP DHCP is available only for WAN Zone
IP Address Netmask Primary DNS Secondary DNS 10.10.1.1 /29(255.255.255.248) 4.2.2.2 8.8.8.8
Specify IP Address Specify Network Subnet mask Configure Primary DNS server IP address Configure address Secondary DNS server IP
3. To verify the configuration, use the below mentioned command: console> show proxy-arp
Create Static Routes for DMZ and WAN Interface Static route provides next hop information to Cyberoam. Go to Network Static Route Unicast and click on Add button to add a new static route.
Parameters Description Parameters Destination IP Netmask Interface Value 1.1.1.1 /32(255.255.255.255) Port B 1.1.1.2 Description Specify Destination IP Address Specify Subnet Mask Select Interface from the list including Physical Interfaces, Virtual Subinterfaces and Aliases Specify Distance for routing. Range of value is from 0 to 255
Distance
Note: Gateway is not needed. Interface is sufficient. In this document one Unicast Route has been added and shown. Similarly 2 more Unicast Routes are to be added.
Step 4: Create Firewall Rules to Allow Web and Mail Server Traffic
By default, Cyberoam blocks entire WAN-DMZ zone traffic, so create firewall rules to allow to and from traffic from web server & mail server. Go to Firewall Ruleand Create the following Rules: LAN to DMZ rule to allow access from internal network to Mail and Web server. WAN to DMZ rule to allow access of Web and Mail server from external world. DMZ to WAN rule to allow the access of the Internet from Web and Mail server.
LAN to DMZ rule to allow access from internal network to Mail and Web server Go to Firewall Rule and Click on Add button to add a LAN_DMZ_ProxyARP Firewall Rule.
Parameters Description Parameters Name Zone Network/Host Services Value LAN_DMZ_ProxyARP Source LAN Destination - DMZ ProxyARP Any Description Specify name to identify the Firewall Rule Specify source and destination zone to which the rule applies Specify source and destination host or network address to which the rule applies Services represent types of Internet data transmitted via particular protocols or
applications. Select service/service group to which the rule applies Select Schedule for the rule Select rule action Available Options: Accept Allow access Drop Silently discards Reject Denies access and ICMP port unreachable message will be sent to the source Select the NAT policy to be applied It allows access but after changing source IP address i.e. source IP address is substituted by the IP address specified in the NAT policy.
Schedule Action
Disabled
Note: In this document one Firewall Rule LAN_DMZ_ProxyARP has been added and shown. In the same way 2 more Firewall Rules i.e WAN_DMZ_ProxyARP and DMZ_WAN_ProxyARP are to be added.
Advantages
With the help of Transparent Subnet Gatewaying, once can enable security for mission critical servers like Mail, Web, SAP, ERP without any configuration changes, Routing changes with minimum downtime. Document Version: 1.208/11/2012