Understanding Cisco Secure Firewall Services Module 4.x Routing and Feature Enhancements

Date: Jun 4, 2009 By Arvind Durai, Ray Blair. Sample Chapter is provided courtesy of Cisco Press.
This chapter discusses the key additions to the Cisco Secure Firewall Services Module (FWSM) 4.x code.

Several significant additions to the 4.x code enhance routing and other features. Some of these additions include Enhanced Interior Gateway Routing Protocol (EIGRP) routing, route health injection, and some additional security features and application inspection enhancements.

Configuring EIGRP

EIGRP has been a long-awaited feature for the Firewall Services Module (FWSM). With EIGRP support, the FWSM can be integrated into an existing EIGRP network, minimizing the need to redistribute routing information into other routing protocols. This reduces the complexity of managing multiple routing processes and simplifies the network design, especially within the datacenter.

Redistribution of routes between routing protocols can be difficult because each routing protocol exercises different methods to classify routes (cost). For example, RIP uses hop-count, OSPF uses a metric (single value), and EIGRP uses bandwidth and delay by default. When routing information is exchanged, the methods used to classify them are also lost. Consequently, routing loops can easily occur if you redistribute a route into one process, change the cost, and inject the route back into the first routing process. Use caution if you find yourself in this situation.

EIGRP is supported only in single-context mode and allows only one single EIGRP routing process. Unlike Routing Information Protocol (RIP) and Open Shortest Path First (OSPF), which cannot be enabled simultaneously, EIGRP and RIP or EIGRP and OSPF can be. Where additional security is required, when connecting to the Internet or other untrusted connections, an EIGRP process can be used on the inside and another routing process can be used on the outside.

Using Figure 25-1, the following example shows how EIGRP is configured to exchange routing information with the local network and extend the default route learned from the OSPF process exchanged on the outside interface to the local network. In the event the router on the outside stops forwarding the default route to the FWSM, the FWSM will remove the route from the local routing table, consequently removing the default route in the local network.

Figure 25-1

Figure 25-1 EIGRP and OSPF Route Redistribution

To enhance the security for the routing information exchanged on the outside, OSPF Message Digest 5 (MD5) authentication has also been configured.

Example 25-1 shows the configuration of the FWSM (only the pertinent information is shown).

Example 25-1. EIGRP Route Redistribution

interface Vlan10
 nameif Inside
 security-level 100
 ip address 10.0.0.2 255.255.255.0
!
interface Vlan11
 nameif Outside
 security-level 0
 ip address 192.168.0.2 255.255.255.0
 ospf message-digest-key 1 md5 <removed>

router eigrp 1
 no auto-summary
 network 10.0.0.0 255.255.255.0
 redistribute ospf 1 metric 1000 2000 255 1 1500

!
!
router ospf 1
 network 192.168.0.0 255.255.255.0 area 0
 area 0 authentication message-digest
 log-adj-changes
 redistribute eigrp 1 subnets
 summary-address 10.0.0.0 255.0.0.0

As the output from the show route command shows in Example 25-2, the FWSM has learned about the routes from the local network via EIGRP. These routes are denoted with the letter "D," and the route from the outside has been learned via OSPF denoted with the letter "O."

Example 25-2. EIGRP Redistributed Routes

FWSM# show route
D    10.2.0.0 255.255.255.0 [90/26880256] via 10.0.0.1, 1:42:35, Inside
D    10.3.0.0 255.255.255.0 [90/27008256] via 10.0.0.1, 1:42:35, Inside
D    10.1.1.0 255.255.255.0 [90/130816] via 10.0.0.1, 1:42:35, Inside
O    10.0.0.0 255.0.0.0 is a summary, 1:42:43, Null0
C    10.0.0.0 255.255.255.0 is directly connected, Inside
D    10.4.0.0 255.255.255.0 [90/27008256] via 10.0.0.1, 1:42:35, Inside
C    192.168.0.0 255.255.255.0 is directly connected, Outside
O*E2 0.0.0.0 0.0.0.0 [110/1] via 192.168.0.1, 0:38:26, Outside

The FWSM is exchanging routing information with the Multilayer Switch Feature Card (MSFC) associated with the inside interface, as the output from the show eigrp neighbors command reveals in Example 25-3.

Example 25-3. EIGRP Neighbors

FWSM# show eigrp neighbors
EIGRP-IPv4 neighbors for process 1
H   Address                 Interface        Hold Uptime   SRTT  RTO  Q  Seq
                                             (sec)         (ms)      Cnt Num
0   10.0.0.1                Vl10             12  02:59:38 1    200   0   63

The OSPF adjacency has been established with the router on the outside interface, as the output from the show ospf neighbor command reveals in Example 25-4.

Example 25-4. OSPF Neighbor

FWSM# show ospf neighbor
Neighbor ID      Pri   State           Dead Time   Address         Interface
192.168.100.1      1   FULL/BDR        0:00:33     192.168.0.1     Outside

In Example 25-5, the last two lines from the show ospf interface command also indicate that the neighbor adjacency is using MD5.

Example 25-5. OSPF Interfaces

FWSM# show ospf interface
Outside is up, line protocol is up
  Internet Address 192.168.0.2 mask 255.255.255.0, Area 0
  Process ID 1, Router ID 10.0.0.2, Network Type BROADCAST, Cost: 10
  Transmit Delay is 1 sec, State DR, Priority 1
  Designated Router (ID) 10.0.0.2, Interface address 192.168.0.2
  Backup Designated router (ID) 192.168.100.1, Interface address 192.168.0.1
  Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
    Hello due in 0:00:03
  Index 1/1, flood queue length 0
  Next 0x0(0)/0x0(0)
  Last flood scan length is 3, maximum is 6
  Last flood scan time is 0 msec, maximum is 0 msec
  Neighbor Count is 1, Adjacent neighbor count is 1
    Adjacent with neighbor 192.168.100.1 (Backup Designated Router)
  Suppress hello for 0 neighbor(s)
  Message digest authentication enabled
    Youngest key id is 1

The challenges of complex redistribution scenarios from EIGRP to OSPF or RIP on adjacent routers are now eliminated with the capability of supporting EIGRP natively on the FWSM. Running EIGRP through the FWSM should be reserved for passing routing information internal to the network—for example, within the datacenter. This minimizes the impact of attacks targeting routing protocols.

The addition of EIGPR support makes the integration of the FWSM into networks taking advantage of the EIGRP routing protocol substantially easier, by not requiring the redistribution between routing protocols. When required, you still have the capability to redistribute routing information between routing protocols on the FWSM, but use caution that you do not cause a routing loop.

Configuring Route Health Injection

The FWSM has limited support for dynamic routing protocols when using "multiple-context" mode. Route Health Injection (RHI) has the capability of propagating routing information from individual contexts in routed-mode, including static routes, connected networks, and Network Address Translation (NAT) pools into the routing-engine on the host-chassis.

Because RHI has such a tight integration with the routing-engine, the minimum image needed on the Supervisor 720 and/or Supervisor 32 is 12.2(33)SXI.

RHI creates entries for static and directly connected routes in the MSFC.

Routes can be redistributed to any routing protocol: EIGRP, BGP, and so on.

RHI can also be used to advertise NAT pools into the MSFC.

RHI allows the FWSM to support more than one routing protocol in multi-context mode.

The following example shows how to propagate a default route into the routing-engine from a context on the FWSM.

Example 25-6 shows the configuration on the host-chassis.

Example 25-6. RHI MSFC Configuration

Host-Chassis(config)# firewall autostate
Host-Chassis(config)# firewall multiple-vlan-interfaces
Host-Chassis(config)# firewall module 9 vlan-group 9
Host-Chassis(config)# firewall vlan-group 9 10-100
Host-Chassis(config)# vlan 2-100,1000

Host-Chassis(config)# interface FastEthernet1/1
Host-Chassis(config-if)# switchport
Host-Chassis(config-if)# switchport access vlan 20
Host-Chassis(config-if)# switchport mode access

Host-Chassis(config)#interface FastEthernet1/2
Host-Chassis(config-if)# switchport
Host-Chassis(config-if)# switchport access vlan 21
Host-Chassis(config-if)# switchport mode access

The firewall autostate command sends messages from the host-chassis to the FWSM regarding the state of the VLANs associated with the FWSM. When an interface is configured to be in the same VLAN as the FWSM, and in the event that physical interface transitions to a "down" state, information can be propagated to the FWSM, consequently "downing" the interface associated with the FWSM. When this happens, the RHI will no longer be propagated to the routing-engine on the host-chassis.

Example 25-7 shows the configuration of the context on the FWSM (only pertinent information is shown).

Example 25-7. RHI FWSM Configuration

FWSM/RHI(config)# interface Vlan20
FWSM/RHI(config-if)# nameif Outside
FWSM/RHI(config-if)# security-level 0
FWSM/RHI(config-if)# ip address 10.20.20.1 255.255.255.0
FWSM/RHI(config)#interface Vlan21
FWSM/RHI(config-if)# nameif Inside
FWSM/RHI(config-if)# security-level 100
FWSM/RHI(config-if)# ip address 192.168.1.1 255.255.255.0
FWSM/RHI(config)# route Outside 0.0.0.0 0.0.0.0 10.20.20.254 1
FWSM/RHI(config)# route-inject
FWSM/RHI(config)# redistribute static interface Inside

Under the route-inject subsection, the redistribute command also offers another great feature. You can apply an access list to static routes, NAT pools, and connected networks redistributed to the routing-engine on the host-chassis, consequently providing very granular control over which routes are redistributed.

From the FWSM, using the show route-inject command, you can verify that the route is being propagated to the routing-engine on the host-chassis, as shown in Example 25-8.

Example 25-8. RHI on the FWSM

FWSM/RHI# show route-inject
Routes injected:
Address      Mask         Nexthop   Proto  Weight  Vlan
-------------------------------------------------------
0.0.0.0  0.0.0.0  10.20.20.254      1     1     20

The host-chassis, using the show ip route command verifies that the route has been received, as shown in Example 25-9.

Example 25-9. RHI on the MSFC

Host-Chassis# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route

Gateway of last resort is 192.168.1.1 to network 0.0.0.0

C    192.168.121.0/24 is directly connected, Vlan121
C    192.168.1.0/24 is directly connected, Vlan21
S*   0.0.0.0/0 [1/0] via 192.168.1.1, Vlan21

You can see that this route shows up as "static". Now it can be redistributed into a dynamic routing protocol. In Example 25-10, we are using EIGRP.

Example 25-10. Redistribution of RHI (Static) Routes on the MSFC

router eigrp 1
 network 192.168.0.0 0.0.255.255
 no auto-summary
 redistribute static metric 1000 2000 255 1 1500

Downstream routers will now see that route in their local routing table, as shown in the output from the show ip route command in Example 25-11.

Example 25-11. Downstream RHI Routes

Downstream# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route

Gateway of last resort is 192.168.121.1 to network 0.0.0.0

C    192.168.121.0/24 is directly connected, FastEthernet2/0
D    192.168.1.0/24 [90/28416] via 192.168.121.1, 00:48:10, FastEthernet2/0
D*EX 0.0.0.0/0 [170/28416] via 192.168.121.1, 00:47:09, FastEthernet2/0

When the FWSM interface goes down, the static route being redistributed into the routing-engine on the host-chassis will be removed.

To really take advantage of the dynamic nature of RHI, only one interface should be assigned to the VLAN. In Example 25-11, interface FastEthernet1/1 is assigned to VLAN 20. In the event FastEthernet1/1 goes down, typically due to an upstream device or interface failure, the associated VLAN interface will also go down. If multiple interfaces have been assigned to the VLAN, all must go down to take down the interface of the FWSM. This completely nullifies the use for any type of dynamic changes.

Figure 25-2 shows a diagram of how RHI can be used.

Figure 25-2

Figure 25-2 RHI Usage

Although not really dynamic, it will automatically provide notification of the FWSM VLAN interface going down by removing the associated route. Something to be aware of is that it requires a physical failure. In the event the upstream had a Layer 3 problem, for example, the IP address changed, the VLAN interface would remain "up," but traffic would drop because the next-hop would not be available. One other notable item is that the routes are not Virtual Routing and Forwarding (VRF) aware, meaning that it will not function with MPLS or VRF-lite (at least not using 4.01 code). Propagating routes from the FWSM to the routing-engine on the host-chassis will be placed in the "global" routing table.

RHI helps to overcome the limitation that dynamic routing processes are not supported when the FWSM is operating the multi-context mode. Recognize that it requires a Layer 2 failure of the selected interface to retract routing information sent to the MSFC. Although some limitations exist, RHI is an excellent feature to have in your "tool kit."

Understanding Application Support

The release of FWSM 4.01 code introduces a very powerful feature with regular expressions. Regular expressions allow you to match a variety of parameters using strings or variables that you assign. Also, four additional inspection engines have been added: DCEPRC, ESMTP, HTTP, and SIP.

Configuring Regular Expressions

If you have had an opportunity to work with Border Gateway Protocol (BGP), you may have been introduced to regular expressions. Regular expressions provide a way to match a group of characters using either an exact string match or by meta-characters that allow you to define a range, a character set, and so on. This feature can be used to match URL strings when inspecting HTTP traffic and perform an action based on a match, or perform an action on the traffic that does not match the regular expression.

The following configuration example shows how to implement regular expression matching. A client on the inside is connecting to a server on the outside. In this example, you will be inspecting the content for the permutation of the keyword "flash." If the keyword is found, the connection will be reset.

  • Step 1 The first step requires that you create a regular expression to match the specific content. Ensure that the regular expression command matches on the keywords of Flash, FLaSh, flASH, and so on:
    regex URL_NOFLASH "[Ff][Ll][Aa][Ss][Hh]"
  • Step 2 Create and set a regular expression (regex) class map to match the regular expression (URL_NOFLASH):
    class-map type regex match-any RESTRICTED_URL
     match regex URL_NOFLASH
  • Step 3 Add an inspection class map to match the previously created class map (RESTRICTED_URL):
    class-map type inspect http match-all RESTRICTED_HTTP
     match request uri regex class RESTRICTED_URL
  • Step 4 Add a policy map to search through the body of the HTTP string. The numeric value of 48 specifies how many characters to search through. The maximum length of the string can be from 1 to 4,294,967,295 characters. Longer search strings will impact the performance of the FWSM. When a match is found, using the class map RESTRICTED_HTTP, the action assigned is to reset and log the connection:
    policy-map type inspect http HTTP_PMAP
     parameters
      body-match-maximum 48
    class RESTRICTED_HTTP
      reset log
  • Step 5 Create and use a final policy map to match the policy map (HTTP_PMAP):
    policy-map INSIDE_POLICY
     class inspection_default
      inspect http HTTP_PMAP
  • Step 6 Apply the service policy to the interface:

    service-policy INSIDE_POLICY interface Inside

    When a match is found, the following log message is generated:

    %FWSM-5-415006: HTTP - matched Class 23: RESTRICTED_HTTP in policy-map
     HTTP_PMAP, URI matched - Resetting connection from
     Inside:192.168.1.23/3898 to Outside:10.133.219.25/80

Figure 25-3 shows a screenshot of what the client's experience would be without the service policy.

Figure 25-3

Figure 25-3 Regular Expression Without the Service Policy

Figure 25-4 shows a screenshot of what the client's experience would be with the service policy.

Figure 25-4

Figure 25-4 Regular Expression with the Service Policy

Notice now that the graphic has been removed from the display.

There is also a simple tool that you can use to test a regular expression from the command line. Use the following test command:

FWSM# test regex http://www.cIsCo123.com [Cc][Ii][Ss][Cc][Oo][0-9]
INFO: Regular expression match succeeded.

The first argument is the string, and the second argument is the match criteria. Notice that both upper and lowercase characters will match the string "cIsCo" but must be followed by a numeric value.

In the next example, the hyphen does not match a numeric value, consequently the match fails.

FWSM# test regex http://www.cIsCo-123.com [Cc][Ii][Ss][Cc][Oo][0-9]
INFO: Regular expression match failed.

Regular expressions are a very helpful tool that could be used to match on viruses, worms, questionable material, and so on. A maximum of 100 characters can be used in the regular expression; remember that implementing regular expressions will impact the performance of the FWSM.

Inspecting content within a packet and matching against a user defined regular expression is a very powerful feature. Because additional CPU cycles are required when you employ this feature, use caution that you do not overwhelm the processor on the FWSM. As an alternative to the FWSM for high-performance regular expression matching, consider using an Intrusion Prevention System (IPS).

Understanding Application Inspection Improvements

One of the primary functions of the FWSM is to provide application inspection, looking for protocol conformance, changing imbedded IP addressing, and so on. Increasing the capabilities of this feature only adds benefit to the services you are offering to your customers.

Domain Name Service (DNS) guard is a feature used when a client requests DNS information through the FWSM to a DNS server or servers. The default behavior of the FWSM is to allow only a single reply and drop any additional responses, consequently helping to prevent against DNS poisoning attacks. Although not recommended because of the possibility of exploiting the host, the FWSM can be configured to allow all responses using the following command:

FWSM/Context-A(config)# no dns-guard

As you may have noticed from the preceding command syntax, this command also works in multi-context mode.

Policy maps are covered in detail in Chapter 11, "Modular Policy," but the introduction of 4.01 includes additional support/enhancements for inspection policy and/or class maps for the following applications:

  • Distributed Computing Environment Remote Procedure Call (DCEPRC): A protocol used across multiple computers to distribute the load. Policy map inspection is the new addition to 4.01.
  • Extended Simple Mail Transfer Protocol (ESMTP): Added extensions to SMTP. The 4.01 code added the capability for application support and the capability to define inspection policy maps that match traffic using regular expressions.
  • HTTP: A protocol used generally to transfer information across the Internet.
  • Session Initiation Protocol (SIP): A signaling protocol used for voice communications over IP.

    The following options are available using policy maps with the previously listed protocols, as follows:

    • drop: Drops all packets that match the defined pattern.
    • drop-connection: Drops the packet and closes the connection.
    • log: Sends a syslog message.
    • mask: Masks that portion of the packet that has been matched.
    • rate-limit: Limits the rate of received messages.
    • reset: Drops the packet; closes and resets the connection.
    • send-protocol-error: Sends an error message when the packet does not match the ESMTP protocol.

The capability added with policy maps for DCEPRC, ESMTP, HTTP, and SIP adds tremendous functionality for the inspection of these protocols. With the option to drop, drop-connection, log, mask, rate-limit, reset, and send-protocol-error, for many of these protocols, the functionality also significantly improves.

Additional Support for Simple Network Management Protocol Management Information Base

Simple Network Management Protocol (SNMP) is used to get specific information from a device or to send it information for the purposes of configuration changes. Because the FWSM is a security device, you cannot send it information, but you can gather information for keeping track of interface statistics, packet counts, and so on. There have been two additions to the Management Information Base (MIB):

  • ACL entries and hit counters located under CISCO-IP-PROTOCOL-FILTER-MIB
  • Address Resolution Protocol (ARP) table entries located under IP-MIB

Table 25-1 shows the MIB additions with definitions.

Table 25-1. FWSM 4.01 MIB Additions

CISCO-IP-PROTOCOL-FILTER-MIB

cippfIpFilterTable

Command Line Interface (CLI) show run access-list

1.3.6.1.4.1.9.9.278.1.1.1.1.1

cippfIpProfileName

ACL name

1.3.6.1.4.1.9.9.278.1.1.3.1.1

cippfIpFilterIndex

Access Control Entry (ACE) line number

1.3.6.1.4.1.9.9.278.1.1.3.1.3

cippfIpFilterAction

Permit/Deny

1.3.6.1.4.1.9.9.278.1.1.3.1.4

cippfIpFilterAddressType

Either ipv4 or ipv6

1.3.6.1.4.1.9.9.278.1.1.3.1.5

cippfIpFilterSrcAddress

Source IP addr

1.3.6.1.4.1.9.9.278.1.1.3.1.6

cippfIpFilterSrcMask

Source IP mask

1.3.6.1.4.1.9.9.278.1.1.3.1.7

cippfIpFilterDestAddress

Destination IP addr

1.3.6.1.4.1.9.9.278.1.1.3.1.8

cippfIpFilterDestMask

Destination IP mask

1.3.6.1.4.1.9.9.278.1.1.3.1.9

cippfIpFilterProtocol

Protocol (IP/TCP/UDP/ICMP)

1.3.6.1.4.1.9.9.278.1.1.3.1.10

cippfIpFilterSrcPortLow

Src port low

1.3.6.1.4.1.9.9.278.1.1.3.1.11

cippfIpFilterSrcPortHigh

Src port high

1.3.6.1.4.1.9.9.278.1.1.3.1.12

cippfIpFilterDestPortLow

Dest port low

1.3.6.1.4.1.9.9.278.1.1.3.1.13

cippfIpFilterDestPortHigh

Dest port high

1.3.6.1.4.1.9.9.278.1.1.3.1.16

cippfIpFilterLogEnabled

Log enabled/disabled

1.3.6.1.4.1.9.9.278.1.1.3.1.17

cippfIpFilterStatus

ACL Active/Inactive

1.3.6.1.4.1.9.9.278.1.1.3.1.22

cippfIpFilterSrcIPGroupName

Src n/w object group name

1.3.6.1.4.1.9.9.278.1.1.3.1.23

cippfIpFilterDstIPGroupName

Dest n/w object group name

1.3.6.1.4.1.9.9.278.1.1.3.1.24

cippfIpFilterProtocolGroupName

Protocol object group name

1.3.6.1.4.1.9.9.278.1.1.3.1.25

cippfIpFilterSrcServiceGroupName

Src service object group name

1.3.6.1.4.1.9.9.278.1.1.3.1.26

cippfIpFilterDstServiceGroupName

Dest service object group name

1.3.6.1.4.1.9.9.278.1.1.3.1.27

cippfIpFilterICMPGroupName

ICMP object group

cippfIpFilterStatsTable

CLI show access-list acl-name

 1.3.6.1.4.1.9.9.278.1.1.1.1.1

cippfIpProfileName

ACL name

1.3.6.1.4.1.9.9.278.1.1.3.1.1

cippfIpFilterIndex

ACE line number within the ACL

1.3.6.1.4.1.9.9.278.1.2.1.1.1

cippfIpFilterHits

ACE hit-count

IP-MIB(RFC2011)

ipNetToPhysicalTable

CLI show arp

1.3.6.1.2.1.4.35.1.1

ipNetToPhysicalIfIndex

Interface number for the ARP entry

1.3.6.1.2.1.4.35.1.2

ipNetToPhysicalNetAddressType> 

IP address type for the ARP entry

1.3.6.1.2.1.4.35.1.3

ipNetToPhysicalNetAddress

IP address for the ARP entry

1.3.6.1.2.1.4.35.1.4

ipNetToPhysicalPhysAddress

Media Access Control (MAC) address for the IP address

When using SNMP, avoid using ansnmp walk. This process will start at the top of the MIB tree and get the statistics for each MIB, until it gets to the end of the tree. Because SNMP is not performed in hardware, this will put an undue burden on the FWSM.

SNMP is a very valuable tool to gather statistics from the FWSM, and with the addition of ACL entries, ACL counters, and ARP table entries, it becomes an even better tool. Just remember not to overwhelm the FWSM with too many queries.

Miscellaneous Security Features

DHCP option 82 is typically used in service-provider networks. It adds location information that can be used to differentiate services between customers. A filtering enhancement was also added to support HTTPS with SmartFilter.

Dynamic Host Configuration Protocol Option 82

Option 82 provides location information from the Dynamic Host Configuration Protocol (DHCP) relay agent—in this case, the FWSM to the DHCP server. This information can be used to differentiate DHCP clients, consequently offering distinctive services on a client basis.

You can use two commands to enable DHCP relay. The first command specifies the DHCP server IP address and the interface where it is located. Optionally, the dhcprelay server ip_address command can be configured under the outgoing interface. The second line enables clients on the inside interface to send and receive DHCP information.

FWSM/Context-A(config)# dhcprelay server 10.20.100.25 Outside
FWSM/Context-A(config)# dhcprelay enable Inside

Option 82 can then be enabled on a specific interface, as shown by the following two commands:

FWSM/Context-A(config)# interface vlan vlan-number
FWSM/Context-A(config-if)# dhcprelay information trusted

Option 82 can also be enabled on all interfaces using the global command that follows:

FWSM/Context-A(config)# dhcprelay information trust-all

If you are currently using the FWSM as a DHCP relay agent, the addition of option 82 will be a simple addition. Also, when enabling option 82 globally, all interfaces are trusted except the interface that is configured as the dhcprelay (outgoing) interface.

DHCP option 82 adds location information to clients, which can be used to differentiate services. Although used primarily in service provider networks, it could all be used in enterprise networks to differentiate client services.

Smartfilter HTTPS Support

For those of you looking for HTTPS support from SmartFilter on the FWSM, it has now arrived with the introduction of 4.01. See Chapter 14, "Filtering," for configuration details.

Summary

The release of 4.x adds some very significant enhancements. The addition of EIGRP now provides the capability to integrate a FWSM into an EIGRP network without having to redistribute routes into other routing protocols. RHI allows static routes, NAT pools, and connected routes to be propagated to the routing engine on the host-chassis dynamically. Regular expressions give you the opportunity to match traffic based on custom signatures. Application inspection improvements and SNMP additions, option 82 support, and filter enhancements, make the FWSM an even better option to secure your valuable assets.

References

  • RFC 1869—SMTP Service Extensions
  • RFC 2011—SNMPv2 Management Information Base for the Internet Protocol Using SMIv2
  • RFC 3046—DHCP Relay Agent Information Option 82