ACLs vs. full firewalls

Eric Gauthier eric at roxanne.org
Tue Apr 7 21:18:06 UTC 2009


Michael,

Do you have logging or audit requirements to your filters?
We use ACLs almost everywhere for non-stateful filtering, but
there are a few locations (e.g. HIPPA) that require an 
audit trail which is perhaps better accomplished by a firewall.

Eric :)


On Tue, Apr 07, 2009 at 01:05:31PM -0700, Michael Helmeste wrote:
> Hi all,
>   One of the duties of my current place of employ is reorganizing the
> network. We have a few Catalyst 6500 series L3 switches, but currently
> do all packet filtering (and some routing) using a software based
> firewall. Don't ask me, I didn't design it :)
> 
>   Current security requirements are only based on TCP and non-stateful
> UDP src/dst net/port filtering, and so my suggestion was to use ACLs
> applied on the routed interface of each VLAN. There was some talk of
> using another software based firewall or a Cisco FWSM card to filter
> traffic at the border, mostly for management concerns. We expect full 1
> gig traffic levels today, and 10 gig traffic levels in the future.
> 
>   I view ACLs as being a cheap, easy to administrate solution that
> scales with upgrades to new interface line speeds, where a full stateful
> firewall isn't necessary. However, I wanted to get other opinions of
> what packet filtering solutions people use in the border and in the
> core, and why.
> 
>   What's out there, and why do you guys use it? How do you feel about
> the scalability, performance, security, and manageability of your
> solution? What kind of traffic levels do you put through it?




More information about the NANOG mailing list