Cisco Cisco Expressway
As per the recommendations in the Introduction section of this appendix, it is highly recommended to disable
SIP and H.323 ALGs on routers/firewalls carrying network traffic to or from a Expressway-E, as, when
enabled this is frequently found to negatively affect the built-in firewall/NAT traversal functionality of the
Expressway-E itself. This is also mentioned in
SIP and H.323 ALGs on routers/firewalls carrying network traffic to or from a Expressway-E, as, when
enabled this is frequently found to negatively affect the built-in firewall/NAT traversal functionality of the
Expressway-E itself. This is also mentioned in
General guidelines and design principles
With Expressway-E deployments involving NAT and/or dual network interfaces, some general guidelines
and principles apply, as described below.
and principles apply, as described below.
Non-overlapping subnets
If the Expressway-E will be configured to use both LAN interfaces, the LAN1 and LAN2 interfaces must be
located in non-overlapping subnets to ensure that traffic is sent out the correct interface.
located in non-overlapping subnets to ensure that traffic is sent out the correct interface.
Clustering
When clustering Expressways that have the Advanced Networking option installed, cluster peers have to
be addressed with their LAN1 interface address. In addition, clustering must be configured on an interface
that does not have Static NAT mode enabled.
be addressed with their LAN1 interface address. In addition, clustering must be configured on an interface
that does not have Static NAT mode enabled.
We therefore recommend that you use LAN2 as the externally facing interface, and that LAN2 is used as the
static NAT interface where applicable.
static NAT interface where applicable.
External LAN interface setting
The External LAN interface configuration setting on the
IP
configuration page controls on which network
interface TURN relays are allocated. In a dual network interfaces Expressway-E configuration, this should
normally be set to the externally-facing LAN interface on the Expressway-E.
normally be set to the externally-facing LAN interface on the Expressway-E.
Dual network interfaces
The following diagram shows an example deployment involving the use of an Expressway-E with dual
network interfaces and static NAT, an Expressway-C acting as a traversal client, and two firewalls/routers.
Typically in this DMZ configuration, FW A cannot route traffic to FW B, and devices such as the dual
interface Expressway-E are required to validate and forward traffic from FW A’s subnet to FW B’s subnet
(and vice versa).
network interfaces and static NAT, an Expressway-C acting as a traversal client, and two firewalls/routers.
Typically in this DMZ configuration, FW A cannot route traffic to FW B, and devices such as the dual
interface Expressway-E are required to validate and forward traffic from FW A’s subnet to FW B’s subnet
(and vice versa).
Figure 6: Dual network interfaces deployment
This deployment consists of:
n
DMZ subnet 1 – 10.0.10.0/24, containing:
l
the internal interface of Firewall A – 10.0.10.1
l
the LAN2 interface of the Expressway-E – 10.0.10.2
Cisco Expressway Basic Configuration Deployment Guide (X8.6)
Page 51 of 57
Appendix 4: Advanced network deployments