Linksys was a global company with a few hundred employees when it was acquired by Cisco in 2003. Operating as a separate division within Cisco, Linksys manages its own network and Websites, including security elements such as firewalls.
Like many small and midsize businesses, Linksys previously used a Linux-based PC as the firewall for its external Website. This internally developed firewall was satisfactory at that time because the availability of the Linksys Website was not considered business critical. However, as the Linksys business continued to grow and the complexity of its Website increased, availability and support requirements of the PC-based firewall were no longer satisfactory.
Linksys IT wanted to deliver 99.99 percent (four 9s) availability for Linksys.com. After initial investigation, Cisco and Linksys engineers determined that this level of availability was not possible given the limitations of the PC-based firewall, such as:
“The existing firewall was not keeping up with the needs of the Linksys Website in many different ways. Even minor problems were causing the firewall to fail, which created more frequent downtime for the Website,” says Ed Scarberry, a Linksys IT support manager. “We also wanted to allow external access to more of our networked applications, but the existing firewall could not support them.”
Steve Acheson, senior information security architect in the Cisco Information Security Group, says, “Perhaps the most troublesome IT issue was that no backup firewall was available, which meant that the PC was a single point of failure in the network.”
Other limitations existed in the Linksys network. Network switches were installed in a standalone design, so that each switch was a potential single point of failure. Additionally, load balancing for the Website was accomplished through a single Cisco Local Director 430, a product that had reached “end of life” by the time of the Linksys project. (Figure 1)
Along with improving the firewall, the project team wanted to upgrade the Linksys network to support higher availability through failover capabilities, greater capacity for increasing traffic, and central management of network elements.
Cisco helped Linksys IT evaluate the changing business requirements of the division’s external network and Website to identify the best replacement solution. Despite the differences in size, cost considerations, and needs for network availability and security, a large enterprise like Cisco and a smaller company like Linksys both found that their best security solutions were very similar. Both companies used the Cisco Catalyst® 6500 Series switches and Cisco Firewall Services Module (FWSM); the only difference is in the architecture.
To improve overall network security and performance, the project team determined that a pair of redundant Cisco Catalyst 6500 Series switches with Cisco FWSMs and Cisco Content Switching Modules (CSMs) would meet the business needs with a powerful, yet cost-effective solution. Deployed in parallel in the Linksys data center, the switches provide redundancy and failover capabilities, as well as capacity for future growth in Linksys network traffic (Figure 2).
The Cisco FWSM provides a high-performance, stateful inspection firewall with engines for examining traffic at the application and protocol levels. The Cisco CSM provides high-performance load balancing for traffic directed to firewalls, servers, and other devices.
“Linksys.com is an example of a Website where the company has determined that 99.99 percent availability is an appropriate objective because the site doesn’t currently support any e-commerce or other essential business functions,” says Acheson. “The Cisco Catalyst 6500 Series switches, Cisco Firewall Services Modules, and Cisco Content Switching Modules offer a powerful, cost-effective solution for improving network availability and security in this midsized business environment.”
“The deployment process for the new switches and modules was fairly simple,” Acheson says. “The original firewall used Network Address Translation [NAT], which meant that we could use bidirectional NAT to install the new firewall in parallel with the original firewall and migrate the applications one at a time.” For the migration, the team simply created a new, public-facing IP address and configured the new firewall to translate that address into the same private address used by the original firewall.
The team also translated the incoming Internet addresses into the internal private address of the FWSM, which prevented return traffic from routing out through the old firewall (over the existing default route) and breaking the NAT translations and stateful inspections. This translation appeared to internal applications as if all connections were originating from the FWSM. Without this extra translation, routing and NAT issues would have prohibited correct operation of the Website.
According to Acheson, “We followed a similar process for migrating from Cisco Local Directors to the Cisco CSMs by creating new, load-balanced IP addresses on the Cisco CSMs. We also found that sharing the back-end server VLANs between the new and old load balancers would allow for migration without downtime.”
After installing the Cisco Catalyst switches and configuring them for failover, Acheson adds, the project team duplicated the load-balancing configuration from the Cisco Local Director to the Cisco CSMs and the firewall policy from the PC to the Cisco FWSMs. Because the Linksys.com site was not very complex, the project team decided to manually recreate the original load balancing, firewall configurations, and NAT rules on the appropriate modules.
The only external dependency on the migration was to coordinate with Linksys business partners for business-to-business transactions that used the original external IP addresses. Working with the partners to test and change their configurations went smoothly and also resulted in no downtime to the Linksys Website.
At the point when the new load-balancing and firewall solutions were active and functional in parallel with the original solutions, the production Domain Name System (DNS) entries still referred to the original firewall. After the project team tested and validated that applications were working as expected through the new firewall configurations, the next step was to change the DNS addresses for the Linksys.com applications and Website to point to the Cisco FWSMs instead of the original firewall. No other major changes were necessary in the Linksys network infrastructure to place the Cisco FWSMs into full operation.
After all DNS entries for applications had been migrated to the new firewalls, the project team found a few legacy applications that had hard-coded the public IP addresses. The team determined that migrating those public IP addresses to the new firewall was the easiest way to support them until those applications were modified to accept the Cisco FWSM address.
The final step was to remove the NAT translations to the incoming Internet addresses so that the Web and FTP servers would again see the true client addresses and make it easier to inspect the Web logs.
Linksys realized the following benefits by implementing the Cisco Catalyst switches with Cisco FWSMs and CSMs:
“Over the long term, this solution also gives us more flexibility for growing and expanding the network and services offered by the Linksys.com Website as well as supporting external access to other applications,” says Scarberry.
Focusing the initial firewall implementation to support only the Linksys Website simplified the migration process. Acheson also identified several lessons gained from this project:
Linksys IT is evaluating internal applications for allowing firewall-protected, external access by users. New types of traffic are also anticipated for Linksys.com—such as alternative ways for handling downloads and firmware, as well as an online chat feature for technical support—that will require accommodation by the firewall.
Additional capabilities are planned for improving the security and availability of the Linksys network, including:
For more information about the products in this solution, visit:
In addition, a detailed case study about Cisco IT’s deployment of the FWSM within the Cisco global network is available at http://www.cisco.com/web/about/ciscoitatwork/security/enterprise_firewall_protection.html.