06-22-2023 03:09 AM - edited 06-22-2023 03:09 AM
Hello all,
We have this kind of topology,
Internet Router (Traffic + Management)> Internet Switch > Firewall > Edge Switch > Core Switch
but we want to connecting management of Internet Router separately from traffic port via Mgmt0 port, is that secure connecting the Internet Router Mgmt0 directly to Core Switch (bypassing Firewall) so the topology will be like this?
Internet Router (Traffic) > Internet Switch > Firewall > Edge Switch > Core Switch
Internet Router (Mgmt0) > Core Switch
06-22-2023 03:36 AM
@betaaaa wrote:
but we want to connecting management of Internet Router separately from traffic port via Mgmt0 port, is that secure connecting the Internet Router Mgmt0 directly to Core Switch (bypassing Firewall) so the topology will be like this?Internet Router (Traffic) > Internet Switch > Firewall > Edge Switch > Core Switch
Internet Router (Mgmt0) > Core Switch
Connect the Mgmt0 port a completely separate network. That way, when the core switch fails (or gets DDoS), there is still a way to access the router from a different direction.
06-22-2023 07:08 AM
is that mean, even we run Management under "Mgmt-Intf" VRF, there are still potentially attack or breach through the inside (trusted zone) ?
06-22-2023 03:01 PM
No, that is not what I mean.
Ideally, Mgmt0 should be connected to a completely separate network. Even if the Mgmt0 is in a different VRF, if the core switch blows up (high CPU/memory leak, DDoS, etc) there is no way, except for console, to remotely access the appliance.
We had a DDoS attack once. It caused our two routers to have 100% CPU. We could not get in via the usual methods. The only way was using the Mgmt0 port because the Mgmt0 was connected to a separate network (different WAN) to the rest.
06-22-2023 06:47 AM
Anytime you wire across an "air gap", you've provided an attack path.
Does this never ever do this? Not at all. It just means you secure that path to make it extremely difficult to be used to get into your network. For example, at the core port you might block all unexpected traffic such as only allowing SSH return traffic to a specific IP.
06-22-2023 07:09 AM
is that means, this setup really not recommended to deployed ? as there are still potentially breach
06-22-2023 07:37 AM
"not recommend"? Again, not at all.
It just means there's another path into you internal network. You need to be as security conscience about it, and configuring it, as you should be with your main Internet path.
"Conscience", above, doesn't imply you treat this path exactly like you do your main path, it means you recognize you opened an alternate attack path so you should determine how much you believe is worthwhile to do to mitigate potential attacks.
What I suggested, earlier, is rather simple to implement and support, but makes it much more difficult to effectively attack via your proposed connection.
Personally, I think it unlikely anyone wil mount any attack via this management connection, but however low the risk is, it's no longer zero.
06-22-2023 07:11 AM - edited 06-22-2023 07:12 AM
Router FW and Core SW can connect tk same subnet and you can OOB mgmt these device.
https://opengear.com/blog/taking-your-cisco-out-of-band-management-to-the-next-level/
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide