09-18-2016 02:32 PM - edited 03-12-2019 01:17 AM
Hello,
What is the Management Interface on an ASA 5510 / 5520 meant to be used for...?
I am not a firewall boffin by any means but recently I've had to set up both 5510 and 5520 ASA's, part of the set up was to use the management interface for the syslog server info and SNMP info going back to a network manager.
My setup is like this... the ASA inside and managemet interface connect to the same switch which has a router connected to it also ( Not Cisco ).
The Inside and Management Interface are on different subnets
Both the snmp and syslog server seem to be working fine but I'm not convinced that this is the correct use of the Management interface. I have read quite a few of the cisco documents on configuring the ASA and best practice but I haven't found anything that really says this is what the Management Interface is for.
Can someone in the know tell me what the best practice use of the Management Interface is.... and is using it for syslog and snmp traffic okay.
Thanks
09-18-2016 06:30 PM - edited 09-19-2018 08:29 PM
The primary use of the management interface, especially in the older 5500 series, was for management features (syslog, snmp, and system configuration via ssh or http (ASDM)) where you have a true out of band network.
It can also work when all the systems used for those functions are on the same subnet as the management interface(s). This is due to the limitation of there not being a separate routing table for management. For that reason, very few people use the interface.
The newer 5500-X series recently benefited from a software update that provides a separate routing table so that limitation is overcome. It's only been available for about a year though; so few people have used it.
The most common use is on the 5500-X series with active software modules (ips, cxsc or sfr). Those modules all use the physical management interface exclusively for their management features. This is distinct from management of the base ASA.
09-19-2016 09:58 AM
Hi Marvin,
Thanks for your reply,
That sounds like the way I have it is fine then, I've noticed that some people here have the snmp set up for the Inside interface but i think i'll leave mine as it is.... seems to working fine.
Thanks again.
03-28-2017 04:24 AM
hi marvin,
this post is really helpful. there's quite a confusion of the MGMT interface for its OOB management.
my questions are:
1) is AAA/TACACS+ included for MGMT interface traffic? i need to know if i should route the TACACS+ server to hop the 'management' or 'inside' interface.
2) is it best practice/practical to remove 'management-only' on the management interface? i read somewhere (i think you posted it) that on new 9.x code, routing is enabled on ASA 5500-x but i have a mix of old 5500 ASA, so is this also applicable?
3) could you please confirm if these are the 'management' basic routes i should have on my next ASA deployments:
route management <SSH JUMP SERVERS>
route management <PC SUBNETS W/ ASDM>
route management <SYSLOG/NMS-IP>
03-28-2017 05:35 AM
There's not one right or wrong way. A lot depends on your overall network architecture and the security policies you are enforcing via configuration of your ASA.
If you have a truly separate management network then you can indeed set the routes exclusively out the management interface - on both old code and new.
The issue with making management routes for some servers and services is that those same things may need to route traffic out the ASA for their own non-ASA-related purposes. Say you want to browse the Internet from one of your ASDM clients or updates packages on your jump box. They route eventually outbound via the ASA inside interface en route to the Internet. The return traffic arrives and sees a more specific route statically defined on the management interface and thinks it should use that ...but it's not allowed (on 8.6+ anyway, and on older code with "management-only" set). So that breaks things.
The newer code has two routing tables to address that issue. Traffic to and from the management interface can use the management routing table. All other traffic (including non-ASA-management traffic from your management stations) can use the global routing table.
03-28-2017 07:20 PM
I am trying to setup my 5506x running 9.6.1 and can't seem to figure out how to use the management-only routing table. My inside and management interfaces are on separate subnets. I can ping the management interface from it's subnet but can not route to it from a different subnet. How to I donfigure the manament network to route subnets besides its own?
Thanks
03-28-2017 08:42 PM
When you create the route with the management keyword under 9.5+ the route wil be created as management-only.
Once you have set such route(s), you can verify with "show route management-only"
Reference the release notes:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html
as follows:
Separate routing table for management-only interfaces |
To segregate and isolate management traffic from data traffic, the ASA now supports a separate routing table for management-only interfaces. We introduced or modified the following commands: backup, clear ipv6 route management-only, clear route management-only, configure http, configure net, copy, enrollment source, name-server, restore, show asp table route-management-only, show ipv6 route management-only show route management-only We did not modify any screens. |
03-28-2017 07:46 PM
hi,
thanks for further clarifying!
can you confirm AAA/TACACS+ traffic goes via the 'management' interface?
also do you prefer removing the 'management-only' under mgmt interface?
03-28-2017 08:28 PM
The AAA/TACACS+ traffic exits the ASA according to what the ASA's routing table tells it. There is no equivalent concept to the IOS "ip tacacs source interface" command.
The management-only command for the management interface is unnecessary under newer ASA code (8.6+). Under the older code, it can be used to prevent data plane traffic from using the management interface. Personally I've never found it necessary but your use cases may differ.
03-28-2017 08:36 PM
thanks! i'll probably route ACS/TACACS+ on the 'inside' and leave SSH/ASDM routed on 'management'
will also remove 'management-only' so it'll be consistent on all 5500 and 5500-x ASA.
i would need to lab this up in our environment. thanks again! +5
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide