03-24-2014 05:59 AM - edited 03-11-2019 08:59 PM
We currently have some Cisco 3560X switches that are internet facing and also some Cisco 3750X switches that are within our Corporate DMZ.
The external facing switches are just really operating at layer 2, have no IP address configuration and just forward all traffic to our firewall.
We currently have HP NNM on our internal LAN for monitoring.
I want to be able to monitor the switches both inside our corporate DMZ and also the external internet facing switches in case of hardware failure etc. However at the same time I obviously want to make sure that this is done as securely as possible without introducing any unnecessary risks.
I was thinking of using SNMPv3 to monitor the switches but in the case of the internet facing switches I would need to assign external IP addresses to them (hence using our valuable external pool of addresses available).
I’d be grateful for any advice on the best way to complete this.
thanks
03-24-2014 11:01 AM
As you know, there are several ways to do this. An easier way could be to use the managment port (next to the console port).
You can create a management VLAN on your internal network and put these management ports on that VLAN.
You can also, as you stated, make the external switches layer 3 and add ACLs on the SVIs and explicitly allow management traffic. Maybe use Control Plane Protection on these switches.
If you decide to use anything other than the management interfaces, you will need to address your firewall rules to allow SNMPv3 traffic in/out.
Good luck.
03-28-2014 01:12 AM
thanks Lee, I'm presuming that by using the managament interface and also putting an ACL on it then this would be the most secure ? This will also mean that I don't need to make our internet switches visible on the internet if i'm using the management interface.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide