12-23-2006 05:18 PM - edited 03-09-2019 05:06 PM
A layer 2 edge switch between an Internet router and the outside interface of a firewall could have a public IP address for the vlan interface for switch management. Another setup is to assign a private IP address from the internal management vlan to the vlan interface of the edge switch. Then assign a port in the management vlan on the edge switch and connect that port with a network cable to a port on the management vlan on the management switch on the inside of the firewall. This setup will only work if both switches are physically close enough. Which is more secure? Is there another option or what is the best security practice for in-band management on an Internet edge switch?
Thanks,
RJ
12-26-2006 11:14 AM
Our security policy dictates no management IP, so we use a console server to manage all public facing devices. Otherwise your second scenario is probably a hair safer than using a public IP.
12-26-2006 12:45 PM
Thanks for the reply. So how do you monitor the switch (i.e. syslogs)?
12-26-2006 01:08 PM
Either through a firewall or in certain devices we're not allowed too :-(
12-27-2006 06:47 AM
Is there a documnet for security best practices on Internet edge device monitoring?
12-27-2006 06:50 AM
I don't know of any from Cisco, but the gov't has some.
http://iase.disa.mil/ditscap/ditscap-to-diacap.html#diacap
HTH and please rate if it does.
12-27-2006 07:52 AM
I am not sure what document you are suggesting.
12-27-2006 08:09 AM
Probably because I gave you the wrong link!
http://iase.disa.mil/stigs/stig/
About half way down you should see Network.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide