08-20-2015 01:35 AM - edited 03-05-2019 02:06 AM
Hi all,
in the config files of the client's router I found that he configured redundancy between the leased line and VSAT communication using the Router RIP functionality.
Could you please explain how does the redundancy work with the command router rip? and what the disadvantage of using this command in the redundancy configuration, thanks.
Solved! Go to Solution.
08-21-2015 05:40 AM
Fida
Your original question was about redundancy. Having looked again at the config and at the architecture drawing let me say a couple of things about redundancy.
The two routers are connected by two Ethernet interfaces and do run a dynamic routing protocol on both of them. This does provide effective redundancy in the sense that if one link fails all the traffic could be carried by the other link.
The two routers are also connected by VSAT. This has potential to provide redundancy but with the config provided it does not provide redundancy. If there were a dynamic routing protocol running on the VSAT then it could carry traffic between the routers if the Ethernet connections fail. But if routing is not configured on router 1 then it does not matter if routing is configured on router 2 because to provide redundancy it must be configured on both. I also note that the configuration of vlan 2 suggests that they intended to run RIP over the VSAT - but it is not implemented.
Router 1 has 4 serial interfaces that carry 4 IPsec encrypted tunnels. It does not appear that these relate to redundancy since we do not know where they go but it is not to router 2. Router 1 also has two GRE tunnels configured but they do not contribute to redundancy since we do not know where they go but it is not to router 2.
You also ask about security aspects of the router configuration. So let me say something about that. I do not regard running RIP as a security issue. While it is an older routing protocol and many networks choose not to use it I do not believe that it raises security issues. The 4 serial interfaces with IPsec tunnels do implement effective security that protects the data that they carry. The GRE tunnels do not provide security for the data that they carry. I can not assess whether this is a security issue since I do not know if the data that they carry is sensitive.
HTH
Rick
08-20-2015 08:00 AM
Could you please answer to my question?
08-20-2015 08:08 AM
Fida
There is not enough information here for us to understand the problem or to make helpful suggestions. You mention leased line and VSAT, redundancy, and RIP. But there is not anything in the post that tells me how redundancy was set up or about how RIP is being used. If we do not know how it is set up and running then how can we offer advice about it?
HTH
Rick
08-20-2015 08:55 AM
The client told us that the redundancy is set between the two routers, I didn't find any command for the redundancy in the router config, I found only the rip feature configured. So I am trying to understand how the redundancy is done?
08-20-2015 08:55 AM
Fida
Thanks for posting the configuration. I have looked through it and have these questions and observations:
- the original post mentions VSAT and leased line. Am I correct in understanding that vlan 2 is the interface connecting to VSAT? And am I correct in understanding that the leased lines you reference are Serial1/0, 1/1, 1/2, and 1/3?
- would I be correct in assuming that the remote destinations (various subnets of 192.168.144.0 ) are reachable using the VSAT and are also reachable using the leased lines?
- assuming that these are correct then I believe that the way it was set up was intended that running RIP over both the serial interfaces and the VSAT that RIP would find that the destinations were available via both serial interface and via VSAT. If there were a difference in advertised metric then one would be primary and one would be backup. And the important aspect is that if there were a problem with one path that RIP would still know about the alternate path and traffic would fail over.
Thei biggest problem that I see is that there is no network statement in RIP that includes the VSAT interface. So RIP is not running there and there is no redundancy.
HTH
Rick
08-20-2015 09:52 AM
08-20-2015 10:17 AM
Fida
Thanks for sending the detailed architecture. There are still some things that I do not understand. The drawing shows router 1 and router 2 connected via two FastEthernet interfaces and by the VSAT connection. router 1 has the four serial interfaces which do not have anything similar on router 2. It is not clear to me which redundancy we are talking about. Is it redundancy between router 1 and router 2? Is it redundancy between router 1 and some other device?
HTH
Rick
08-20-2015 02:43 PM
the redundancy is supposed to be between the router 1 and 2, but according to their config files I think that it is just configured between the two communication link (VSAT and LS) if the communication with the Leased line fails the VSAT communication will take over. that's what makes me confused?
08-21-2015 03:13 AM
According to you and based one the config file that I published , which are the major security gaps in the router.
Many Thanks Richard for your support.
08-21-2015 05:40 AM
Fida
Your original question was about redundancy. Having looked again at the config and at the architecture drawing let me say a couple of things about redundancy.
The two routers are connected by two Ethernet interfaces and do run a dynamic routing protocol on both of them. This does provide effective redundancy in the sense that if one link fails all the traffic could be carried by the other link.
The two routers are also connected by VSAT. This has potential to provide redundancy but with the config provided it does not provide redundancy. If there were a dynamic routing protocol running on the VSAT then it could carry traffic between the routers if the Ethernet connections fail. But if routing is not configured on router 1 then it does not matter if routing is configured on router 2 because to provide redundancy it must be configured on both. I also note that the configuration of vlan 2 suggests that they intended to run RIP over the VSAT - but it is not implemented.
Router 1 has 4 serial interfaces that carry 4 IPsec encrypted tunnels. It does not appear that these relate to redundancy since we do not know where they go but it is not to router 2. Router 1 also has two GRE tunnels configured but they do not contribute to redundancy since we do not know where they go but it is not to router 2.
You also ask about security aspects of the router configuration. So let me say something about that. I do not regard running RIP as a security issue. While it is an older routing protocol and many networks choose not to use it I do not believe that it raises security issues. The 4 serial interfaces with IPsec tunnels do implement effective security that protects the data that they carry. The GRE tunnels do not provide security for the data that they carry. I can not assess whether this is a security issue since I do not know if the data that they carry is sensitive.
HTH
Rick
08-21-2015 06:20 AM
It's clear now, Thank you Richard for your support.
08-24-2015 05:59 AM
Hi Richard,
There is something else that makes me confused, is the network masks, IP addresses and network segmentation. is there a tool to do the penetration test? based on the config file that I shared in this post how can I do the network segmentation's validation?
Thanks.
08-24-2015 08:07 AM
Fida
I do not understand very well your question. You ask about penetration tests. There certainly are tools to do penetration testing. But since this is not my area of expertise I am reluctant to make suggestions about those tools.
You also ask about network segmentation validation. To perform an appropriate validation we would need more than the configuration of one or two routers. We would need an understanding of their network resources, how many routers, how many switches, how many subnets, how are the subnets distributed, who do they need to communicate with are some of the things we would need to understand to perform an appropriate validation.
HTH
Rick
08-24-2015 08:13 AM
Is there a procedure to do the network segmentation validation to follow?
08-24-2015 08:22 AM
I mean a standard procedure.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide