07-23-2010 08:47 AM - edited 03-08-2019 06:34 PM
IDSM2 Inline mode design on 6500/7600:
IDSM2 in inline mode can be a complex configuration. Not in terms of configuration on IDSM2 itself, but in terms of configuring 6500/7600 so that traffic can flow through IDSM2. This document tries to explain the basic concepts behind the inline mode design.
Principle:
Broadcast Domains:
One Vlan is one broadcast domain. This means is a broadcast frame sent will only be flooded to all ports in the Vlan and will not transmitted outside it.
We need to route a packet if we need to go from one broadcast domain to the other, i.e from one Vlan to the other.
If we bridge Vlans together, we merge broadcast domains. A broadcast frame sent by host is sent to all ports in both the Vlans that are bridged together.
L3 broadcast allows IP packets to reach all hosts on the local subnet. (But packets will not be forwarded out of other router interfaces to other subnets.)
With bridging, we can merge broadcast domains.
Architecture:
Normal Intervlan routing 6500/7600:
--------------
| IDSM |
| | | |
| g0/7 G0/8 |
|--|--------|--|
|Dport1 Dport2 |
| | | |
Vl 100 | | vl 200
------| 6500 |-------
| ----> |
--------------
| ----> |
Vlan Vlan
Int 100 Int 200
100.1.1.x 200.1.1.x
Inline mode IDSM2 design:
Requirement: IDSM2 should monitor vlan 100.
-----------------
| IDSM |
| <---------> |
| | | |
| g0/7 G0/8 |
|--|---------|----|
|Dport1 Dport2 |
| v100 v300 |
| ^ ^ |
Host A g1/1 | | | | Host B g2/1 Vl200
vL100----|--v | |---------
(Df GW: | V | ---> (Df Gw 200.1.1.1)
100.1.1.1) | | |
----------------- |
| | v
| |
Vlan Vlan200
Int 300 <--> Int 200
100.1.1.1 200.1.1.1
Configuration:
ARP principles:
Working:
- When Host A tries to reach a destination in different subnet or different Vlan, it Arps for the default gateway. The default gateway for Vlan 100 is the SVI on the newly created Vlan 300.
- The Arp broadcast request packet sent by Host A in Vlan 100 is received on Gig1/1 on the switch and is flooded in the Vlan 100. Dataport1 which also belongs to Vlan 100 receives it and then Gig 0/7 of IDSM receives it over the back-plane connection. IDSM bridges Gig0/7 and Gig0/8 and packet goes out of Gig0/8 into Vlan 300 and reaches SVI of Vlan 300 from where is routed to its destination.
- The switch maintains the source mac addresses per Vlan based in the table & learns mac address of Host A on port gig1/1 for Vlan 100 and Dataport 2 for Vlan 300 (Since same packet is bridged from Vlan 100 to Vlan 300 by passing from gig0/7 to gig0/8).
- From the point of view of switch Host A for Vlan 300 can be reached through dataport2.
- Hence any packet sent to Host A in Vlan 300 is sent to dataport2. This is how return traffic destined to Host A also goes through IDSM2.
- When a host A in Vlan 100 sends a packet to host B in vlan 100, Host A arps directly for Host B. And Host B replies (unicast) to Host A. Switch learns the source mac of Host A on Gig 1/1. It also learns the source mac of Host B via arp reply on the port Host B is connected to. The packet never needs to go to the default gateway since both hosts are in the same Vlan.
- The traffic between Host A and B is switched directly by the switch, and this traffic never hits the IDSM2.
The only traffic that needs to go the default gateway will be passing through the IDSM2.
In other words only traffic that leaves the Vlan or is routed to it will get monitored by the IDSM since its bridging the vlans together.
Thanks for the great document.
With the IDSM2 can this all be carried out across multiple VLAN pairs at the same time and if so are there any limitations on this sort of deployment ?
Thanks
Really great information
Andrew : Yes you can
for example on the 6500 switch side you should configure :
intrusion-detection module 4 data-port 1 trunk allowed-vlan 2-10
...........
intrusion-detection module 4 data-port 2 trunk allowed-vlan 11-20
and on the IDSM configure the requerd configurations ...
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: