10-13-2021 10:50 AM
Hello Team,
I understand the management VLAN concepts with L2 switches - enable the SVI/IP address on the VLAN that you create specifically for it.
When one utilizes L3 switches, which may typically have SVI on most VLAN's, how does one prevent users from these other vlans from not having access to the management VLAN? Or, what are best practices for a L3 switch management VLAN?
Thanks,
WW
Solved! Go to Solution.
10-13-2021 11:27 AM - edited 10-13-2021 11:29 AM
You would have to use ACL to block SSH/Telnet from all user subnets except the management subnet.
HTH
10-13-2021 01:52 PM
There are several ways to understand management vlan for switches. The more simple understanding is to focus on remote access to the switch (and that seems to be the focus of the original poster who asks " how do your disable switch management access within a L3 subnet/VLAN?".). I agree with Reza that you would use ACLs and would go a step further and suggest that on the switch you configure access-class on all of the vty ports. access-class uses an acl (preferable a standard acl and not an extended acl) to specify what IP addresses are permitted remote access to the switch.
10-13-2021 02:49 PM
"Or, what are best practices for a L3 switch management VLAN?"
In many respects, they might be the same as on a router (which might have multiple routed interfaces).
In the large Enterprise environments I've worked in, for network devices, there was some "trust" for our internal facing interfaces so we didn't ACL control the interfaces, themselves. Instead we had either Radius or Tacacs logon control, perhaps with a "dynamic" PIN key (e.g. SecureID token). And/or we had ACL controlling Telnet/SSH/SNMP access to the device (regardless of interface accessed through).
Also, generally, we only ACL'ed interfaces when connected to "untrusted" networks, like Internet connections.
10-13-2021 11:08 AM
Hi,
how does one prevent users from these other vlans from not having access to the management VLAN?
Well, users should not have access (username/password) to network devices. If you want to block management subnet from users, you would have to use ACL on the layer-3 switch to make sure the management subnet/vlan is not reachable from the user subnets.
HTH
10-13-2021 11:17 AM
Let's say the username/password was somehow compromised.
Within Packet Tracer, I created a single L3 switch with 5 PC's connected to it. Each PC within their subnet/VLAN could access the switch using SSH. Thus, how do your disable switch management access within a L3 subnet/VLAN?
WW
10-13-2021 11:27 AM - edited 10-13-2021 11:29 AM
You would have to use ACL to block SSH/Telnet from all user subnets except the management subnet.
HTH
10-13-2021 01:52 PM
There are several ways to understand management vlan for switches. The more simple understanding is to focus on remote access to the switch (and that seems to be the focus of the original poster who asks " how do your disable switch management access within a L3 subnet/VLAN?".). I agree with Reza that you would use ACLs and would go a step further and suggest that on the switch you configure access-class on all of the vty ports. access-class uses an acl (preferable a standard acl and not an extended acl) to specify what IP addresses are permitted remote access to the switch.
10-13-2021 02:49 PM
"Or, what are best practices for a L3 switch management VLAN?"
In many respects, they might be the same as on a router (which might have multiple routed interfaces).
In the large Enterprise environments I've worked in, for network devices, there was some "trust" for our internal facing interfaces so we didn't ACL control the interfaces, themselves. Instead we had either Radius or Tacacs logon control, perhaps with a "dynamic" PIN key (e.g. SecureID token). And/or we had ACL controlling Telnet/SSH/SNMP access to the device (regardless of interface accessed through).
Also, generally, we only ACL'ed interfaces when connected to "untrusted" networks, like Internet connections.
10-14-2021 11:23 PM
WW
I am glad that our suggestions have been helpful. Thank you for marking this question as solved. This will help other participants in the community to identify discussions which have helpful information. This community is an excellent place to ask questions and to learn about networking. I hope to see you continue to be active in the community.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide