Network Guys

Share your knowledge!

HPE Comware how to separate the management vlan from the routing table

Hello Guys,

today I will talk about how you can separate the management vlan from the routing table.
Ok that sounds interesting but why do you want that?
In this scenario, I use an HPE Comware 5900 as a central core switch that routes between the individual VLANs. This means that the switch needs an IP address for each VLAN and can be addressed via this address.
And in addition, the requirement was that the management traffic be routed through a firewall to scan the data stream and block it if necessary.

 

Logical structure

Now comes the exciting part: Because the switch routes in the network, the management VLAN is accessible from all other networks and routes past the firewall directly into the management VLAN.
This also applies to the Out of Band Management Interface.

seperate the management vlan

To separate the management vlan or the OOBM interface from the routing table, we have to put it into a separate VPN instance.
this can be done with the following commands:

system view
ip vpn-instance Management
interface Vlan-interface666
 description Management-VLAN
 ip binding vpn-instance Management
 ip address 10.69.69.2 255.255.255.0
quit
ip route-static vpn-instance Management 0.0.0.0 0 10.69.69.1
s s f

If we now run a dis ip routing-table, we see that the management vlan is no longer included. And because we have a default route to the firewall, the management traffic is routed through the firewall.
For control you can you enter dis ip routing-table vpn-instance Management to see the additional routing table also with its own default route for the vpn instance.

Securing the remaining VLAN interfaces

OK, the management vlan is now protected by the firewall, but the switch can be reached via all other IP addresses four SSH, HTTPS or similar. Therefore, we now have to create a very very long advanced ACL that contains every IP of the switch. Except for the IP of the management vlan, otherwise no one can access it remotely :D Here it is important to specify only the individual IP of the switch. If you simply block ssh and co for 192.168.0.0/16, all other systems that fall under this IP range will also be affected.

ACL example for 2 VLANs

acl advanced name NoManagementAccess 
 rule 0 deny tcp destination 10.16.55.1 0 destination-port eq 22
 rule 1 deny udp destination 10.16.55.1 0 destination-port eq 22
 rule 2 deny tcp destination 10.16.55.1 0 destination-port eq 80
 rule 3 deny tcp destination 10.16.55.1 0 destination-port eq 443
 rule 10 deny tcp destination 10.18.69.1 0 destination-port eq 22
 rule 11 deny udp destination 10.18.69.1 0 destination-port eq 22
 rule 12 deny tcp destination 10.18.69.1 0 destination-port eq 80
 rule 13 deny tcp destination 10.18.69.1 0 destination-port eq 443
quit
ssf

Now the ACL must be bound to each VLAN interface for incoming traffic.

interface Vlan-interface100
 ip address 10.16.55.1 255.255.255.0
 packet-filter name NoManagementAccess inbound
 dhcp select relay
 dhcp relay server-address 192.168.0.66
 dhcp relay server-address 192.168.0.67
interface Vlan-interface101
 ip address 10.18.69.1 255.255.255.0
 packet-filter name NoManagementAccess inbound
 dhcp select relay
 dhcp relay server-address 192.168.0.66
 dhcp relay server-address 192.168.0.67
quit
ssf

The what, now the management interfaces of the core switch are only accessible via the firewall exclusively under the management vlan ip.

You don’t have to change anything for the edge switches, because they only have one IP from the management VLAN and then route via the firewall anyway.

 

Have a nice day!

 

2 Responses

Leave a Reply

Click on the button to load the content from jetpack.wordpress.com.

Load content

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Certificates

ekahau Certified Survey Engineer
ATP_wsrgb
ACMP2
suca
Post Categories
Post Archives