<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: L3 Switch acting as Internet router between /30 and routed subnet (outside of firewall) in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/l3-switch-acting-as-internet-router-between-30-and-routed-subnet/m-p/17003#M473</link>
    <description>Of course the ideal case is to physically isolate your private switch with the outside L3 switch.&lt;BR /&gt;
&lt;BR /&gt;
If constraint, the next better option is like you mention, using vrf. But, do note vr-router instances shares the same mac address, so they cannot be connected to a L2 switch. However, since you are using Firewall, which is looking at layer 3 and above, then it will not be an issue.&lt;BR /&gt;
&lt;BR /&gt;
VLAN isolation is good only for layer 2. But againt, you must ensure there is no ipf enable for VLAN. To me, that is a risk of misconfiguration.&lt;BR /&gt;
&lt;BR /&gt;
For SSH management, if possible use the out-of-band (OOB) management port. That port itself is also vr-Mgmt isolated. on EXOS platform. &lt;BR /&gt;
&lt;BR /&gt;
The best practices are always defined and isolate the Data Plane, Mgmt. plane and Control Plane.&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 17 Jan 2018 09:39:00 GMT</pubDate>
    <dc:creator>Mel78__CISSP__E</dc:creator>
    <dc:date>2018-01-17T09:39:00Z</dc:date>
    <item>
      <title>L3 Switch acting as Internet router between /30 and routed subnet (outside of firewall)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/l3-switch-acting-as-internet-router-between-30-and-routed-subnet/m-p/17002#M472</link>
      <description>Looking for a "best practices" example using an EXOS switch acting as both a private network switch and an internet router.  We have several deployed in this fashion, mostly where the ISP does not provide a router for the client's routed subnet.  Instead, they give us a /30 which routes via the Extreme to the outside of our firewall. &lt;BR /&gt;
&lt;BR /&gt;
Do you create a second virtual router or simply add the two outside VLANs to the default? We implement a policy which checks a list of subnets before allowing SSH to the management IP, but what else?  Should we be doing more? Anyone have an example?&lt;BR /&gt;
&lt;BR /&gt;
Thanks in advance!&lt;BR /&gt;
BigRic&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Jan 2018 09:20:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/l3-switch-acting-as-internet-router-between-30-and-routed-subnet/m-p/17002#M472</guid>
      <dc:creator>Eric_Burke</dc:creator>
      <dc:date>2018-01-17T09:20:00Z</dc:date>
    </item>
    <item>
      <title>RE: L3 Switch acting as Internet router between /30 and routed subnet (outside of firewall)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/l3-switch-acting-as-internet-router-between-30-and-routed-subnet/m-p/17003#M473</link>
      <description>Of course the ideal case is to physically isolate your private switch with the outside L3 switch.&lt;BR /&gt;
&lt;BR /&gt;
If constraint, the next better option is like you mention, using vrf. But, do note vr-router instances shares the same mac address, so they cannot be connected to a L2 switch. However, since you are using Firewall, which is looking at layer 3 and above, then it will not be an issue.&lt;BR /&gt;
&lt;BR /&gt;
VLAN isolation is good only for layer 2. But againt, you must ensure there is no ipf enable for VLAN. To me, that is a risk of misconfiguration.&lt;BR /&gt;
&lt;BR /&gt;
For SSH management, if possible use the out-of-band (OOB) management port. That port itself is also vr-Mgmt isolated. on EXOS platform. &lt;BR /&gt;
&lt;BR /&gt;
The best practices are always defined and isolate the Data Plane, Mgmt. plane and Control Plane.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Jan 2018 09:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/l3-switch-acting-as-internet-router-between-30-and-routed-subnet/m-p/17003#M473</guid>
      <dc:creator>Mel78__CISSP__E</dc:creator>
      <dc:date>2018-01-17T09:39:00Z</dc:date>
    </item>
  </channel>
</rss>

