07-29-2021 09:56 AM
Hi Community,
I have a customer who uses xos-switches exclusively for L2 connectivity. The network is segmentet and the central routing instance is the firewall.
This firewall only supports one IP-Helper-address. This address is already in use for a DHCP-Server.
I would like to create another bootprelay on a extreme device to relay the dhcp packets to the pxe-server, too. But sadly, I need to enable ipforwarding on both vlans to get bootprelay running. As this could be used to bypass the central firewall, it is not allowed for security reasons.
So, what I would like to do is to define a Accesslist, which only permits the bootprelay packets to get forwarded on L3 while all other traffic may be forwarded on L2 but not on L3 (as this has to happen on the firewall)
If there is another way to realize, what i am planning, I would be interested, too!
Any Ideas on this?
Best Regards,
Robert
07-30-2021 06:26 PM
Hi Robert,
as long as users have the firewall as the default GW and are not allowed to manually call EXOS for any remote destination forwarding, it should be good. Of course, EXOS IP must not be allowed to be set as the gateway at all cost.
ACL might be tricky. I don’t see an ACL option to pick ‘routed packets’ for filtering. Perhaps packets destined towards switch’s MAC address should be denied. But then, management traffic to it will be impaired. Two+ entries are needed then:
I think this might work.
Mgmt traffic from within the mgmt subnet will have both MAC and IP accurately pointing the switch. The rule has to be IP-based to not allow routing of mgmt protocols through the switch.
If it’s SSH it will be allowed because of the first rule (just an example for one mgmt protocol).
If it’s something else, like Telnet to the switch, it won’t be allowed.
If it’s something the switch would be asked to route, the packet would contain remote IP and switch MAC. First rule wouldn’t apply so the second would be matched and packet should get denied.
Caveat is, any to-the-switch protocols must be allowed explicitly.
Just a quick food for thoughts.
Hope that helps,
Tomasz
07-29-2021 10:37 AM
Install a Linux-Machine with DHCP Relay installed and relay from the firewall to this Linux-Machine and from there to the DHCP and PXE.
Not nice, but should work.