ā07-29-2021 09:56 AM
Hi Community,
I have a customer who uses xos-switches exclusively for L2 connectivity. The network is segmentet and the central routing instance is the firewall.
This firewall only supports one IP-Helper-address. This address is already in use for a DHCP-Server.
I would like to create another bootprelay on a extreme device to relay the dhcp packets to the pxe-server, too. But sadly, I need to enable ipforwarding on both vlans to get bootprelay running. As this could be used to bypass the central firewall, it is not allowed for security reasons.
So, what I would like to do is to define a Accesslist, which only permits the bootprelay packets to get forwarded on L3 while all other traffic may be forwarded on L2 but not on L3 (as this has to happen on the firewall)
If there is another way to realize, what i am planning, I would be interested, too!
Any Ideas on this?
Best Regards,
Robert
ā07-30-2021 06:26 PM
Hi Robert,
as long as users have the firewall as the default GW and are not allowed to manually call EXOS for any remote destination forwarding, it should be good. Of course, EXOS IP must not be allowed to be set as the gateway at all cost.
ACL might be tricky. I donāt see an ACL option to pick ārouted packetsā for filtering. Perhaps packets destined towards switchās MAC address should be denied. But then, management traffic to it will be impaired. Two+ entries are needed then:
I think this might work.
Mgmt traffic from within the mgmt subnet will have both MAC and IP accurately pointing the switch. The rule has to be IP-based to not allow routing of mgmt protocols through the switch.
If itās SSH it will be allowed because of the first rule (just an example for one mgmt protocol).
If itās something else, like Telnet to the switch, it wonāt be allowed.
If itās something the switch would be asked to route, the packet would contain remote IP and switch MAC. First rule wouldnāt apply so the second would be matched and packet should get denied.
Caveat is, any to-the-switch protocols must be allowed explicitly.
Just a quick food for thoughts.
Hope that helps,
Tomasz
ā07-29-2021 10:37 AM
Install a Linux-Machine with DHCP Relay installed and relay from the firewall to this Linux-Machine and from there to the DHCP and PXE.
Not nice, but should work.