Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
abigserve
Sep 13, 2009

this is a better avatar than what I had before

bort posted:

F5 and Palo Alto come to mind, too.

The F5 gui is pretty good, even on version 10. Everything is laid out in a sensible manner, it's quick to respond to requests and there's no ambiguity.

Course you can also just edit the config files directly then restart the server daemon.

Adbot
ADBOT LOVES YOU

ragzilla
Sep 9, 2005
don't ask me, i only work here



Aka RFC4193- unique local addresses

http://blog.ipexpert.com/2010/08/02/ipv6-unique-local-addressing-explained/

doomisland
Oct 5, 2004

Also keep in mind that you do have Global unique addresses that you're assigned which is enough to work with (you requested the correct amount right?). Just because they're globally unique doesn't mean they need direct access to 'the internet'.

ruro
Apr 30, 2003

QPZIL posted:

So, IPv6...

code:
xxxx:xxxx:          <== the ISP
xxxx:               <== the individual user/site/section of ISP space
xxxx:               <== the subnet
xxxx:xxxx:xxxx:xxxx <== the individual interface

(ISP:ISP:YOU:SUB:INT:INT:INT:INT)
You can use SUB:INT:INT:INT:INT however you wish.

bort posted:

The other thing to remember is that if you subnet below /64 you will break SLAAC on the subnet.

I can't see SLAAC being terribly important on an enterprise network that uses DHCP. Particularly DHCP can be used to deliver non-addressing related options (NTP, TFTP, etc).

SamDabbers
May 26, 2003



ruro posted:

I can't see SLAAC being terribly important on an enterprise network that uses DHCP. Particularly DHCP can be used to deliver non-addressing related options (NTP, TFTP, etc).

You can use DHCPv6 to deliver the non-addressing related options AND use SLAAC. It doesn't have to be stateful DHCPv6.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer
Is there a curmudgeons guide to ipv6 available somewhere on the internet? I'm a real IT person with real networking knowledge, but have done nothing with ipv6. I feel like I am way behind the times since I'm not even running it at home.

psydude
Apr 1, 2008

^e: I totally want to run IPv6 (dual stack of course) at my next place just for the hell of it.

doomisland posted:

Also keep in mind that you do have Global unique addresses that you're assigned which is enough to work with (you requested the correct amount right?). Just because they're globally unique doesn't mean they need direct access to 'the internet'.

I only requested 152,000 :(

SamDabbers
May 26, 2003



adorai posted:

Is there a curmudgeons guide to ipv6 available somewhere on the internet? I'm a real IT person with real networking knowledge, but have done nothing with ipv6. I feel like I am way behind the times since I'm not even running it at home.

Get a free tunnel and check out the tests/exercises here.

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS

psydude posted:

^e: I totally want to run IPv6 (dual stack of course) at my next place just for the hell of it.


I only requested 152,000 :(

I ended up with 79228162514264337593543950336 after making a pretty vague request to APNIC (we only have a /23 for IPv4... running out of that too). Unfortunately none of our end-user satellite equipment supports IPv6 but I guess I could tunnel remote IPv6 networks.

doomisland
Oct 5, 2004

We have a /32 and a /22 I think? Too lazy to look into the IPAM.

Docjowles
Apr 9, 2009

The "swatting a fly with a Buick" aspect of IPv6 does amuse me. Oh, a /24 isn't enough for you, tough guy? Ok, here's more address space than all of IPv4. We give no fucks :dealwithit:

doomisland
Oct 5, 2004

Just have to remember you can only route a /48 on the internet which also means you get huge rear end space for each site. Used to be a /32 too which is how we got such a large allocation. I think now RIR's give out a /46?

SamDabbers
May 26, 2003



ARIN will give you a /44 if you tell them you have two sites. It's great that the address space is so large because it's really easy to get roomy allocations.

Zuhzuhzombie!!
Apr 17, 2008
FACTS ARE A CONSPIRACY BY THE CAPITALIST OPRESSOR
Any of you guys have training by Raj Toumai (sic?)? Guy is a savant!

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
I wonder what my /19 of v4 space will get me in IPv6.

e:
One of my blocks was an ISP assignment (product never panned out though) so I could get a /32 if I wanted to be a dick.

FatCow fucked around with this message at 05:21 on Aug 23, 2013

SamDabbers
May 26, 2003



FatCow posted:

I could get a /32 if I wanted to be a dick.

That's the thing...the address space is so massive that the dickliness of taking up a /32 would be miniscule. Here's an illustration of just how big we're talking.

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS
I don't even remember making an argument for our /32, I just thought we might as well get an allocation while I was doing IPv4 stuff.

CrazyLittle
Sep 11, 2001





Clapping Larry

doomisland posted:

Just have to remember you can only route a /48 on the internet which also means you get huge rear end space for each site. Used to be a /32 too which is how we got such a large allocation. I think now RIR's give out a /46?

If you're an end user it's between a /44-48 depending on your demonstrated need. If you're a provider, then they'll give you a /32 by default... smaller if you ask for it, or bigger if you show justification.

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:

I wonder what my /19 of v4 space will get me in IPv6.

e:
One of my blocks was an ISP assignment (product never panned out though) so I could get a /32 if I wanted to be a dick.

How many sites do you have?

ARIN NRPM 6.5.8.2 Initial Assignment Size posted:

Organizations that meet at least one of the initial assignment criteria above are eligible to receive an initial assignment of /48. Requests for larger initial assignments, reasonably justified with supporting documentation, will be evaluated based on the number of sites in an organization’s network and the number of subnets needed to support any extra-large sites defined below.

The initial assignment size will be determined by the number of sites justified below. An organization qualifies for an assignment on the next larger nibble boundary when their sites exceed 75% of the /48s available in a prefix. For example:

More than 1 but less than or equal to 12 sites justified, receives a /44 assignment;

More than 12 but less than or equal to 192 sites justified, receives a /40 assignment;

More than 192 but less than or equal to 3,072 sites justified, receives a /36 assignment;

More than 3,072 but less than or equal to 49,152 sites justified, receives a /32 assignment; etc...

Or if you make assignments to end users and are considered an ISP/LIR, you can get a /32.

ToG
Feb 17, 2007
Rory Gallagher Wannabe
Is there ever an occasion when you'd put an ip helper on a vlan which points to an address within that vlan? Ie 192.168.1.0/24 with the helper as 192.168.1.20?

I saw it in a configuration today an I'm still trying to wrap my brain around it.

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS
We run a tunnel from an IOS router to a Ha pair of ASA's in another country to NAT radius from two RADIUS clients to a server behind the ASA. This works great for a few weeks till it doesn't. 5 hours of troubleshooting later with no configuration changes on each and and multiple rebuilds of the tunnel, we Failover the ASAs and it starts working. We fail the back. Still working. What the gently caress.

ate shit on live tv
Feb 15, 2004

by Azathoth

ToG posted:

Is there ever an occasion when you'd put an ip helper on a vlan which points to an address within that vlan? Ie 192.168.1.0/24 with the helper as 192.168.1.20?

I saw it in a configuration today an I'm still trying to wrap my brain around it.

ip helper will turn broadcast dhcp requests into unicast requests. If for some reason the DHCP server NIC doesn't handle broadcasts well, or if you have broadcasts turned off on the SVI, the helper address will ensure the DHCP server gets the requests.

Herv
Mar 24, 2005

Soiled Meat

BurgerQuest posted:

We run a tunnel from an IOS router to a Ha pair of ASA's in another country to NAT radius from two RADIUS clients to a server behind the ASA. This works great for a few weeks till it doesn't. 5 hours of troubleshooting later with no configuration changes on each and and multiple rebuilds of the tunnel, we Failover the ASAs and it starts working. We fail the back. Still working. What the gently caress.

Just for s&g are the phase1 and 2 lifetimes matching?

Does one side try to re-key after a certain data threshold?

sellouts
Apr 23, 2003

This is more of a Cisco hardware question vs a software question.

I'm moving into an office with a 500X switch with a fiber run connecting the other half of the office to another 500X switch. I have to replace one of these switches but not the other.

Could I save some money and get a 500 series switch with a 5gb SFP fiber module to connect to the 500x with 10gb SFP?

Assumptions:
** We will very likely not saturate the 5gb fiber connection, 10gb seems overkill
** Due to physical space we will not need to add another switch. We have plenty of ports leftover in the current situation.
** With only 2 switches and a very simple topography I don't see us needing complicated management setup. A 500 and 500X would likely not be stackable but would I really need that with such a relatively small setup?
** We do not need POE
** If it matters, we are a 99% mac shop with a few small linux servers for development.

n0tqu1tesane
May 7, 2003

She was rubbing her ass all over my hands. They don't just do that for everyone.
Grimey Drawer
Generally, the fiber SFPs need to be matched on both ends. A 5gb module will not link up with a 10gb module.

SamDabbers
May 26, 2003



sellouts posted:

This is more of a Cisco hardware question vs a software question.

I'm moving into an office with a 500X switch with a fiber run connecting the other half of the office to another 500X switch. I have to replace one of these switches but not the other.

Could I save some money and get a 500 series switch with a 5gb SFP fiber module to connect to the 500x with 10gb SFP?

Can you not just reuse the SFP from the switch you're replacing? Why are you replacing it to begin with?

Herv
Mar 24, 2005

Soiled Meat

Herv posted:

Just for s&g are the phase1 and 2 lifetimes matching?

Does one side try to re-key after a certain data threshold?

IOS Default P2 lifetime: 3600 secs (1 Hour) 4,608,000 kilobytes

ASA Default P2 lifetime: 28,800 seconds (8 Hours) 4,608,000 kilobytes

sellouts
Apr 23, 2003

n0tqu1tesane posted:

Generally, the fiber SFPs need to be matched on both ends. A 5gb module will not link up with a 10gb module.

Thanks for this, I'll make sure to match them.

SamDabbers posted:

Can you not just reuse the SFP from the switch you're replacing? Why are you replacing it to begin with?

Because it is being taken by the previous tenant. The other switch is being left for us as part of the sublease deal. I don't know why the powers that be left one and took the other. I'm guessing it's because we are taking some of their furniture and it was negotiated as a 50/50 split.

sellouts fucked around with this message at 20:35 on Aug 23, 2013

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS

Herv posted:

IOS Default P2 lifetime: 3600 secs (1 Hour) 4,608,000 kilobytes

ASA Default P2 lifetime: 28,800 seconds (8 Hours) 4,608,000 kilobytes

Yep, the ASA has the default and the router is set for 28800. After clearing the SAs the tunnel looked fine and in fact was encapsulating the data from the IOS side fine, but only data matching UDP 1812 appeared to get encapped on the ASA in return. The ASA wasn't encapsulating return data on 1813 or ICMP in return. So the client requests would hit the RADIUS server behind the ASA ok, the server would respond appropriately, but only some bits were encapsulated for the tunnel by the ASA. And to make it weirder, this only affected one client and not the other. Atleast I got to generate some pcap files out of the IOS router, which I haven't done much of before.

Herv
Mar 24, 2005

Soiled Meat

BurgerQuest posted:

Yep, the ASA has the default and the router is set for 28800. After clearing the SAs the tunnel looked fine and in fact was encapsulating the data from the IOS side fine, but only data matching UDP 1812 appeared to get encapped on the ASA in return. The ASA wasn't encapsulating return data on 1813 or ICMP in return. So the client requests would hit the RADIUS server behind the ASA ok, the server would respond appropriately, but only some bits were encapsulated for the tunnel by the ASA. And to make it weirder, this only affected one client and not the other. Atleast I got to generate some pcap files out of the IOS router, which I haven't done much of before.

Hrm, ok cool, since you are matching lifetimes, I'm assuming the nat exclusions are tight...but I am curious if/when it happens again, if the return traffic is somehow getting banished to the xlate table and never making it to the tunnel.

Maybe just a bug in the ASA build? That sounds like a frustrating one to peg down. Good luck, hope you find the problem.

e: Sorry for asking this here, but is there a 'SQL short questions thread'? I scanned the first few pages here but don't see anything. I am having weird issues with TDE encrypted databases and log shipping, the monitor isn't updating properly post encryption, and every secondary has the certificates, is restoring properly, but the logship monitor is deaf and dumb to some of the metrics.

Herv fucked around with this message at 00:57 on Aug 24, 2013

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS
I'm leaning towards strange bug too. The setup is pretty simple. Basically RADIUS requests are received from a tunnel interface on the IOS router, which has a static route for the RADIUS server towards the outside interface where a crypto map is applied to match the RADIUS traffic and ICMP (complete reverse of the same ACL on the ASA). Before that, the two clients addresses are statically NAT'd to another IP each, because the RADIUS server behind the ASA's also talks to these RADIUS clients directly elsewhere. This works well enough for our purposes. It's a pretty simple configuration and doesn't require much maintenance generally. Unfortunately I managed the gear in this country and someone else manages the ASA in the other, so I wasn't debugging the ASA directly but I trust him when he says nothing in the config changes and the relevant parts he pasted me seemed a-ok. The debug output from the tunnel looked fine, just DPD messages.

:iiam:

Herv
Mar 24, 2005

Soiled Meat
OK I don't give up easy.

You say the radius servers behind the ASA need to talk to the clients through multiple channels due to (A reason I also don't know about). Can't you just add secondary IP's so you can point what traffic you want to client 1 and 2 on either the primary or secondary IP instead of the NAT tricks? I have a hard time picturing the exact details without a map.

I can't tell if this is an old school transient ipsec tunnel, I try to avoid straight tunnels and do dmvpn wherever I can. (Don't think this is an option on PIX/ASA).

Another question, are the encrypted radius calls not secure enough on their own? I know, could be policy... lots of moving parts.

Anyhow, I love a good/weird problem here and there.

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS
I'll PM you a diagram and an explanation, I don't want to talk much more publicly about it :)

Protokoll
Mar 28, 2003

Here we go Lina.
Here we go Lina.
COME ON, LINA!
In a not-at-all-surprising move, my employer has decided to sell and manage a product that we cannot possibly support. Of course, the design task has fallen to our networking lead and we have been trying to flesh out a design that is simple, scalable and provides basic segmentation between port members. Since our IW pricing is astronomical, our equipment budget is basically nonexistent. Welcome to my hell.

Without divulging the entirety of the project, since it's very much in beta, these are the quick and dirty specs:

- 100 Mb Ethernet hand off into a 39XX (praying they approve a second router for FHRP and a second circuit for diversity)
- 3 X 3750G-12S-12 aggregation switches
- 13 X 2960 access switches

We're running OM3 between all of the equipment because we like charging the customer for poo poo they don't need (not our decision). All of the uplinks will be port channels and we're running layer 2 all the way up to the router. We're handing public IPs off at the access layer (no NAT). Each customer is going to be getting a port with a public address and it's their responsibility to protect their traffic. Given this scenario:

What is the easiest, most scalable solution to prevent each customer from being able to talk to the other customers? Once this is designed, it's going to be deployed to (potentially) 2,000 different sites and standard "Have you tried turning it off and on again?" personnel are going to inherit the day-to-day maintenance and management of each site. We've discussed some of the following solutions:

- VRFs for every customer (not scalable, not simple enough for NOC personnel to troubleshoot, excessive documentation required)
- PVLANs (requires more expensive switches at the access layer; a non-starter)
- Put every customer in their own VLAN and use L3 ACLs to prevent routed traffic (time consuming, not scalable)

Our current champion design is to use protected ports at the access layer (all 200 ports in the same VLAN; not my idea) in an attempt to jury-rig a PVLAN solution with cheaper switches. All of the ports save the uplinks will be protected essentially preventing traffic sourced by a customer from going anywhere except the edge router. Other than this not being best practice, is there a better way to design a solution given a lovely budget and no time? The only glaring problem I can see is that if, down the road, customer 1 need to talk to customer 100 we would have to move them into their own VLAN. How would you handle this?

Protokoll fucked around with this message at 04:18 on Aug 27, 2013

SamDabbers
May 26, 2003



Protokoll posted:

Each customer is going to be getting a port with a public address and it's their responsibility to protect their traffic.

Why even bother with trying to isolate the traffic between customers? Set up DHCP snooping/ARP inspection to mitigate IP spoofing, put it all in a big layer 2 (to save addresses and complexity) and call it a day. This also saves you from having to devise a way for NOC personnel to permit desired customer-to-customer traffic later.

Alternatively, what about PPPoE? Bump up the L2 MTU a little so the path is 1500 byte clean, ACL deny anything but PPPoE on the access ports, and all traffic goes through the router so you can filter to your heart's content. You can even pass ACL rules via RADIUS.

Protokoll
Mar 28, 2003

Here we go Lina.
Here we go Lina.
COME ON, LINA!

SamDabbers posted:

Why even bother with trying to isolate the traffic between customers?

It's a requirement we cannot control nor influence. I know...

PPPoE sounds like a good solution, we can white board it tomorrow.

ruro
Apr 30, 2003

Not sure about platform support, but how about private vlans?

Edit: derp didn't read all of your post.

ruro fucked around with this message at 06:44 on Aug 27, 2013

Herv
Mar 24, 2005

Soiled Meat
I would have figured pruning would have done the trick but not sure if that is supported on those switches.

At any rate static arp entries > arp spoofing.

e: Oops can't tell difference between IP and ARP spoofing. Nevermind me.

Herv fucked around with this message at 20:48 on Aug 27, 2013

GOOCHY
Sep 17, 2003

In an interstellar burst I'm back to save the universe!
Why don't you just use VRFs? Sure, there's some effort in the initial provisioning for them but it's possible. It's not that hard to explain to the front line folks how a VRF works in basic terms. I worked for a MSP that was able to communicate how to do basic troubleshooting for VRFs. After some initial thrashing the non-necessary ticket escalations slowed down to nothing. There are always growing pains.

"Potentially 2000 sites" - what's the realistic deployment out of the gates?

GOOCHY fucked around with this message at 01:38 on Aug 28, 2013

Adbot
ADBOT LOVES YOU

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer
Seriously -- VRF is pretty simple concept in todays virtualized world.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply