Native vlan is management vlan?
Hi CCIEs,
I have a question. Sorry to bug you but I feel this is wrong and a security hole possiblity.
Can you make your network management or is it safe to make your network management vlan say vlan 999 is network management vlan, is it secure to make this your native vlan as well
so native vlan is 999 and network management vlan is 999 is this safe?
I have a question. Sorry to bug you but I feel this is wrong and a security hole possiblity.
Can you make your network management or is it safe to make your network management vlan say vlan 999 is network management vlan, is it secure to make this your native vlan as well
so native vlan is 999 and network management vlan is 999 is this safe?
Comments
LinkedIn: www.linkedin.com/in/charlesbrumley
Its been my experience that everything gets a vlan and thus native vlan is never used as it is A) A security threat to have multiple layer 3 networks in the same vlan which by proxy just connecting two servers in different networks to default set ports will get you there. So this is the same for your switch management. But I think most importantly
Long answer to say that, from my experience, everything gets its own non-native vlan. Leave native vlan for control plane stuff as its used for like BPDU's etc.
EDIT: Depending on the vendor A) can be a problem, but a lot of vendors don't automatically enable ports into access or anything. Just a thought.
I mean, I think I separate management out to its own vlan mainly because there is nothing to lose and possibly something to lose by putting it into the native, so I guess that's how I sort that logic.
The problem is that the native VLAN is like the 'default', so it's very easy for a port to accidentally be on the native VLAN. So if you haven't secured the VLAN, then it can lead interesting and unexpected places. If you have the management VLAN and native VLAN, then it is likely that somewhere in a reasonable sized network will accidentally give access to your management VLAN. Oops.
Nexus switches go a step further and place the management interface in its own VRF instance.
Security: CCNA [ ]
Virtualization: VCA-DCV [ ]