EasyManua.ls Logo

Vertiv Avocent - Page 84

Vertiv Avocent
117 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
the normal authentication and permission securities built into the appliance. It is recommended that such a security bypass
only be implemented for select few situations.
For example, an SPmanagement tool (HP SIM) residing on the production network could be allowed to directly
communicate with SPs (iLO)connected to the private ports of the appliance for the purpose of monitoring, configuration
and firmware updates. But user sessions would not be permitted to bypass the appliance's securities and SP interaction
would be governed by appliance-based permissions. This could be achieved through a simple NAT or IPforward policy rule
allowing the management tool access to the SP. In addition, a firewall filter rule would prevent users from exploiting the
NAT/forwardrule used by the management tool.
The following criteria should be used to make the determination between a NATrule or an IPforward rule for providing
bypass access to private hosts. An IP forward rule requires that the private IPnetwork/subnet is unique with regard to other
production networks and even other appliance private networks. If two appliances have the exact same IPnetwork
associated with their private ports/hosts, an external host would be unable to properly make a routing decision between the
appliances when trying to send traffic to a private host behind one of them. The benefit of a NATrule is that the same
IPnetwork/subnet can be repeated for private ports/hosts on multiple appliances without the same routing conflict. The
appliance supports two forms of NAT: 1-to-1 NAT (IPmasquerading)and port address translation (PAT/NAToverload).
For successful end-to-end communication leveraging an IPforward policy rule, the private host must treat the nearest
appliance IPas its gateway and all external hosts must have routes (static or dynamic)that reference the private
network/subnet and nearest appliance IP.
NOTE: In this context, the nearest IPis the one belonging to the same network or the closest routable IPon a different
network.
Network configuration changes made to eth0, eth1, bond0, br0, priv, kvm, spm, and any other bridge groups and virtual
private interfaces could affect the applicability of NATand firewall rules. All firewall rules that reference interface names or
addresses that were replaced during the network configuration change should be edited within the NATand/or firewall rules
to ensure proper network communication. For example, eth0/eth1 must be replaced with br0 or bond0 where applicable.
NATflow
Traffic entering an interface (incoming)is translated according to a NATrule before any filtering rules and before any
routing decisions. Traffic exiting an interface (outgoing)is translated according to a NATrule after filter rules and routing
decisions have been made.
Vertiv | Avocent® Universal Management Gateway Appliance Installer/User Guide | 78

Table of Contents

Other manuals for Vertiv Avocent

Related product manuals