Management Plane Isolation

<< Click to Display Table of Contents >>

Navigation:  Operation and Maintenance > Security Maintenance > Network Layer Security >

Management Plane Isolation

Navigation: Operation and Maintenance > Security Maintenance > Network Layer Security >

hm_btn_navigate_prevhm_btn_navigate_tophm_btn_navigate_next

The unified gateway supports isolation of the management plane from the service plane to ensure the security of the system management plane.

public_sys-resources_note_3.0-en-us

Physical isolation is more secure and reliable; therefore, scheme 1 is recommended.

Scheme 1: Physical Isolation (for X1911/X1960/X1981 only)

Configure dual-network-port mode on the control board of the unified gateway to physically isolate the management plane from the service plane, which ensures that the management plane is invisible to the service plane. Figure 1 shows the network.

Figure 1 Network for physical isolation

U1900_semt_image_f_u1960_semt_00070_01

[Verification]

Attempt to access any IP address, protocol port, or URL of the management plane of the unified gateway from the service network. The access is expected to fail. For example, if you ping the IP address of network port 0, the ping operation is expected to fail.

Scheme 2: Firewall Policy Control

Configure the management plane access policy on the unified gateway and firewall. Such a policy specifies that only IP addresses in the management terminal area can access the URL or protocol port of the management plane. This ensures that the management entries are invisible to the service terminal area. Figure 2 shows the network.

Figure 2 Network for firewall policy control

U1900_semt_image_f_u1960_semt_00070_02

Parent Topic: Network Layer Security

 

 

< Previous topic Next topic >