Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Proper authentication model

  • From: Stephen Stuart
  • Date: Wed Jan 12 10:59:44 2005


> 2) An OpenBSD bastion host(s), where the NOC would ssh in, get
> authenticated from TACACS+ or ssh certs, and then just telnet from
> there all day,

[...] (and s/telnet/ssh as has been suggested already)

> 3) Or just an IOS based bastion router that also runs ssh, 


When crafting the ACL that restricts what source IP{,v6} addresses may
ssh to the router, you may want to include each router's neighbors by
both their loopback and any interface addresses that might source a
packet (if your security policy permits it). Having all your loopbacks and
internal interfaces in a small number of prefixes dedicated to the
task can help you craft a more-maintainable ACL. 

The motivation for doing this is that if dynamic routing melts down,
you may find that using PMR to ssh from router to router is
helpful. If you find yourself in a situation where you're using PMR,
you may also need to turn off "ip ssh source-interface Loopback0" if
you have it turned on - if dynamic routing has melted to the point
where routers don't know each others' loopbacks, sourcing an ssh
packet from a loopback won't get you far. If you use TACACS for AAA,
plan in advance to have at least one login on the router with local
credentials so that you can get in when TACACS is broken.


Discussion Communities

About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home

Merit Network, Inc.