Re: Proper authentication model

2005-01-16 Thread John Bittenbender
On Wed, 12 Jan 2005 12:58:43 -0500, Hannigan, Martin <[EMAIL PROTECTED]> wrote: > > > > -Original Message- > > From: Joe Abley [mailto:[EMAIL PROTECTED] > > Sent: Wednesday, January 12, 2005 12:05 PM > > To: Hannigan, Martin > > Cc: NANOG l

Re: Proper authentication model

2005-01-16 Thread Gernot W. Schmied
Iljitsch van Beijnum wrote: On 12-jan-05, at 11:30, Gernot W. Schmied wrote: True out of band management networks are very hard to build and very hard to use, and you run the risk that you can't get at your stuff because the management network is down. IS-IS can be highly recommended for true ou

Re: Proper authentication model

2005-01-13 Thread Owen DeLong
That's great if you want to trust one carrier to provide all your seperacy, but, when you want to make sure carrier A isn't running your ring in common with carrier B, you need GIS data. Owen --On Thursday, January 13, 2005 10:36 AM + [EMAIL PROTECTED] wrote: > My point was that competing, d

Re: Proper authentication model

2005-01-13 Thread Erik Haagsman
On Wed, 2005-01-12 at 20:12, Daniel Golding wrote: > > The biggest problem I've seen with dial-up OOB is reliability. You really > need you really need to have a good series of testing scripts to ensure that > all the phone lines are working, modems have reset properly, serial ports > are ok, etc

Re: Proper authentication model

2005-01-13 Thread Michael . Dillon
> > My point was that competing, differently-named and > > organisationally-separate suppliers of network services frequently use > > common suppliers for metro fibre, long-haul transport, building access, > > etc. Just because you buy different services from different providers > > doesn't mean

Re: Proper authentication model

2005-01-12 Thread Hannigan, Martin
EMAIL PROTECTED] <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] <[EMAIL PROTECTED]> CC: NANOG list Sent: Wed Jan 12 14:35:21 2005 Subject: RE: Proper authentication model On Wed, 12 Jan 2005, Hannigan, Martin wrote: > Out of band management isn't telnetting from your desktop to &g

RE: Proper authentication model

2005-01-12 Thread Hannigan, Martin
> -Original Message- > From: Steve Gibbard [mailto:[EMAIL PROTECTED] > Sent: Wednesday, January 12, 2005 5:35 PM > To: Hannigan, Martin > Cc: NANOG list > Subject: RE: Proper authentication model > > > On Wed, 12 Jan 2005, Hannigan, Martin wrote: > [

RE: Proper authentication model

2005-01-12 Thread Steve Gibbard
On Wed, 12 Jan 2005, Hannigan, Martin wrote: > Out of band management isn't telnetting from your desktop to > the serial port. > > Mgmt and surveillance is the Bellcore standard for out of band. > It means your M/S is not riding your customer or public networks, and > it's physically seperate. Ye

Re: Proper authentication model

2005-01-12 Thread Daniel Golding
On 1/12/05 12:05 PM, "Joe Abley" <[EMAIL PROTECTED]> wrote: > > > On 12 Jan 2005, at 11:53, Hannigan, Martin wrote: > >>> You mean you'd *request* a different path from different providers. >> >> Provisioning a circuit from two different ^providers^, other than >> your OC3 provider. > > I re

Re: Proper authentication model

2005-01-12 Thread Daniel Golding
On 1/12/05 8:46 AM, "Erik Haagsman" <[EMAIL PROTECTED]> wrote: > > On Wed, 2005-01-12 at 12:37, David Gethings wrote: >> On Wed, 2005-01-12 at 12:25 +0100, Iljitsch van Beijnum wrote: >>> IPv6 is also very useful in providing non-IPv4 management. >> Well if we're offering protocols other than IP

RE: Proper authentication model

2005-01-12 Thread Hannigan, Martin
> -Original Message- > From: Joe Abley [mailto:[EMAIL PROTECTED] > Sent: Wednesday, January 12, 2005 12:05 PM > To: Hannigan, Martin > Cc: NANOG list > Subject: Re: Proper authentication model > > > > On 12 Jan 2005, at 11:53, Hannigan, Martin wrote: >

Re: Proper authentication model

2005-01-12 Thread Joe Abley
On 12 Jan 2005, at 11:53, Hannigan, Martin wrote: You mean you'd *request* a different path from different providers. Provisioning a circuit from two different ^providers^, other than your OC3 provider. I realise that's what you meant. My point was that competing, differently-named and organisati

RE: Proper authentication model

2005-01-12 Thread Hannigan, Martin
> -Original Message- > From: Joe Abley [mailto:[EMAIL PROTECTED] > Sent: Wednesday, January 12, 2005 10:55 AM > To: Hannigan, Martin > Cc: NANOG list > Subject: Re: Proper authentication model > > > > On 12 Jan 2005, at 10:16, Hannigan, Martin wrote:

Re: Proper authentication model

2005-01-12 Thread Stephen Stuart
> When crafting the ACL that restricts what source IP{,v6} addresses may > ssh to the router, you may want to include each router's neighbors by > both their loopback and any interface addresses that might source a > packet (if your security policy permits it). I forgot a phrase: [that might sou

Re: Proper authentication model

2005-01-12 Thread Stephen Stuart
[...] > 2) An OpenBSD bastion host(s), where the NOC would ssh in, get > authenticated from TACACS+ or ssh certs, and then just telnet from > there all day, [...] (and s/telnet/ssh as has been suggested already) > 3) Or just an IOS based bastion router that also runs ssh, [...] When crafting

Re: Proper authentication model

2005-01-12 Thread Joe Abley
On 12 Jan 2005, at 10:16, Hannigan, Martin wrote: If you have 3 sites and they're interconnected via an OC3 and the internet, you would also have 2 frame or ppp circuits seperately connecting the terminal server network. You'd do the different path, different provider, etc. on these circuits. You

RE: Proper authentication model

2005-01-12 Thread Hannigan, Martin
> -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of > Iljitsch van Beijnum > Sent: Wednesday, January 12, 2005 6:25 AM > To: Gernot W. Schmied > Cc: NANOG list > Subject: Re: Proper authentication model > > > > On 12-ja

Re: Proper authentication model

2005-01-12 Thread Erik Haagsman
On Wed, 2005-01-12 at 12:37, David Gethings wrote: > On Wed, 2005-01-12 at 12:25 +0100, Iljitsch van Beijnum wrote: > > IPv6 is also very useful in providing non-IPv4 management. > Well if we're offering protocols other than IP(v4) for OOB management > then might I chip in with MPLS? What ever ha

Re: Proper authentication model

2005-01-12 Thread David Gethings
On Wed, 2005-01-12 at 12:25 +0100, Iljitsch van Beijnum wrote: > IPv6 is also very useful in providing non-IPv4 management. Well if we're offering protocols other than IP(v4) for OOB management then might I chip in with MPLS? ;) -- Cheers Dg

Re: Proper authentication model

2005-01-12 Thread Iljitsch van Beijnum
On 12-jan-05, at 11:30, Gernot W. Schmied wrote: True out of band management networks are very hard to build and very hard to use, and you run the risk that you can't get at your stuff because the management network is down. IS-IS can be highly recommended for true out of band management, it is

Re: Proper authentication model

2005-01-12 Thread Gernot W. Schmied
Iljitsch van Beijnum wrote: On 11-jan-05, at 18:48, Daniel Golding wrote: True out of band management networks are very hard to build and very hard to use, and you run the risk that you can't get at your stuff because the management network is down. IS-IS can be highly recommended for true out

Re: Proper authentication model

2005-01-11 Thread Joe Abley
On 11 Jan 2005, at 15:28, Kevin wrote: On Tue, 11 Jan 2005 11:17:55 +0200, Kim Onnel <[EMAIL PROTECTED]> wrote: Hello, I'd like everyones 2 cents on the BCP for network management of an ISP PoPs, with a non-security oriented NOC, . . . 2) An OpenBSD bastion host(s), where the NOC would ssh in, g

Re: Proper authentication model

2005-01-11 Thread Iljitsch van Beijnum
On 11-jan-05, at 18:48, Daniel Golding wrote: Its terribly important that your routers' management traffic be encrypted all the way to the device. Why "terribly important"? If this stuff runs over your own network then others aren't going to be able to sniff it without physically getting at your

Re: Proper authentication model

2005-01-11 Thread Kevin
On Tue, 11 Jan 2005 11:17:55 +0200, Kim Onnel <[EMAIL PROTECTED]> wrote: > > Hello, > I'd like everyones 2 cents on the BCP for network management of an ISP > PoPs, with a non-security oriented NOC, . . . > 2) An OpenBSD bastion host(s), where the NOC would ssh in, get > authenticated from TACACS

Re: Proper authentication model

2005-01-11 Thread Daniel Golding
Kim, Its terribly important that your routers' management traffic be encrypted all the way to the device. For this reason, the best practice is to use ssh2. There are some other hacks that can be used, but they are hacks, and are not scalable. Bastion hosts are a good thing and can be a great pl

Proper authentication model

2005-01-11 Thread Kim Onnel
Hello, I'd like everyones 2 cents on the BCP for network management of an ISP PoPs, with a non-security oriented NOC, Most of my routers doesnt have crypto IOS images, couldnt agree with core members to do a major upgrade, just a promise of doign that when other needs to an IOS upgrade come up,