476
edits
No edit summary |
No edit summary |
||
|
We have two OPNsense devices, Lasagna and Ravioli.
'''The VLAN configuration (like VLAN IDs) should probably be moved to [[Docs/Switches]] to keep this article strictly Layer3'''
== Management (OOB) ==
# Management cannot communicate with LAN/WAN (the internet), and LAN cannot communicate with Management.▼
{| class="wikitable"
## Generally, Management should be restricted from everything else. (maybe even other iDrac servers?)▼
!Subnet
## OOB services tend to be ''super'' vulnerable, there are dozens of [https://github.com/mgargiullo/cve-2018-1207 premade scripts] that instapwn iDRACs and give you a root shell by just pointing them at the IP address.▼
!VLAN ID
## Because of this, the iDRAC web login interface should only be accessible to anyone you're okay having root on the server.▼
|-
# Wireguard▼
|1?
|}
▲
=== Routing ===▼
▲
▲* 10.10.0.0/24 - Management (OOB Management services like [https://www.dell.com/en-us/lp/dt/open-manage-idrac Dell iDRAC] / [https://www.hpe.com/us/en/hpe-integrated-lights-out-ilo.html HP iLO])
▲
The plan is to use reverse-NAT to map the public IPs to select internal IPs, since we won't have enough IPs for every VM (so we can't do it like IT and exclusively use publicly routable addresses).▼
▲
==== VPN Networks ====▼
== LAN ==
▲* 10.10.10.0/24 - OpenVPN
{| class="wikitable"
* 10.10.11.0/24 - Wireguard▼
!Subnet
** 10.10.11.0/25 - Wireguard admin range (access to Management+LAN, no WAN)▼
!VLAN ID
** 10.10.11.128/25 - Wireguard user range (access to only LAN, no WAN)▼
|-
|10.10.1.0/24
|2?
|}
Servers and Virtual Machines.
LAN cannot communicate with Management.
== WAN ==
{| class="wikitable"
!Subnet
!VLAN ID
|-
|141.219.80.64/27
|640
|}
Our public IP subnet under Tech's <code>141.219.0.0/16</code> block.
▲The plan is to use reverse-NAT to map the public IPs to select internal IPs, since we won't have enough IPs for every VM
{| class="wikitable"
!Subnet
!VLAN ID
|-
|10.10.10.0/24
|N/A
|}
{| class="wikitable"
!Subnet
!VLAN ID
|-
|N/A
|}
All members can be freely given 'user' wireguard configs. Only admin configs need to be restricted (due to the aforementioned iDrac exploit issues).
Neither wireguard config should have access to the internet.
| |||