476
edits
No edit summary |
No edit summary |
||
| (5 intermediate revisions by the same user not shown) | |||
|
'''For Layer 1 network details, see [[Docs/Cables]].'''
'''For Layer 2 network details, see [[Docs/Switches]].'''
OPNsense is our router/firewall.
We have two OPNsense devices, Lasagna and Ravioli.
=== Management (OOB) ===
{| class="wikitable"
!Subnet
|-
|}
=== LAN ===
{| class="wikitable"
!Subnet
|-
|}
Servers and Virtual Machines.
LAN cannot communicate with Management.
=== WAN ===
{| class="wikitable"
!Subnet
|-
|141.219.80.64/27
|}
Our public IP subnet under Tech's <code>141.219.0.0/16</code> block.
The plan is to use reverse-NAT to map the public IPs to select internal IPs, since we won't have enough IPs for every VM
=== OpenVPN ===
▲# Management cannot communicate with LAN/WAN (the internet), and LAN cannot communicate with Management.
{| class="wikitable"
▲## Generally, Management should be restricted from everything else. (maybe even other iDrac servers?)
!Subnet
▲## OOB services tend to be ''super'' vulnerable, there are dozens of [https://github.com/mgargiullo/cve-2018-1207 premade scripts] that instapwn iDRACs and give you a root shell by just pointing them at the IP address.
|-
▲## Because of this, the iDRAC web login interface should only be accessible to anyone you're okay having root on the server.
|10.10.10.0/24
|}
===
{| class="wikitable"
!Subnet
|-
|10.10.11.0/24
|}
▲* 10.10.0.0/24 - Management (OOB Management services like [https://www.dell.com/en-us/lp/dt/open-manage-idrac Dell iDRAC] / [https://www.hpe.com/us/en/hpe-integrated-lights-out-ilo.html HP iLO])
All members can be freely given 'user' wireguard configs. Only admin configs need to be restricted (due to the aforementioned iDrac exploit issues).
▲The plan is to use reverse-NAT to map the public IPs to select internal IPs, since we won't have enough IPs for every VM (so we can't do it like IT and exclusively use publicly routable addresses).
Neither wireguard config should have access to the internet.
== OPNSense ==
▲* 10.10.10.0/24 - OpenVPN
<Rules for access, updates, generating wireguard configs, etc>
▲* 10.10.11.0/24 - Wireguard
▲** 10.10.11.0/25 - Wireguard admin range (access to Management+LAN, no WAN)
▲** 10.10.11.128/25 - Wireguard user range (access to only LAN, no WAN)
| |||