Re: VLANs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 10/01/11 21:33, John Haxby wrote:
On 10 Jan 2011, at 17:42, Jonathan Tripathy wrote:

I wish to use VLANs on my Linux Xen hosts to seperate managed customer networks.

Can anybody please give me some pointers on how to make the network secure so no-one can VLAN hop?

At the minute, I plan to set up one bridge per customer, and use linux vconfig to add an if to the bridge (which I believe strips all tags). Then, all the respective customer Xen DomU (VM) interfaces will connect to the bridge.
If each bridge (for each customer) contains just one vlan-tagged physical interface then there is no way for the guests to vlan-hop.  A vlan tag added by a guest will either be replaced by the vlan tag of the external interface or the frame will be dropped.  If you have multiple vlans on a bridge (with multiple physical interfaces) then the vlan will be chosen by routing if the interfaces have their own addresses, I'm not sure what happens if the interfaces don't have addresses, but when a frame leaves on a vlan interface it acquires the corresponding vlan tag.  It doesn't matter what happens to the tag on the way back as it's only relevant to an interface that's on a vlan.

Obviously you should test this, but it's all pretty straightforward and there's nothing special or complicated to set up.

jch
Excellent! Thank you for your explanation.

If a guest maliciously added a vlan tag, wouldn’t it still remain in the frame, however be "double-tagged" by the outgoing physical port? Even still though, this probably isn't an issue, provided that all upstream switches are configured correctly.

In the first instance though, my Xen host will connect directly to my vlan-aware firewall port

Please let me know if I've got this wrong somewhere...
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux