Solved

HP Blade Center in DMZ

Posted on 2013-01-16
8
787 Views
Last Modified: 2013-01-25
Experts,

I need opinions. We would like to stand up a Blade Center in our DMZ. We would like the management connections run to our main network so we can manage the frame itself. The VCs for the blades will follow the traditional set up of a DMZ. they will be run through the firewalls. The blades are stateless. All data is stored on a SAN.

So I'm in a discussion with my network people. They feel that since the chassis lives in the DMZ, all connections to the chassis should stop there and it should be physically cut off from the network.

My position is that the management connections don't "expose" a security risk. Therefore, we would be fine running those connections outside the firewall.

I also know that you can't see nor move the data that lives on SAN via the management ports.

Is there anyone that is using a blade chassis in there DMZ that can shed some light on this?

I have to believe that we are not the only people using a blade chassis this way.

Thanks!
0
Comment
Question by:punchie123
  • 2
  • 2
  • 2
  • +2
8 Comments
 
LVL 57

Accepted Solution

by:
giltjr earned 167 total points
ID: 38786810
I have never used HP blades, but I have used IBM and Dell.

Assuming that HP's setup is like IBM and Dell, the management interface can't  be used to route traffic between the it and the OS's running on the blades.  So as long as the management and OS's IP addresses are on separate subnets you are safe.

The management IP addresses give you access to manage the blade center and in most cases "RDP" type access to the the blades and OS's running on the blades.  That's it.  

And I really doubt that your DMZ is physically cut off from the network, otherwise you would never be able to access it.  My guess is that it is firewalled off.  Putting your management interface on the internal network is safer than allowing say RDP or VNC through the firewall to you can have access to the servers to manage them.
0
 
LVL 21

Assisted Solution

by:robocat
robocat earned 167 total points
ID: 38786819
We have such a setup. Management of the Blade center is entirely in the LAN.

We do have a virtualisation layer (VMWare) on the blades, which adds an extra layer between the phyiscal hardware and the OS. Chances of anything "escaping" from the virtual machines and accessing the LAN through the blade center management seem extremely slim.
0
 
LVL 55

Expert Comment

by:andyalder
ID: 38786888
I can understand their concern, data could be transferred via the iLOs virtual media from a blade in the DMZ to the LAN without going through the firewall.
0
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

 
LVL 17

Assisted Solution

by:TimotiSt
TimotiSt earned 166 total points
ID: 38792595
It seems a bit unlikely for a malware to jump onto virtual media and come inside the LAN, but sure, possible in theory.
Do you have a 2 firewall setup, like
[internal LAN]---[firewall]---[DMZ]---[firewall]---[internet]
or one firewall with 3 interfaces (internal, DMZ and external)?

You can put the management outside the internal firewall for an added layer of protection, just don't put it outside the outer firewall, that would be a bad idea imho.

Tamas
0
 
LVL 57

Expert Comment

by:giltjr
ID: 38793089
Unless your firewall(s) are doing content/file scanning malware can get in copying files from anywhere.  

What should prevent the malware is anti-virus protection on the target, which should protect you even when using virtual media.
0
 
LVL 21

Expert Comment

by:robocat
ID: 38793406
During normal operations, virtual media will not be mounted, so this risc is fairly limited.
Using a virtualisation layer further lowers chances of this happening.
0
 

Author Comment

by:punchie123
ID: 38819470
Guys,

Thanks for all of your answers.

@giltjr - The Dell and IBM chassis's are basically the same set up. The only ports that will be open through the firewall will be specific to the functionality of what's in the DMZ. We will have to go to our datacenter to manage anything in the DMZ.

@robocat - That's what I was trying to tell our security group. To me, it's akin to the management port on a firewall. Traffic passing thru the firewall can not somehow start passing data on the management connection. They're totally separate.

@TimotiSt - [internal LAN]---[firewall]---[DMZ]---[firewall]---[internet] is our set up.
0
 
LVL 55

Expert Comment

by:andyalder
ID: 38819773
Whatever you think about it your security group are right; until they have fully examined all implications of something being open it stays shut. You may say that you're not going to mount a virtual CD through iLO but they wouldn't be very good at their jobs if they took your word for it. You're probably thinking about a low security environment where all the threats are on the outside and forgetting that the biggest threat is the IT staff.

robocat got one thing right though in the mis-spelling or risk, there's lots of RISC chips in that chassis ;)
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question