• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 669
  • Last Modified:

Secure access to IPMI and vSphere from remote location

I need some help brainstorming a good way to do this.

We are about to deploy a new server - a VMWare ESXi host which will run most of our internal company systems and services.

We have an entirely virtual company and everybody works remotely from home. We don't actually have an office of our own.

We DO rent the services of a "business incubator" - a shared office facility that is basically a receptionist and some shared boardrooms and meeting rooms. They happen to have a really nice 100MBPS internet connection, and that's where our server is going to be hosted.

Our server runs a virtual router - we have a pfSense VM which provides routing for the local area network available inside the host. All of the virtual machines are part of this virtual LAN, and the pfSense VM provides routing and VPN access to the network for our outside workers.

So workers VPN in to the pfSense router, and after that they can access the internal company network. I an also VPN into the network to administer servers via SSH, Remote Desktop etc.

This is great and all so long as everything is working, but on my end there's two low level management tasks I NEED to be able to do remotely, and securely:

1) Connecting to the host via vSphere, to manage virtual machines

2) The server itself has a SuperMicro motherboard with IPMI, and I can connect via IPMIVIEW over port 5900 and I can actually see the console of the physical server - very cool! This lets me see the sensors, power on/off the server, and come to the rescue when everything goes to hell and the server is down.


What's a good way to get remote access to these two services in a secure way? I'm a bit hesitant to just open it up to the Internet, and VPN access only works if the pfSense VM is actually functional - something I can't rely on if I'm trying to fix a broken server.


....... any ideas?
0
Frosty555
Asked:
Frosty555
2 Solutions
 
Henk van AchterbergCommented:
You should put a box in front which will access control connections to your box. I have used mikrotik for remote access as they are (very) cheap but very powerfull (100mbits VPN traffic is NO problem).
0
 
ChadSeatonCommented:
I would use a hardware solution. Two Mikrotik Routers (or Cisco if you want to spend more money) set up to do a VPN Tunnel between the two routers. Use IPSec to secure the tunnel between the two. Done.

This a "always on" VPN sollution.

Video on how to set this up:
http://gregsowell.com/?p=787
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Tackle projects and never again get stuck behind a technical roadblock.
Join Now