Hi,
At our university we use the portadmin "vlan_auth" feature to restrict access to certain VLANs for certain organizations. Now we have the problem that a VLAN that we want to give access to is missing in NAV and we couldn't find a way to just add this VLAN.
From what I understand VLANs are added automatically by ipdevpoll from detected router ports. Now the reason for this missing VLAN most probably is the fact that it is routed on a PaloAlto firewall. This firewall exists in NAV as type "Palo Alto Networks PA-5200 (Palo Alto Networks PA-5200 series firewall from PaloAlto)" (sysobjectid 1.3.6.1.4.1.25461.2.3.23) but no router ports are reported (count 0).
So my questions at this point are:
- Is there a way to manually add VLANs so the can be used by "vlan_auth"? - Is my assumption correct that the VLAN is missing because the PaloAlto router ports are not correctly detected? - Should PaloAlto router ports normally be detected with NAV? - If so, how can I fix this? And if not, is there any workaround available? - Is https://github.com/Uninett/nav/pull/2613 a solution to this?
We are currently using NAV 5.5.2
Thanks and best regards,
--
Philipp Petermann Universität Basel | ITS | NINS Spitalstrasse 41 | 4056 Basel | Schweiz Tel. +41 61 207 15 74
Hi,
just for the record answering the question on how to manually add VLANs. I had a look with Philipp on how we could add these VLANs directly via the db and it turns out there is a better way that can be nicely achieved through the SeedDB Prefix Gui adding a Dummy Prefix for the VLANID. This creates the VLAN AND adds it to the needed group if configured in the Prefix allocation. Really nice and convenient.
Cheers, Mischa
On Mon, 2023-06-19 at 08:26 +0000, Philipp Petermann wrote:
Hi,
At our university we use the portadmin "vlan_auth" feature to restrict access to certain VLANs for certain organizations. Now we have the problem that a VLAN that we want to give access to is missing in NAV and we couldn't find a way to just add this VLAN.
From what I understand VLANs are added automatically by ipdevpoll from detected router ports. Now the reason for this missing VLAN most probably is the fact that it is routed on a PaloAlto firewall. This firewall exists in NAV as type "Palo Alto Networks PA-5200 (Palo Alto Networks PA-5200 series firewall from PaloAlto)" (sysobjectid 1.3.6.1.4.1.25461.2.3.23) but no router ports are reported (count 0).
So my questions at this point are:
- Is there a way to manually add VLANs so the can be used by
"vlan_auth"?
- Is my assumption correct that the VLAN is missing because the PaloAlto
router ports are not correctly detected?
- Should PaloAlto router ports normally be detected with NAV?
- If so, how can I fix this? And if not, is there any workaround
available?
- Is https://github.com/Uninett/nav/pull/2613%C2%A0a solution to this?
We are currently using NAV 5.5.2 Thanks and best regards,
--
Philipp Petermann Universität Basel | ITS | NINS Spitalstrasse 41 | 4056 Basel | Schweiz Tel. +41 61 207 15 74 _______________________________________________ Nav-users mailing list -- nav-users@lister.sikt.no To unsubscribe send an email to nav-users-leave@lister.sikt.no
mischa.diehm@unibas.ch said:
- Is my assumption correct that the VLAN is missing because the PaloAlto
router ports are not correctly detected?
- Should PaloAlto router ports normally be detected with NAV?
morten.brekkevold@sikt.no said:
Perhaps someone from the University of Tromsø reads this and can comment? They use PaloAlto, and have recently contributed the pull request you mentioned.
University of Tromsø speaking: We have nothing further to add. I guess that whether your PaloAlto ports is detected "correctly" depends on how you use your PaloAlto. We have not defined any vlans on our PaloAlto or any vlan-interfaces.
All our layer3 trunk ports and subinterfaces are detected, as well as physical ports.
--Ingeborg
On Mon, 19 Jun 2023 08:26:38 +0000 (4 days, 6 hours, 19 minutes ago) Philipp Petermann philipp.petermann@unibas.ch wrote:
From what I understand VLANs are added automatically by ipdevpoll from detected router ports. Now the reason for this missing VLAN most probably is the fact that it is routed on a PaloAlto firewall. This firewall exists in NAV as type "Palo Alto Networks PA-5200 (Palo Alto Networks PA-5200 series firewall from PaloAlto)" (sysobjectid 1.3.6.1.4.1.25461.2.3.23) but no router ports are reported (count 0).
So my questions at this point are:
- Is there a way to manually add VLANs so the can be used by
"vlan_auth"?
Potentially by using the solution proposed by Mischa Diehm - although, manual registration of prefixes is usually meant to mark a prefix as a scope or to make an address space reservation for future use.
- Is my assumption correct that the VLAN is missing because the
PaloAlto router ports are not correctly detected?
I think this may be a result of using the `vlan_auth` feature. I believe PortAdmin will happily let you set any VLAN on a switch port, as long as it can detect that VLAN tag as existing on the switch.
However, once you enable `vlan_auth`, PortAdmin necessarily needs to correlate the VLAN tag used on the switch with one of the VLANs it has discovered and stored from inspecting router ports, since the router port description is where it gets organizational ownership for a VLAN from.
So again, you may be able to work around it by using Mischa's tip.
- Should PaloAlto router ports normally be detected with NAV?
I think so, but I have no direct experience with PaloAlto (yet - we are currently evaluating PaloAlto firewalls for upcoming campus network installations for customers).
Perhaps someone from the University of Tromsø reads this and can comment? They use PaloAlto, and have recently contributed the pull request you mentioned.
- If so, how can I fix this? And if not, is there any workaround
available?
The best way to resolve this would be to make NAV see your PaloAlto router ports. Again, I cannot be sure what the problem is here without some debugging - but as long as PaloAlto properly supports the IF-MIB and the IP-MIB, this should just work.
I'm off on a few week's vacation now, so I'm cheekily sending a blind carbon copy to someone at the University of Tromsø, just in case they have time to offer some feedback :)
- Is https://github.com/Uninett/nav/pull/2613 a solution to this?
Not likely. This is mainly a workaround for the fact that, although PaloAlto supports SNMP, it does not want to report ARP cache information through SNMP (this seems to be the case for firewall products from several other vendors as well).