|
| 1 | +--- |
| 2 | +title: How to set up Break-Glass access using In-Band management in Azure Operator Nexus Network Fabric |
| 3 | +description: Learn how to How to set up Break-Glass access using In-Band management |
| 4 | +author: sushantjrao |
| 5 | +ms.author: sushrao |
| 6 | +ms.service: azure-operator-nexus |
| 7 | +ms.topic: how-to |
| 8 | +ms.date: 02/24/2025 |
| 9 | +ms.custom: template-how-to |
| 10 | +--- |
| 11 | + |
| 12 | +# Break-Glass access using In-Band management |
| 13 | + |
| 14 | +In the Nexus Network Fabric (NNF), there is an out-of-band management network where most fabric devices are connected to management switches via management ports (Ma1). The only exceptions are the Terminal Server and Aggregation Management Switches. |
| 15 | +To address the potential single point of failure posed by the management switch, Microsoft team has provided the Redundant In-band Management Break Glass Access feature. |
| 16 | + |
| 17 | +> [!Note] |
| 18 | +> Currently, pivot to gNMI to use loopback6 is not supported. |
| 19 | +
|
| 20 | +## Redundant In-Band management break glass access |
| 21 | +The Redundant In-band management break glass access feature provides a backup mechanism for the operations team to access Arista devices in the event of a primary management path failure. This feature allows operators to SSH into Arista devices using the loopback IP over the control plane VLAN / In-band management VRF, ensuring continuity of device management. |
| 22 | + |
| 23 | +### Primary and backup paths |
| 24 | + |
| 25 | +• **Primary path:** The default method for accessing Arista devices is via the MA1 interface, which is used for management operations under normal conditions. |
| 26 | + |
| 27 | +• **Backup path:** In cases where the primary path is unavailable, the break glass access allows operators to SSH to the device using the loopback IP over the control plane VLAN / In-band management VRF. |
| 28 | + |
| 29 | +The in-band management path is applicable only to devices configured and participating in BGP, excluding management switches and Network Packet Brokers (NPB). NPB does not support routing, and it is recommended against creating complex workarounds to enable such capability. The in-band management path relies on BGP because it provides dynamic routing, redundancy, resilience, policy-based routing, and scalability, all of which are essential for ensuring that management traffic can be reliably routed through the network. |
| 30 | + |
| 31 | +To support in-band management, a new loopback interface (lo6) is created on network devices. The addresses of these loopback interfaces will be advertised to the Provider Edge (PE) via the INFRA-MGMT VRF from the Customer Edge (CE). Customer IP addresses will be advertised to the Top of Rack (ToR) switches from the CEs via the default VRF. |
| 32 | + |
| 33 | +## Set up Break-Glass access using In-Band management |
| 34 | + |
| 35 | +### Assign IPv4 and IPv6 addresses to loopback interfaces |
| 36 | + |
| 37 | +On Customer Edge (CE) devices and Top of Rack (ToR) switches, assign IPv4 and IPv6 addresses to loopback interfaces. |
| 38 | + |
| 39 | +Example configuration for CE: |
| 40 | + |
| 41 | +```json |
| 42 | + interface Loopback6 |
| 43 | + description "Inband Management" |
| 44 | + vrf INFRA-MGMT |
| 45 | + ip address 10.x.x.64/32 |
| 46 | + ipv6 address fda0:d59c:df09:2::x/128 |
| 47 | +``` |
| 48 | + |
| 49 | +Example configuration for ToR: |
| 50 | + |
| 51 | +```json |
| 52 | +interface Loopback6 |
| 53 | + description "Inband Management" |
| 54 | + ip address 10.x.x.66/32 |
| 55 | + ipv6 address fda0:d59c:df09:2::x/128 |
| 56 | + ``` |
| 57 | + |
| 58 | + ### Update prefix-lists |
| 59 | + |
| 60 | +Add loopback addresses to prefix-lists and create IPv6 prefix if not already created. |
| 61 | + |
| 62 | +Example: |
| 63 | + |
| 64 | +```json |
| 65 | +ip prefix-list loopback |
| 66 | + seq 10 permit 10.XX.X.34/32 |
| 67 | + seq 20 permit 10.XX.X.115/32 |
| 68 | + seq 30 permit 10.XX.X.117/32 |
| 69 | + seq 40 permit 10.XX.X.64/27 le 32 |
| 70 | +ipv6 prefix-list loopback_v6 |
| 71 | + seq 10 permit fda0:d59c:df09:2::/64 eq 128 |
| 72 | +``` |
| 73 | + |
| 74 | + |
| 75 | +### Assign IPv6 addresses to CE-ToR interfaces |
| 76 | + |
| 77 | +Configure Ethernet interfaces on CE and ToR devices. |
| 78 | + |
| 79 | +Example for CE: |
| 80 | + |
| 81 | +```json |
| 82 | +interface Ethernet5/1 |
| 83 | + description "AR-CE1(fab5-AR-CE1):Et9/1 to CR1-TOR1(fab5-CP1-TOR1)-Port23" |
| 84 | + mtu 9214 |
| 85 | + no switchport |
| 86 | + ip address 10.x.x.1/31 |
| 87 | + ipv6 address fda0:d59c:df09:c::x/127 |
| 88 | +``` |
| 89 | + |
| 90 | +Example for ToR: |
| 91 | + |
| 92 | +```json |
| 93 | +interface Ethernet23/1 |
| 94 | + description "CR1-TOR1(fab5-CP1-TOR1):Et23/1 to AR-CE1(fab5-AR-CE1)-Port05" |
| 95 | + mtu 9214 |
| 96 | + no switchport |
| 97 | + ip address 10.x.x.0/31 |
| 98 | + ipv6 address fda0:d59c:df09:c::x/127 |
| 99 | +``` |
| 100 | + |
| 101 | +### Configure CE_TOR_UNDERLAY peer group |
| 102 | + |
| 103 | +Enable auto-local-addr for the peer group. |
| 104 | + |
| 105 | +Example: |
| 106 | + |
| 107 | +```json |
| 108 | +neighbor CE_TOR_UNDERLAY auto-local-addr |
| 109 | +``` |
| 110 | + |
| 111 | +### Configure IPv6 address family in BGP |
| 112 | + |
| 113 | +Activate the CE_TOR_UNDERLAY peer group under the IPv6 address family. |
| 114 | + |
| 115 | +Example: |
| 116 | + |
| 117 | +```json |
| 118 | +address-family ipv6 |
| 119 | + neighbor CE_TOR_UNDERLAY activate |
| 120 | +``` |
| 121 | + |
| 122 | +### Update adv_loopback RCF |
| 123 | + |
| 124 | +Include IPv6 prefix list in the adv_loopback function. |
| 125 | + |
| 126 | +Example: |
| 127 | + |
| 128 | +```json |
| 129 | +router general |
| 130 | + control-functions |
| 131 | + code unit adv_loopback |
| 132 | + function adv_loopback() { |
| 133 | + @SEQ_10 {if prefix match prefix_list_v4 loopback { |
| 134 | + return true; |
| 135 | + }} |
| 136 | + @SEQ_20 {if prefix match prefix_list_v6 loopback_v6 { |
| 137 | + return true; |
| 138 | + }} |
| 139 | + } |
| 140 | + ``` |
| 141 | + |
| 142 | +### Redistribute under Global BGP |
| 143 | + |
| 144 | +Redistribute connected and static routes using the adv_loopback route-map. |
| 145 | + |
| 146 | +Example: |
| 147 | + |
| 148 | +```json |
| 149 | +router bgp 65000 |
| 150 | + redistribute connected route-map adv_loopback |
| 151 | +8. Create SOO Community: |
| 152 | +Example: |
| 153 | +ip extcommunity-list aon-soo permit soo 100:100 |
| 154 | +9. Create Route-Maps for Leaking Routes: |
| 155 | +Create policies for leaking routes between default and INFRA-MGMT VRFs and assign SOO. |
| 156 | +Example: |
| 157 | +route-map leak_default_infra permit 10 |
| 158 | + match ip address prefix-list loopback |
| 159 | + match source-protocol bgp |
| 160 | + set extcommunity extcommunity-list aon-soo |
| 161 | +``` |
| 162 | + |
| 163 | +### Redistribute BGP leaked routes |
| 164 | + |
| 165 | +Redistribute BGP leaked routes in default and INFRA_MGMT VRFs. |
| 166 | + |
| 167 | +Example: |
| 168 | + |
| 169 | +```json |
| 170 | +router general |
| 171 | + vrf default |
| 172 | + leak routes source-vrf INFRA-MGMT subscribe-policy leak_infra_default |
| 173 | + vrf INFRA-MGMT |
| 174 | + leak routes source-vrf default subscribe-policy leak_default_infra |
| 175 | + ``` |
| 176 | + |
| 177 | +### Define Trusted Source IP prefixes |
| 178 | + |
| 179 | +Define and use trusted source IP prefixes for both IPv4 and IPv6 to enhance security and management. |
| 180 | + |
| 181 | +Example: |
| 182 | + |
| 183 | +```json |
| 184 | +ip prefix-list trusted_sources |
| 185 | + seq 10 permit 10.x.x.0/16 |
| 186 | + seq 20 permit 192.x.x.0/16 |
| 187 | +ipv6 prefix-list trusted_sources_v6 |
| 188 | + seq 10 permit fda0:d59c:df09::/48 |
| 189 | +``` |
| 190 | + |
| 191 | +> [!Note] |
| 192 | +> For Greenfield deployments, provide a list of trusted IP prefixes or use default resources created by the system. <br> For Brownfield deployments, ensure configurations are in place during upgrades and use PATCH operations to update the network fabric. |
0 commit comments