[c-nsp] Remote management console servers?

David Hubbard dhubbard at dino.hostasaurus.com
Tue Jul 14 21:57:05 EDT 2015


We use and really like the Opengear's as well.  Just keep in
mind that you're still running a linux box so it should be
treated as one.  We had to quickly lock all of ours down 
back when that bash exploit happened as we had the web 
interface of the units exposed to the cell modem side.

David

> -----Original Message-----
> From: cisco-nsp [mailto:cisco-nsp-bounces at puck.nether.net] On 
> Behalf Of CiscoNSP List
> Sent: Tuesday, July 14, 2015 7:41 PM
> To: Scott Granados; cisco-nsp at puck.nether.net
> Subject: Re: [c-nsp] Remote management console servers?
> 
> 
> We've just started using Opengear (7216's) - 16 serial 
> ports(Can use standard straight through eth, or rollover), 
> has 3G/4G, modem and 2 x Eth connections, all can be setup as 
> failover for each other as OOB...plus supports dydns(We have 
> to use this for our 4G, as we can only get dynamic IP)....so 
> far, very happy with them (Our "old" OOB boxes were/are 
> 2511's with old external modems hanging off them)....Cant get 
> those modems anymore, so alternate box was needed.
> 
> 
> Plenty of models to choose form, if you dont need 16 serial 
> ports....but the 7216 has the "4" WAN connection 
> options....very handy when you cant get a pstn line installed 
> into a Data Centre...just use Eth and 4G....works well for us
> 
> 
> 
> ________________________________________
> From: cisco-nsp <cisco-nsp-bounces at puck.nether.net> on behalf 
> of Scott Granados <scott at granados-llc.net>
> Sent: Wednesday, 15 July 2015 3:03 AM
> To: cisco-nsp at puck.nether.net
> Subject: [c-nsp] Remote management console servers?
> 
> Hi,
> 
> Wondering what people are doing / best practices for remote 
> management generally in datacenter environments.  We have 
> several datacenter with a mix of Cisco, F5, Juniper and Palo 
> Alto equipment in each.  All have a similar RJ45 type console 
> port and all are pretty much your garden variety devices.  
> Looking for a good solution to gain access when primary 
> connectivity is disrupted.  I know back in the day we used 
> 2610XM routers with the octopus cables but I'm wondering if 
> there is better available now or is this still a good 
> solution?  Do you all use out of band loops for remote 
> management like DS1 / DS3 circuits from diverse providers, 
> dial in, what's the standard for remote management?  Do you 
> also have your management networks isolated on their own 
> (could be the same) management network or do you do some sort 
> of VPN / VRF deal for normal non emergency management 
> connectivity?  Any thoughts on the subject would be most 
> appreciated.  The last time I built one of these was with 
> 2610XM routers in the pops and 7206 routers as aggregation 
> points in each geographic region linked together with 
> different T1s and multiplexed to the 7206 regional routers 
> with backhaul loops to the NOC.  Seems like a bit of overkill 
> for my application now but if this is still the best practice 
> then it might be worth while.  Any pointers or other 
> suggestions would be most appreciated.
> 
> Thank you
> Scott
> 
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net 
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net 
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
> 


More information about the cisco-nsp mailing list