Forum Discussion
F5-LTM 11.5.4 mac-masquerade
I have 2ea BIG-IP F5 vCMPs in an HA setup running version 11.5.4. The F5 is in routed mode where the server farms behind it are on different network segments/vlans with their default gateway residing on the F5 itself. The security folks want to mitigate a man-in-the-middle attack by setting up mac-masquerading but I think this will do more harm than good. If the masqueraded mac is on the traffic group now all vlans have the same mac-address and if that mac is compromised the attack surface is larger now than when each vlan had it's own unique mac (without mac masquerade). I understand that mac masquerade is good for arp/failover reasons, but I don't believe it is a man-in-the-middle preventative measure? Any guidance would assist us in our design.
1 Reply
- Hannes_Rapp
Nimbostratus
I see no obvious security advantages of using MAC Masquerade either. Perhaps they want it to reduce L2 noise instead? When Masquerade is used, multiple originating BigIP (L2 Server-Side) MAC addresses will be contracted to just one. This adds to clarity on the wire as a BigIP middle-ware device is easily distinguishable from the other addresses, possible clients. To some extent, this will contribute to ease of sniffing, monitoring/surveillance. As a security enhancement, I don't buy the idea. As a security enhancement through added clarity, it might be a valid thing to ask for.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com