Hi Mates,
Why it sucks ? So let's see!
First of all it's not a real separation. It's kind of "understandable" but let go deep:
Tunnel Interface - Planes are isolated and traffic cannot cross between them. The Tunnel interface (mdps_tun) allows only packets that originated from the local gateway to be sent to selected destination(s) through the Management plane, regardless of the plane where the connection was initiated.
This right here clearly violates the rule that "planes are isolated and traffic cannot cross between them". The result is asymetrical routing.
Another thing is that when you are using MDPS the management interface is still visible in topology and massive anti-spoofing occurs. Disabling "extended cluster anti-spoofing" solves part of the problem.
Traffic originating from the management plane/interface with the interface's IP address (with default route in core network) arrives from the core network to an interface in dplane. It gets recognized by the firewall as being it's own and it's dropped 🙂 It it's real isolated why is this happening ?
Workaround: just use a 3rd party router to NAT the ip address in order not to be recognized by mplane otherwise the management of the firewall from the internal network (originating from dplane) is absolutely impossible.
So how the big question comes: is there a WAY to disable/remove the mdps_tun interface ? I wanted to implement mpds (as I was used and in love with the real separation that Palo Alto has) but I stumbled across multiple problems. Of traffic originates from a source in dplane (my local vlan - my laptop) I would never reach the management IP of the firewall.
So the big question is: am I thinking wrong trying to access my own firewall from my own internal network but via MDPS (which is isolated from the rest of the world)?
Otherwise mplane sitting by it's own is fine ... some TACACS+/LDAP/DNS problems but seems to be fine. Util you try to do something from behind dataplane :))))