Category Archives: Security

Magic Quadrant for Enterprise Network Firewalls 2018

Security landscape is evolving fast, so fast detection and mitigation is important for customers.   Many enterprises are looking to firewall vendors to provide cloud-based malware detection instances to aid them in their advanced threat detection efforts, as a cost-effective alternative to stand-alone sandboxing appliances.
SSL Decryption is one of the key topics, since TLS 1.2 to the TLS 1.3 standard will undoubtedly force changes in how enterprise firewall vendors process the traffic.
Policy Orchestration and Automation Become Critical on SDN deployments, some vendors haven’t provide much attention om this topic. Firewall Services Within IaaS Environments Become an Area of Differentiation.

Magic Quadrant for Enterprise Network Firewalls

Full Report on Report Magic Quadrant for Enterprise Network Firewalls 2018

Cisco Firepower Forbidden- you don’t have permission to access

After re-image FPR2110 from FTD to ASA9.8.2, the chassis (FXOS) mgmt interface UI become unaccesible giving the following error “Forbidden- you don’t have permission to access / on this server”.

In a nutshell, i could access FXOS via SSH and ASA (SSH & HTTPS) but the FXOS Chassis Management was broken. After spend some time, the only way to get this sorted was upgrade for the version 9.9.x

After upgrade, everything was working again.

 

Dell Networking OS10 using GNS3

Dell EMC Networking OS10 combines the best of Linux, open computing, and networking to advance open networking disaggregation. OS10 is a transformational software platform which provides networking hardware abstraction through a common set of APIs.
You can enable consistency across compute and network resources for your system operator (sysops) groups that require server-like manageability, as well as leverage your existing network con€guration.
You can simulate OS10 devices using OS10 VM appliances. The OS10 VM appliances execute the same software deployed on OS10-enabled hardware devices, with the exception of the hardware abstraction layer. The OS10 VM hardware abstraction layer simulates hardware devices in a VM environment.

All CLI commands as well as RESTCONF and SNMP interfaces are available in the OS10 simulation environment. You can build sandbox environments to learn open networking concepts, and prototype network operations and scripts risk-free.

Dell OS10

OS10 simulation features

All OS10 CLI commands and north-bound interfaces (RESTCONF, SNMP) are available including:

  • System management (SSH, AAA, DHCP, and so on)
  • Management port

L3 data plane and control plane (using Linux functionality)

Partial support for L2 data plane and control plane (using Linux functionality):

  • LACP
  • VLAN
  • LLDP
  • VLT

OS10 feature limitations

  • No ACL or QoS support (NPU is not available) — ACL and QoS CLI commands are available (but have no effect on trafc)
  • Limited L2 functionality (NPU is not available on simulator) — no spanning-tree control plane functionality
  • No breakout mode for simulated ports
  • Defaults to S6000-ON hardware platform simulation

Requirements

  • Workstation or laptop with 16 GB RAM or larger recommended
  • 64-bit x86 CPU with 2 GHz or faster core speed (dual-core or larger recommended)
  • SDD with 64 GB available space
  • Virtualization environment — you can use either Windows, Linux, or VMware ESXi as a host system for the GNS3 Server VM environment
  • VMware ESXi server recommended for large network simulation

Download

https://cld.pt/dl/download/fff9c764-59cb-4521-8bd9-e9eeb38519c8/os10_virtualization_10.4.1.0v.zip

https://cld.pt/dl/download/2f61626b-f1fe-4415-8825-4357823e5ed8/os10_virtualization_guide.pdf

 

 

Fire Jumper Stage 5 Network Security Systems Engineer

Cisco Fire Jumper program is composed by different tracks, and each has a Sales, Systems Engineer and Field role with dedicated videos, training, POV, Labs and exams to be accomplished. After completed all four stages, you need to ask your Manager to endorse and send en email to fire jumper team. Once accepted you are going to receive an certificate. I’ve focused on the Network Security System Engineer role where i achieved the Stage 5. Looking for the Elite now.

Dissecting the Different Tracks

Network Security: Firepower, ASA and Meraki

Advanced Threat: AMP for Endpoints and Threat Grid

Visibility & Enforcement: ISE, Stealthwatch and SDA

Cloud, Web & Email Security: Cisco Umbrella, Cloudlock, WSA and Email Security

At the moment you can only be Stage 5 in one track and Stage 4 on all of them. Once you achieve this you become Fire Jumper Elite.

Find below the relevant links for the program:

Fire Jumper Sales Engineer

Fire Jumper Systems Engineer

Fire Jumper Field Engineer

Tweak multicast on Cisco ASA without RP

This came as a customer request, where they required to send multicast for testing purposes to their own customers but without using a RP. A Cisco ASA is segregating the environment acting as Layer 3 between the multicast sender and receivers. The first step was disabling the snooping on the switching to let the traffic going through, and last but not least setup a static group on the ASA to flood the interface outwards to the receivers. The challenge was the PIM, which has to be enabled but can’t have a neighbourship otherwise the interface is not going to flood the multicast out, so how do we make this work?

I’m running code Cisco ASA 9.1(7) with multicast-routing enabled

Because i have the firewall connect to a DMZ switch i have to disable the IGMP snooping on the switch

no ip igmp snooping vlan 2201

Setup a Filter to not allow the neighbourship but having the PIM enabled, and the static group to force the ASA to join particular multicast address (224.0.1.129)
You have to Deny the host adjacent in this case was 10.101.201.43

access-list CSC_FILTER_PIM standard deny host 10.101.201.43

interface Ethernet0/0
description CSC
nameif CSC-LON9
security-level 55
ip address 10.111.201.41 255.255.255.248 standby 10.111.201.42
pim neighbor-filter CSC_FILTER_PIM
igmp static-group 224.0.1.129

If a PIM neighbourship was established, that needs to expire before the interface starts flooding the traffic, if you see Nbr Count=0 you are almost there

fw01/sec/act# show pim interface

Address Interface PIM Nbr Hello DR DR
Count Intvl Prior

10.101.201.41 CSC-LON9 on 0 30 1 this system

fw01/sec/act# sh igmp interface CSC-LON9
CSC-LON9 is up, line protocol is up
Internet address is 10.101.201.41/29
IGMP is enabled on interface
Current IGMP version is 2
IGMP query interval is 125 seconds
IGMP querier timeout is 255 seconds
IGMP max query response time is 10 seconds
Last member query response interval is 1 seconds
Inbound IGMP access group is:
IGMP limit is 500, currently active joins: 0
Cumulative IGMP activity: 1 joins, 0 leaves
IGMP querying router is 10.101.201.41 (this system)

Now the interface is forwarding the multicast, if you see Null you missed something

fw01/sec/act# sh mroute 10.101.100.13 224.0.1.129

Multicast Routing Table
Flags: D – Dense, S – Sparse, B – Bidir Group, s – SSM Group,
C – Connected, L – Local, I – Received Source Specific Host Report,
P – Pruned, R – RP-bit set, F – Register flag, T – SPT-bit set,
J – Join SPT
Timers: Uptime/Expires
Interface state: Interface, State

(10.101.100.13, 224.0.1.129), 3w3d/00:03:29, flags: SFJT
Incoming interface: INSIDE
RPF nbr: 10.101.100.13
Inherited Outgoing interface list:
CSC-LON9, Forward, 3w3d/never