blog.packetflow.io
Open in
urlscan Pro
2a00:1450:400d:805::2013
Public Scan
Submitted URL: http://packetflow.io/2015/01/extreme-networks-exos-cheat-sheet.html
Effective URL: http://blog.packetflow.io/
Submission Tags: falconsandbox
Submission: On January 19 via api from US — Scanned from DE
Effective URL: http://blog.packetflow.io/
Submission Tags: falconsandbox
Submission: On January 19 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Keeping the packets flowing. ABOUT * Home * Networking * The Lab * About MONDAY, NOVEMBER 14, 2016 RETHINKING MICRO-SEGMENTATION TRADITIONAL SECURITY ARCHITECTURES Traditional security architectures enforce security policy at rigidly defined trust boundaries. At the most basic level, this is the perimeter of the network. A firewall sits between the untrusted public Internet and the trusted private network. If inbound access from the Internet is required, a DMZ is often created to segment Internet exposed resources from the trusted internal network. A network can be further segmented using additional zones on the perimeter firewall, access-lists on distribution switches, and additional layers of security at various points in the network. In this traditional model, as security increases, so does configuration complexity, management overhead, and margin for human error. In addition, implicit trust between devices on a network segment is inherent to traditional security architectures. If one device is breached, an attacker can use the compromised device to launch an attack against other devices on the same network segment. Therefore, traditional security architectures are often ill equipped to secure east-west traffic in a modern data center. WHAT IS MICRO-SEGMENTATION? In two words: Trust nothing. The goal is to eliminate implicit trust and apply security policy between all devices within the purview of the micro-segmentation solution. By using this zero-trust model, micro-segmentation solutions aim to prevent attackers from moving laterally through a network after breaching an initial target. There are a few fundamentally different approaches to micro-segmentation in the data center. Several current micro-segmentation solutions are built into larger data center orchestration and automation platforms. I'll avoid mentioning specific products, because comparisons often end up like those of vi vs. Emacs or which is the best Linux distribution. That said, the solutions I am most familiar with enforce security policy in one of two ways: • Enforce policy in the network device and/or vSwitch • Enforce policy in the hypervisor kernel Despite where the actual enforcement occurs, at a high level the micro-segmentation functionality itself is comparable. An engineer logs into a controller, defines a security policy, and centrally pushes this security policy to a number of devices in order to restrict traffic between endpoints. These endpoints can be baremetal servers, VMs, containers, or other resources supported by the micro-segmentation platform. The fundamental difference is the point of policy enforcement - hypervisor, vSwitch, or network device. Read more » Posted by Matt Haedo 1 comment: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: Illumio, micro-segmentation, Networking Field Day, NFD12, security, Tech Field Day THURSDAY, OCTOBER 6, 2016 BIG DATA ANALYTICS FOR YOUR NETWORK The help desk just called. Users are reporting the wireless is down in your office, and nobody can get on the network. The wireless seems fine to you. You're connected. You ask a few people nearby, and they're connected too. You log into the WLC and don't see any problems. Speedtest.net works fine. Maybe you should just turn the controller off and then back on again. That worked last time. No, that's a bad idea. It's the middle of the day and you actually need to troubleshoot it. After a bit of troubleshooting, you determine the cause of the issue is not the wireless. The DHCP scope is exhausted. Users could connect, but they couldn't obtain an IP address. You shorten the lease time, expand the scope, and call it a day. While you're at it, you wonder if DHCP is the reason connecting has been taking longer than usual, so you fire up Wireshark. Discover, offer, request, acknowledge. You remember that from a CCNA class half a lifetime ago. Looks good. Well, you think it looks good. It takes about 227 milliseconds from discover to offer. That's normal, right? You realize you're not sure what normal is. You don't know your baseline, and you have no idea how long DHCP should take from discover to offer or request to acknowledge. What about dot1x? Is the RADIUS server slowing things down? You really have no idea. It works. It's lunch time. Nobody is complaining - right now. Ok, hopefully the way you run your network is nothing like this. However, let's face it: this is an exaggerated version of the reality that many deal with on a day to day basis. There is often little insight into the individual operations that contribute to network performance as a whole. "The wireless is down" could mean any number of things, many of which may be out of the purview of the team managing the wireless network. Troubleshooting is often a reactive process. Even when there is visibility into network operations and baselines are known, it can be difficult to determine if your "normal" is actually optimal. I recently attended a presentation by Nyansa at Networking Field Day 12. Nyansa is a startup focusing on what they call Cloudsourced Network Analytics. Their goal is to go beyond providing visibility in the form of pretty graphs and actually provide actionable insight about how to improve the end user experience. Read more » Posted by Matt Haedo No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: analytics, big data, correlation, networking, Networking Field Day, NFD12, Nyansa, Tech Field Day, Voyance FRIDAY, SEPTEMBER 9, 2016 MNEMONIC: SYSLOG SEVERITY LEVELS Ever have trouble remembering syslog severity levels? I was organizing some old study notes and came across this mnemonic. It's easy to remember, and I'm sure many network engineers can relate. EVERYONE ALWAYS COMPLAINS EVEN WHEN NOTHING IS DIFFERENT. [E]veryone [A]lways [C]omplains [E]ven [W]hen [N]othing [I]s [D]ifferent [E]mergency [A]lert [C]ritical [E]rror [W]arning [N]otification [I]nformational [D]ebugging Level Description 0 - emergency System is unusable 1 - alert Immediate action needed 2 - critical Critical condition 3 - error Error condition 4 - warning Warning condition 5 - notification Normal but significant condition 6 - informational Informational message only 7 - debugging Appears during debugging only More information about syslog (system message logging): https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SysMsgLogging.html Posted by Matt Haedo 4 comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: ccie-rs-lab-v5-topic-5.1.c, ccie-rs-lab-v5-topic-5.1.c-i, ccie-rs-wr-v5.1-topic-6.1.c, ccie-rs-wr-v5.1-topic-6.1.c-i, logging, mnemonic, network engineering, networking, syslog SATURDAY, SEPTEMBER 3, 2016 SPANNING TREE PROTOCOL VISUALIZATION - INITIAL CONVERGENCE Spanning tree: everyone's favorite protocol! Thousands of pages have already been written about spanning tree, so I've decided to take a different approach. I find it helpful to visualize protocol elections and traffic flow in order to better understand protocol behavior, so I created a visualization illustrating the initial spanning convergence process. This visualization only addresses the initial root bridge election and STP convergence process, for example, if all switches were to boot at the same time. This does not address converging a new STP topology after a topology change. The visualization below is basically an embedded slideshow that can be advanced by clicking on the image. There are notes for each slide that briefly explain each step of the convergence process. The numbers on each side of the links between switches represent the port number of each uplink. Here are the basic steps of the initial STP convergence process: 1. Elect the root bridge. 2. Determine the root ports. 3. Determine the designated ports. 4. Remaining ports are blocking ports. CLICK THE IMAGE TO ADVANCE THE VISUALIZATION. Tap here if you are on a mobile device. As you can see, the resulting topology (the logical forwarding topology that is created after STP blocks redundant links) looks something like an upside-down tree. Here is an example of of what this tree might look like when redundant links are blocked by STP in a larger L2 topology (although hopefully your network looks nothing like this). The links shown in black can be used, because each port is in the forwarding state. The links shown in red cannot be used, because one of the ports is in the blocking state. Reducing the topology to a tree of forwarding links is how spanning tree maintains a loop free L2 topology. Once again, this is not meant to be a complete description of STP, but rather a visualization and basic description of the initial convergence process. Feel free to leave questions or comments below. Posted by Matt Haedo 1 comment: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: ccie-rs-lab-v5-topic-1.1.f, ccie-rs-lab-v5-topic-1.1.f-i, CCIE-RS-v5, ccie-rs-wr-v5.1-topic-2.1.f, ccie-rs-wr-v5.1-topic-2.1.f-i, certification, L2, networking, spanning tree, switching, visualization TUESDAY, AUGUST 9, 2016 OPENGEAR AND THE EVOLUTION AND CONSOLIDATION OF NETWORK DEVICES OPENGEAR AT TECH FIELD DAY EXTRA 2016 I recently attended Cisco Live 2016 in Las Vegas and was invited to attend Tech Field Day Extra as a delegate. The first presenter was Opengear, a maker of console access servers and remote management gateways. They describe their products as "next generation Smart Solutions for managing and protecting critical IT and communications infrastructure." While the term "next generation" is frequently overused, I can't argue with Opengear. Opengear extends the functionality of a console access server into a more complete out-of-band management solution. First, the Opengear presentation made me reevaluate what I should look for in an a console access server. What should it do? What shouldn't it do, and what roles should be held by separate devices? Read more » Posted by Matt Haedo No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: CLUS, CLUS2016, networking, Opengear, Tech Field Day, TFDx FRIDAY, FEBRUARY 5, 2016 CONFIGURING ERSPAN ON CISCO ROUTERS AND SWITCHES In two recent posts, I covered SPAN, for mirroring traffic to a port on a local switch, and RSPAN, for mirroring traffic across a VLAN to a port on a remote switch. What if we want to mirror traffic traffic to a destination across a L3 link? Cisco provides the ability to do this natively with a feature called ERSPAN, or encapsulated RSPAN. However, this feature is only available on higher end platforms such as Catalyst 6500 and 6800 series switches, 7600 series routers, ASR1000, and CSR1000v (this is not a complete list). ERSPAN Like SPAN and RSPAN, configuring ERSPAN is pretty straightforward. ERSPAN simply requires L3 connectivity between source and destination devices. The ERSPAN monitor session then builds a GRE tunnel that transports mirrored frames from the source port to the destination port. Basic ERSPAN configuration is as follows: ! Source switch monitor session SESSION-NUMBER type erspan-source source-interface INTERFACE(S)|VLAN(S) {TX|RX|BOTH} no shutdown destination erspan-id ERSPAN-ID ip address DESTINATION-IP origin ip address ORIGIN-IP ! Destination switch monitor session SESSION-NUMBER type erspan-destination destination-interface INTERFACE(S) no shutdown source erspan-id ERSPAN-ID ip address SOURCE-IP It is important to note that when configuring the destination switch "source IP," you should select the source IP on the destination switch itself - the GRE tunnel endpoint. Source IP does not refer to the GRE tunnel origin IP address. Therefore, the "ip address" command should match on the source and destination. Below is a basic ERSPAN config to mirror data from R1 interface g3 to R3 interface g3. I created this topology using VIRL using CSR1000V routers for R1 and R3. Read more » Posted by Matt Haedo 3 comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: ccie-rs-lab-v5-topic-1.1.g, ccie-rs-lab-v5-topic-1.1.g-i, CCIE-RS-v5, ccie-rs-wr-v5.1-topic-2.1.g, ccie-rs-wr-v5.1-topic-2.1.g-i, certification, L2, L3, network engineering, networking, routing, RSPAN, switching SATURDAY, JANUARY 30, 2016 CONFIGURING RSPAN ON CISCO CATALYST SWITCHES I recently wrote a post on configuring port mirroring (SPAN) on Cisco Catalyst switches. SPAN (switched port analyzer) allows you to mirror traffic from a source or multiple sources on a switch to a destination interface or interfaces on the same switch. RSPAN (remote SPAN) takes this a step further and allows you to mirror traffic to an interface on a remote switch or switches. RSPAN RSPAN configuration is relatively simple and builds upon existing SPAN functionality and configuration syntax. * Create an RSPAN VLAN on the source switch, destination switch, and all switches in the transit path. * Take traffic from a specified source on switch A, and mirror it to an RSPAN VLAN. * Then, on switch B, use traffic from this VLAN as the source and mirror it to a physical interface As shown below, traffic mirrored from the switch on the right to the switch on the left can traverse other switches as long as there is end to end L2 connectivity between them (ie. the RSPAN VLAN exists on all switches). Basic RSPAN configuration is as follows: Read more » Posted by Matt Haedo 2 comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: ccie-rs-lab-v5-topic-1.1.g, ccie-rs-lab-v5-topic-1.1.g-i, CCIE-RS-v5, ccie-rs-wr-v5.1-topic-2.1.g, ccie-rs-wr-v5.1-topic-2.1.g-i, certification, Cisco, L2, network engineering, networking, RSPAN, switching Load more posts Older Posts Home Subscribe to: Posts (Atom) POPULAR POSTS * Mnemonic: Syslog Severity Levels Ever have trouble remembering syslog severity levels? I was organizing some old study notes and came across this mnemonic . It's... * Extreme Networks EXOS Cheat Sheet After working in primarily Cisco or Cisco-esque CLIs, ExtremeXOS can have a bit of a learning curve. At the time of this post, Extreme Netw... * Rethinking Micro-segmentation Traditional Security Architectures Traditional security architectures enforce security policy at rigidly defined trust boundaries. At the ... BLOG ARCHIVE * ▼ 2016 (8) * ▼ November (1) * Rethinking Micro-segmentation * ► October (1) * ► September (2) * ► August (1) * ► February (1) * ► January (2) * ► 2015 (5) * ► April (1) * ► March (1) * ► January (3) * ► 2014 (4) * ► December (1) * ► April (1) * ► March (2) Tweets by @matthaedo BLOGS I FOLLOW packetflow.io. Theme images by A330Pilot. Powered by Blogger. Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit Messwerten zur Leistung und Sicherheit für Google freigegeben. So können Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die Qualität des Dienstes gewährleistet werden.Weitere InformationenOk