• Breaking News

    [Android][timeline][#f39c12]

    Monday, April 2, 2018

    Moronic Monday! Networking

    Moronic Monday! Networking


    Moronic Monday!

    Posted: 02 Apr 2018 05:13 AM PDT

    It's Monday, you've not yet had coffee and the week ahead is gonna suck. Lets open the floor for a weekly Stupid Questions Thread, so we can all ask those questions we're too embarassed to ask!

    Post your question - stupid or otherwise - here to get an answer. Anyone can post a question and the community as a whole is invited and encouraged to provide an answer. Serious answers are not expected.

    submitted by /u/AutoModerator
    [link] [comments]

    ASA dropping 1.1.1.1 traffic outbound

    Posted: 02 Apr 2018 07:59 AM PDT

    Yes, this is related to the new 1.1.1.1 dns service. I have read that there are some parts of the internet still having trouble routing this space, but I'm not even making it out of my own network.

    I did the same test for both 8.8.8.8 and 1.1.1.1, and 8.8.8.8 works fine. Even though 1.1.1.1 hits the same rule, it's saying in a later phase that it's denied by the implicit drop rule.

    Code version is Cisco Adaptive Security Appliance Software Version 8.2(5)

    Packet-tracer to 8.8.8.8:

     FIREWALL# packet-tracer input inside icmp 172.18.172.1 8 0 8.8.8.8 Phase: 1 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: MAC Access list Phase: 2 Type: ROUTE-LOOKUP Subtype: input Result: ALLOW Config: Additional Information: in 0.0.0.0 0.0.0.0 outside Phase: 3 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group insidelist in interface inside access-list insidelist extended permit icmp any any access-list insidelist remark Additional Information: Phase: 4 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 5 Type: INSPECT Subtype: np-inspect Result: ALLOW Config: Additional Information: Phase: 6 Type: Subtype: Result: ALLOW Config: Additional Information: Phase: 7 Type: NAT Subtype: Result: ALLOW Config: nat (inside) 15 172.18.172.0 255.255.255.0 match ip inside 172.18.172.0 255.255.255.0 outside any dynamic translation to pool 15 (X.X.X.143) translate_hits = 252290205, untranslate_hits = 89103687 Additional Information: Dynamic translate 172.18.172.1/0 to X.X.X.143/49549 using netmask 255.255.255.255 Phase: 8 Type: NAT Subtype: host-limits Result: ALLOW Config: nat (inside) 15 172.18.172.0 255.255.255.0 match ip inside 172.18.172.0 255.255.255.0 outside any dynamic translation to pool 15 (X.X.X.143) translate_hits = 252290207, untranslate_hits = 89103687 Additional Information: Phase: 9 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 4008272196, packet dispatched to next module Result: input-interface: inside input-status: up input-line-status: up output-interface: outside output-status: up output-line-status: up Action: allow 

    Packet-tracer to 1.1.1.1:

    FIREWALL# packet-tracer input inside icmp 172.18.172.1 8 0 1.1.1.1 Phase: 1 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: MAC Access list Phase: 2 Type: ROUTE-LOOKUP Subtype: input Result: ALLOW Config: Additional Information: Phase: 3 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group insidelist in interface inside access-list insidelist extended permit icmp any any access-list insidelist remark Additional Information: Phase: 4 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 5 Type: INSPECT Subtype: np-inspect Result: ALLOW Config: Additional Information: Phase: 6 Type: Subtype: Result: ALLOW Config: Additional Information: Phase: 7 Type: NAT Subtype: host-limits Result: ALLOW Config: nat (inside) 15 172.18.172.0 255.255.255.0 match ip inside 172.18.172.0 255.255.255.0 outside any dynamic translation to pool 15 (X.X.X.143) translate_hits = 252290381, untranslate_hits = 89103699 Additional Information: Phase: 8 Type: ACCESS-LIST Subtype: Result: DROP Config: Implicit Rule Additional Information: Result: input-interface: inside input-status: up input-line-status: up Action: drop Drop-reason: (acl-drop) Flow is denied by configured rule 
    submitted by /u/ilmdbii
    [link] [comments]

    Ideas for wireless media streaming setup with wifi wan link.

    Posted: 02 Apr 2018 07:21 AM PDT

    BLUF: US Army, deployment in the next 12 months, expecting little to no MWR services, looking to wirelessly deliver media to the masses.

    In the past, I've used devices like the HOOTOO Titan to serve myself and the guys in my hooch, and it's worked ok for that purpose.

    What I'm looking to do is expand and simplify that capability so I can get 30-50 non-techy people connected to a read-only DLNA and/or SMB server with the ability to mooch off a wired or wireless WAN connection if available (aka someone else's wifi).


    What I'm looking at right now:

    • Router: Ubiquiti Edgerouter PoE

    • AP: Ubiquiti Unifi UAP-AC-LR

    • Wifi mooch: Unsure

    • Server: Dedicated laptop, gigabit wired connection, 4TB USB3 external HD (considering replacing this with a Synology NAS)


    Obviously I'm a fan of Ubiquiti, but I can also work with Cisco gear if the benefits outweigh the extra cash.

    My main question is: what device and configuration works well to mooch off a wifi signal? Preferably it would be something with enough power and sensitivity to grab weak signals.

    Other than that, if anyone has recommendations or tips on the setup as a whole, I'm all ears.

    submitted by /u/certifiedintelligent
    [link] [comments]

    Anyone on here using Cisco Stealthwatch? If wo what are your thoughts on it?

    Posted: 02 Apr 2018 09:01 AM PDT

    Like the title says, I'm curious of peoples opinion who've used this product.

    submitted by /u/enderusaf
    [link] [comments]

    Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability

    Posted: 02 Apr 2018 07:40 AM PDT

    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2

    I think I may have to update a lot of my devices. However the output of my Vstack config shows

    Operation mode: auto (default)

    I don't know if I am vulnerable to this exploit.

    submitted by /u/Digital_Native_
    [link] [comments]

    Watchguard vs. Meraki vs. security vendor in relation to implementation?

    Posted: 02 Apr 2018 11:26 AM PDT

    I'm getting close to a decision on what should be rolled out to 45+ locations. No locations need to talk to each other whatsoever, less than 15 devices total connect, and the max MBps is 75.

    Right now it's between Watchguard(T35's), Meraki(MX64's), or CATO networks(using their nodes to connect to their cloud based security). It seems the costs of both watchguard and Meraki are going to be similar, but the merakis are most likely easiest to implement at a large amount of locations, and I don't believe I'll need to be present. Since they all have static IPs, I believe I will probably need to be present at each location in order to get all the Watchguards configured, even with their RapidDeploy sytem. CATO Networks will be either as easy or easier than meraki to deploy, however the cost of subscription I believe will be the most out of all of them.

    Three main questions: 1: Has anyone used CATO networks and are they happy with their service/cost/efficiency? Not needing to worry about licensing sounds pretty nice. 2: I've been reading some bad comments about WatchGuard, why might this be? I've worked with their firebox devices many times with a diverse amount of companies and have never truly seen much of an issue with them. 3: I have not deployed Meraki firewalls, are they really as easy as they seen to configure, in a plug and play sort of way? All employees at each location are not in the slightest bit tech savvy, so this is important.

    Also feel free to say that my final 3 options are all dumb, and suggest something you feel is better :p

    Thanks for the insight.

    submitted by /u/jakezpurez
    [link] [comments]

    Shaping on my Router vs ISP Router

    Posted: 02 Apr 2018 10:27 AM PDT

    I'm wondering if or how this matters.

    Customer called ISP directly, they say they are seeing microbursts which causes drops. (20mbp circuit on 100mbp interface).

    Internet circuit, no qos or priority setup/needed. Is there really any benefit to me shaping the traffic in my router or the ISP shaping it in theirs? Someone is still just going to drop traffic.

    Of course if we were prioritizing certain things or this was an MPLS or other private circuit, I'd want to be doing shaping, just trying to see if there is really any benefit in the above scenario.

    submitted by /u/SisqoEngineer
    [link] [comments]

    Two new RFC's released today.

    Posted: 01 Apr 2018 06:34 PM PDT

    Wrongful Termination of Internet Protocol (IP) Packets

    Summary:

    This memo recommends that every router and middlebox be an Equal Opportunity Device, which does not discriminate on the basis of actual or perceived rate, color, age, origin, length, IP version, fragmentation characteristics, higher-layer protocols, or any other IP characteristic.

    Internationalizing IPv6 Using 128-Bit Unicode

    Summary:

    There is still much to be decided on, most of which is frankly rather boring. It is clear, however, that 128-bit Unicode code points will be needed eventually, and IPv6 addressing MUST be migrated to it. Thus, the time to act is now!

    submitted by /u/YourMomLikesDogPoo
    [link] [comments]

    I've managed to lock myself out of a 6509. :( How screwed am I?

    Posted: 01 Apr 2018 08:34 PM PDT

    NPS is returning Denys for reasons that I can't figure out but suspect to me a mis-matched shared secret, and none of the potential local accounts that I've been able to find documentation for work. :(

    The supervisor engines in this switch do have CF cards in them, but when I pulled out those cards they were both blank and didn't have anything on them. I was hoping I'd be able to pull at least the startup config off of them or something to verify the local account name and shared secret for RAIDUS, but no such luck.

    There's no documented backup of the config because it turns out that my backup logging system hasn't actually been working for the last month.

    What are my options here? How screwed am I? This switch is currently running our small company's datacenter, and while I can probably beg some downtime it's not going to be pretty.

    submitted by /u/Princess_Fluffypants
    [link] [comments]

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel