TLS Handshake Failing - Changing IP address. Networking |
- TLS Handshake Failing - Changing IP address.
- Experiences with Honeypots (for a school-project)
- Trouble getting FortiAP up and running
- For those Engineers who had their network taken over/managed by a 3rd party VAR (Accenture, NTT, Fujitsu etc). How was it? How is it going?
- Finally figured out how to replicate policy based DCE/RPC inspection from the ASA onto our new FTD Platforms.
- Nexus vPc advice
- Point to point connection via tunnel
- Aruba ClearPass policy across locations
- Aruba ClearPass User ACL with Cisco switches?
- Best p2p receiver ~1KM ?
- Endpoint Authentication
- MAC Spoofing in Campus LAN (SD-Access)
- Cisco ISE CLI password reset
- Firewalls and DHCP Transaction ID
- Need assistance with failed router cutover please!
- DANOS - Filtering out default route on OSPFv3
- Help with Cisco SG200-50P Voice VLAN issues.
- Best enterprise Networking vendor
TLS Handshake Failing - Changing IP address. Posted: 18 Sep 2021 01:37 PM PDT Having a difficult issue with SSL handshakes on a client-server TLS connection over 443 we are trying to troubleshoot. We have a client PC on a customer's network trying to connect over the internet to a cloud hosted server. We have good access to the cloud solutions' tech support and somewhat indirect access to the customer's firewall vendor that is managing the infrastructure getting our PC out to the internet to connect to the cloud server. We had this PC, via an agent service, connecting fine to the cloud solution over port 443 previously. The customer required that we change the local IP on the client PC decrementing the last octet (we went from .251 to .250). It is not an option at this point to change the IP back or to anything else for reasons I can't go into. The agent no longer connects and here is what we know:
Would love some insight/encourage to focus our efforts on the firewall vendor, or identify any other avenues of attack in our troubleshooting/isolation. [link] [comments] |
Experiences with Honeypots (for a school-project) Posted: 18 Sep 2021 05:35 AM PDT Hi Guys Saw, that quetions like mine pop up from time to time, however it wasn't exactly what I was looking for, therefore asking my own questions now..For a school project I want to setup a small Honeypot environment. In order to evaluate different possible solutions I would like to have some real-life experiences and maybe even real-life examples from different setups. I'm looking for both high- or low-interaction honeypots as well as "appliances" like FortiDeceptor or whatever fancy marketing-names these devices have. So my questions are:
I'm primarily thinking about honeypots in the enternal network to decept and/or reveal some malicious activity.I know that there are other and probably even better options - which I'll certainly mention in my project, but as I had to chose a specific topic for the school-project so I'm all in on Honeypots :) I'm open and thankful for all opinions, experiences and discussions! [link] [comments] |
Trouble getting FortiAP up and running Posted: 18 Sep 2021 10:49 AM PDT Hey all! I am hoping to obtain some guidance as i've run into a brick wall. For some context, I am a networking noob. I have some fundamental networking knowledge and have done basic cisco router/switch configurations but nothing crazy and only in an educational environment (and that was about 4 years ago, at that). I am a Jr Sys Admin tasked with setting up a network at one of our overflow offices and I have run into a bit of a snag. I have a Fortigate 100F that will be used as our Firewall and act as our router. I also have a Cisco SF300-48P switch underneath. Alongside this, I have a FortiAP 431f that I need to deploy. I have the Fortigate and the switch configured and operating normally. When I plug into one of the ports on the switch I obtain network connectivity and it seems to work great. I was tasked with deploying a FortiAP to provide a wireless option for some of our more mobile users in this office which is where the FortiAP 431F comes in. I figured it would be easy enough, configure the interface in the fortigate for wireless, plug the AP into that port on the fortigate and I should be able to configure from there. However, to my dismay, I have realized that the Fortigate 100f does not offer PoE and so when I plug the AP into the fortigate, it doesn't power on. It looks like I will need to have this AP run through the switch. I attempted to plug the AP into the switch and the AP powered on just fine (a good sign!) however I could not see the AP in the FortiAP manager console when in the admin console of the fortigate. This leaves me at a bit of an impasse as I cannot interface the AP for configuration because it does not appear in the FortiAP section of my admin console (when remoted into the fortigate). I assume that I am just missing something very obvious here. It doesn't seem like running an AP off a switch is an unorthodox or unusual configuration so I may just need a nudge in the right direction. Any guidance is greatly appreciated! [link] [comments] |
Posted: 17 Sep 2021 08:39 PM PDT I'm seeking insight from those shops who have had a VAR step in and take over full management of the network to provide comment. Things I'm interested in hearing your experience on:
Thanks! [link] [comments] |
Posted: 18 Sep 2021 01:43 PM PDT Seriously, it's was like Cisco wants to punish us for moving to the FTD platform. I had even used their migration tool previously to convert our ASA config to the FTD and the post migration report listed the inspection policy as unsupported. I spent hours scouring forum, blogs, and white paper sites and really couldn't find any good documentation about how you could go about doing it. The most I could find was some suggestions to use FlexConfig objects. We had several tickets open with Cisco tac on this issue, and every engineer assigned failed to give me a good solution. Their answer always came back to just creating rules in the access policy opening all the high range ports between security zones. Which, kind of sucks as a solution. So yes, maybe I'm an idiot for not figuring this out earlier, or maybe it was clearly documented somewhere and my google-fu really could use a refresher, but it is possible to replicate policy based DCE/RPC inspection using FlexConfig objects. (To a degree, I still couldn't get it to let me configure timeout pinhole settings, but take the victories you can I guess) I welcome reddit's mockery for banging my head against tha wall this long before figuring it out. [link] [comments] |
Posted: 18 Sep 2021 09:07 AM PDT Kinda out of my realm, as I am more at home in IOS world, but here goes.... I have a C9300 switch connected back to a pair of N9K's at the core. The C9300 is trunked over fiber back to the core on a port channel, one connection to N9K-A and one connection to N9K-B, utilizing vpc and hsrp. As this is a critical link, we have added a microwave backup to this site in case the fiber is ever damaged. The traffic between this site would be measured in kilobits rather than gigabits, but every bit is fairly important. I would prefer that 100% of the traffic utilize the fiber until the microwave is the only option. How would you go about adding this backup connection? Add it to the hsrp standby group as a third member? Isolate it and let STP sort it out? Thanks in advance [link] [comments] |
Point to point connection via tunnel Posted: 18 Sep 2021 09:07 AM PDT To start I deal with more of defensive and offensive security, so while I can understand the networking aspects some, they are not my primary knowledge base. I am in the process of designing a training network involving two forested domains with extremely limited access between the both. Here is a rough break down.. Forest 1's domain will have an overarching dc with 2 child domains (a & b). Each child domain will also have a separate file sever and dc. Under each child domain will be several pcs. Forest 2 will be it's own domain with a single dc and separate file server with several pcs. The idea is to grant selective authentication trust for a single domain admin from forest 2 dc to forest 1 dc. That will be pretty much the only access between the forests with 1 other alternative. The access I am trying to figure out is a pc to pc connection from Forest 1, child domain b, pc 3 to forest 2, pc 2. I am hoping to set up a one way trust for a single user that can only be accessed via tunnel. Forest 2 will not be able to access Forest 1 via this route at all. Please share any links or knowledge on this process or let me know if I need to draw anything out and provide more information. [link] [comments] |
Aruba ClearPass policy across locations Posted: 18 Sep 2021 03:04 PM PDT Hi We are a globally located enterprise and looking at Aruba Clearpass. Any best practices on whether it should be deployed per location or in a few central locations. If deployed centrally, there would be latency issues. If deployed distributed, I am not sure how we would get policy consistency across locations. Any thoughts on best practices please? [link] [comments] |
Aruba ClearPass User ACL with Cisco switches? Posted: 18 Sep 2021 02:56 PM PDT Hi I have a question regarding the use of per-user ACL's with Aruba ClearPass. Is this only possible with Aruba switches or will it also work if we have Cisco switches. In this case, ClearPass does not know how to provision Cisco switches and only talks to Cisco switches via RADIUS. I don't see how RADIUS has the mechanism to provision highly granular ACE's, so I am thinking this is user ACL's with ClearPass are not possible if we have Cisco switches. But am I missing something? [link] [comments] |
Posted: 18 Sep 2021 12:55 PM PDT Hi. I used microtik sxt for years, but it's broken. Please suggest me a cheaper p2p wireless device for 1KM away from pop site (it has a direct sight) and maximum speed of my internet service is 16Mb/s [link] [comments] |
Posted: 18 Sep 2021 05:07 AM PDT If an endpoint wired or wireless gets disconnected physically or faces an IP disconnect for some reason, does it need to reauthenticate itself with ISE and redo the DORA? Or can such endpoints in Campus LAN be authenticated and join the network back despite reachability to ISE/AAA/DHCP server being down as a result of Data center reachability being down? [link] [comments] |
MAC Spoofing in Campus LAN (SD-Access) Posted: 18 Sep 2021 07:52 AM PDT Does Cisco SDA solution, specially use of LISP, help crackdown MAC spoofing or MAC theft? In my experience, if MAC spoofing/theft occurs, LISP is not intelligent enough to know if the first device is legit or the second. [link] [comments] |
Posted: 18 Sep 2021 01:08 AM PDT Hi, all. Could somebody please explain the best way to reset the the CLI password for SNS-3515 appliance running ISE 2.7? We've CIMC access but it decided to stop working now. (I can ping but GUI/SSH doesn't work) That leaves me with only option which is via bootable USB. I found this guide but quite confused with the exact steps needed. steps. https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200568-ISE-Password-Recovery-Mechanisms.html Has anybody done this before? If so, what is the best way to reset it? Step 3 on the guide says: Step 3. Restart SNS-35XX appliance and go to the BIOS mode on console Step 4. In the BIOS mode, choose boot from USB. Any idea how can I force the ISE to boot to the BIOS? Is there a keyboard break I should send? Thanks in advance. [link] [comments] |
Firewalls and DHCP Transaction ID Posted: 18 Sep 2021 04:49 AM PDT We are currently troubleshooting an issue where in our site has asymmetrical routing towards the data center where the DHCP servers are. The discover message goes out one side and the offer message is being received on the other WAN circuit. Based from the packet capture the transaction ID is being altered. If we try to force the DHCP communication over one circuit via static route or shutting down one circuit then DHCP works well and transaction ID is intact. We do not have access at the DC side but we suspect that there are two firewalls out there facing different mpls circuits that's causing the transaction ID to be altered. I can't think of any network device that would alter the payload other than a firewall. So assumption is, discover message goes out mpls1, passes through fw1, offer message goes back through fw2, then mpls2. Thinking like since fw2 doesn't have session on its table, it messes up the offer message but it allowed to pass through. Maybe they allowed to pass udp any/any. I just can't seem to find a firewall product that could cause this. Any idea? Thanks! Edit: I tested on a lab using ASA but ASA is just letting it pass through without any modifications to the payload. [link] [comments] |
Need assistance with failed router cutover please! Posted: 17 Sep 2021 11:28 PM PDT We tried earlier to upgrade our edge cisco routers. We have 2 WAN links and we use eBGP to peer with the carriers. The primary link was to go from 500M fiber to 10G. The backup link is 50M fiber. The customer failed due to the primary carrier claiming they never moved us to 10G service at their CO. Only the physical line was put in. So, we rolled back to the old router and service. After that, we notice we had asynchronous routing. Context: we have a /24 public block purchased from the secondary carrier(Grande communications). We are advertising this to the primary carrier(spectrum). Spectrum is now saying they do not and will not advertise this /24....despite us having this setup for several years at least. Does anyone have any knowledge of the WAN part here? I'm not familiar enough with the carrier part to say that Spectrum is full of shit and should be advertising this route for us. Do we need to provide some type of LOA or does the carrier who we lease the /24 need to provide this? Any help would be greatly appreciated. We've been at this for hours and I don't know what to do. [link] [comments] |
DANOS - Filtering out default route on OSPFv3 Posted: 17 Sep 2021 05:40 PM PDT I`m trying to setup an Full Table BGP router on DANOS and it is working fine so far. Transit connections are working and the same for the connection to the IX platform. However i have one vlan to get back to the rest of the network running OSPFv3 which also holds a default route for the rest of the network to function (al sub locations to gain internet access) I would like to filter out the default but it looks like it it no possible on DANOS to apply a inbound filter? [link] [comments] |
Help with Cisco SG200-50P Voice VLAN issues. Posted: 17 Sep 2021 04:28 PM PDT Hello, I hate to burden anyone with this but I'm at a loss. I have several phones that initially came up fine on VLAN 2 as expected but now have resorted to coming up only on VLAN 1 and nothing I do seems to change that. Initially I was convinced the issues were related to auto voice VLAN or auto smart port settings that are enabled by default as I could see the VLAN membership magically changed when I logged into the switch. I set everything back and I set the built-in voice VLAN to 100, unused. Default VLAN 1 is default PVID 1 and voice VLAN is 2. Here's where it get's weird. I programmed ports 1-50 untagged PVID 1, tagged VLAN 2 (except ports 47 and 48 which are PVID 2 - my actual voice VLAN i.e. 172.16.X.X). Port 48 is my router providing DHCP to the phones and 47 is a nat'd subnet for the data network. All phones are tagging VLAN 2. First run all phones came up VLAN 2 and all PC's VLAN 1, packed up and left. After leaving, a day layer I get a call several phones aren't working. I have them check IP's and they are VLAN 1. I have them verify the phone still set to VLAN 2. I log into switch only to find several switched, this is when I disabled auto everything (at least I think everything). I got the phones to all come back up on VLAN 2 after a hard reboot but what's weird is the MAC Address Tables show the phone's MAC in both the VLAN 1 list and the VLAN 2 list even if I clear the list and let it rebuild. How can this be? There are PC's behind many of the phones and they all come up VLAN 1, so essentially I see 3 devices per port in the MAC Address Table, a PC and phone for VLAN 1 and the very same phone for VLAN 2. Today I log in and clear the MAC Address Table and I only see the two untagged PVID 2 ports 47 and 48 belonging to VLAN 2 and everything, all phones and PC's are in the VLAN 1 group. Additionally when checking the phones, they all have VLAN 1 IP's now!!! I'm going insane!. Do I throw this switch in the trash? Please advise thank you! [link] [comments] |
Best enterprise Networking vendor Posted: 18 Sep 2021 01:27 AM PDT Hey guys, Cisco has too many components to manage..Tired of their forever integration…always need to buy new hardware for their next integrated feature etc. Which vendor provides the following capabilities better or equal to Cisco.
Preferably should have a single dashboard (DNA center is lol). Remote management support for switches (never need to console in ever). Stackable switches, minimal downtime during upgrades. Should extend to datacenter switches. How good are Fortinet, Juniper, Arista etc? Thanks [link] [comments] |
You are subscribed to email updates from Enterprise Networking Design, Support, and Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment