Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
BelDin
Jan 29, 2001

Bardlebee posted:

Does the CCNA even cover OSPF? That is my main fear. I have the ICND1, but if the ICND2 doesn't cover something that you need to know for employment. Then.... its kinda silly.

Yep, it covers the basics like single area OSPF. The big thing to know is that it is a link state protocol and not distance-vector like EIGRP, the base metric is cost and not bandwidth/delay, and the steps it uses to build the tables (LSAs and LSDBs using Djikstra).

You may get into some basic troubleshooting, but nothing multi-area IIRC.

Adbot
ADBOT LOVES YOU

some kinda jackal
Feb 25, 2003

 
 
OSPF is covered in the CCNA. RIP, OSPF, EIGRP.

ragzilla
Sep 9, 2005
don't ask me, i only work here


BelDin posted:

Dynamic routing protocols? We just use static routes for everything! :corsair:

I have actually heard both these in the last two years. EIGRP being rolled out is voodoo magic as far as they are concerned.

If static routing is good enough for the PSTN, it's good enough for my network :colbert:

BelDin
Jan 29, 2001

Cavepimp posted:

Uh oh...maybe I'm rustier than I thought.

Not necessarily, but they do come in handy for rapid convergence and the use of redundant infrastructure protocols such as HSRP and GLBP. Again, shake that voodoo stick and explain that using L3 switches with routed interfaces (no switchport)does not introduce loops in your network at L2.

The last time a switch went down on our network edge due to a DSL line problem, the IT manager kept harping about spanning tree and how it was causing issues in the network. He then went on blaming the recently implemented VLANs (rather than everything running on VLAN 1 with separate switches and lines) and trunks between switches (Running PVST+) causing network instability.

They were physically moving lines between switches in network closets. These lines use two pair of a CAT5 cable going to 110 blocks that are cross linked to the infrastructure lines at the work cubes.

Remember kids, you only need four wires for Ethernet! :corsair:

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE

ragzilla posted:

If static routing is good enough for the PSTN, it's good enough for my network :colbert:

NPAC would like to talk to you.

LERG for IP would be awesome.

*Makes route update*
*Waits 3 months for the effective date*
*network becomes unreachable as only 1/2 the other networks load the update*

BelDin
Jan 29, 2001

ragzilla posted:

If static routing is good enough for the PSTN, it's good enough for my network :colbert:

Fair enough, but then again, you don't typically get a helpdesk guy promoted to sole network administrator/engineer in a PSTN. (at least not without serious skills)

It's bad enough that our 600 client LAN is expected to scale 4x over a large campus in three months.

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:

NPAC would like to talk to you.

LERG for IP would be awesome.

*Makes route update*
*Waits 3 months for the effective date*
*network becomes unreachable as only 1/2 the other networks load the update*

If I had to make an SS7 dip on every call that traversed the network...

I'd be buying stock in Syniverse.

BelDin
Jan 29, 2001

FatCow posted:

NPAC would like to talk to you.

LERG for IP would be awesome.

*Makes route update*
*Waits 3 months for the effective date*
*network becomes unreachable as only 1/2 the other networks load the update*

I can imagine it now...

*helpdesk call*

:supaburn::Why can't I get to icanhazcheezburger? I NEED to get there for business purposes!

:corsair:: Because the NSFNet got taken down by a backhoe and BGP, rear end, and ASNs haven't been invented yet?

inignot
Sep 1, 2003

WWBCD?

BelDin posted:

Dynamic routing protocols? We just use static routes for everything! :corsair:

I have actually heard both these in the last two years. EIGRP being rolled out is voodoo magic as far as they are concerned.

Sometimes I wonder how people like that scammed their way into a paycheck.

BelDin
Jan 29, 2001

inignot posted:

Sometimes I wonder how people like that scammed their way into a paycheck.

Work as a government contractor, such as myself. You'll be amazed at the level of incompetence across the board.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

BelDin posted:

Work as a government contractor, such as myself. You'll be amazed at the level of incompetence across the board.

Annnnd how! :( Also "IA professionals". :sotw:

BelDin
Jan 29, 2001

Tremblay posted:

Annnnd how! :( Also "IA professionals". :sotw:

I cringe every time I have to refer to myself as "Cyber Security" for that very reason. I've gone from helpdesk, applications administrator, systems administrator, and network administrator over my career. Don't lump me in with the IA grad that can write policies, watch logs, and not much else.

The best INFOSEC guys I have worked with over time have been the ones that had technical jobs before treating security as a specialization, not a degree program.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

BelDin posted:

I cringe every time I have to refer to myself as "Cyber Security" for that very reason. I've gone from helpdesk, applications administrator, systems administrator, and network administrator over my career. Don't lump me in with the IA grad that can write policies, watch logs, and not much else.

The best INFOSEC guys I have worked with over time have been the ones that had technical jobs before treating security as a specialization, not a degree program.

Agree, sadly you/them are the minority in an ocean of poo poo.

inignot
Sep 1, 2003

WWBCD?

BelDin posted:

Work as a government contractor, such as myself. You'll be amazed at the level of incompetence across the board.

I've done mostly federal work for the past seven years, and yes, it's full of fools. Actually I think any large organization tends to be dominated by fools. Anyway, it still boggles my mind that the kind of goofball that would think you can make a network run faster by changing the bandwidth statement on an interface once sat in an interview and was judged the most competent man for the job.

And I concur that IA people are laughable. One of the more recent eye rollingly bizarre IA edicts is that using vlan 1 for anything is bad. Because one is an easily guessed number. Of course, the switches they are moaning about are in data centers with no end users attached. So I suppose they are concerned attackers will remotely send crafted dot1q headers over the internet (in IA world layer 2 headers somehow persist across layer 3) ...and then something bad happens. Cripes, based on default behavior on Cisco switches, vlan 1 is never tagged anyway.

I'm considering pursuing the ISSEP just to spite them. Or I may just start asking for CERT or Mitre advisory numbers on these alleged issues to see if I can force them to admit it's all unsubstantiated. How did risk analysis become risk fabrication?

BelDin
Jan 29, 2001

inignot posted:

I've done mostly federal work for the past seven years, and yes, it's full of fools. Actually I think any large organization tends to be dominated by fools. Anyway, it still boggles my mind that the kind of goofball that would think you can make a network run faster by changing the bandwidth statement on an interface once sat in an interview and was judged the most competent man for the job.

And I concur that IA people are laughable. One of the more recent eye rollingly bizarre IA edicts is that using vlan 1 for anything is bad. Because one is an easily guessed number. Of course, the switches they are moaning about are in data centers with no end users attached. So I suppose they are concerned attackers will remotely send crafted dot1q headers over the internet (in IA world layer 2 headers somehow persist across layer 3) ...and then something bad happens. Cripes, based on default behavior on Cisco switches, vlan 1 is never tagged anyway.

I'm considering pursuing the ISSEP just to spite them. Or I may just start asking for CERT or Mitre advisory numbers on these alleged issues to see if I can force them to admit it's all unsubstantiated. How did risk analysis become risk fabrication?

I like to think of myself as an up and coming security engineer with a management day job. :)

I don't like using VLAN 1 for anything because we keep it the default, not because it is the default. The primary reason that we are taught not to use VLAN 1 is misconfiguration. Some goober plugging a computer in a DTP enabled port can make for a bad day. We actually enforce access ports and set nonegotiate by default so that double tagging and VLAN hopping aren't easily possible.

Risk analysis became risk fabrication when there was money to be made in selling fear. It's been a long time now.

More on topic:

I had one of my guys get concerned once I pushed going to VLANs and trunking.

:downs:: Be sure to turn on port security for all the switch ports to make everything more secure!

:raise:: Even trunk lines?

:downs:: Especially trunk lines, they are the most vulnerable because you can get on all the VLANs with them!

:eng99:: ...

some kinda jackal
Feb 25, 2003

 
 

BelDin posted:

I had one of my guys get concerned once I pushed going to VLANs and trunking.

:downs:: Be sure to turn on port security for all the switch ports to make everything more secure!

:raise:: Even trunk lines?

:downs:: Especially trunk lines, they are the most vulnerable because you can get on all the VLANs with them!

:eng99:: ...

I'm not calling you out, but this is almost too ridiculous to believe :stare:

BelDin
Jan 29, 2001

Martytoof posted:

I'm not calling you out, but this is almost too ridiculous to believe :stare:

This guy is not IT, he's a physical security / policy writer type who was a floor supervisor for about 20 years before moving into security (in the 90s) . He then took some MCSE classes (but hasn't passed an MCP exam) to get into the exciting field of Cyber Security. To his credit, he doesn't know much about networking and doesn't need to for his job duties.

Give him an information security topic (non computer), and he'll beat you to death with paper. That's his forte, and I keep him corraled in that area for reasons like this. Very useful against auditors.

You're right that this is the condensed version of the conversation... he didn't know what trunk lines were, so I had to explain them to him. This was the result of that talk. He asked it in more of a questioning tone. Call it artistic license, if you will.

I can't grumble too much, he's one of the two reasons why I got hired.


Enough derailing.... new Cisco short question choices:

1) Has anyone here taken the SNAF exam? How bad was it?

2) For those who use port security, what is a good aging time? We're currenly using sticky macs on most workstation ports, and all equipment moves are updated manually. My understanding is that the static entries from the stickies will not get cleared during aging and only the ports without stickies will age.

abigserve
Sep 13, 2009

this is a better avatar than what I had before
At my old job I believe we had the aging time said to 300 seconds (5 mins).

As for sticky mac addresses, they don't age as far as I'm aware - buuut if you don't write the config, the entries will vanish on reboot.

Out of curiosity, why do you want to enable this feature?

BelDin
Jan 29, 2001

abigserve posted:

At my old job I believe we had the aging time said to 300 seconds (5 mins).

As for sticky mac addresses, they don't age as far as I'm aware - buuut if you don't write the config, the entries will vanish on reboot.

Out of curiosity, why do you want to enable this feature?

We have a problem where certain IT cubes that have port security on are not aging out MAC addresses properly due to desktop switches.

The recent event is that an IT worker with a workstation switch in their cube is hooked to a switch with port security (no sticky) and imaged a bunch of machines. When we went to deploy the computer (on the same infrastructure switch) it err-disabled because the MAC was still hanging on the IT worker's port. I figured we would turn it on across the board if it didn't affect sticky macs.

We use the stickies on our workstations so that people can't move computers or hook new ones up on the network. It triggers an err-diable, and we have to bring the interface back up after we bludgeon the user. We have a NAC appliance sitting in the corner to remove the need for stickies, but are so busy putting out fires that we haven't got it put in yet.

ate shit on live tv
Feb 15, 2004

by Azathoth

CrazyLittle posted:

who the hell still uses EIGRP anyways?

We use it exclusively. Both over our MPLS Cloud and at our Datacenter.

We use Sticky Mac as well and for IT people who need to reimage multiple machines, they are in a seperate VLAN and their particular ports are not stickied. Eventually we may move to NAC, but who knows when that will be rolled out.

ate shit on live tv fucked around with this message at 15:56 on Oct 29, 2010

Tremblay
Oct 8, 2002
More dog whistles than a Petco

BelDin posted:

We have a problem where certain IT cubes that have port security on are not aging out MAC addresses properly due to desktop switches.

The recent event is that an IT worker with a workstation switch in their cube is hooked to a switch with port security (no sticky) and imaged a bunch of machines. When we went to deploy the computer (on the same infrastructure switch) it err-disabled because the MAC was still hanging on the IT worker's port. I figured we would turn it on across the board if it didn't affect sticky macs.

We use the stickies on our workstations so that people can't move computers or hook new ones up on the network. It triggers an err-diable, and we have to bring the interface back up after we bludgeon the user. We have a NAC appliance sitting in the corner to remove the need for stickies, but are so busy putting out fires that we haven't got it put in yet.

I don't think aging timers work with sticky since sticky adds the mac to the config.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

inignot posted:

I've done mostly federal work for the past seven years, and yes, it's full of fools. Actually I think any large organization tends to be dominated by fools. Anyway, it still boggles my mind that the kind of goofball that would think you can make a network run faster by changing the bandwidth statement on an interface once sat in an interview and was judged the most competent man for the job.

And I concur that IA people are laughable. One of the more recent eye rollingly bizarre IA edicts is that using vlan 1 for anything is bad. Because one is an easily guessed number. Of course, the switches they are moaning about are in data centers with no end users attached. So I suppose they are concerned attackers will remotely send crafted dot1q headers over the internet (in IA world layer 2 headers somehow persist across layer 3) ...and then something bad happens. Cripes, based on default behavior on Cisco switches, vlan 1 is never tagged anyway.

I'm considering pursuing the ISSEP just to spite them. Or I may just start asking for CERT or Mitre advisory numbers on these alleged issues to see if I can force them to admit it's all unsubstantiated. How did risk analysis become risk fabrication?

For Cisco stuff VLAN 1 traffic is largely punted to the CPU. You can DoS a 6k pretty quick if you know the kind of traffic to smack it with. It's actually one of the less stupid items on the checklists.

BelDin
Jan 29, 2001

Tremblay posted:

I don't think aging timers work with sticky since sticky adds the mac to the config.

That's the behavior I want so that I can push it out on all public interfaces stickied or otherwise. Then we don't have to tell the fill in admins another configuration item to look for when moving people from cube to cube.

Explaining to systems administrators why we want to have small frame violation rates, broadcast and multicast storm control, etc. on workstation ports was enough of a headache to last me a lifetime.

jwh
Jun 12, 2002

inignot posted:

(in IA world layer 2 headers somehow persist across layer 3)
Yeah, it's funny how widespread that belief is.

I like my IT Security staff, but periodically they do say things that make me grit my teeth, such as 'VLAN hopping is possible, so we need to buy more firewalls," or "why can't you identify the machine based on MAC address?" (when the machine is very far away, outside of our environment.)

You have to just roll with it, though, because the alternative is a brain aneurysm.

vty
Nov 8, 2007

oh dott, oh dott!
What's the most reliable JRE version for accessing ASDM? I wind up configuring a few ASAs a year, typically by CLI, but to make customers satisfied I leave them with ASDM to muck around in.

The problem is, every time I get an ASA I wind up going through hours of searching for the "correct" Java version. I believe it's been 6u7, but I'm currently having issues with 7.0.

ragzilla
Sep 9, 2005
don't ask me, i only work here


vty posted:

What's the most reliable JRE version for accessing ASDM? I wind up configuring a few ASAs a year, typically by CLI, but to make customers satisfied I leave them with ASDM to muck around in.

The problem is, every time I get an ASA I wind up going through hours of searching for the "correct" Java version. I believe it's been 6u7, but I'm currently having issues with 7.0.

We configure various ASAs running ASDM between 5 and 6.3(1) (so ASA/PIX versions 7 through 8.3(1)) and I haven't run into any problems running the latest Java off Sun's site.

workape
Jul 23, 2002

jwh posted:

"why can't you identify the machine based on MAC address?" (when the machine is very far away, outside of our environment.)

You have to just roll with it, though, because the alternative is a brain aneurysm.

I have this poo poo out of people in my own group. At first I thought I was being trolled, then I realized that he doesn't know a loving thing. What is worse is that people are going to this retard asking him questions and I have to spend about 20% of my day fixing his loving retarded mistakes.

Although, there really is nothing more entertaining than asking him to explain how a mac table is built or how voip works. Seriously, if you have the Senior level title, you should be able explain the loving basics. loving christ...

ate shit on live tv
Feb 15, 2004

by Azathoth
"Ok so I have this machine I don't know the IP, can you figure out the IP based on the mac-address?" :eng99:

SamDabbers
May 26, 2003



That should be possible if you're on the same layer 2 segment, at least in theory.

ate shit on live tv
Feb 15, 2004

by Azathoth
I know that part. But the networking part is any mac-address can be any arbitrary IP Address (or it might not even have an IP Address at all, maybe its using IPX, or TokenRing, who knows?). There is no way to take a device with a mac-address and just know its IP address without some kind of layer 3 process occurring, like in your example, an ARP request.

Rad Boss
May 10, 2003
i obsess over things because i have nothing better to do

Powercrazy posted:

There is no way to take a device with a mac-address and just know its IP address without some kind of layer 3 process occurring, like in your example, an ARP request.

What about CDP :shepface:

This is the Cisco thread, after all

Tremblay
Oct 8, 2002
More dog whistles than a Petco

Rad Boss posted:

What about CDP :shepface:

This is the Cisco thread, after all

Unless there is a Cisco softphone installed CDP is no help for PCs.

abigserve
Sep 13, 2009

this is a better avatar than what I had before
Find out the switchport it's connected to and r-span that poo poo rasta.

Harry Totterbottom
Dec 19, 2008
Anyone happen to know if there's a huge gap in difference between Cisco Unified Contact Center Enterprise and Express? Or are they essentially the same just different scalability?

The main thing I'm trying to figure out is if I taking a UCCX class will give me enough info that I can manage the UCCE environment that might be getting dropped in my lap.

PuTTY riot
Nov 16, 2002
I'm in the market for an entry-level dual WAN firewall. I have 2 AT&T Bell South nettopia routers in bridge mode doing PPPoE. I realize that bonding is probably something that won't work, and have settled on load balancing as an alternative. Are there any gotchas with either of the below devices? Is there a comparable ASA that wouldn't blow my mind to configure? I have a watchguard right now and I want to set the thing on fire.


http://www.cisco.com/en/US/prod/collateral/routers/ps9923/ps9925/data_sheet_c78-501225.html

http://www.cisco.com/en/US/prod/collateral/routers/ps9923/ps9926/data_sheet_c78-501227.html
(Is there any difference besides the number of ports between these two?)


I actually have 4 DSL lines in so if there is something <$1,000 that will work with all 4 I'd rather do that. Can pfsense do that (easily and reliably)?

Tremblay
Oct 8, 2002
More dog whistles than a Petco

American Jello posted:

I'm in the market for an entry-level dual WAN firewall. I have 2 AT&T Bell South nettopia routers in bridge mode doing PPPoE. I realize that bonding is probably something that won't work, and have settled on load balancing as an alternative. Are there any gotchas with either of the below devices? Is there a comparable ASA that wouldn't blow my mind to configure? I have a watchguard right now and I want to set the thing on fire.


http://www.cisco.com/en/US/prod/collateral/routers/ps9923/ps9925/data_sheet_c78-501225.html

http://www.cisco.com/en/US/prod/collateral/routers/ps9923/ps9926/data_sheet_c78-501227.html
(Is there any difference besides the number of ports between these two?)


I actually have 4 DSL lines in so if there is something <$1,000 that will work with all 4 I'd rather do that. Can pfsense do that (easily and reliably)?

I don't have much experience with the non-consumer linksys stuff so I can't comment on that. Unless there was a change made in 8.3. ASA's dual WAN support is limited to primary and backup connection. You can't use both at the same time.

jwh
Jun 12, 2002

I'd buy a Palo Alto PA-500 instead, personally.

edit: Although those are >$1k, so maybe that's out of the question.

jwh fucked around with this message at 16:59 on Nov 4, 2010

tortilla_chip
Jun 13, 2007

k-partite
Juniper SSG

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

American Jello posted:

I'm in the market for an entry-level dual WAN firewall. I have 2 AT&T Bell South nettopia routers in bridge mode doing PPPoE. I realize that bonding is probably something that won't work, and have settled on load balancing as an alternative. Are there any gotchas with either of the below devices? Is there a comparable ASA that wouldn't blow my mind to configure? I have a watchguard right now and I want to set the thing on fire.


http://www.cisco.com/en/US/prod/collateral/routers/ps9923/ps9925/data_sheet_c78-501225.html

http://www.cisco.com/en/US/prod/collateral/routers/ps9923/ps9926/data_sheet_c78-501227.html
(Is there any difference besides the number of ports between these two?)


I actually have 4 DSL lines in so if there is something <$1,000 that will work with all 4 I'd rather do that. Can pfsense do that (easily and reliably)?

I recommended Mikrotik earlier in this thread, I'd take it over Linksys any day. Hell their $40 RB750's would do this. I have many RB493's doing all sorts of stuff (ospf, bgp, mpls, etc). RB1100's are awesome if you can find them in stock ($400, 13gig-e interfaces)

* Routerboard models
* Load balacing over multiple gateways

Adbot
ADBOT LOVES YOU

Davethehedgehog
Jun 7, 2003
Choose me, I am warm!

Tremblay posted:

Unless there is a Cisco softphone installed CDP is no help for PCs.

LLDP?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply