Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
psydude
Apr 1, 2008

Heartache is powerful, but democracy is *subtle*.

gooby pls posted:

In UCS training at Cisco this week. Our teacher has SEVEN CCIEs. Just...how.

What's their name? I may know their daughter.

Adbot
ADBOT LOVES YOU

gooby pls
May 18, 2012



psydude posted:

What's their name? I may know their daughter.

Mike C. out of Maryland. Teaches for firefly.

madsushi
Apr 19, 2009

Baller.
#essereFerrari

falz posted:

Counterpoint: RANCID diffs are extremely chatty and filled with revision changes of botnet and av database updates. It seems that whatever command spits out your config always includes that versioning too. Lame.

You can edit your RANCID modules to filter out a lot of the chatty poo poo, I end up with slightly custom modules for most devices.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

madsushi posted:

You can edit your RANCID modules to filter out a lot of the chatty poo poo, I end up with slightly custom modules for most devices.

Yeah, but retaining special patches to re apply after updating packages sucks. But usually necessary. RANCID 3 did do a nice job of letting one specify modules which helps in many cases, just not this one.

psydude
Apr 1, 2008

Heartache is powerful, but democracy is *subtle*.

gooby pls posted:

Mike C. out of Maryland. Teaches for firefly.

Yep. His daughter is but a mere single CCIE holder.

some kinda jackal
Feb 25, 2003

 
 

falz posted:

Counterpoint: RANCID diffs are extremely chatty and filled with revision changes of botnet and av database updates. It seems that whatever command spits out your config always includes that versioning too. Lame.

I didn't even use RANCID for this, I just made sure I downloaded a copy of the config from the UI before I made any changes. Low tech but saved my rear end at least twice.

Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...

gooby pls posted:

In UCS training at Cisco this week. Our teacher has SEVEN CCIEs. Just...how.

It becomes a bit of a game at that point since as soon as a new path is released a few people rush to be the first x time ccie.

I work with a few multiple ccies and while they definitely know their stuff and are supremely intelligent, they likely won't use all of their certs in work, at least for what we do. Not in any way dissing the accomplishments.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
You would have to spend a great amount of your time recertifying for all of those, I would imagine that would be a part of each day, forever.

I don't see the benefit for the person outside of getting a higher paycheck because their org can say they have X ccie certs on staff.

Methanar
Sep 26, 2013

by the sex ghost

falz posted:

You would have to spend a great amount of your time recertifying for all of those, I would imagine that would be a part of each day, forever.

I don't see the benefit for the person outside of getting a higher paycheck because their org can say they have X ccie certs on staff.

If you're the kind of person that pursues every CCIE it's likely you really enjoy labing and studying for them.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Right, but is there time to actually do anything but study? I do realize that some people enjoy studying, and if they get paid to study, then that's a win for them I guess.

Sheep
Jul 24, 2003
That Ferrari isn't going to buy itself, you know.

1000101
May 14, 2003

BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY FRUITCAKE!

falz posted:

You would have to spend a great amount of your time recertifying for all of those, I would imagine that would be a part of each day, forever.

I don't see the benefit for the person outside of getting a higher paycheck because their org can say they have X ccie certs on staff.

If you re-certify for one it'll go ahead and re-up them all. The recertification process is basically "go pass any CCIE written exam" so as long as you stay current on at least 1 technology you can maintain all of them. The only time you have to re-take a lab is when you let one expire.

psydude
Apr 1, 2008

Heartache is powerful, but democracy is *subtle*.
DoD deployments: 10% engineering, 90% managing red-tape.

Eletriarnation
Apr 6, 2005

People don't appreciate the substance of things...
objects in space.


Oven Wrangler

1000101 posted:

If you re-certify for one it'll go ahead and re-up them all. The recertification process is basically "go pass any CCIE written exam" so as long as you stay current on at least 1 technology you can maintain all of them. The only time you have to re-take a lab is when you let one expire.

Yeah, there are a lot of people inside of Cisco at least who have more than one and are trying for a new one every few years. As long as you can pass the written for the one you're trying for, it recerts you for everything you already have and you don't have to worry about it.

This also applies to lower certs like CCNA and CCNP - you can refresh them by passing the CCIE written, not that anyone cares too much about those earlier certs once you manage to pass the lab as well.

Eletriarnation fucked around with this message at 16:55 on Feb 10, 2016

Docjowles
Apr 9, 2009

On a Cisco ASA, is there a way to set up the AnyConnect VPN profile to let users toggle "split tunnel" on and off themselves? I'm more familiar with OpenVPN, where this is possible on the client side, but I cannot find anything similar for ASA/AnyConnect. The best I can come up with is creating two profiles, one with it on and one with it off, and having users pick at login. Which works, but will generate a bunch of tickets about "HALP A NEW CHOICE APPEARED WAT DO?"

Split tunnel is what I want for the vast bulk of our users. I don't want them streaming Spotify or whatever through the VPN. There's just a few special snowflakes that need full tunneling enabled from time to time who I need to accommodate as painlessly as possible.

psydude
Apr 1, 2008

Heartache is powerful, but democracy is *subtle*.

Docjowles posted:

On a Cisco ASA, is there a way to set up the AnyConnect VPN profile to let users toggle "split tunnel" on and off themselves? I'm more familiar with OpenVPN, where this is possible on the client side, but I cannot find anything similar for ASA/AnyConnect. The best I can come up with is creating two profiles, one with it on and one with it off, and having users pick at login. Which works, but will generate a bunch of tickets about "HALP A NEW CHOICE APPEARED WAT DO?"

Split tunnel is what I want for the vast bulk of our users. I don't want them streaming Spotify or whatever through the VPN. There's just a few special snowflakes that need full tunneling enabled from time to time who I need to accommodate as painlessly as possible.

The best way to do this is to create two group policies, one with split tunnel and one without, create a full-tunneling security group in active directory and then query that attribute when they log in to determine which group policy to apply. You can also use this to provide different address pools and other things to further differentiate between user groups.

Here's some reading on it: http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html

e: I see that you want it as a "sometimes" thing. I don't know if there's a way to do that. Your best option is probably to configure two different profiles, name one "USE THIS, ASSHOLES" or something idiot-proof, and tell those people who need the full tunneling to select the second option when they need it.

psydude fucked around with this message at 20:04 on Feb 10, 2016

Slickdrac
Oct 5, 2007

Not allowed to have nice things
e; better answer^

psydude
Apr 1, 2008

Heartache is powerful, but democracy is *subtle*.
Also, happy Wednesday! Now everyone get ready to patch your ASAs.

Docjowles
Apr 9, 2009

psydude posted:

The best way to do this is to create two group policies, one with split tunnel and one without, create a full-tunneling security group in active directory and then query that attribute when they log in to determine which group policy to apply. You can also use this to provide different address pools and other things to further differentiate between user groups.

Here's some reading on it: http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html

e: I see that you want it as a "sometimes" thing. I don't know if there's a way to do that. Your best option is probably to configure two different profiles, name one "USE THIS, ASSHOLES" or something idiot-proof, and tell those people who need the full tunneling to select the second option when they need it.

Thanks, the group policy thing is probably what I will end up doing. Exactly because no matter how clearly I label the different profiles, someone will still get confused.

Is this document up to date? Seems to indicate that group membership doesn't work well, because a user is going to belong to multiple groups and that confuses the ASA. But I can stick it in some other field we don't currently use, which is fine.

psydude posted:

Also, happy Wednesday! Now everyone get ready to patch your ASAs.

are-you-loving-kidding.jpg

madsushi
Apr 19, 2009

Baller.
#essereFerrari
More details:
https://blog.exodusintel.com/2016/01/26/firewall-hacking/

Literally just decomm'd my last 5585-X last week.

Slickdrac
Oct 5, 2007

Not allowed to have nice things

psydude posted:

Also, happy Wednesday! Now everyone get ready to patch your ASAs.

gently caress yeah, I can plan a bunch of stuff for the total outage this will require.

Bluecobra
Sep 11, 2001

The Future's So Bright I Gotta Wear Shades

psydude posted:

Also, happy Wednesday! Now everyone get ready to patch your ASAs.

:psyduck:

Does this mean anyone on the Internet can send these UDP packets to the firewall or does the packets need to come from already site-to-site VPN sessions?

psydude
Apr 1, 2008

Heartache is powerful, but democracy is *subtle*.

Bluecobra posted:

:psyduck:

Does this mean anyone on the Internet can send these UDP packets to the firewall or does the packets need to come from already site-to-site VPN sessions?

Not sure, but even so it wouldn't be hard to do some reconnaissance on what the potential peers may be and then spoof the address of the packets.

Partycat
Oct 25, 2004

If you use radius you can easily make a web portal with a big ol' toggle to manage group memberships at least.

You could probably also use dns or hostnames to manage where people hit a concentrator or something, we used to do that but it was multiple appliances on the end of that arrangement.

Richard Noggin
Jun 6, 2005
Redneck By Default

Slickdrac posted:

gently caress yeah, I can plan a bunch of stuff for the total outage this will require.

I dunno how long it takes your ASA to reload, but mine come back up in a matter of minutes.

Slickdrac
Oct 5, 2007

Not allowed to have nice things

Richard Noggin posted:

I dunno how long it takes your ASA to reload, but mine come back up in a matter of minutes.

Ours are so out of date, they have to do the two step update. So I'm claiming 5 minutes per reboot, plus 10 minutes to upload 2nd IOS between them for the outage notification.

I can do a lot in a 20 minute window.

Docjowles
Apr 9, 2009

Hi I'm back with today's edition of "lol wtf is this giant ASA config I've inherited doing?"

I found that from a remote location, I could not ping anything behind the ASA. I could SSH/RDP/etc to everything, and even ping the inside interface, but explicitly NOT ping the servers attached to it. There's a global "permit icmp any any" rule and nothing more specific that would override it. ICMP inspection was enabled in the default inspection policy. Finally, after trying everything else I could think of, I turned OFF ICMP inspection. Pings immediately began to work. This is like 100% contrary to everything I've ever read about enabling pings to pass the ASA. Why did this happen?

There is a second service policy besides the default, which turns on tcp-state-bypass. Is this setting conflicting with the inspect icmp setting? If I leave inspect icmp off, is that going to cause problems elsewhere?

Here's the relevant config sections, before I disabled inspect icmp:

code:
access-group global_access global
!
access-list global_access extended permit icmp any any 
!
class-map inspection_default
 match default-inspection-traffic
class-map bypass_class
 match access-list <object-group holding all internal networks>
!
policy-map bypass_policy
 description TCP Bypass for traffic coming back via <upstream device>
 class bypass_class
  set connection timeout idle 0:30:00 dcd 
  set connection advanced-options tcp-state-bypass
  set connection decrement-ttl
 class inspection_default
  inspect icmp 
!
service-policy bypass_policy global

ragzilla
Sep 9, 2005
don't ask me, i only work here


Docjowles posted:

Hi I'm back with today's edition of "lol wtf is this giant ASA config I've inherited doing?"

I found that from a remote location, I could not ping anything behind the ASA. I could SSH/RDP/etc to everything, and even ping the inside interface, but explicitly NOT ping the servers attached to it. There's a global "permit icmp any any" rule and nothing more specific that would override it. ICMP inspection was enabled in the default inspection policy. Finally, after trying everything else I could think of, I turned OFF ICMP inspection. Pings immediately began to work. This is like 100% contrary to everything I've ever read about enabling pings to pass the ASA. Why did this happen?

There is a second service policy besides the default, which turns on tcp-state-bypass. Is this setting conflicting with the inspect icmp setting? If I leave inspect icmp off, is that going to cause problems elsewhere?

Here's the relevant config sections, before I disabled inspect icmp:

code:
access-group global_access global
!
access-list global_access extended permit icmp any any 
!
class-map inspection_default
 match default-inspection-traffic
class-map bypass_class
 match access-list <object-group holding all internal networks>
!
policy-map bypass_policy
 description TCP Bypass for traffic coming back via <upstream device>
 class bypass_class
  set connection timeout idle 0:30:00 dcd 
  set connection advanced-options tcp-state-bypass
  set connection decrement-ttl
 class inspection_default
  inspect icmp 
!
service-policy bypass_policy global

If you have tcp-state-bypass enabled, some traffic is likely routing asymmetrically (so it travels out through the firewall, but the return traffic is direct behind the firewall, or in this case likely vice versa). If ICMP inspect was blocking pings in a situation like this I'd go capture the outside interface to ensure the pings are returning to verify the return pings are being blocked by inspection.

Richard Noggin
Jun 6, 2005
Redneck By Default
If you re-enable ICMP inspection and do a packet trace, where is it dropped? If you then remove the icmp ACL (leaving inspection on), what happens?

Bluecobra
Sep 11, 2001

The Future's So Bright I Gotta Wear Shades
I opened a case with TAC on CVE-2016-1287 and they claim that only existing VPN peers can send the malicious traffic. Take that with a grain of salt as I don't think they understand my question. Somone came up with a control plane ACL to whitelist VPN peers that can help you buy some time before you upgrade your ASA:

http://info.stack8.com/blog/cisco-cve-2016-1287-network-vulnerability-and-mitigation

DeNofa
Aug 25, 2009

WILL AMOUNT TO NOTHING IN LIFE.

Bluecobra posted:

I opened a case with TAC on CVE-2016-1287 and they claim that only existing VPN peers can send the malicious traffic.

I wouldn't trust this, just upgrade your god drat ASAs.

Moey
Oct 22, 2010

I LIKE TO MOVE IT

DeNofa posted:

I wouldn't trust this, just upgrade your god drat ASAs.

People I work with don't believe in updates/patches. I am sure there are other people out there just like this.

H.R. Paperstacks
May 1, 2006

This is America
My president is black
and my Lambo is blue

Moey posted:

People I work with don't believe in updates/patches. I am sure there are other people out there just like this.

Anyone who doesn't believe updates or patches when they involve a RCE (Remote Code Exploit) should be removed from their place of work. I can get behind not upgrading because of some odd vulnerability in a protocol you don't use.

ElCondemn
Aug 7, 2005


I just finished upgrading every drat ASA in our environment. Ran into one significant issue, if you're using identity NATs you need to disabled proxy-arp. It can/does cause your firewall to seemingly lose all it's arp entries. This should only be an issue for people upgrading from below 8.4 but I had several that were on 8.4(2) that didn't have a problem before the upgrade to 9.1(7).

Specifically in our environment we have a DMZ network with our load balancers in them. My load balancers and firewalls could ping each other, but none of the virtual servers were reachable until I disabled proxy-arp. This did not affect normal translations.

abigserve
Sep 13, 2009

this is a better avatar than what I had before
I've got three ASAs to update on Tuesday, and I'll be doing all our other firewalls that don't run IKE later in the same week. poo poo sucks, of course it happens before my project to re-do our ipsec topology removes the need for them.

Jedi425
Dec 6, 2002

THOU ART THEE ART THOU STICK YOUR HAND IN THE TV DO IT DO IT DO IT

abigserve posted:

I've got three ASAs to update on Tuesday, and I'll be doing all our other firewalls that don't run IKE later in the same week. poo poo sucks, of course it happens before my project to re-do our ipsec topology removes the need for them.

As I've posted before, I work for a company that hosts, lets say, a 'fuckton' of ASAs. Many of them are pre-8.3 code. All of them need to be updated.

The first batch update is tonight. My night off.

I feel like I just became the lead character in the Cisco version of Final Destination. Like the updates are going to find me.

Docjowles
Apr 9, 2009

Thanks all for the ASA troubleshooting suggestions. I'll dig into it next week as time allows and post if I find anything useful. The immediate problem is resolved so at this point it's more for my own education. I'm a Linux admin who understands networking well enough conceptually, but not the specific nuances of ASA's, so I appreciate the pointers.

We do have asymmetric routing in/out of this facility. Doing a traceroute out, the first couple hops are not the same as the last couple hops coming in from the other end. So I assume that's why the tcp-state-bypass line exists. The upstream devices are controlled by our parent company and I have no visibility into their config, which made troubleshooting this even more horrible. They verified nothing on their end is stopping ICMP from passing but that's it.

edit: I don't have the exact log line handy, but what led me to disable ICMP inspection was lines something like "Denied ICMP type=11, from laddr <remote host> on interface <outside> to <internal host>: no matching session"

Docjowles fucked around with this message at 03:15 on Feb 13, 2016

Antillie
Mar 14, 2015

I am fairly certain that the issue applies even you don't have any sort of IPSec VPN configured on the ASA as the advisory on Cisco's website does not list any workarounds (like disabling ISAKMP): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike

I upgraded three ASAs from pre 8.3 to 9.1(7) on the fly today for different clients. The first wave of mass upgrades starts tonight. Much like Jedi425, we have a "fuckton" of these things deployed, with a pretty diverse spread of code versions. Fun times.

Antillie fucked around with this message at 05:58 on Feb 13, 2016

Jedi425
Dec 6, 2002

THOU ART THEE ART THOU STICK YOUR HAND IN THE TV DO IT DO IT DO IT

Antillie posted:

I am fairly certain that the issue applies even you don't have any sort of IPSec VPN configured on the ASA as the advisory on Cisco's website does not list any workarounds (like disabling ISAKMP): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike

I upgraded three ASAs from pre 8.3 to 9.1(7) on the fly today for different clients. The first wave of mass upgrades starts tonight. Much like Jedi425, we have a "fuckton" of these things deployed, with a pretty diverse spread of code versions. Fun times.

Yeah the way it was told to me was: "Do a 'sh run | i crypto-map', did you get output? If so, you're hosed."

Adbot
ADBOT LOVES YOU

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Enjoy upgrading ram and flash on most of those so you can upgrade.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply