Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Moey
Oct 22, 2010

I LIKE TO MOVE IT
Keeping the firewall chat going, is everyone doing UTM type stuff from the edge, or maybe something at the client level?

I'm going to replace se old Juniper SRX 240 (6 in total, 3 sites) soon. Trying to decide on going with something other than Juniper.

Adbot
ADBOT LOVES YOU

Kazinsal
Dec 13, 2011



We have a bunch of ASAs and Firepowers and I hate them. Maintaining the firewalls for a company of seven offices and one datacentre shouldn't make me lust for nuclear death. We sell better products, so... I don't know why we keep running the FTDs.

Our preferred solution is "throw the whole Cisco security stack at it". It seems to work well for our clients... edge security is Firepower magic, internal security is handled by AMP and ISE.

What are you looking to accomplish other than just "refresh our firewalls"? I work for a multi-vendor VAR so I can poke some of our SEs and pick their brains.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Moey posted:

Keeping the firewall chat going, is everyone doing UTM type stuff from the edge, or maybe something at the client level?

I'm going to replace se old Juniper SRX 240 (6 in total, 3 sites) soon. Trying to decide on going with something other than Juniper.
I am by no means a Firewall dude, but $myorg offers managed firewall services for some schools and stuff, and it's on Fortigate things and they don't seem to hate it. UTM license of course jacks up the price by a lot.

Prescription Combs
Apr 20, 2005
   6

Moey posted:

Keeping the firewall chat going, is everyone doing UTM type stuff from the edge, or maybe something at the client level?

I'm going to replace se old Juniper SRX 240 (6 in total, 3 sites) soon. Trying to decide on going with something other than Juniper.

If you already know SRX I think they do UTM stuff now too.

Thanks Ants
May 21, 2004

#essereFerrari


Isn't trying to do security at the edge pretty much a dead end now that everything is encrypted and TLS 1.3 is coming along? I guess you still want a way to keep an eye on the traffic and ensure that DNS ports are being used for DNS traffic, stop machines communicating with known botnet command & control servers etc. but from my admittedly limited perspective it seems like trying to do full MITM inspection of traffic at the insane speeds that are available for relatively low costs, and keeping up with the number of applications that use cert pinning is a way to constantly be busy.

ate shit on live tv
Feb 15, 2004

by Azathoth
I've never been a believer in UTM at the edge. Let the edge do network level security IP/Port/NAT, and generally just coarse black listing. If you want MITM and application security then do it on the client.

volkadav
Jan 1, 2008

Guillotine / Gulag 2020
Re: earlier thing looking for software updates, I found an alternative source with updates as recent as this summer for a broad range of devices (and the hashes I checked against cisco's site all matched). Not sure if linking in here would be :filez: so ... DM me if anyone wants that?

I feel like I'm very close to having everything working with the 891fw for my home network, but it seems like wireless clients (and the ap itself, fwiw, when i session into it) can't get packets to the outside world (e.g. ping google). I'm sure it's probably some terrible newbie mistake but extensive googling around and poking on my part has thus far been unsuccessful. Anyone have possible suggestions? :shobon:

(Is there a better way to share these configs than pastebombing in here? e.g. can I trim all the "!" lines?)

Note on configs: at present the 891fw's wan interface is plugged into my current router and grabbing dhcp from it while I dork around with it via console cable from one of my linux machines. The existing LAN is 192.168.3.0/24, the new LAN will be 192.168.30.0/24. So for example re: problem description above, from the router's console I can ping 192.168.3.1 just fine (and google et al.), but while I can ping 192.168.30.1 ok from the AP console/wireless clients, I can't ping 192.168.3.1. Wireless clients get .30.x dhcp addresses just fine from the 891.

891fw's (truncated) sh ver:
code:
gateway#sh ver
Cisco IOS Software, C800 Software (C800-UNIVERSALK9-M), Version 15.7(3)M4a, RELEASE SOFTWARE (fc1)
Technical Support: [url]http://www.cisco.com/techsupport[/url]
Copyright (c) 1986-2019 by Cisco Systems, Inc.
Compiled Mon 25-Mar-19 08:23 by prod_rel_team

ROM: System Bootstrap, Version 15.4(1r)T1, RELEASE SOFTWARE (fc1)
891fw's running config:
code:
Current configuration : 4620 bytes
!
! Last configuration change at 11:38:13 PST Thu Nov 28 2019
!
version 15.7
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname gateway
!
boot-start-marker
boot system flash flash:c800-universalk9-mz.SPA.157-3.M4a.bin
boot system flash flash:c800-universalk9-mz.SPA.154-3.M9.bin
boot-end-marker
!
!
enable secret 5 $1$herpderpflerppitybloop
enable password sinfest!
!
no aaa new-model
clock timezone PST -8 0
service-module wlan-ap 0 bootimage autonomous
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!


!
ip dhcp excluded-address 192.168.30.0 192.168.30.100
!
ip dhcp pool pool1
 import all
 network 192.168.30.0 255.255.255.0
 default-router 192.168.30.1
 dns-server 8.8.8.8 8.8.4.4
!
!
!
ip domain list lan.mydomainname.foo
ip domain name lan.mydomainname.foo
ip name-server 192.168.3.3
ip name-server 8.8.8.8
ip name-server 8.8.4.4
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
cts logging verbose
license udi pid C891FW-A-K9 sn blahblahblah
!
!
!
redundancy
!
!
!
!
!
!
class-map type inspect match-all INSIDE-TO-OUTSIDE-CLASS
 match access-group name INSIDE-TO-OUTSIDE
class-map type inspect match-all OUTSIDE-TO-INSIDE-CLASS
 match access-group name OUTSIDE-TO-INSIDE
!
policy-map type inspect INSIDE-TO-OUTSIDE-POLICY
 class type inspect INSIDE-TO-OUTSIDE-CLASS
  inspect
 class class-default
  drop log
policy-map type inspect OUTSIDE-TO-INSIDE-POLICY
 class type inspect OUTSIDE-TO-INSIDE-CLASS
  pass
 class class-default
  drop log
!
zone security inside
zone security outside
zone-pair security IN-TO-OUT source inside destination outside
 service-policy type inspect INSIDE-TO-OUTSIDE-POLICY
zone-pair security OUT-TO-IN source outside destination inside
 service-policy type inspect OUTSIDE-TO-INSIDE-POLICY
!
!
!
!
!
!
!
!
!
!
!
interface Loopback0
 ip address 10.10.10.1 255.255.255.0
!
interface BRI0
 no ip address
 encapsulation hdlc
 shutdown
 isdn termination multidrop
!
interface FastEthernet0
 description "10/100 wan"
 ip address dhcp
 ip nat outside
 ip virtual-reassembly in
 zone-member security outside
 duplex auto
 speed auto
!
interface GigabitEthernet0
 no ip address
 zone-member security inside
!
[snip gig1-7, they're all the same as gig0]
interface GigabitEthernet8
 description "gige wan"
 ip address dhcp
 ip nat outside
 ip virtual-reassembly in
 zone-member security outside
 duplex auto
 speed auto
 media-type rj45
!
interface Wlan-GigabitEthernet8
 switchport mode trunk
 no ip address
!
interface wlan-ap0
 ip address 10.10.100.1 255.255.255.0
!
interface Vlan1
 ip address 192.168.30.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly in
!
interface Async1
 description "dial on demand v92 modem wan"
 no ip address
 encapsulation ppp
 shutdown
 dialer in-band
 async mode dedicated
!
interface Async3
 no ip address
 encapsulation slip
!
define interface-range switch GigabitEthernet0 - 7
!
ip default-gateway 192.168.3.1
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip nat inside source list 1 interface GigabitEthernet8 overload
ip route 0.0.0.0 0.0.0.0 GigabitEthernet8 dhcp
!
ip access-list extended INSIDE-TO-OUTSIDE
 permit tcp 192.168.30.0 0.0.0.255 any
 permit udp 192.168.30.0 0.0.0.255 any
 permit icmp 192.168.30.0 0.0.0.255 any
ip access-list extended OUTSIDE-TO-INSIDE
 permit icmp any 192.168.30.0 0.0.0.255
!
ipv6 ioam timestamp
!
snmp-server community public RO
access-list 1 permit 192.168.30.0 0.0.0.255
!
control-plane
!
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
banner motd ^C>--- gateway.mydomainname.foo ---<
All access is logged; unauthorized access prohibited.^C
!
line con 0
 no modem enable
line aux 0
 password herpderp
 login
line 2
 no activation-character
 no exec
 transport preferred none
 transport input all
 stopbits 1
line 3
 modem InOut
 speed 115200
 flowcontrol hardware
line vty 0 4
 password sinfest
 login
 transport input none
!
scheduler allocate 20000 1000
!
!
!
!
!
!
!
end
ap802's running config:
code:
Current configuration : 2543 bytes
!
! Last configuration change at 10:59:57 -0800 Thu Nov 28 2019
! NVRAM config last updated at 11:00:16 -0800 Thu Nov 28 2019
! NVRAM config last updated at 11:00:16 -0800 Thu Nov 28 2019
version 15.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname gateway-AP
!
!
logging rate-limit console 9
enable secret 5 $1$warrrrrgarrrrrrrrbbbblllllllllabc123
!
no aaa new-model
clock timezone -0800 -8 0
clock summer-time -0700 recurring
no ip source-route
no ip cef
!
!
!
!
dot11 pause-time 100
dot11 syslog
!
dot11 ssid bifrost2
   vlan 1
   authentication open
   authentication key-management wpa version 2
   guest-mode
   wpa-psk ascii 7 a-bunch-of-hexadecimal-here
!
!
dot11 network-map
!
no ipv6 cef
!
!
username Cisco password 7 morehexhere
!
!
!
bridge irb
!
!
!
interface Dot11Radio0
 no ip address
 no ip route-cache
 !
 encryption vlan 1 mode ciphers aes-ccm tkip
 !
 encryption mode ciphers aes-ccm tkip
 !
 ssid bifrost2
 !
 antenna gain 0
 station-role root
!
interface Dot11Radio0.1
 encapsulation dot1Q 1 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface Dot11Radio1
 no ip address
 no ip route-cache
 !
 encryption vlan 1 mode ciphers aes-ccm tkip
 !
 encryption mode ciphers aes-ccm tkip
 !
 ssid bifrost2
 !
 antenna gain 0
 peakdetect
 dfs band 3 block
 channel dfs
 station-role root
!
interface Dot11Radio1.1
 encapsulation dot1Q 1 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface GigabitEthernet0
 description the embedded AP GigabitEthernet 0 is an internal interface connecting AP with the host router
 no ip address
 no ip route-cache
!
interface GigabitEthernet0.1
 encapsulation dot1Q 1 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 spanning-disabled
 no bridge-group 1 source-learning
!
interface BVI1
 mac-address a0e0.afba.d7de
 ip address 192.168.30.4 255.255.255.0
!
ip default-gateway 192.168.30.1
ip forward-protocol nd
ip http server
no ip http secure-server
ip http help-path [url]http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag[/url]
!
!
bridge 1 protocol ieee
bridge 1 route ip
!
!
!
line con 0
line vty 0 4
 login local
 transport input all
!
end

volkadav fucked around with this message at 04:24 on Nov 29, 2019

volkadav
Jan 1, 2008

Guillotine / Gulag 2020
:frogbon: found the problem; if anyone else stumbles on this in the future I needed to add "zone-member security inside" on vlan1:

code:
interface Vlan1
 ip address 192.168.30.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly in
 zone-member security inside
!
so, uh, at least the firewall part's been tested? :v:

Pile Of Garbage
May 28, 2007



Been experiencing a weird issue since I upgraded my Catalyst 2960CX to v15.2(7)E, hoping maybe someone has seen it before: object-group's in extended ACLs don't match when said ACL is used in line vty access-class.

Here's what was configured and working prior to upgrading:

code:
object-group network TRUSTED-MGMT-HOSTS
 description *** Trusted Management Hosts ***
 host 10.6.66.2
!
ip access-list extended ACL-VTY-IN
 permit tcp object-group TRUSTED-MGMT-HOSTS any eq 22
 deny   ip any any
!
line vty 0 4
 access-class ACL-VTY-IN in
 login local
 transport input ssh
 transport output none
Since upgrading it's stopped hitting the permit and I cannot SSH to the device. When I enable log on the deny I can see that the traffic should be matching:

code:
Nov 30 11:48:28.749: %SEC-6-IPACCESSLOGP: list ACL-VTY-IN denied tcp 10.6.66.2(64466) -> 0.0.0.0(22), 1 packet
Nov 30 11:52:09.860: %SYS-5-CONFIG_I: Configured from console by admin on console
Nov 30 11:52:43.018: %SEC-6-IPACCESSLOGP: list ACL-VTY-IN denied tcp 10.6.66.2(64466) -> 0.0.0.0(22), 4 packets
Nov 30 11:53:30.266: %SYS-5-CONFIG_I: Configured from console by admin on console
Nov 30 11:53:51.046: %SEC-6-IPACCESSLOGP: list ACL-VTY-IN denied tcp 10.6.66.2(64582) -> 0.0.0.0(22), 1 packet
Nov 30 11:58:52.297: %SEC-6-IPACCESSLOGP: list ACL-VTY-IN denied tcp 10.6.66.2(64582) -> 0.0.0.0(22), 4 packets
If I replace the object-group in the ACL with a host it works fine:

code:
ip access-list extended ACL-VTY-IN
 permit tcp host 10.6.66.2 any eq 22
 deny   ip any any
So yeah, kinda weird. I did some Googling but nothing relevant came up. This device is just in my home network so it's as far from critical as you can really get and I'm not super fussed.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Pile Of Garbage posted:


cisco weird poo poo


I had a similar issue recently, remove the ACL from the config then re-add it, if that doesn't work remove the line vty as well and re-add; that fixed the issue I was having and it was a very similar lead up that you had, I did an upgrade to possibly the same version or the one before.

Pile Of Garbage
May 28, 2007



MF_James posted:

I had a similar issue recently, remove the ACL from the config then re-add it, if that doesn't work remove the line vty as well and re-add; that fixed the issue I was having and it was a very similar lead up that you had, I did an upgrade to possibly the same version or the one before.

Cheers thanks mate I'll give that a go.

Edit: no dice. Removed the line, ACL and object-group then recreated but the same issue occurred.

Pile Of Garbage fucked around with this message at 17:20 on Nov 30, 2019

Tetramin
Apr 1, 2006

I'ma buck you up.

Prescription Combs posted:

Old as poo poo topic but unless you absolutely need to capture every connection to syslog, enable syslog permit host down or that ASA will block all traffic if that syslog server goes down.

E: when sending TCP syslog. Udp doesn't care obvs.

Yeah I found this out the hard way. That’s such a stupid default setting, especially in an environment that patches servers every week.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Speaking of ASA and syslog, how does one get ASA's to stop syslogging things about every rule? Stuff like:

Jul 16 00:00:06 fw-hostname.example.net %ASA-2-106006: Deny inbound UDP from 10.3.6.20/61266 to 10.180.20.232/161 on interface inside
Jul 16 00:00:06 fw-hostname.example.net %ASA-4-400011: IDS:2001 ICMP unreachable from 184.61.208.148 to 4.213.112.161 on interface outside
Jul 16 00:00:05 fw-hostname.example.net %ASA-4-313005: No matching connection for ICMP error message: icmp src outside:4.213.111.132 dst identity:4.213.112.1 (type 3, code 10) on outside interface. Original IP payload: udp src 4.213.112.1/514 dst 4.213.111.132/514.

I tried to find settings to calm this down a while back, gave up. I ended up having to filter out all asa logs from my syslog server because it was all crap I didnt care about. Really all I want are router-like things, like people logging in, command logging if possible, and actual real alarms like power supply or fan fissues.

Tetramin
Apr 1, 2006

I'ma buck you up.

falz posted:

Speaking of ASA and syslog, how does one get ASA's to stop syslogging things about every rule? Stuff like:

Jul 16 00:00:06 fw-hostname.example.net %ASA-2-106006: Deny inbound UDP from 10.3.6.20/61266 to 10.180.20.232/161 on interface inside
Jul 16 00:00:06 fw-hostname.example.net %ASA-4-400011: IDS:2001 ICMP unreachable from 184.61.208.148 to 4.213.112.161 on interface outside
Jul 16 00:00:05 fw-hostname.example.net %ASA-4-313005: No matching connection for ICMP error message: icmp src outside:4.213.111.132 dst identity:4.213.112.1 (type 3, code 10) on outside interface. Original IP payload: udp src 4.213.112.1/514 dst 4.213.111.132/514.

I tried to find settings to calm this down a while back, gave up. I ended up having to filter out all asa logs from my syslog server because it was all crap I didnt care about. Really all I want are router-like things, like people logging in, command logging if possible, and actual real alarms like power supply or fan fissues.

Can’t you just adjust the logging to some other threshold? https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_syslog.html#95407

Verbose logging actually saved my rear end with our CIO because a third party vendors monitoring device got infected because they left it with default creds and demanded I open up ssh to the public. The thing was bringing our biggest site down for like 2 weeks until I stood up the logging server and found that. I have zero respect for executives but he is rightfully nervous about things after this year of infrastructure failures.

Also after we sent their device back they let me know that port 22 actually didn’t need to be open so that was pretty fuckin cool.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Tetramin posted:

Can’t you just adjust the logging to some other threshold? https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_syslog.html#95407

Verbose logging actually saved my rear end with our CIO because a third party vendors monitoring device got infected because they left it with default creds and demanded I open up ssh to the public. The thing was bringing our biggest site down for like 2 weeks until I stood up the logging server and found that. I have zero respect for executives but he is rightfully nervous about things after this year of infrastructure failures.

Also after we sent their device back they let me know that port 22 actually didn’t need to be open so that was pretty fuckin cool.
Yeah, this was the first thing I tried, I don't use ASDM, but cli stuff ive tried are setting it to seeminly quiet stuff:

logging asdm critical
logging buffered critical

and emergencies (lowest level). buffered seems to affect the local log buffer (`show log`) but neither affects syslog server, and I don't see these type of options as flags of `logging host <1.2.3.4>'. On top of that, ASA seems to think that the types of log messages i posted are in the 'critical' category, and I... disagree.

WT Wally
Feb 19, 2004

You can disable individual message IDs, but I’m not sure about disabling for a specific rule. Might have to filter them at the syslog server.


https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/monitor_syslog.html#wp1071301

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

WT Wally posted:

You can disable individual message IDs, but I’m not sure about disabling for a specific rule. Might have to filter them at the syslog server.


https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/monitor_syslog.html#wp1071301

I guess I could add a hundred lines to the config to ignore things. Seems weird to me that there's not just a flag like 'log IPS stuff' to turn off, and it's on by default.

My current "fix" is filtering them on the rsyslogd side, but that too is brute force as I'm filtering *everything* from based on hostname matching.

Anyway, ASAs are lame.

Nuclearmonkee
Jun 10, 2009


falz posted:

I guess I could add a hundred lines to the config to ignore things. Seems weird to me that there's not just a flag like 'log IPS stuff' to turn off, and it's on by default.

This is the answer

quote:

Anyway, ASAs are lame.

Yep

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
I ended up doing this, which got 99% of the cruft, but leaves important stuff like commands that users type. Annoyingly though it shows the command class (enable_15) instead of the username. oh well.

code:
logging buffer-size 20480
logging buffered notifications
logging trap notifications
logging asdm notifications

logging message 106001 level debugging
logging message 106006 level debugging
logging message 106007 level debugging
logging message 106014 level debugging
logging message 106021 level debugging
logging message 106023 level debugging
logging message 313001 level debugging
logging message 313005 level debugging
logging message 400010 level debugging
logging message 400011 level debugging
logging message 400014 level debugging
logging message 400015 level debugging
logging message 400026 level debugging
logging message 410001 level debugging
logging message 710003 level debugging
logging message 733100 level debugging

Nuclearmonkee
Jun 10, 2009


falz posted:

I ended up doing this, which got 99% of the cruft, but leaves important stuff like commands that users type. Annoyingly though it shows the command class (enable_15) instead of the username. oh well.

code:
logging buffer-size 20480
logging buffered notifications
logging trap notifications
logging asdm notifications

logging message 106001 level debugging
logging message 106006 level debugging
logging message 106007 level debugging
logging message 106014 level debugging
logging message 106021 level debugging
logging message 106023 level debugging
logging message 313001 level debugging
logging message 313005 level debugging
logging message 400010 level debugging
logging message 400011 level debugging
logging message 400014 level debugging
logging message 400015 level debugging
logging message 400026 level debugging
logging message 410001 level debugging
logging message 710003 level debugging
logging message 733100 level debugging

It does that whenever you use enable. Set priv level 15 for admin users and auto enable on login so they don’t need to enable (which switches executed commands from their user to being run as “enable_15”)

If priv level is already set then running “login” instead of enable will let you elevate to 15. Setting ASA to work right with full AAA/logging and fail back to local is a giant pain in the rear end

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
Been a while since I had to do a BGP build from scratch. I'm wondering what the best way to build this design would be. I have two external bgp routers that talk to two internal bgp routers. There's no cross communication between router 1's and router 2's, it's all 1:1, 2:2. The goal is to have the default route advertised from external to internal, where internal knows it can go "Upstream" to external or across to it's neighbor internal router. Wondering if I should use iBGP everywhere, or eBGP everywhere, confederacies, etc..

There will never be a 3rd internal bgp router, but there may be more than 2 externals in the future

Edit: no BGP with "internet". the external routers are just doing bgp internally.



Edit2: Plan so far is to do iBGP with the internal routers being route reflectors.

Sepist fucked around with this message at 16:30 on Dec 2, 2019

tortilla_chip
Jun 13, 2007

k-partite
Definitely no to confederations.

Singla AS iBGP with inline RR between the Internal Routers is probably the cleanest solution here. It sounds like you don't want multipathing to 0/0.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

tortilla_chip posted:

Definitely no to confederations.

Singla AS iBGP with inline RR between the Internal Routers is probably the cleanest solution here. It sounds like you don't want multipathing to 0/0.

I do want multipathing, each internal router is going to ECMP upstream or over to it's internal router neighbor to send upstream from there. But yea RR on internal seems to be the right call here

unknown
Nov 16, 2002
Ain't got no stinking title yet!


Because you're just doing default routes - you don't want to run BGP, just run OSPF and you get all the benefits of doing per-link costing and the like.

Raise the link cost of Int1-Int2 (you probably don't even need to do that in such a simple setup) so that Internal Router 1 uses External 1 as it's primary gateway, and Int2 uses Ext2 as it's primary.

Failures are covered nicely when the uplink route (that is redistributed) from an external router/firewall is gone (assuming you're tracking it).

Using BGP you'd need start doing weightings and the like which would be more complicated and in the future a pain to start dealing with.

Edit: Oh, you need ECMP and want active balancing of uplinks. Are you doing NAT on the external routers?

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

unknown posted:

Edit: Oh, you need ECMP and want active balancing of uplinks. Are you doing NAT on the external routers?

No NAT.

Also the "external" routers aren't peering with anyone else besides internal routers. They just advertise a quad 0

Sepist fucked around with this message at 16:56 on Dec 2, 2019

unknown
Nov 16, 2002
Ain't got no stinking title yet!


FYI, If you're not doing NAT, and you're not doing BGP (or some kind of 2way dynamic failure checks like BFD) with your internet provider(s), you've likely got a serious failure (blackhole type) on those links.

There's no reason to run RRs - this is 4 routers (with growth to 6?) and 2-4 default routes (not 100k+), easily manageable with a bog standard mesh deployment at this point.

You're not going to get ECMP in your setup because your base links are unequal from the get go (2 hops to the far side, 1 to local side). You need links: Ext1 to Int1, Ext1 to Int2, Ext2 to Int1, Ext2 to Int2.

If this is a multi-location setup, with Int1-Int2 being a long/MAN link - then a simple OSPF setup I said before is the way to go.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
This is an AWS deployment so it's a bit non-traditional. The externals point to a IGW via default route so there's no fault tolerance for me to deal with there. I can't (easily) peer full mesh because of the different availability zones of the routers. I can get ECMP at the internal routers by doing AS Path rewrite on the cross AZ peering

unknown
Nov 16, 2002
Ain't got no stinking title yet!


Sepist posted:

This is an AWS deployment so it's a bit non-traditional. The externals point to a IGW via default route so there's no fault tolerance for me to deal with there. I can't (easily) peer full mesh because of the different availability zones of the routers. I can get ECMP at the internal routers by doing AS Path rewrite on the cross AZ peering

Ooooh, yeah, the fun of AWS. I'll bow out of the conversation - I've only played with it enough to know that if you're attempting to apply normal/conventional networking to a setup there you can be in for a bunch of weird hurt (also some very interesting speed limitations on a per-server type). My knowledge limits to "do it Amazon's way" and let them manage your networking (although that costs a ton more).

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
Actually my whole design was just blown up. The "External routers" are actually palo alto's and they are very...restrictive about dynamic protocols over DHCP interfaces. Just gonna have to use static routing with lambda's to withdraw routes from the FRR instances.

unknown
Nov 16, 2002
Ain't got no stinking title yet!


Sepist posted:

This is an AWS deployment so it's a bit non-traditional. The externals point to a IGW via default route so there's no fault tolerance for me to deal with there. I can't (easily) peer full mesh because of the different availability zones of the routers. I can get ECMP at the internal routers by doing AS Path rewrite on the cross AZ peering

Just out of curiosity - if this is AWS, why would you try to do ECMP (instead of active/passive failover)? The bandwidth generally isn't a limiter, and you just get billed for usage, so I'd assume less complexity would be an advantage. (Unless you're talking about enough bandwidth that it is a limiter...)

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
Firewalls have an upper limit of inspection bandwidth. We have them tied to cloudwatch metrics to kick off autoscale events when thresholds are met. This lets us handle a lot of east-west at a manageable cost. The FRR routers can do 10s of gigs without fuss but palos get expensive after the first 1.5 gigs

eg: A palo capable of 8 gigs is about 40k/yr, whereas 4 small palos each doing 2 gigs is much cheaper and providers HA

Sepist fucked around with this message at 20:01 on Dec 2, 2019

unknown
Nov 16, 2002
Ain't got no stinking title yet!


Makes perfect sense - in your case, bandwidth is a limiter (monetary wise)!

ragzilla
Sep 9, 2005
don't ask me, i only work here


falz posted:

I guess I could add a hundred lines to the config to ignore things. Seems weird to me that there's not just a flag like 'log IPS stuff' to turn off, and it's on by default.

There is.

code:
ciscoasa(config)# logging flow-export-syslogs disable
Will disable all the conn permit/deny/setup/teardown messaging that’s duplicated in NSEL.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

ragzilla posted:

There is.

code:
ciscoasa(config)# logging flow-export-syslogs disable
Will disable all the conn permit/deny/setup/teardown messaging that’s duplicated in NSEL.
This sounds like exactly what I'm looking for! Unfortunately it doesn't work, it's actually a weird macro that doesn't actually show up in the config, but instead adds this to it, at least on this ASA5515X I'm testing with:

code:
no logging message 106015
no logging message 313001
no logging message 313008
no logging message 106023
no logging message 710003
no logging message 106100
no logging message 302015
no logging message 302014
no logging message 302013
no logging message 302018
no logging message 302017
no logging message 302016
no logging message 302021
no logging message 302020
.. comparing these codes to the ones I had manually filtered has very little overlap:

code:
logging message 410001 level debugging
logging message 106014 level debugging
logging message 106006 level debugging
logging message 106007 level debugging
logging message 313005 level debugging
logging message 106001 level debugging
logging message 313001 level debugging
logging message 106023 level debugging
logging message 106021 level debugging
logging message 710003 level debugging
logging message 400026 level debugging
logging message 733100 level debugging
logging message 400010 level debugging
logging message 400011 level debugging
logging message 400014 level debugging
logging message 400015 level debugging
Also annoying rant that ASA doesn't add these lines to the config numerically, even though I entered them that way. Please ASAs die in a fire, kthxbye.

ate shit on live tv
Feb 15, 2004

by Azathoth
The company I'm working for just bought a bunch of shiny new Juniper 10003 PTXs that we intend to use for MACsec and setup an MPLS backbone. Right now they are sitting in our systems integration facility. I've been tasked with setting up a validation plan for these things. Not so much testing every port or doing a bandwidth test or whatever (I trust Juniper Quality Control over whatever we could do), but "proofing" and validating them. Things like checking the amount of memory, installing the proper code, etc. Anyone have anything like that in their environment that I could crib from? For context we will be running about 45 of these routers through that process plus any future RMA's, so I want to make sure it's useful, consistent, and not too time consuming.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Do you already run Junos on your network? We do, and when we have a new Junos product of any type (different MX model, QFX model, EX model, etc) I always

* Check if our existing configuration standards work

* Check if the things you wan to do actually work - BGP, MPLS, LDP, OSPF, BFD, etc etc

* Setup your lab like production, configure the interfaces to be how you want, tweak MTU, etc

* Ensure your monitoring systems see the data you want over SNMP or whatever. Things like traffic on vlan subinterfaces, routing protocol stuff, DOM per lane on opptics, and so on.

* Test OS upgrades and downgrades, as well as powering off device to simulate power outage. Figure out how to drop to the linux shell. Figure out how to install Junos from USB and keep a USB drive attached to help with that just in case.

Basically test everything you want to use, just because it's on the spec sheet doesn't mean it's going to work. I always start with the current Junos recommended version and then bounce some questions off of your Juniper reps about when the next service release is coming out for bugfixes (and new bugs!) and if you need bleeding edge (Junos 19) for any particular features.

We keep config standards per juniper model as well, for example you need a different:

* lo0 RE protect filter between MX, Q5 (your ptx), Qfx5k (broadcom), and so on.

* different class-of-service rules for above models

We've had Q5 based QFX10002 in production for a bit and it's been smooth sailing lately, but early on we had issues getting vlans provisioned through that a simple reboot fixed. ¯\_(ツ)_/¯

Side note, Juniper was going to release that model switch as QFX10003 as well, but at the last moment this year ditched it and now everything will cost 10x more for the same features that we need. Sucks.

ate shit on live tv
Feb 15, 2004

by Azathoth
Thanks. I've already done a few of those and yea my ansible environment already breaks out our Juniper's by model type. Currently just SRX and PTX with custom security stuff (Lo0 ACLs, firewall policies, etc) common stuff (root password, usernames, logging, etc) and finally site and host specific configs.

Prescription Combs
Apr 20, 2005
   6

Tetramin posted:

Yeah I found this out the hard way. That’s such a stupid default setting, especially in an environment that patches servers every week.

"Why does our internet/vpn connectivity always go down when the syslog server patches?!" :thunk:

BaseballPCHiker
Jan 16, 2006

This bug is getting exploited again, time to upgrade ASAs if you're being affected:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi16029/
Good to know it wasnt hardware that was causing one of our ASAs to keep reloading.

Adbot
ADBOT LOVES YOU

Kazinsal
Dec 13, 2011



Yep, had to upgrade the firewalls at every one of our sites in the middle of the day yesterday.

Except for the newest one, which makes this the first time I've ever been appreciative of FTD code.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply