Wednesday, March 16, 2016

DDoS Attack!

 

As a hosted VoIP provider, our customers get a little snippy when the service is unreliable (intermittently unable to make or receive phone calls). This doesn’t help with sales!

Our uplink (Level3) is having issues. This was their response today…

"We regret to inform you that we are again experiencing issues that are related to the DDoS attack being committed by unknown parties against our network. Our network engineers are currently working diligently with our upstream carriers as well as a network security firm to combat the attack and will continue to do so until all of the issues are resolved. Our senior leadership has also been in contact with the FBI. The FBI is considering these events a national security issue due to the number of firms impacted, the magnitude of the attacks and the persistence of these attacks."

image

image

Tuesday, March 15, 2016

Cisco ASA–Next Generation Firewall

 

In the early days of networking in order to implement security, the first technique developed was packet-filtering. In those days, we implemented routers (firewalls) that matched traffic at Layer3/4 using ACLs (and TCP/UDP ports) and either permitted or denied that traffic. The Network Administrator would deny ALL from outside –> inside by default and then had to explicitly permit trusted networks. Sometimes a deny ALL from inside –> outside was also created and is why some old school technologist still think the root cause of some issues is that ports must be opened going out.

image

Then over time, Firewalls became more sophisticated and ‘state-tables’ were born. The Firewall would by default deny ALL from the Internet and the Network Administrator did not have to explicitly permit trusted network… the Firewall had the ability to manage a ‘state-table’ of connections that originated from the inside and would dynamically permit the return traffic.

image

In the past several years, Firewalls have evolved into what manufacturers are calling Next-Generation Firewalls (NGFW). NGFWs include the typical functions of traditional packet-filtering firewalls as well as well as second-generation statefull inspection Firewalls. However, NGFWs have a goal to include inspection all the way up to the Application Layer (Layer7).

For example, Cisco’s 5500-X series Firewalls are considered NGFWs. I recently took a look at Cisco “FirePower” on the ASA5506-X. In July, 2013 Cisco purchased Sourcefire for $2.7B. Their software has been incorporated into Cisco’s ASA product line and provides IPS, Malware Protection, URL Filtering, and other features.

2

In my experience setting up the software on the 5506-X, the process was slow as the device took a lot of processing time to think. In addition ASDM can be used on the 5506-X for Firesight configuration (but it only contains a subset of the full Firesight Management Center, a VMware VM provided by Cisco).

Friday, March 11, 2016

Laptop Battery Seem Sub-Optimal?

 

Easy and effective way to run Windows report on laptop battery health…

C:> powercfg /batteryreport /output "C:\battery_report.html"

… then pull up the resultant HTML file…

image

image

Wednesday, February 17, 2016

Verizon Jetpack®, MiFi 5510L–IPv6

 

Plugged in Verizon Jetpack today…

image

Go out to Google and type “what is my IP address”…

image

Very interesting… starting to see IPv6 now coming from ISPs.

What?!? I was able to connect to IPv4-only enabled devices? Is Verizon doing IPv6 <-> IPv4 NAT?!?

A few minutes later I repeated my Google “what is my IP address” and now I had an IPv4 address!

Friday, October 23, 2015

Ubiquiti Networks Outdoor P2P AP

 

Customer has requirement to establish a connection from MDF to new office on same property but about 100 yards away. What to do? Multi-mode fiber cost prohibitive.

Decided to try Ubiquiti Networks outdoor APs. Was very impressed. Implemented two of the inexpensive ($150 per unit) UniFi AP Outdoor+

Ubiquiti_UniFi_Outdoor_AP__UAP-Outdoor__802.11n_MiMo_main_product

Setup at first was a little tricky… before physically mounting on roof-top with line-of-sight between two points, need to first stage configuration by plugging both units into an Ethernet switch with Internet access. Download Ubiquiti’s ‘Unfi’ software which detects devices (the devices will acquire a DHCP address if a server exists but the Unifi software seems to detect them over a multicast address). Once both devices have been provisioned as independent APs, put a label on the far side AP, and unplug it from the Ethernet LAN. The Unifi software detects the disconnect and then you can configure the disconnected AP in a P2P topology (what Ubiquiti calls an (‘uplink’). After uplinking, the AP will operate in both modes concurrently… as an AP for nearby WiFi clients as well as a P2P endpoint with the other Unifi Outdoor+.

Here’s a very helpful video for uplink configuration… https://www.youtube.com/watch?v=16r9CoTdRqo

Also, knowing what LED status means comes in very handy as these guys can think slowly leading to confusion…

image

Thursday, September 17, 2015

Practical Use for Disabling Layer2 Keepalives…

 

Retail store has no Ethernet device plugged into LAN interface of MPSL router. How to test from Corp Core Switch to verify connectivity to store?

KEEP-ALIVES-ENABLED-DISABLED

BGP Fail-Over!!

 

Interesting observation… retail store has a main MPLS connection and a backup connection over the Internet. When the main connection goes down, the CE router immediately injects floating-static route with AD of 21 into RIB and re-routes traffic to neighboring Cisco ASA Firewall programmed for IPSEC backup to Service-Provider.

However, there is packet-loss when the CE router goes down… for (3) minutes…

A

B