Wednesday, March 16, 2016

DDoS Attack!

 

As a hosted VoIP provider, our customers get a little snippy when the service is unreliable (intermittently unable to make or receive phone calls). This doesn’t help with sales!

Our uplink (Level3) is having issues. This was their response today…

"We regret to inform you that we are again experiencing issues that are related to the DDoS attack being committed by unknown parties against our network. Our network engineers are currently working diligently with our upstream carriers as well as a network security firm to combat the attack and will continue to do so until all of the issues are resolved. Our senior leadership has also been in contact with the FBI. The FBI is considering these events a national security issue due to the number of firms impacted, the magnitude of the attacks and the persistence of these attacks."

image

image

Tuesday, March 15, 2016

Cisco ASA–Next Generation Firewall

 

In the early days of networking in order to implement security, the first technique developed was packet-filtering. In those days, we implemented routers (firewalls) that matched traffic at Layer3/4 using ACLs (and TCP/UDP ports) and either permitted or denied that traffic. The Network Administrator would deny ALL from outside –> inside by default and then had to explicitly permit trusted networks. Sometimes a deny ALL from inside –> outside was also created and is why some old school technologist still think the root cause of some issues is that ports must be opened going out.

image

Then over time, Firewalls became more sophisticated and ‘state-tables’ were born. The Firewall would by default deny ALL from the Internet and the Network Administrator did not have to explicitly permit trusted network… the Firewall had the ability to manage a ‘state-table’ of connections that originated from the inside and would dynamically permit the return traffic.

image

In the past several years, Firewalls have evolved into what manufacturers are calling Next-Generation Firewalls (NGFW). NGFWs include the typical functions of traditional packet-filtering firewalls as well as well as second-generation statefull inspection Firewalls. However, NGFWs have a goal to include inspection all the way up to the Application Layer (Layer7).

For example, Cisco’s 5500-X series Firewalls are considered NGFWs. I recently took a look at Cisco “FirePower” on the ASA5506-X. In July, 2013 Cisco purchased Sourcefire for $2.7B. Their software has been incorporated into Cisco’s ASA product line and provides IPS, Malware Protection, URL Filtering, and other features.

2

In my experience setting up the software on the 5506-X, the process was slow as the device took a lot of processing time to think. In addition ASDM can be used on the 5506-X for Firesight configuration (but it only contains a subset of the full Firesight Management Center, a VMware VM provided by Cisco).

Friday, March 11, 2016

Laptop Battery Seem Sub-Optimal?

 

Easy and effective way to run Windows report on laptop battery health…

C:> powercfg /batteryreport /output "C:\battery_report.html"

… then pull up the resultant HTML file…

image

image

Wednesday, February 17, 2016

Verizon Jetpack®, MiFi 5510L–IPv6

 

Plugged in Verizon Jetpack today…

image

Go out to Google and type “what is my IP address”…

image

Very interesting… starting to see IPv6 now coming from ISPs.

What?!? I was able to connect to IPv4-only enabled devices? Is Verizon doing IPv6 <-> IPv4 NAT?!?

A few minutes later I repeated my Google “what is my IP address” and now I had an IPv4 address!