Wednesday, September 16, 2015
SYNful Knock
FireEye
Cisco Blog Post
SNORT Rule
Thursday, April 23, 2015
WPA(WPA2)-PSK not supported for ISE guest CWA?
If you are using ISE for CWA, then you are "limited" in what you can do from and SSID security standpoint.
Basic constraints:
- Set Layer2 security to None with MAC filtering.
- Select the ISE IP address for both Authentication and Accounting Servers.
- Advanced tab, enable AAA Override and set the Network Admission Control (NAC) State to RADIUS NAC (CoA support)
- Your guest VLAN should not have access to anything besides the internet once authenticated.
- All devices must get registered in ISE before they can authentication, so even if an unencrypted packet is sniffed, the device still gets redirected to the Guest portal page.
- Absolute worst case, the "hacker" gets on your guest network: your guest VLAN ACLs peel them off to the internet only and you disallow peer to peer communication on the SSID.
Friday, April 10, 2015
Cisco ISE Fail Open Ports
On your switch ports, add the following command to your standard 802.1x config:
authentication event server dead action authorize vlan X
This command will grant access and dump all traffic on the specified VLAN in the event of total ISE failure/unreachability.
Wednesday, April 8, 2015
Simple IP SLAs
Basic premise:
Create an SLA to track a specific IP from a specific IP. You ideally want to track from an external interface the is always going to be able to reach the tracked IP unless there is an outage.
ip sla 7
icmp-echo (IP to track) source-ip (your local interface IP)
timeout 6000
threshold 3000
frequency 30
Now you have to start your SLA.
ip sla schedule 7 life forever start-time now
Next you setup tracking of that SLA for reachability
track 7 ip sla 7 reachability
***(track 7 rtr 7 reachability) code version differences
Now for the implementation. You simply add the track statement to the route you want to be preferred and add the backup route with a worse metric.
ip route DestinationNetwork Mask NextHop track 7
example:
ip route 172.16.48.0 255.255.255.0 172.18.8.129 track 7
ip route DestinationNetwork Mask NextHop Distance
example:
ip route 172.16.48.0 255.255.255.0 10.14.32.1 200
You can get way more complicated with this, but this is a simple solution for backup links.
references:
Cisco SLAs
Wednesday, April 1, 2015
ISE and iPads
I do a lot of customer site install these days. There are varying levels of infrastructure at all of them so here is a solution I ran into recently.
Needs:
ISE authentication for Wired Domain Joined PC
ISE authentication for Wired Non-Domain Joined (printers)
ISE authentication for Wireless Domain Joined PC
ISE authentication for Wireless Non-Domain Joined (ipad, iphone, scan gun)
Most of this is straight forward.
For starters they wanted to use Certificate authentication. This worked great for all of the domain joined PCs, wired and wireless alike. I simply allowed EAP-TLS connections only for each and used computer based authentication with a machine cert validation. I pushed out the machine certs with a GPO and did the roll out the following week. Piece of cake.
MAB was an easy solution for all of the printers, scanners, and misc devices in the manufacturing/warehouse areas.
The issue came in when they wanted secure access via their iPads. Had these devices been domain joined it would have been simple. Issue them a machine cert. Alternately I could have used NDES to join the iPads (but they're running windows server 2008 standard... Not NDES). A third option would be to manually generate certs for each device (not an option, too many and spread out across the country).
My solution was to add all users that needed WiFi via iPads into an AD group. I then profiled all apple devices joining the network and created an identity group mapping.
My policy was simple and just required that after a cert failure, check to see if the devices has been profile as an apple-device and that the user is a member of the ipadUser group. Not as secure as certificates or checking for domain joined machines, but a lot better than just allow all devices coming and going onto the corp-WiFi.
Tuesday, March 31, 2015
Ipad/Iphone SSID Join issue
Symptoms:
- Ipad/Iphone can't join a wireless network
- Ipad/Iphone can't roam properly
- Laptops and androids join/roam just fine
- Debugs on the Controller show the Ipad/Iphone joining
Solution:
Turn on Fast SSID switching.The apple devices for whatever reason try to join a 2nd SSID before they receive the response from the controller. With the option disabled the WLC sets a delay before the devices and join a different SSID. The vicious cycle begins.
Nothing make people more irritated than not being able to use their shiny apples.
References:
rscciew