So, I have been kicking the tires on the FTD-API on the Cisco NGFW Firepower Threat Defense (FTD) 6.3 software. The FTD-APIs allow one to completely control the platform without the use of SSH or a GUI. Read more
Since completely moving to Mac platforms about 10 years ago, I have been searching for a suitable replacement for Microsoft Visio, the Microsoft acquisition that has been the tech industry standard for network and systems drawings. Read more
I love a good troubleshooting challenge. But damn, this one had me stumped until I could pull back the covers of my Orbi system to discover the root cause.
I have a vmWare ESXi hypervisor in my home lab. The ESXi system is trunked up to a Ubiquiti router that is handling inter-vlan routing and has my Orbi base station set as the default gateway. Read more
TLS is DEAD! Long Live TLS!
As most of you are probably aware, TLS 1.3 (draft 28) was recently accepted by the Internet Engineering Task Force (IETF) as an official standard.
What ramifications will TLS 1.3 have on tried and true network operations like URL filtering or passively load balancing to specific servers based on hostname? Read more
Managing Your Firepower Appliance
If you are running a Firepower NGFW appliance from Cisco, you have two options to manage the device:
- Firepower Device Manager (FDM) – An on-box GUI and set of APIs to directly control a Firepower appliance.
- Firepower Management Center (FMC) – A management station used to control a collection of Firepower appliances and collect, correlate, and report on events generated by the Firepower appliance.
(At least today) These two options to manage your Firepower appliance are mutually exclusive; you can use one or the other. This article is focused on using the FlexConfig feature in FDM. Read more
Upon a fresh install of FTDv (6.2.3) on VMWare ESXi, the FTD console reports the following error over and over and over:
Jul 2 15:22:58 ciscoasa init: Id "ftd1" respawning too fast: disabled for 5 minutes
Happy July 2nd!
I have posted a new blog entry on the Cisco communities page. This is a continuation of my previous post “Script an ASDM Session Part I“. In part I, we examined how ASDM interacts with and controls the ASA. In part II, we dig into some sample code where we make programatic calls to the ASA masquerading as an ASDM client. Read more
So, I attempted to use the apt-get binaries to install gns3-server on Ubuntu 18.04 LTS (Bionic Beaver). The issue I ran into is that the package is linked to a specific version of python3. The installation was linked to the python3 version 3.5 libraries as evidenced by the output:
cp: cannot stat '/usr/bin/python3.5': No such file or directory
So, in connecting my virtual gns3 network to my local, physical lan, I found the connection speeds to be abysmal. Host to host speeds within the virtual network were good but communicating from a virtual host to a physical host had speeds around 10kbps.
I wrote a blog article over in the Cisco Security Community detailing the steps on how to hack the Cisco ASA ASDM http interface to build your own automation.