Secure Fabric. Agenda Overview Modes of operation Enabling Strict Mode Authorizing/Rejecting APICs Replacing existing APIC CLI commands Policies Debug.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 6 – Switch Configuration Switch Configuration Starting the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
 WAN uses Serial ports  Ethernet Ports:  Straight through  Cross over.
CCNP Network Route IPV-6 Part-III IPV-6 Static Routing: R1(Conf t)# ip routing  (Turn on Routing) R1(Conf t)# ipv6 unicast-routing  (Turn on ipv6 routing)
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—5-1 WAN Connections Enabling the Internet Connection.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing and Switching Essentials.
Cisco Router. Overview Understanding and configuring the Cisco Internetwork Operating System (IOS) Connecting to a router Bringing up a router Logging.
CCNA 2 v3.1 Module 2.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Basic Router Configuration Warren Toomey GCIT. Introduction A Cisco router is simply a computer that receives packets and forwards them on based on what.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—7-1 Address Space Management Scaling the Network with NAT and PAT.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© Wiley Inc All Rights Reserved. CHAPTER 4: Introduction to the Cisco IOS CCNA: Cisco Certified Network Associate Study Guide.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Otomo End User SSO - TOI March 2014 Otomo 10.5 – End User SSO Support.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
TOI: FIPS compliance Unity Connection 8.6 Mike Canfield- Test engineer Yolanda Liu – Dev engineer.
Dr. Mustafa Cem Kasapbaşı Security in ASP.NET. Determining Security Requirements Restricted File Types.
1 ECHO SSL Ordering With ECHO 9.0 Dan Pilone. 2 Agenda Introduction SSL Ordering Overview Order Fulfillment Features Provider Requirements Configuring.
CCNA 2 Week 9 Router Troubleshooting. Copyright © 2005 University of Bolton Topics Routing Table Overview Network Testing Troubleshooting Router Issues.
Enabling Port Security
1 © 2004 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Identity Based Networking Terena Rhodes, June 04 Eric Marin EMEA Consulting Engineer.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
© 2002, Cisco Systems, Inc. All rights reserved..
Interconnecting Cisco Networking Devices Part 1 Pass4sureusa Pass4sure.
BGP. BGP Configuration Create Fabric ASN Enable BGP on a given Tenant & VRF Create BGP Neighbor and associated config eBGP Vs iBGP Route Maps BGP over.
APIC NXOS CLI – Vlan Domains
VRF, Interface Configuration. Enable VRF On A Leaf Command Syntax: Enabling VRF on leaf is a pre-requisite for most of the L3 configuration on that leaf.
Intra EPG Isolation Support For AVS
Discovery Internetworking Module 9 JEOPARDY K. Martin.
Configuring Network Devices
Instructor Materials Chapter 8: DHCP
Palo Alto Networks Certified Network Security Engineer
IFIP-UNU ADVANCED COURSE ON NETWORKING AND SECURITY Module II-Wireless Communications Section 5 Access Points.
Obtain Your Dream Certification
© 2002, Cisco Systems, Inc. All rights reserved.
CCNA Routing and Switching Routing and Switching Essentials v6.0
CCNP Cloud CLDACI Exam CLDACI Exam, Building the Cisco Cloud with Application Centric Infrastructure.
Cisco Unity Connection 2.0 Phone View Configuration
Change of VLAN for Wired Guest
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
Chapter 5: Switch Configuration
Instructor & Todd Lammle
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 2: Static Routing
Chapter 2: Basic Switching Concepts and Configuration
Implementing Cisco Data Center Infrastructure Introduction of Cisco Dumps practice-questions.html.
NSE5 Dumps PDF Fortinet Network Security Expert 5 Written Exam (500) NSE5 DumpsNSE5 BraindumpsNSE5 Questions AnswersNSE5 Study Material.
2018 Valid Cisco Exam Dumps IT-Dumps
Get Updated Free Cisco Exam Questions | Dumps4download.co.in
Chapter 5: Switch Configuration
Chapter 2: Static Routing
Net 412 (Practical Part) LAB 5-port security
Chapter 3: Dynamic Routing
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
X-Road as a Platform to Exchange MyData
Chapter 10: Advanced Cisco Adaptive Security Appliance
Introduction to Cisco IOS -(Internetwork Operating System)
© 2002, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

Secure Fabric

Agenda Overview Modes of operation Enabling Strict Mode Authorizing/Rejecting APICs Replacing existing APIC CLI commands Policies Debug Commands

Overview Securing fabric from unauthorized switches/controllers to join the fabric APICs and Switch are factory provisioned with Cisco certified SSL certificates Serial number based Authorization to allow the switches and controllers to join the Fabric −Switch Authorization (Using the existing Node Identity policy) −Controller Authorization (New Controller Identity policy) All communication between Switches and APICs are encrypted except LLDP, DHCP and ISIS

Modes Of Operation Permissive Mode – Default mode of operation −Allows any existing fabrics with invalid SSL certs to operate normally −APICs to Switch communication is encrypted −No serial number based authorization Strict Mode − Enforces serial number based authorization − Controllers and switches are manually authorized to join the fabric − Only Nodes with SSL cert with authorized Serial number are allowed Strict Mode is allowed only when all the nodes in the existing fabric have valid SSL certificates

Enabling Strict Mode All switches need to have valid SSL certificate

Enabling Strict Mode (cont.) All controllers need to have valid SSL certificate

Approving / Rejecting Controller

APIC Authorization Process APIC sends its ID/Serial Number via LLDP to Leaf Leaf puts the APIC connected port in OOS until the APIC is verified Leaf relays the new APIC details to other APICs that are already part of the cluster User Authorizes the APIC Serial Number (Control Identity Policy) Leaf sends a random auth cookie via IFM/SSL to APIC APIC sends the Auth Cookie back via LLDP Leaf marks the port as verified and makes the port in-service and advertises APIC static route via ISIS

CLI Commands

CLI Commands (cont.) Checking APIC connected port status on Leaf

Policies Enabling Strict Mode Authorizing Controller <!-- /api/mo/uni/controller.xml? 