SCSE Training - Lab 3 - Model Validation and Triggered Collection
This document provides instructions for several lab activities including running network model validation tasks in Skybox, configuring triggered collection and analysis for firewalls, using the change manager to push access control list changes to a firewall, and preparing for a vulnerability scan. The tasks cover validating the network model, monitoring firewall configuration changes, provisioning firewall rules using change management, and scanning for vulnerabilities.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
64 views29 pages
SCSE Training - Lab 3 - Model Validation and Triggered Collection
This document provides instructions for several lab activities including running network model validation tasks in Skybox, configuring triggered collection and analysis for firewalls, using the change manager to push access control list changes to a firewall, and preparing for a vulnerability scan. The tasks cover validating the network model, monitoring firewall configuration changes, provisioning firewall rules using change management, and scanning for vulnerabilities.
Lab activities + Run Daily Sequence + Network Model Validation: run task, review results, investigate main issues + Configuring Triggered Collection and Analysis for Firewalls + Change Manager – pushing ACL changes to the ASA
Run Model Validation Task and Review Results 1. Create a new Task, type “Model – Completion and Validation” 2. Leave all settings to default 3. Run Task
+ Results are in Model tab | Model Analyses | Model
Validation o There are many detail analyses out of the box
+ Add a “Model Anomalies” analysis to review all
issues at once o Right- click “Model Analyses”, choose “New | Analysis…” o Leave all parameters at default • In a real environment this would be impractical, but our Lab model is very small o Click OK to save
Investigate issues + There are several anomalies relating to missing next hops + Most of these can be fixed by converting the edge networks to Perimeter Clouds + We can do it manually, but more easily we can let the Model Validation Task do it for us
Run Model Validation Task + Run the Model Validation Task a second time, setting the flag “Convert Perimeter Networks to Clouds” to ON. + This will convert all edge networks with Missing Next Hops to Perimeter clouds
+ When the Task is finished, change the flag back
to OFF and run the Task a third time + Review the Model Anomalies Analysis + Most of the Critical anomalies should have been converted to “Fixed”
+ Once you are done, please add this task to the
Daily Sequence as well, right after the Collection Group and before any Analysis task.
Configure triggered collection on the ASA + Must make sure change logs can be processed by Skybox o Are change audit entries coming to the syslog server? o Are we detecting changes? o Are “lite” and “full” changes merging?
Adding a Triggered Collection and Analysis Sequence + Create new Sequence + Type: “Firewalls – Triggered Collection and Analysis” + Add its name and click Next
CM Access Update flow + Create new ticket using Standard Workflow o Select Access Update o Source: 10.0.16.0/24 o Destination: 10.0.15.0/24 o Service: 1433/TCP
+ Verify it identifies the ASA
o In the example, the automatically- generated object names have been replaced (manually) with descriptive names
Risk Review + There should be no risks regarding Access Compliance (“Compliant” column) o No need for approval, can promote immediately o Why are there no risks from vulnerabilities (the “Secure” column)?
Scan local VLAN + Logon to nessus and scan local VLAN and DMZ o The nessus instance is installed locally on Secops o Open nessus console on https://localhost:8834/ o Username: skyboxview o Password: P@ssw0rd1234
o You can use the helpful window that
appears right after logon o Set scan target to 10.0.0.0/24, 10.0.10.0/24 then Submit
Scan local VLAN + Nessus will start a quick “discovery” of the active hosts on those networks + Once the discovery is complete, click on “Run Scan” + Let the scan run, it will take several minutes to complete + We’ll retrieve the results in the next lab
Kubernetes: Build and Deploy Modern Applications in a Scalable Infrastructure. The Complete Guide to the Most Modern Scalable Software Infrastructure.: Docker & Kubernetes, #2