In my past two blog post, I called out very specific security use cases for I Fabric, today I’m going to go the opposite way and talk about two very common, dare I say it pervasive problems.
My first exposure to OS version control was leading up to the year 2000 with the so called y2k bug. I spent days connecting to routers doing show vers to see OS version and installed memory … after checking this I usually had to install memory before upgrading to IOS version 11.x … That was the good old days, at least I usually knew exactly what I was going to break when I took the router out of commission. I was also new to my career back then and was often excited about the new ways of doing things and did not always consider the consequences of my actions. Round about the same time I was l fiddling around on a large banks network (as a consultant) I saw Netbios traffic and I was fully aware that it shouldn’t be there so I helpfully updated the config on several routers and firewall …. (Yes for those of you old enough to know Microsoft used to need that little protocol for communicating) I inadvertently broke the bank because I didn’t follow a standard and didn’t know what I didn’t know.
Today I am less adventurous definitely more cautious not to mention less technical than I was back then. However, Im also wise enough to recognize the problems I didn’t when I was younger. Inconsistent configuration and failure to follow standards/compliance rules in our networking environments is a recipe for disaster maybe not today maybe not tomorrow but we will have a problem. So how do we solve this age old challenge?
This is a 3 stage problem that are all interrelated and so sometimes we overthink and get paralyzed. In part that’s because we have lacked tools and doing things manually especially in a large environment even with the correct resources can be intimidating if not impossible .
The challenge isn’t in building a single framework or standard most folks will already have this or be able to create it fairly easily. The problem is in translating that framework into reality across our entire environment made up from multiple manufacturers, multiple device types in organizations that often have different technology areas tied to different organizational control groups (Think security, networking, devops, Scada/PCD as an examples). Many of the manufacturers we have in our environments have tried to solve this problem but in totally miopic ways because they don’t see the pervasive problem they see their own brands problem, a Cisco problem, a PaloAlto problem, a Juniper problem etc but our problem is not vendor specific. We need a solution that can span entire networks all our network and security infrastructure, regardless of location device type or sphere of control.
Some companies tried to solve the problem by making tools to enforce device level configuration management and standards. This device level compliance and configuration management can help but it solves a compliance problem not a reality problem … for example I can push out perfect firewall configurations, that are CIS/PCI/GDPR compliant etc but if another device in the data path is inadvertently configured to bypasses that firewall or is compromised because it doesn’t meet the same standard, then the perfect configuration is useless … what we need is a network wide state level view.. a tool that will, discover the entire network (quickly, simply and efficiently ), capture configurations, standardize said configurations and visualize the data. Then allow us to write network wide intent or assurance checks. The output form this check then needs to be consumable so that we can get alerts.. some examples if our standard is to have only SNMPv3 running to avoid the inherent security risks with SNMPv2 community strings, logging needs to be enabled, Telnet needs to be disabled.. check this each time we do a network snapshot ( at atleast once a day ) not on one device or location but everywhere …
This same Network Assurance platform can solve the other problem I mentioned earlier OS version standardization. If we have a sprawling network deployed over years how do we enforce network OS standards … perhaps we are very disciplined and have a schedule automation tools in place already etc … for planned changes that can work ( I haven’t seen it often but it can work ) Now what happens when there is a CVE… management says get it fixed … easy but the you think about operational risk.. you need an outage window how long should that be how much risk is there really ? Wouldn’t it be great if a toll could quickly show you where the affected devices were in the network (They would show you things like how many disparate code versions you have on the same device as a standard report already). Not only do they show you where they are by site, but because of the visualization you can see the layer1,2,3 network level dependencies … and better understand the real risk associated with a potential outage. This doesn’t solve the problem but it does do several things 1)decrease the time required to figure out where you are at risk 2) give you a better idea of what the real risk updating code is 3)give you a simple way to see OS level compliance across your entire environment.
Lastly in both cases above a simple post change path or network wide snapshot will give you the peace of mind …
In this blog series I only touched on some simple use cases but the application of the data these tools collect is almost infinite … the trick when evaluating network and Assurance solutions in my opinion comes down to four things… Is it easy to install and set up, Is it easy to operate and functionally modify for additional use cases, does it have a simple open API and webhook capability to allow for integration with other 3rd party tools and lastly if you speak to there customers will they say they are nimble . ( No solution in this space will support every product on the market but how quickly do they add support and functionality).
Until next time may your networks be ever secure and stable.
To find out more, check out our Youtube channel youtube.com/c/ipfabric for demos of our monitoring platform integrations. Look at our other blog posts on the website to learn how our partners and customers are integrating IP Fabric with their wider operational ecosystem. And if you’re interested in a free trial of our platform, take a look here