Denise "Fish" Fishburne

Author Archives: Denise "Fish" Fishburne

Verify Your Segmentation is Working with Stealthwatch

Network segmentation…. air gap segmentation… the names go on and on.  But no matter what you call it, you designed it and deployed it for a reason.  Likely a very good reason.  Potentially even a reason with fines and consequences should the segmentation not work.  So once you deploy it…. what then?  Just trust it is working and will always stay working?

 Trust, But Verify

I admit I am likely viewed as boringly logical when it comes to the network.  It just doesn’t seem logical to me to spend so many hours in the design and the deploy phase and then just trust that it is working.   

Don’t just trust.  Verify. 

Use whatever tool you want.  Just please… know what is really going on in your network.  Know reality.   

In this blog I’m going to show you how you can use Stealthwatch to get visibility into what is REALLY going on in your networking in reference to your segmentation.  

How can Stealthwatch tell you if your segmentation is working or not?  I refer to Stealthwatch as “Your Network Detective Command Center”.  If Continue reading

Find Rogue DNS Servers in your Network with Stealthwatch

Rogue DNS kinda reminds of me of a crime scene show I saw once.  The killer was hijacking the GPS mapping system in the rental cars of their victims.

Imagine that who you think is your valid DNS server actually isn’t.  Yeah… i know – scary.   …. If you are not familiar with the term “Rogue DNS” … maybe you might know the exposure via other terms like DNS hijacking or DNS redirection to name just a few.

In this blog I’m not going to teach about what Rogue DNS… DNS hijacking… or DNS redirection. Nor am I going to talk about solutions like OpenDNS (Cisco’s Umbrella).  I’m going to just show you how you can use Stealthwatch to get visibility into what is REALLY going on in your network in reference to DNS.  We are going to cover 2 situations where having a tool like Stealthwatch could help you with your DNS.

  1. Finding Rogue DNS
  2. DNS Server Cutover:  Checking Reality before Decommissioning DNS Servers

How does Stealthwatch do this?  I refer to Stealthwatch as “Your Network Detective Command Center”.  If there are rogue DNS in your network and your end devices are Continue reading

The Case of the Missing LDP Neighbor

R1 and R2 are cabled up twice to each other via their gig0/0/1 interfaces and their gig0/0/7 interfaces. Each connection is in its own subnet, and each interface configured for OSPF and MPLS.  But while we have 2 OSPF neighbors between them… we only have 1 LDP neighbor.

R1#show mpls int
Interface IP Tunnel BGP Static Operational
Gi0/0/1 Yes (ldp) No No No Yes
Gi0/0/7 Yes (ldp) No No No Yes

So as you can see from the output of show mpls interface, gig0/0/1 and gig0/0/7 are both configured for MPLS LDP.  Why then if we look below do we see only 1 MPLS LDP neighbor between them?  

What is the problem?  Actually… in this situation there isn’t a problem.  This is actually expected behavior.

R1#sh mpls ldp neighbor
Peer LDP Ident:; Local LDP Ident
TCP connection: -
State: Oper; Msgs sent/rcvd: 184/184; Downstream
Up time: 02:32:11
LDP discovery sources:
GigabitEthernet0/0/1, Src IP addr:
GigabitEthernet0/0/7, Src IP addr:
Addresses bound to peer LDP Ident:
Continue reading

Knowledge of the “Truths in Your Network” is KEY

I am a huge believer in “knowledge is key”.  Yeah… I know… just reading that statement you are probably saying “well yeah… duh”.

Of course knowledge is key… duh, Fish!  We know that!  We love knowledge.  We are knowledge seekers and we love to learn!  I mean… if we didn’t love learning and knowledge why would we be reading this?   Okay… got it.  You love knowledge.  You want to grow your knowledge.   I hear you.  You are basically saying… bring on the knowledge… max the setting!   Got it.

So you most likely extend that desire for knowledge to most of the areas in your life.

For example….

  • Buying a House:  When buying a house you want the knowledge you can get by hiring a subject matter expert to walk thru the entirety of the house and inspect it.  You want knowledge of the truths of that house.
  • Hiring a Financial Advisor: When hiring a financial advisor you just go and “bare all” in reference to your financial situation so they can review every nuance of it.   You want knowledge of the truths of your finances.

Let’s Continue reading

Stealthwatch: The “Network Detective Command Console”

Stealthwatch, to me, is like having a Network Detective working in my very own network!  I truly love Stealthwatch and I am playing with every chance I can get.

Disclaimer:   I do not get commissions from you buying Stealthwatch nor am I part of the Cisco Business Unit for Stealthwatch.  I just really honestly and for realsies super love it.

I tossed together a ~31 minute YouTube.  Obviously you can watch the entire thing.  Or… here you go for the big sections.

Setting Up Addressing and Routing: FTDv Fun

In my previous blog (Fun in the Lab: FTDv & FMC – Install and Deploy) we deployed a FMC VM and a FTDv VM and ended the blog with the FTDv successfully added to the FMC.

Now?  Now let’s add IP addressing for the FTDv and also set up routing protocol neighbor relationships.  I learned what I am about to show you from my co-worker and friend, Keith Brister.  So don’t thank me, thank Keith.  ?

I tossed together a ~29 minute YouTube.  Obviously you can watch the entire thing.  Or… here you go for the big sections.

Done and Done.  Easy Peasy!


Fun in the Lab: FTDv & FMC – Install and Deploy

This is my Stealthwatch playground…. errrr… I mean … ahem… “work environment” for a Technical Solution Workshop I am working on for Stealthwatch.

Going to set up FTDv and FMC today.  A co-worker and friend, Scott Barasch, helped me get jump started… so figure I’ll pass on what I just learned to you. ?

What this blog will cover is

    1. Deploying the OVF for FTDv
    2. Deploying the OVF for FMC
  2. VMware settings
    1. Tweak for FTDv
    2. Tweak for FMC
  3. Prepping to Power On
    1. Snapshot Both Before Power On
    2. Power Both On
  4. Setup via Console
    1. FMC – console in and setup IP address
    2. FTDv – console in and step thru the prompts
  5. Test IP Connectivity
    1. Ping FMC and FTDv from the PC
    2. Notice Can’t ping FTDv
    3. Fix
    4. Ping
  6. Browse into FMC
    1. Change password
    2. Setup DNS
    3. Setup NTP
    4. Accept EULA
    5. Apply
    1. License FMC
  8. FMC/FTDv: Make the Connection
    1. FTDv – Point FTDv to FMC
    2. FMC – bring the FTDv into the fold.  ?


So let’s begin.  What I have to host my FMC & FTDv VMs is a UCS M4 with a NIC connected to a Cat4948 in vlan 1.  That NIC is tied to vSwitch0 in the UCS. Continue reading

Hello There! :) Update from the FishBowl

June 28th… wow…. lol… my last blog out here was June 28th!  Too funny!  So where have I been and what have I been doing?

Well June was CiscoLive in the beginning and then SharkFest at the end.  I think i hit some “being social” limit and became a hermit for most of July and August.  Then 2 weeks of vacation for the first 2 weeks of September.  Two full weeks.  It was AWESOME!  Then Florence came to visit… ?  She hung around for a little while.  Like one of those visitors who come stay with you at your house and just won’t leave.    Oh.. and then breaking a finger September 15th and struggling to type for the rest of the month.

Hello!  I’m BACK! 

And I have REALLY missed being here!  At the same time… that break was REALLY needed!  ?   Awesome summer with the wife and family!  Woot woot!  Work hard… play hard!

So what am I up to?  Stealthwatch Baby!  Woot woot!  Been with Cisco for 22 years and I have NEVER loved a product and a GUI so Continue reading

Techniques of a Network Detective: A New Series

Put your detective hat on your head and your Network Detective badge on your lapel.  Introducing a new blog series – Techniques of a Network Detective.  This series will focus on the detective work (troubleshooting side) of our jobs as network engineers.

For over 30 years I’ve been playing in the “world of IT”. During those years there have been a lot of changes in our world. But through all that change, there has been a thread, for me, that has always remained constant. A thread and a passion that always seemed to be with me in every job over all these years.


Being a “Network Detective” is much the same as being a regular detective in many ways.  As a Network Detective we get put on a “case” – the “Case of the Missing Packets” maybe.  We go to the crime scene and try to find answers so we can solve the “who done it”


When a “crime” happens you need to be right there interviewing the suspects, surveying the crime scene, asking the right questions.  Trying to quickly figure out what is happening, where it is happening, and why it Continue reading

SharkFest 2018!! Woot woot! So Excited!

On Saturday I leave North Carolina to head to Sunnyvale, California for…… (insert drumroll here)… SharkFest!  I’m am so pumped and excited!  I have wanted to attend SharkFest since 2009 when I first learned about it!  I’m finally going!  Woot woot!

It is not uncommon that I find myself having to explain what SharkFest is… even to diehard WireShark users and enthusiasts.  So let me take a step back and explain what SharkFest is.

What is SharkFest?

SharkFest™, launched in 2008, is a series of annual educational conferences staged in various parts of the globe and focused on sharing knowledge, experience and best practices among the Wireshark® developer and user communities.

SharkFest attendees hone their skills in the art of packet analysis by attending lecture and lab-based sessions delivered by the most seasoned experts in the industry. Wireshark core code contributors also gather during the conference days to enrich and evolve the tool to maintain its relevance in ensuring the productivity of modern networks.

Teehee.  So basically it is a major WireShark geek fest!!!!  And I am STOKED!  Who wouldn’t be?  Just look at the classes I’ve Continue reading

Network Detective Ride-Along: Troubleshooting Multicast

Grab your Network Detective badge!  It’s time for another Network Detective ride-along.  ?   Multicast this time.

We need to solve the case of the missing Multicast streams.  ONLY 2 multicast streams ( and are getting thru to the hosts who requested them. The other 4 streams the same hosts requested are NOT getting thru.  Let’s go to the crime scene and review the facts.

Fact #1 – Host off of Cat9K-40 is sending IGMPv2 membership reports to join ASM groups, and
Fact #2 – Host off of Cat9K-50 is sending IGMPv3 membership reports to join SSM groups, and
Fact #3 – All multicast sources are off of Cat9k-10 in subnet They are sending the mcast for all 3 SSM groups and all 3 ASM groups
Fact #4 – Cat9K-20 is the Rendezvous Point (RP) for all 3 ASM groups

Any thoughts at first glance?  Time to go to the YouTube ride-along ~11 minute video!  Good luck!  Have fun!