Presenter: Arkadiy Shapiro, Manager Technical Marketing (Nexus 2000 – 7000) @ArkadiyShapiro
You could say I’m obsessed with BFD –Arkadiy
The focus on this session is around failure detection (not reconergence, protocol tuning, etc). This session will not go over user-driven failure detection methods (ping, traceroutes, etc).
Fast failure detection is the key to fast convergence.
Routing convergence steps:
Failure detection tools: a layered approach: Layer 1, 2, MPLS, 3, application.
Interconnect options:
Think about this: moving to higher speeds (1G -> 10G -> 40G -> beyond) means that more data is lost as you move to higher speeds without changing the failure detection/reconvergence characteristics of the network. 1 second reconvergence time at 1G is way different than 1 second at 40G.
Be aware: ISSU may not support aggressive timers on various protocols. Another reason to be wary of timer cranking.
Presenter: Eric Kostlan, Technical Marketing Engineer, Cisco Security Technologies Group
Above all, Snort is a community –Eric
Snort stats
Snort was created in 1998 (!!). Sourcefire founded in 2001.
The Snort engine
DAQ – packet acquisition library(ies?). Snort leverages this to pull packets off the wire (Snort doesn’t have its own built-in packet capture abilities). DAQ provides a form of abstraction between the Snort engine and the hardware where the bits are flowing. DAQ – Data AcQusition. DAQ modes: inline, passive or read from file.
Packet decoder – look for header anomalies, look for weird TCP flags, much more. Generator id (GID) is 116 for the packet decoder. Decodes Layer and Layer 3 protocols with a focus on TCP/IP suite.
Preprocessors – apply to Layer 3, 4, and 7 protocols. “Protocol decoders”. Normalizes traffic. Major preprocessors: frag3 (reassembly), stream5 (reconstruct TCP streams), http_inspect (normalizes http traffic), protocol decoders (telnet, ftp, smtp, so on).
Detection engine – various performance settings (eg, how long to spend on regex). Two components: rule builder and inspection component. Rule builder: assembles the rules into Continue reading
Presenter: Eric Howard, Techincal Marketing Engineer
Why aren’t we stopping all the malware???
The term “APT” has become the boogey man of cyber security. :-)
You don’t need to know squat about writing malware in order to launch malware
Why aren’t we stopping all the malware?
Product does not solve the issue. Process is required, too. Ideally, good process backed by good product.
If you knew you were going to be compromised, would you do security differently? — Marty Roesch, Cheif Architect, Cisco Security, founder of Sourcefire
Do security different:
Plan A
Presenter: Eric Kostlan, Technical Marketing Engineer, Cisco Security Technologies Group
“Above all, Snort is a community” -Eric
Snort stats
Snort was created in 1998 (!!). Sourcefire founded in 2001.
Presenter: Arkadiy Shapiro, Manager Technical Marketing (Nexus 2000 - 7000) @ArkadiyShapiro
“You could say I'm obsessed with BFD” -Arkadiy
Fast failure detection is the key to fast convergence.
Presenters: Dave Zacks, Distinguished Engineer; Peter Zones, Principle Engineer
History has been: 10x performnce increase at 3x the cost. 40Gb broke that model –> 100Gb PHYs were very expensive; industry needed/wanted an intermediate step.
Ethernet has a really strong roadmap and will continue to evolve for a very long time. Roadmap: http://www.ethernetalliance.org/roadmap/
SERDES
100m is the sweet spot for copper cable lengths. Why? CSMA/CD and also electrical wiring, placement of wiring closets just make 100m the right fit.
Cisco Mgig
802.11ac Wave 2
Cisco Mgig products:
Between 2003 and 2014, approx 70 billion meters of Cat 5e and Cat 6 cabling were sold
Presenters: Dave Zacks, Distinguished Engineer; Peter Zones, Principle Engineer
History has been: 10x performnce increase at 3x the cost. 40Gb broke that model -> 100Gb PHYs were very expensive; industry needed/wanted an intermediate step.
Presenter: Eric Howard, Techincal Marketing Engineer
“Why aren't we stopping all the malware???”
Presenter: Craig Williams (@security_craig) – Sr Technical Leader / Security Outreach Manager, Cisco TALOS
I’m from Talos. We love to stop bad guys.
Talos has a serious amount of data. For serious.
Data is key. It allows generation of real threat intel.
We basically have a bottomless pit of data
Talos vuln dev team:
With ransomware, you’re basically funding the malware underground.
Malvertizing:
Destructive/Wiper Malware:
BRKARC-2032 – Designing for Secure Convergence of Enterprise and Process Control Networks
Presenter: Chuck Stickney, Cisco SE
Handful of OT folks in the room; majority IT.
Convergence Benefits
PCN vs Enterprise
“Layer 2, Layer 3″ are not terms that OT folks understand. IT folks: speak a language your OT folks can understand.
PCN Characteristics
Presenter: Markus Harbek, CCIE, CCDE
Who knows what SDN stands for?
APIC – Application Policy Infrastructure Controller
UCI – User Centric Infrastructure
APIC-EM – APIC Enterprise Module
Eventually, APIC and APIC-EM will have a common policy model so they can share policies across DC and enterprise. They will not integrate directly but will talk to a common policy orchestrator.
APIC-EM is really focussed on brownfield deployments because the assumption is that customers already have networks up and running hat APIC-EM needs to integrate into. APIC-EM won’t cconfigure OSPF and STP today, things like that, because they’re more than likely already running.
Imperative Control
Declarative control
Presenter: Chuck Stickney, Cisco SE
Handful of OT folks in the room; majority IT.
Convergence Benefits
Presenter: Markus Harbek, CCIE, CCDE
Who knows what SDN stands for?
Presenter: Craig Williams (@security_craig) - Sr Technical Leader / Security Outreach Manager, Cisco TALOS
“I'm from Talos. We love to stop bad guys.”
Talos has a serious amount of data. For serious.
Presenter: Jeff Schutt – Cybersecurity Solutions Architect (Jeff works in Adv Services in the IoT team)
Full Title: An IoT Security Model & Architecture for Securing Cyber-Physical and IT-OT Converged Assets
Mix of IT/OT folks in the room.
How do we do physical security?
How do we do cybersecurity?
IT landscape
OT landscape
With IT and OT convergence, ther’s no way people are going to lose their jobs. We all have too much to do for anyone to be redundant. Additionally, there is a well-known shortage of skilled workers in this area.
Security awareness and training: a combination of people, process, and technology.
“Airgap security” does not address “people, process and technology”. Airgap is NOT security (on its own). Airgap is not Continue reading
Presenter: Konrad Reszka, IoT Vertical Solutions Group Engineering Lead
Given a chance, how many people in this room would volunteer to be a meteorologies in San Diego?
Inflection point between 2009 and 2010 where the number of connected devices began to out number the connected people. 50 billion “things” by 2020. And this doesn’t include phones and tablets. It’s other smart devices.
Shift in dominant endpoints: from consumers (people) to devices (like sensors and such). This shift demands changes in the network to support this growth.
Cisco + Schneider Electric joint functional reference model for connected pipelines.
Isolate your enterprise network from the operations network.
In the erm… pipeline:
Had to leave session halfway through due to an overlapping MtE session.
How to Call REST APIs from a REST Client and Python
Presenter: Matt (didn’t catch last name, sorry)
I was late to this session because of wonderful San Diego traffic :-/
A walk-through of using the REST API on APIC-EM.
http://learninglabs.cisco.com – sample code, docs
Postman – plugin for Chrome browser to craft, send, receive API commands over HTTP using a nice graphical interface. Helpful for building and testing queries and also viewing the raw output from the controller that you’re querying. Is there an equivalent for Firefox?
APIC-EM docs fully cover the API. Methods, variables, etc.
“Requests” library in Python – simplifies the CRUD operations in Python.
When you’re in the lab, verifying the SSL cert of your controller (in your code) might be optional. Don’t bring that into prod code. Get a proper cert and have your code validate the cert.
Other references:
How to Call REST APIs from a REST Client and Python
Presenter: Matt (didn't catch last name, sorry)
Presenter: Konrad Reszka, IoT Vertical Solutions Group Engineering Lead
“Given a chance, how many people in this room would volunteer to be a meteorologist in San Diego? You'd never be wrong!”