Cisco Secure Data Center for Enterprise Single Site Clustering with Cisco TrustSec Technology Implementation Guide Last Updated: March 19, 2014 About the Authors About the Authors Tom Hogue, Security Solutions Manager, Security Business Group, Cisco Tom is the Data Center Security Solutions Manager at Cisco with over 30 years in developing integrated solutions with Cisco and previous roles in the industry. Tom led the development of the industry leading data center solutions such as the FlexPods, Vblocks, and Secure Multi-tenancy. Tom Hogue Bart McGlothin, Security Systems Architect, Security Business Group, Cisco Bart is a Security Solutions Architect at Cisco with over 16 years of solutions experience. Bart leads Cisco's involvement with the National Retail Federation's Association for Retail Technology Standards Committee (ARTS) as a member of the ARTS board and Executive Committee. Prior to Cisco, Bart worked as the Network Architect at Safeway, Inc. Bart McGlothin Matt Kaneko, Security Systems Architect, Security Business Group, Cisco Matt Kaneko is the solution technical lead for Secure Data Center Solution team. In this role, Matt and his team work closely with product marketing teams of various business group along with customer’s feedback to create solution architecture. Prior to this role, Matt has worked as a Technical Marketing Manager for various Cisco Security Product lines which includes Cisco ASA Next Generation Firewall, Cisco Intrusion Protection System, Cisco AnyConnect and associated Management products line. Matt Kaneko 2 CONTENTS Introduction 4 Goal of this Document 4 Intended Audience 5 Validated Components 5 Solution Component Implementation 6 Cisco ASA Firewall Clustering 7 IPS Protection 15 Cisco TrustSec 17 Validation Testing 25 Summary of Tests Performed 25 Summary of Results 27 Conclusion 28 Appendix A—References 29 Appendix B—Device Configurations 30 ASA Cluster Configurations 30 Nexus 7000 Configuration 44 Nexus 1Kv 55 Appendix C—About the Cisco Validated Design Program 67 Cisco Secure Data Center for Enterprise 3 Introduction Introduction Goal of this Document The Single Site Clustering with Cisco TrustSec Technology Solution provides guidance for enterprises that are challenged with the exponential growth of data center resources and associated security policy complexity. Enterprises that want to protect against advanced data security threats can deploy a comprehensive set of security capabilities to address these needs, as shown in Figure 1. Using Cisco’s next-generation firewalls operating as a cluster with IPS and TrustSec, the goals of increased security capacity and simplicity can be jointly achieved. Figure 1 Single Site Clustering with Cisco TrustSec Technology TrustSec Cisco ASA Cluster with IPS Cisco Security Manager Policies at a Active Directory en tD ata vir on m nm viro En En User Identity Master D ent SXP SEA Flexpod User On-boarding SXP Environment Data Nexus 7k 347923 Identity Services Engine This document is specifically focused on providing implementation guidance on the Single Site Clustering with Cisco TrustSec Technology solution, which is part of the Cisco Secure Data Center for the Enterprise portfolio of solutions. These solutions provide the best protection available to address today’s advanced data security threats. They contain design and implementation guidance for enterprises that want to deploy secure physical and virtualized workloads in their data centers. The solution portfolio contains this solution and two others: Secure Enclaves Architecture and Cyber Threat Defense for the Data Center. Figure 2 illustrates the relationship among these solutions. For additional content that lies outside the scope of this document, see the following URL: http://www.cisco.com/c/en/us/solutions/enterprise/design-zone-secure-data-center-portfolio/index.html . 4 Introduction Figure 2 Cisco Secure Data Center for the Enterprise Solution Portfolio Cisco Secure Enclave Architecture Single-Site Clustering with Cisco TrustSec Technology Cisco Cyber Threat Defense for the Data Center Firewall Clustering Intrusion Prevention Real-time Updates Management Cisco TrustSec Technology • SXP (SGT Exchange Protocol) • SGT (Secure Group Tags • Policy Enforcement • SGACLs (Security Group ACLs) • FWACLs (Firewall ACLs) Lancope StealthWatch System • NetFlow • NSEL (NetFlow Security Event Logging) • Identity 347901 Integrated Systems • Compute • Storage • Hypervisor Virtualization Infrastructure Management Access Layer Secure Enclaves Intended Audience This document is intended for, but not limited to, security architects, system architects, network design engineers, system engineers, field consultants, advanced services specialists, and customers who want to understand how to deploy a robust security architecture. This document details how specific use cases of the designs were implemented for validation. This implementation guide assumes that the reader is familiar with the basic concepts of IP protocols, quality of service (QoS), high availability (HA), and security technologies. This guide also assumes that the reader is aware of general system requirements and has knowledge of enterprise network and data center architectures. Validated Components Table 1 lists the validated components for the solution. Table 1 Validated Components Component Cisco Adaptive Security Appliance (ASA) Role Data center firewall cluster Hardware Cisco ASA 5585-SSP60 Release Cisco ASA Software Release 9.1(4) Cisco Intrusion Prevention Module Application inspection Cisco ASA engines 5585-SSP-IPS60 7.2(1) Cisco Nexus 7000 Aggregation and Cisco 7004 FlexPod access switch NX-OS version 6.1(2) Cisco Identity Services Engine (ISE) Roles-based policy management N/A (virtual machine) Cisco ISE Software Version 1.2 5 Solution Component Implementation Solution Component Implementation As stated in the Single Site Clustering with Cisco TrustSec Technology Solution Design Guide, the solution is designed around the following key design principles: provisioning, performance, and protection. Figure 3 portrays an overview of the lab deployment used for validation. The following sections show how each product was configured to match specific use cases desired in the validation. Figure 3 Lab Overview Enterprise Core Storage SAN Nexus 1kv Virtual Supervisor Module Data CCL Cisco ASA Cluster NetFlow Generation Appliances Active Cisco Identity Directory Services Security Engine Manager SEA Flexpod 347929 Cyber Threat Defense Four Cisco ASA 5585-X SSP60 firewalls with IPS modules are deployed as a cluster with a combination of Layer 2 and Layer 3 mode contexts (multi-mode). The ASA cluster configuration is performed via CLI or Cisco Adaptive Security Device Manager (ASDM)—Cisco Security Manager did not support cluster creation at the time of this validation. Policies for the firewalls and IPS are managed via Cisco Security Manager. User/server device objects are managed in ISE along with TrustSec policy creation for the remaining platforms. User accounts and authentication are linked to Active Directory. Cisco UCS Director is used to manage the deployment of new virtual machines (VMs) across the infrastructure. 6 Solution Component Implementation Cisco ASA Firewall Clustering Initial configuration of the firewalls was performed via the console command line. After the first ASA was configured, additional firewalls were then added to the cluster. For additional information on cluster configuration options, see the following resources: • Cisco ASA 9.1 CLI configuration guide— http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_co nfig/ha_cluster.html • Cisco ASA Clustering within the VMDC Architecture— http://www.cisco.com/en/US/docs/solutions/Enterprise/Data_Center/VMDC/ASA_Cluster/ASA_C luster.html • Additional Cisco ASA configuration guides— http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/products -installation-and-configuration-guides-list.html The cluster in this validation consists of four ASAs acting as a single unit. All units in the cluster are the same model with the same DRAM. The units used in the cluster were all running 9.1(4) software. When deploying the ASA cluster, all of the ASAs must have the exact same configurations for the ASA system to work properly. In addition, they should be deployed in a consistent manner. This applies to using the same type of ports on each unit to connect to the fabric. Use the same ports for the Cluster Control Link (CCL) to the switching fabric and the same with the data links. When the ASA cluster is deployed properly, the master unit of the cluster replicates its configuration to the other units in the cluster, and so the cluster must have a consistent deployment across all the units. Keep in mind that the following features are applied to each ASA unit, instead of the cluster as a whole: • QoS—The QoS policy is synced across the cluster as part of configuration replication. However, the policy is enforced on each unit independently. For example, if you configure policing on output, the conform rate and conform burst values are enforced on traffic exiting a particular ASA. In a cluster with eight units and with traffic evenly distributed, the conform rate actually becomes eight times the rate for the cluster. QoS was not implemented in this validation. • Threat detection—Threat detection works on each unit independently; for example, the top statistics are unit-specific. Port scanning detection, for example, does not work because scanning traffic is load balanced between all units (when using source-dest-ip-port balancing), and one unit does not see all traffic. • Resource management—Resource management in multiple context mode is enforced separately on each unit based on local usage. • IPS module—There is no configuration sync or state sharing between IPS modules. More information on this is available in the IPS section below. ASA Connectivity The ASA interfaces were configured as a spanned EtherChannel using a single port-channel for both inside and outside VLAN interfaces. These channels connect to a pair of Nexus 7000s using a virtual PortChannel (vPC). The EtherChannel aggregates the traffic across all the available active interfaces in the channel. A spanned EtherChannel accommodates both routed and transparent firewall modes per Cisco’s use case requirements. The EtherChannel inherently provides load balancing as part of basic operation using Cluster Link Aggregation Control Protocol (cLACP). Figure 4 shows the connections and port channels implemented. 7 Solution Component Implementation Figure 4 Cluster Connections Clustering Data Interface vPC-20 N7ka vPC-21 0/7 0/9 4/5 ASA-2 IPS-2 PC-2 PC-1 0/6 ASA-3 IPS-3 PC-2 vPC-23 4/7 4/8 PC-1 4/5 vPC-22 0/8 4/11 PC-1 0/9 ASA-4 IPS-4 PC-2 vPC peer-link vPC-21 0/6 0/7 4/10 4/12 4/6 N7ka vPC-24 0/9 4/9 vPC-22 0/7 0/8 vPC peer-link N7kb Clustering Control Interface 0/8 4/10 4/12 PC-1 0/6 PC-2 4/9 4/11 ASA-1 IPS-1 vPC-23 4/6 4/7 4/8 0/6 N7kb vPC-24 0/7 0/9 347918 0/8 It is important to point out that the clustered ASAs have the same port channel configuration because of the sync from the cluster, but the Nexus 7000s have different port channels configured because these are local and not spanned across the cluster. EtherChannels configured for the CCL are configured as discrete EtherChannels on the switch. Note Cisco recommends that the bandwidth of the CCL match at least the highest available bandwidth on the data interfaces. For example, if a 10GE port is used as a data interface, the CCL also needs to support 10GB bandwidth. The reason is that the load balancing performed by the switches connecting to the cluster can be asymmetric and as such, it is possible that all traffic hits just one unit in the cluster, resulting in increased traffic. The interface type mode is the first item that must be specified before configuration of the ASAs. You must set the mode separately on each ASA that you want to add to the cluster. If the device is already configured for multiple context mode, configure this setting in the system execution space. Procedure Step 1 Configure the cluster interface mode for each unit using the console port: ciscoasa(config)# cluster interface-mode spanned The ASA firewall then clears all improper configurations and reboots. Step 2 Next, configure the CCL interface, which must be enabled before joining the cluster. interface TenGigabitEthernet0/6 channel-group 1 mode active no shutdown ! interface TenGigabitEthernet0/7 channel-group 1 mode active no shutdown ! 8 Solution Component Implementation interface Port-channel1 no shutdown Step 3 For multi-mode, create or change to the Admin context. Be sure to assign the M0/0 interface. Step 4 In the Admin context, configure the Cluster IP pool and then assign an IP address to the M0/0 interface, specifying the cluster pool. ip local pool K02-SEA 172.26.164.157-172.26.164.160 mask 255.255.255.0 ! interface Management0/0 management-only nameif management security-level 0 ip address 172.26.164.194 255.255.255.0 cluster-pool K02-SEA no shutdown Step 5 Now you can either launch the Cluster Wizard in the ASDM, or use the following configuration statements to create the master node of the cluster. mtu cluster 9000 cluster group K02-SEA key ***** local-unit ASA-1 cluster-interface Port-channel1 ip 192.168.20.101 255.255.255.0 priority 1 console-replicate no health-check clacp system-mac auto system-priority 1 enable conn-rebalance frequency 3 Once completed, additional security contexts can be created and set as routed or transparent. Note Note that ASDM has a bug: you cannot add the IP address to the sub-interface (vlan) of the routed context for a spanned port channel. In this instance, the IP address was able to be configured via the CLI. There were no problems creating a bridge interface on the transparent firewall context. Adding Additional Slave Firewalls Note Be sure to upgrade ASA software version to match the cluster before adding to the cluster. Each unit in the cluster requires a bootstrap configuration to join the cluster. Typically, the first unit configured in the cluster will be the master unit. After you enable clustering, after an election period, the cluster elects a master unit. With only one unit in the cluster initially, that unit becomes the master unit. Subsequent units added to the cluster will be slave units. Add additional cluster members via the console; Telnet and SSH are not supported. First change the cluster interface mode to match the ASA cluster master, clear the configuration, configure the CCL interface, and join the cluster as a slave as follows: changeto system cluster interface-mode spanned force clear configure cluster mtu cluster 9000 9 Solution Component Implementation interface TenGigabitEthernet0/6 channel-group 1 mode active no shutdown interface TenGigabitEthernet0/7 channel-group 1 mode active no shutdown interface Port-channel1 no shutdown cluster group K02-SEA local-unit ASA-4 priority 3 cluster-interface Port-channel1 ip 192.168.20.104 255.255.255.0 key ********* enable as-slave noconfirm The MTU command enables jumbo-frame reservation, and should be added to the configuration manually because it is not synced via the cluster. Firewall Contexts The ASA cluster was partitioned into multiple virtual devices, known as security contexts. Each context acts as an independent device with its own security policy, interfaces, configuration, and administrators. Multiple contexts are similar to having multiple stand-alone devices. Routed Firewall Mode In routed firewall mode, the ASA is considered to be a router hop in the network. Routed firewall mode supports many interfaces. Each interface is on a different subnet. You can share interfaces between contexts. The ASA acts as a router between connected networks, and each interface requires an IP address on a different subnet. The ASA supports multiple dynamic routing protocols. However, Cisco recommends using the advanced routing capabilities of the upstream and downstream routers instead of relying on the ASA for extensive routing needs. Transparent Firewall Mode A security context can be operated in transparent mode, which acts like a Layer 2 firewall that appears to be a “bump in the wire” or a “stealth firewall”, and is not seen as a router hop to connected devices. The ASA connects to the same network between its interfaces. Because the firewall is not a routed hop, you can easily introduce a transparent firewall into an existing network. The Management and Data interfaces should not be connected to the same switch because the Data interface receives the MAC address table updates with a minimum of a 30-second delay for security reasons. At least one bridge group is required per context, but each context can support up to eight bridge groups. Each bridge group can include up to four interfaces. Note The transparent mode ASA does not pass CDP packets, or any packets that do not have a valid EtherType greater than or equal to 0x600. An exception is made for BPDUs and IS-IS, which are supported. All ASA 5585-X units within the cluster share a single configuration. When configuration changes are made on the master unit, the changes are automatically replicated to all slave units in the cluster. A configuration change directly made on slave units is prohibited. Two transparent mode contexts were created and one routed mode context was created. These were labeled as Enclaves 1 through 3 aligning with the Secure Enterprise Enclave (SEA) design guidance. Figure 5 shows the logical segmentation implemented. 10 Solution Component Implementation Figure 5 Logical Topology Core VLAN 200 - WAN Contexts Enclave 1 (L2) Enclave 2 (L2) Outside Inside Outside Inside Outside 10.3.0.254 Enclave 3 (L3) Inside 10.3.1.254 Cisco ASA Cluster VLAN 2001 VLAN 2002 VLAN 2003 VLAN 3001 10.1.1.254 10.2.1.254 10.3.0.1 10.10.0.1 VLAN 3002 VLAN 3003 Nexus 7k VM VM VM VM VMs in Enclaves 347921 Nexus 1k Management Network All units in the cluster must be connected to a management network that is separate from the CCL. Use the dedicated management interfaces of each ASA as shown in Figure 6. Each ASA is assigned a unique IP address, and a system IP is assigned to the master unit as its secondary IP address. For inbound management traffic, an application such as Cisco Security Manager accesses the master ASA by using the system IP address or individual ASAs by their own IP address. For outbound traffic, such as SNMP or syslog, each ASA uses its own IP address to connect to the server. In multi-context mode, the same configuration applies to the admin context and any user contexts that allow remote management. ip local pool enclave1-pool 10.0.101.101-10.0.101.108 mask 255.255.255.0 ! interface Mgmt101 description Enclave 1 Management management-only nameif management security-level 0 ip address 10.0.101.100 255.255.255.0 cluster-pool enclave1-pool 11 Solution Component Implementation Management Interface Connectivity IPS-1 Cisco ASA Cluster 0/6 M0/0 0/7 0/8 M0/0 0/9 ASA-2 M0/0 IPS-2 M0/0 ASA-1 0/46 0/47 0/43 0/45 Management Switch 0/41 0/42 0/39 0/40 ASA-3 M0/0 IPS-3 M0/0 ASA-4 M0/0 IPS-4 M0/0 0/6 0/7 0/8 0/9 0/6 0/7 0/8 0/9 0/6 0/7 0/8 0/9 4/5 4/9 4/6 4/10 4/7 4/11 4/8 4/12 4/5 4/9 4/6 4/10 4/7 4/11 4/8 4/12 N7ka vPC peer-link N7kb 347919 Figure 6 NetFlow and Syslog NetFlow and syslog are valuable tools for accounting, monitoring, and troubleshooting in such a high-throughput environment, and are key aspects of Cisco’s Cyber Threat Defense solution. ASA units in the cluster generate NetFlow and syslogs independently. The syslog’s HEADER field, which contains a timestamp and device ID, can be customized as required. A syslog collector uses the device ID to identify the syslog generator. The CLI is enhanced so that different ASAs can generate syslog with identical or different device ID. However, a per-unit NetFlow stream cannot be consolidated. The NetFlow collector handles each individual ASA separately. flow-export destination management 172.26.164.240 2055 flow-export template timeout-rate 1 TrustSec and SGT Exchange Protocol Each context maintains its own configurations, databases, credentials, and environment data. The master unit of the cluster contacts ISE via SGT Exchange Protocol (SXP) connections from each context, and obtains the secure group-to-IP address mappings data, which is then replicated to all units in the cluster via reliable messaging; therefore, security group-based policies are enforced on the slave units as well. Security group-based policies are replicated as part of the configuration sync. Both routed and transparent firewall modes are supported. In this validation, the management interface was used for SXP communication with peer devices to keep it out of the normal flow of production traffic. SXP flows from the Nexus 7000 to each of the contexts in the ASA cluster, as shown in Figure 7. The Nexus 7000s act as the “speakers” and send the secure group tag (SGT) and IP address mapping to the “listeners”, which include each of the ASA cluster contexts, via SXP. 12 Solution Component Implementation Figure 7 TrustSec Communication 172.26.164.218 172.26.164.217 Enclave 1 (L2) M101 10.0.101.100 Enclave 2 (L2) M102 10.0.102.100 Enclave 3 (L3) M103 10.0.103.100 Cisco ASA Cluster Nexus 7k 172.26.164.187 Identity 172.26.164.239 Services Engine RADIUS Request Environment Data SXP SG:IP Map 347922 Contexts Configuration of ASA Context (Enclave 1) cts cts cts cts cts sxp sxp sxp sxp sxp enable default password ***** default source-ip 10.0.101.100 connection peer 172.26.164.218 password default mode local listener connection peer 172.26.164.217 password default mode local listener Configurations of Nexus 7000 cts cts cts cts cts cts cts cts cts sxp enable sxp default password 7 <removed> sxp connection peer 10.0.101.100 source 172.26.164.218 password default mode listener sxp connection peer 10.0.102.100 source 172.26.164.218 password default mode listener sxp connection peer 10.0.103.100 source 172.26.164.218 password default mode listener sxp connection peer 172.26.164.18 source 172.26.164.218 password default mode speaker sxp connection peer 172.26.164.186 source 172.26.164.218 password default mode speaker sxp connection peer 192.168.250.22 source 192.168.250.252 password default mode listener role-based enforcement ASA Security Policy Cisco ASA Software Release 9.0.1 and above are necessary for secure group firewall (SGFW) functionality. Policy in the firewall has been expanded to include source and destination security groups that are downloaded from the ISE in the environment data after the ASA has established a secure connection by importing a proxy auto-configuration (PAC) file from the ISE. The ASA issues a RADIUS request for the TrustSec environment data, which includes the secure group table mapping secure group names to secure group numbers. The ASA receives the secure group numbers-to-secure group IP addresses mapping from the Nexus 7000 via SXP. If the PAC file downloaded from the ISE expires on the ASA and the ASA cannot download an updated security group table, the ASA continues to enforce security policies based on the last downloaded security group table until the ASA downloads an updated table. 13 Solution Component Implementation As part of configuring the ASA to integrate with Cisco TrustSec, you must configure each context so that it can communicate with the ISE servers via RADIUS. The last configuration identifies the AAA server group that is used by Cisco TrustSec for environment data retrieval. aaa-server ISE_Radius_Group protocol radius aaa-server ISE_Radius_Group (management) host 172.26.164.187 key ***** radius-common-pw ***** aaa-server ISE_Radius_Group (management) host 172.26.164.239 key ***** radius-common-pw ***** ! cts server-group ISE_Radius_Group When configuring access rules from ASDM and Cisco Security Manager, objects created in the PAC files are available as source and destination criteria. (See Figure 8.) Figure 8 Configuring Access Rules For more information on configuring the ASA to integrate with TrustSec, see the following URL: http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config /aaa_trustsec.html 14 Solution Component Implementation IPS Protection The Single Site Clustering with Cscio TrustSec Technology Solution leverages the ASA Next Generation Firewall with IPS module to deliver most of the protection capabilities of the solution. Although TrustSec’s security group access control lists (SGACLs) also provide significant protection capabilities in the switching fabric, TrustSec is discussed in the provisioning section because of its ability to consolidate policies from a provisioning perspective. The IPS uses Cisco Security Intelligence Operations (SIO) cloud-based threat intelligence to simplify operations and creates a system that keeps itself updated. There is no configuration sync or state sharing between IPS modules. Some IPS signatures require IPS to keep the state across multiple connections. For example, the port scanning signature is used when the IPS module detects that someone is opening many connections to one server but with different ports. In clustering, those connections are balanced between multiple ASA devices, each of which has its own IPS module. Because these IPS modules do not share state information, the cluster may not be able to detect port scanning as a result. Not all IPS alerts are actionable, if detecting subtle port scanning is required, Cisco recommends that signatures be tuned across all of the IPS modules in the cluster to accommodate for these types of detection activities. These changes can be performed using Cisco Security Manager and a common policy for the IPS modules; customizations would include dividing the event count triggers by the number of systems in the cluster for the desired signatures. For more information on IPS signatures, see the IPS Sensor CLI Configuration Guide at the following URL: http://www.cisco.com/c/en/us/td/docs/security/ips/7-2/configuration/guide/cli/cliguide72/cli_signature _definitions.html The ASA IPS module runs as a separate application from the ASA. Traffic goes through the firewall before being forwarded to the ASA IPS module. When traffic is identified for IPS inspection on the ASA, traffic flows through the ASA and then the IPS module. Traffic to the ASA IPS module was configured using inline mode. This mode places the ASA IPS module directly in the traffic flow (see Figure 9). No traffic that is identify for IPS inspection can continue through the ASA without first passing through, and being inspected by, the ASA IPS module. This mode is the most secure because every packet identified for inspection is analyzed before being allowed through. Also, the ASA IPS module can implement a blocking policy on a packet-by-packet basis. This mode, however, can affect throughput. 15 Solution Component Implementation Figure 9 Inline Mode ASA Main System Firewall Policy inside VPN Decryption outside Block IPS inspection IPS 251157 Diverted Traffic IPS Security Policies You can create multiple security policies and apply them to individual virtual sensors. A security policy is made up of a signature definition policy, an event action rules policy, and an anomaly detection policy. Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy called rules0, and a default anomaly detection policy called ad0. You can assign the default policies to a virtual sensor or you can create new policies. The use of multiple security policies lets you create security policies based on different requirements and then apply these customized policies per VLAN or physical interface. You can also apply the same policy instance, for example, sig0, rules0, or ad0, to different virtual sensors. You can assign interfaces, inline interface pairs, inline VLAN pairs, and VLAN groups to a virtual sensor. For this validation, all traffic was designated to pass through the IPS inspection module using the default global policy and no virtual sensor. The following sample commands show the IPS being implemented in inline mode on the ASA context, and the feature of failing open in the event of a module problem. policy-map global-policy class class-default ips inline fail-open On the IPS, the sensor is configured to use the default virtual-sensor in detect mode and use the backplane port-channel interface. service analysis-engine virtual-sensor vs0 anomaly-detection operational-mode detect exit physical-interface PortChannel0/0 16 Solution Component Implementation Understanding Global Correlation Global correlation enables the IPS sensors to be aware of network devices with a reputation for malicious activity, and enables them to take action against them. Participating IPS devices in a centralized Cisco threat database, the SensorBase Network, receive and absorb global correlation updates. The reputation information contained in the global correlation updates is factored into the analysis of network traffic, which increases IPS efficacy, because traffic is denied or allowed based on the reputation of the source IP address. The participating IPS devices send data back to the Cisco SensorBase Network, which results in a feedback loop that keeps the updates current and global. The sensor can participate in the global correlation updates and/or in sending telemetry data. Reputation scores in events can be viewed showing the reputation score of the attacker. Statistics from the reputation filter are also available. For enterprise data centers that allow connections from the Internet, the Cisco SIO service provides for global reputation and correlation relevant information to the IPS inspections. To configure global correlation features, follow these steps in the IPS module: service global-correlation global-correlation-inspection on global-correlation-inspection-influence standard reputation-filtering on test-global-correlation on For more information on Cisco IPS and Global Correlation, see the following URL: http://www.cisco.com/c/en/us/td/docs/security/ips/7-1/configuration/guide/cli/cliguide71/cli_collabora tion.html For more information on SIO, see the following URL: http://tools.cisco.com/security/center/home.x Cisco TrustSec The Single Site Clustering with Cisco TrustSec Technology Solution uses key technologies provided by Cisco TrustSec to bring typically disparate data center functions together for simplified provisioning and management. This enables you to bring the ISE, Cisco Security Manager, Cisco UCS Director, and the Cisco Nexus Switching Fabric together to participate in securing the data center. Cisco TrustSec Solution The Cisco TrustSec solution (see Figure 10) provides the customer with the ability to create policies to map end users, or consumers, to data center assets, or servers and applications. Typical policies for securing the data center are the 5-tuple or even recently, context-based policies. These policies have been placed at the edge of the data center in a border-based architecture. TrustSec enables you to create policies that are much deeper than just roles based or a 5-tuple-based approach, all while keeping a defense-in-depth architecture with enforcement points integrated throughout the fabric. Using the TrustSec SGTs and the advance policy capability, you can also leverage TrustSec at the data center virtualization layer to enable separation for your secure containers. For further details and comprehensive information about deploying TrustSec solutions, see the following URL: http://www.cisco.com/go/trustsec. 17 Solution Component Implementation Figure 10 Cisco TrustSec TrustSec Policies Active Directory Environment Data Secure Secure Group Name Group Tag HR 10 20 Engineering 30 John Doe 40 Web Server 50 Email Server ASA Cluster with IPS Cisco Security Manager Alerts API User Identity est equ R ta S Da DIU ent RA m n viro SXP En Master SEA Flexpod RADIUS Identity Services Engine Environment Data SXP Nexus 7k Secure Group Tag 10 20 30 IP Address 1.1.1.1 2.2.2.2 3.3.3.3 347924 User On-boarding Cisco Identity Service Engine Cisco Identity Services Engine (ISE) is an access control system. It provides authentication, authorization, and accounting (AAA) services for a variety of external actors. In the CTS architecture, it has the role of authentication and authorization server. In Figure 11, the ISE provides several key roles to the implementation of TrustSec in the data center: • End-user authentication • TrustSec device enrollment and authorization (switches, firewalls, management platforms) • Establishment and central management of SGTs • Establishment and management of roles-based policies • Propagates environment data (secure groups, secure group names, SGACLs) • Manages change of authorizations (CoAs) The ISE performs other functions, but these are of most interest and relevance to the Secure Data Center for the Enterprise solution. ISE installation was accomplished using the Cisco Identity Services Engine Installation and Upgrade Guides available at the following URL: http://www.cisco.com/c/en/us/support/security/identity-services-engine/products-installation-guides-li st.html. Installation was deployed using a pair of VMs because the laboratory utilizations are very low. Typical enterprise deployments should be on dedicated ISE hardware and scaled to meet enterprise requirements. Each RADIUS client must be added to the ISE network devices as shown in Figure 11. Within Cisco ISE, navigate to Administration> Network Resources > Network Devices. 18 Solution Component Implementation Figure 11 ISE Network Devices Add devices as follows: Procedure Step 1 Click Add. Step 2 Enter the device name and an IP address. Step 3 Under Network Device Group, select the Location and Device Type. Step 4 Scroll down and check the box for Authentication Settings, and configure the shared secret. Step 5 Scroll down and check the box for Security Group Access (SGA). Check the box to use the Device ID for SGA Identification, and configure the password to be used by the device during registration. Step 6 Scroll down and check the box for Device Configuration Deployment. Fill in the exec mode username and password. This step is necessary for deploying the IP/hostname-to-SGT mapping. Step 7 Click Submit. Figure 12 shows the configuration of the ASA Enclave 1, and Figure 13 shows the configuration of the Nexus 7000. 19 Solution Component Implementation 20 Figure 12 ISE ASA Context Device Figure 13 ISE Nexus 7000 Device Solution Component Implementation Each of the ASA contexts in the cluster is configured to communicate with the ISE server, as shown previously in the “ASA Security Policy” section on page 13. The Nexus 1000v and 7000 are both configured to join the Cisco TrustSec domain and receive the SGT PAC files. Procedure Step 1 First, configure the ISE RADIUS group as follows: radius-server host 172.26.164.187 key 7 <removed> authentication accounting radius-server host 172.26.164.239 key 7 <removed> authentication accounting aaa group server radius ISE-Radius-Grp server 172.26.164.187 server 172.26.164.239 use-vrf management source-interface mgmt0 Step 2 After the ISE RADIUS group is configured, next configure the Authentication and Authorization actions: aaa authentication dot1x default group ISE-Radius-Grp aaa accounting dot1x default group ISE-Radius-Grp aaa authorization cts default group ISE-Radius-Grp Step 3 Finally, configure the switch to join the Cisco TrustSec domain. This command invokes device registration with Cisco ISE and forces a PAC download. Make sure the device-id matches the name entry in Cisco ISE. cts device-id k02-fp-sw-a password 7 <removed> For more information on configuring TrustSec on Nexus devices, see the NX-OS Security Configuration Guide at the following URLs: • http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/products-installation-an d-configuration-guides-list.html • http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/6_x/nx-os/security/configuration/guide /b_Cisco_Nexus_7000_NX-OS_Security_Configuration_Guide__Release_6-x/b_Cisco_Nexus_70 00_NX-OS_Security_Configuration_Guide__Release_6-x_chapter_01101.html Secure Group Tags The Cisco ISE enables end-to-end policies enforced on the basis of role-based access-control lists (RBACLs). Device and user credentials acquired during authentication are used to classify packets by security groups. Every packet entering the Cisco TrustSec domain is tagged with a secure group tag (SGT). The SGT identifies the packet as belonging to either a user or an asset in the data so that policy enforcement can be applied to the packet at the appropriate enforcement point or be processed by advance processing in the ASA 5585-X. Tagging helps trusted intermediaries identify the source identity of the packet and enforce security policies along the data path. An SGT is assigned to a device through IEEE 802.1X authentication, web authentication, or MAC authentication bypass (MAB), which happens with a RADIUS vendor-specific attribute. An SGT can be assigned statically to a particular IP address or to a switch interface. An SGT is passed along dynamically to a switch or access point after successful authentication. 21 Solution Component Implementation Table 2 lists examples of secure group names and their respective SGTs. Table 2 Secure Group Names and Secure Group Tags Secure Group Name HR Secure Group Tag 10 Engineering 20 John Doe 30 Web server 40 Email server 50 SGT Exchange Protocol SGT Exchange Protocol (SXP) is a protocol developed for Cisco TrustSec to propagate the IP-to-SGT mapping database across network devices that do not have SGT-capable hardware support to hardware that supports SGTs and security group access lists. Typically, SXP is conceived as the protocol between the switches that is used to map SGTs to IP addresses. SXP, a control plane protocol, passes IP-SGT mappings from authentication points (such as legacy access layer switches) to upstream switches and authenticated devices in the network. The SXP connections are point-to-point and use TCP as the underlying transport protocol. SXP uses the well-known TCP port number 64999 when initiating a connection. In Figure 14, SXP flows between the Nexus 7000 and the ASA 5585-X, the Nexus 5000 access switch, and the Nexus 1000V. 22 Solution Component Implementation Figure 14 Cisco TrustSec The Nexus 5000 and the Nexus 1000V act as “speakers” and send the SGT and IP address mapping back to the Nexus 7000 via SXP. The Nexus 7000 then sends the SGT-to IP address map to the ASA 5585-X, again via SXP. Table 3 lists examples of SGTs and their respective IP addresses. Table 3 Secure Group Tags and IP Addresses Secure Group Tag 10 IP Address 1.1.1.1 20 2.2.2.2 30 3.3.3.3 Cisco Security Manager Cisco Security Manager manages the policies on the ASAs as would be expected in a traditional deployment model. Security group awareness is integrated into several existing firewall rules; there is no unique TrustSec firewall policy. Security groups are downloaded from the ISE in the environment data after the Cisco Security Manager has established a secure connection and imported a PAC file from the ISE. As described above, the Cisco Security Manager issues a request for the TrustSec environment data, 23 Solution Component Implementation which includes the secure group table mapping secure group names to secure group numbers and are presented as secure group objects. After the environment data is downloaded, creating policies for the firewall is similar to creating extended ACLs. All of the TrustSec and SGT Exchange Protocol configurations described earlier can be managed through common policies in Cisco Security Manager. For more information for using Cisco Security Manager and TrustSec, see Chapter 14 of the User Guide at the following URL: http://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security _manager/4-4/user/guide/CSMUserGuide_wrapper.pdf TrustSec Enforcement In the Cisco TrustSec solution, enforcement devices use a combination of user attributes and end-point attributes to make role-based and identity-based access control decisions. Security group access transforms a topology-aware network into a role-based network, thus enabling end-to-end policies enforced on the basis of RBACLs. Tagged traffic is blocked by the closest device to the source of the traffic that is able to perform enforcement. 24 Validation Testing Validation Testing Summary of Tests Performed These test are designed to validate the integration and general functionality of the Secure Data Center design. The common structure of the architecture is based on Cisco’s integrated reference architectures. Table 4 outlines the various tests conducted to validate the deployment. Table 4 Test Scenarios Test Physical Cisco ASA failure and recovery—Clustered mode Methodology In this failure scenario, Cisco manually removed and recovered power from one of the slave ASA nodes in the cluster. Fail slave Physical Cisco ASA failure and recovery—Clustered mode In this failure scenario, Cisco manually removed and recovered power from the Master ASA node in the cluster. Fail master Physical Cisco ASA failure and recovery—Clustered mode IPS module ASA Cluster Data Link failures—Master and slave In this failure scenario, Cisco manually removed and reinserted an active IPS processor blade from a alave ASA node in the cluster. Fail and recover the following links: • Fail a data link to the master • Fail both data links to the master • Fail a data link to a slave • Fail both data links to a slave Fail a data link to the master, and verify SXP communication switches to the new master elected Fail and recover the following links: • ASA Cluster Control Link failures —Master and slave • Fail a cluster link to the master • Fail both cluster links to the master • Fail a cluster link to a slave Fail both cluster links to a slave Confirm SXP configuration across the infrastructure between the following devices: • SXP data propagation • Nexus 1000v and Nexus 7000 Nexus 7000 and ASA virtual context Confirm that the SGT tag is maintained across the enclave infrastructure. This requires data captures of the ingress and egress of the enclave components, including: • SGT integrity • Nexus 1000v and Nexus 7000 • ASA virtual context • ASAv 25 Validation Testing Table 4 Test Scenarios (continued) Intra-enclave communication Flows within each enclave models are verified point-to-point within the infrastructure. Uniform traffic patterns and then security policy is critical to SEA for each enclave. Steps include: • Baseline traffic established Connections mapped through the enclave Ensure centralized management access via private VLAN and firewall access control rules Asymmetric traffic flows are introduced to the test bed. Ensure the ASA implementation properly manages these flows. Traffic flows are passed through the IPS ASA Cluster configuration. Validate integrity of flow and ability to enforce policy based on SIO data. Confirm integration of the Cisco Security Manager • Management traffic flows Asymmetric traffic flow validation Validate integrity of IPS serviced flows Cisco Security Manager integration • ASA cluster and HA pair management – Virtual context discovery – Virtual context management • ISE integration – Security object learning Cisco Identity Services Engine (ISE) integration Confirm integration of the ISE with the components listed below. • ISE authentication and authorization services across the infrastructure – Nexus switching – UCS domain – ASA platforms – StealthWatch System • Directory service integration – Microsoft Active Directory Services • 26 Security Object Modeling and Security Group ACLs Validation Testing Summary of Results Table 5 lists the summary of test results. Table 5 Summary of Results Test Description Components Physical Cisco ASA Cluster Cisco ASA5585 failure and recovery (Fail Slave) Cisco Security Manager and (Fail Master) Spirent Cisco ASA behavior after IPS Cisco ASA5585 IPS module failure and recovery Cisco Security Manager and (Fail Slave) (Fail Master) Spirent Cisco ASA link failure on Cisco ASA5585 data/clustering link Cisco Security Manager and Spirent Cisco ASA management link Cisco ASA5585 failure Cisco Security Manager and Spirent TrustSec SXP recovery after Cisco ASA5585, ISE, 7000, cluster failure Cisco Security Manager Result No traffic interruption and notification syslog output with acceptable packet loss Verify NetFlow activity and collection All the NetFlow data has been transmitted and collected Cisco ASA5585, 7000 and NGA, Lancope ASA unit that contains the failed IPS module leaves the cluster No traffic interruption and notification syslog output with acceptable packet loss ASA unit with failed management interface leaves the cluster SXP communication reestablished with new master ASA 27 Conclusion Conclusion The Secure Data Center the Enterprise: Single Site Clustering with Cisco TrustSec Technology Solution is a Cisco Validated Design that enables customers to confidently integrate Cisco’s security portfolio to respond to the increasing sophisticated attacks being targeted at the data center. This solution is made even stronger when customers also leverage the Secure Enclaves Architecture for securing the workloads, and leverage the Cyber Threat Defense for Data Center solution for enabling behavioral analysis, which provides zero day mitigation protections in the data center. 28 Appendix A—References Appendix A—References • Access Control Using Security Group Firewall—Aaron Woolan, Cisco.com • Cisco TrustSec How-To Guide: Server-to-Server Segmentation Using SGA—Aaron Woolan, Cisco.com • Data Center Security Design Guide—Mike Storm • Cisco ASA Series CLI Configuration Guides • Cisco Adaptive Security Appliance Cluster Deployment Guide—Mason Harris, David Anderson, Mike Storm 29 Appendix B—Device Configurations Appendix B—Device Configurations ASA Cluster Configurations System Context ASA-1 ASA Version 9.1(4) <system> ! hostname K02-ASA-Cluster domain-name corp.sea9.com enable password <REMOVED> encrypted mac-address auto prefix 1 ! interface GigabitEthernet0/0 shutdown ! interface GigabitEthernet0/1 shutdown ! interface GigabitEthernet0/2 shutdown ! interface GigabitEthernet0/3 shutdown ! interface GigabitEthernet0/4 shutdown ! interface GigabitEthernet0/5 shutdown ! interface Management0/0 ! interface Management0/0.101 description ** Enclave 1 Mgmt ** vlan 101 ! interface Management0/0.102 vlan 102 ! interface Management0/0.103 vlan 103 ! interface Management0/0.164 description ** Flash Interface ** vlan 164 ! interface Management0/1 ! interface TenGigabitEthernet0/6 description N7k-a-T4/6 –vPC21 channel-group 1 mode active ! interface TenGigabitEthernet0/7 description N7k-b-T4/6 –vPC21 channel-group 1 mode active ! interface TenGigabitEthernet0/8 30 Appendix B—Device Configurations channel-group 2 mode active vss-id 1 ! interface TenGigabitEthernet0/9 channel-group 2 mode active vss-id 2 ! interface GigabitEthernet1/0 shutdown ! interface GigabitEthernet1/1 shutdown ! interface GigabitEthernet1/2 shutdown ! interface GigabitEthernet1/3 shutdown ! interface GigabitEthernet1/4 shutdown ! interface GigabitEthernet1/5 shutdown ! interface TenGigabitEthernet1/6 shutdown ! interface TenGigabitEthernet1/7 shutdown ! interface TenGigabitEthernet1/8 shutdown ! interface TenGigabitEthernet1/9 shutdown ! interface Port-channel1 description Clustering Control Interface ! interface Port-channel2 description Cluster Spanned Data Link to PC-20 port-channel span-cluster vss-load-balance ! interface Port-channel2.200 description Uplink network vlan 200 ! interface Port-channel2.2001 description Enclave1-outside vlan 2001 ! interface Port-channel2.2002 description Enclave2-outside vlan 2002 ! interface Port-channel2.2003 description Enclave3-outside vlan 2003 ! interface Port-channel2.3001 description Enclave1-inside vlan 3001 ! interface Port-channel2.3002 description Enclave2-inside 31 Appendix B—Device Configurations vlan 3002 ! interface Port-channel2.3003 description Enclave3-inside vlan 3003 ! class default limit-resource Mac-addresses 65535 limit-resource All 0 limit-resource ASDM 5 limit-resource SSH 5 limit-resource Telnet 5 ! boot system disk0:/asa914-smp-k8.bin ftp mode passive clock timezone EST -5 clock summer-time EDT recurring cluster group K02-SEA key ***** local-unit ASA-1 cluster-interface Port-channel1 ip 192.168.20.101 255.255.255.0 priority 1 console-replicate health-check holdtime 3 clacp system-mac auto system-priority 1 enable conn-rebalance frequency 3 pager lines 24 mtu cluster 9000 no failover asdm image disk0:/asdm-714.bin no asdm history enable arp timeout 14400 no arp permit-nonconnected console timeout 0 ! tls-proxy maximum-session 11000 ! admin-context admin context admin allocate-interface Management0/0.164 config-url disk0:/admin.cfg ! context Enclave1 description Secure Enclave 1 allocate-interface Management0/0.101 Mgmt101 allocate-interface Port-channel2.2001 outside allocate-interface Port-channel2.3001 inside config-url disk0:/enclave1.cfg ! context Enclave2 description Secure Enclave 2 allocate-interface Management0/0.102 Mgmt102 allocate-interface Port-channel2.2002 outside allocate-interface Port-channel2.3002 inside config-url disk0:/enclave2.cfg ! context Enclave3 description Secure Enclave 3 32 Appendix B—Device Configurations allocate-interface Management0/0.103 mgmt103 allocate-interface Port-channel2.2003 outside allocate-interface Port-channel2.3003 inside config-url disk0:/Enclave3.cfg ! prompt hostname context ! jumbo-frame reservation ! no call-home reporting anonymous Cryptochecksum:6b81be0e4ef0f963efbcb3219464df7f : end System Context ASA-3 ASA Version 9.1(4) <system> ! hostname K02-ASA-Cluster domain-name corp.sea9.com enable password <removed> encrypted mac-address auto prefix 1 ! interface GigabitEthernet0/0 shutdown ! interface GigabitEthernet0/1 shutdown ! interface GigabitEthernet0/2 shutdown ! interface GigabitEthernet0/3 shutdown ! interface GigabitEthernet0/4 shutdown ! interface GigabitEthernet0/5 shutdown ! interface Management0/0 ! interface Management0/0.101 description ** Enclave 1 Mgmt ** vlan 101 ! interface Management0/0.102 vlan 102 ! interface Management0/0.103 vlan 103 ! interface Management0/0.164 description ** Flash Interface ** vlan 164 ! interface Management0/1 ! interface TenGigabitEthernet0/6 description N7k-a-T4/6 -vPC3 33 Appendix B—Device Configurations channel-group 1 mode active ! interface TenGigabitEthernet0/7 description N7k-b-T4/6 -vPC3 channel-group 1 mode active ! interface TenGigabitEthernet0/8 channel-group 2 mode active vss-id 1 ! interface TenGigabitEthernet0/9 channel-group 2 mode active vss-id 2 ! interface GigabitEthernet1/0 shutdown ! interface GigabitEthernet1/1 shutdown ! interface GigabitEthernet1/2 shutdown ! interface GigabitEthernet1/3 shutdown ! interface GigabitEthernet1/4 shutdown ! interface GigabitEthernet1/5 shutdown ! interface TenGigabitEthernet1/6 shutdown ! interface TenGigabitEthernet1/7 shutdown ! interface TenGigabitEthernet1/8 shutdown ! interface TenGigabitEthernet1/9 shutdown ! interface Port-channel1 description Clustering Interface ! interface Port-channel2 description Cluster Spanned Data Link to PC-20 port-channel span-cluster vss-load-balance ! interface Port-channel2.200 description Uplink network vlan 200 ! interface Port-channel2.2001 description Enclave1-outside vlan 2001 ! interface Port-channel2.2002 description Enclave2-outside vlan 2002 ! interface Port-channel2.2003 description Enclave3-outside vlan 2003 34 Appendix B—Device Configurations ! interface Port-channel2.3001 description Enclave1-inside vlan 3001 ! interface Port-channel2.3002 description Enclave2-inside vlan 3002 ! interface Port-channel2.3003 description Enclave3-inside vlan 3003 ! class default limit-resource Mac-addresses 65535 limit-resource All 0 limit-resource ASDM 5 limit-resource SSH 5 limit-resource Telnet 5 ! boot system disk0:/asa914-smp-k8.bin ftp mode passive clock timezone EST -5 clock summer-time EDT recurring cluster group K02-SEA key ***** local-unit ASA-3 cluster-interface Port-channel1 ip 192.168.20.103 255.255.255.0 priority 3 console-replicate health-check holdtime 3 clacp system-mac auto system-priority 1 enable conn-rebalance frequency 3 pager lines 24 mtu cluster 9000 no failover asdm image disk0:/asdm-714.bin no asdm history enable arp timeout 14400 no arp permit-nonconnected console timeout 0 ! tls-proxy maximum-session 11000 ! admin-context admin context admin allocate-interface Management0/0.164 config-url disk0:/admin.cfg ! context Enclave1 description Secure Enclave 1 allocate-interface Management0/0.101 Mgmt101 allocate-interface Port-channel2.2001 outside allocate-interface Port-channel2.3001 inside config-url disk0:/enclave1.cfg ! context Enclave2 description Secure Enclave 2 allocate-interface Management0/0.102 Mgmt102 allocate-interface Port-channel2.2002 outside 35 Appendix B—Device Configurations allocate-interface Port-channel2.3002 inside config-url disk0:/enclave2.cfg ! context Enclave3 description Secure Enclave 3 allocate-interface Management0/0.103 mgmt103 allocate-interface Port-channel2.2003 outside allocate-interface Port-channel2.3003 inside config-url disk0:/Enclave3.cfg ! prompt hostname context ! jumbo-frame reservation ! no call-home reporting anonymous Cryptochecksum:faca7e6346ac9c9355f24f0011b0e902 : end K02-ASA-Cluster# Admin Context ASA Version 9.1(4) <context> ! hostname admin enable password <removed> encrypted names ip local pool K02-SEA 172.26.164.157-172.26.164.160 mask 255.255.255.0 ! interface Management0/0.164 management-only nameif management security-level 0 ip address 172.26.164.191 255.255.255.0 cluster-pool K02-SEA ! pager lines 21 logging enable logging standby logging buffer-size 128000 logging asdm-buffer-size 512 logging console notifications logging monitor notifications logging asdm informational logging facility 16 no logging message 106015 no logging message 313001 no logging message 313008 no logging message 106023 no logging message 710003 no logging message 106100 no logging message 302015 no logging message 302014 no logging message 302013 no logging message 302018 no logging message 302017 no logging message 302016 no logging message 302021 no logging message 302020 flow-export destination management 172.26.164.240 2055 36 Appendix B—Device Configurations flow-export template timeout-rate 1 mtu management 1500 icmp unreachable rate-limit 1 burst-size 1 icmp permit any management no asdm history enable arp timeout 14400 route management 0.0.0.0 0.0.0.0 172.26.164.254 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 aaa-server ISE_Radius_Group protocol radius aaa-server ISE_Radius_Group (management) host 172.26.164.187 key ***** radius-common-pw ***** aaa-server ISE_Radius_Group (management) host 172.26.164.239 key ***** radius-common-pw ***** user-identity default-domain LOCAL aaa authentication enable console ISE_Radius_Group LOCAL aaa authentication ssh console ISE_Radius_Group LOCAL aaa authentication http console ISE_Radius_Group LOCAL aaa authentication serial console ISE_Radius_Group LOCAL aaa accounting enable console ISE_Radius_Group aaa accounting serial console ISE_Radius_Group aaa accounting ssh console ISE_Radius_Group aaa local authentication attempts max-fail 3 aaa authorization exec authentication-server http server enable http 0.0.0.0 0.0.0.0 management no snmp-server location no snmp-server contact crypto ipsec security-association pmtu-aging infinite telnet timeout 5 ssh 0.0.0.0 0.0.0.0 management ssh timeout 60 ssh version 2 ssh key-exchange group dh-group1-sha1 threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200 ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect ip-options inspect netbios inspect rsh inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect xdmcp 37 Appendix B—Device Configurations class class-default user-statistics accounting flow-export event-type all destination 172.26.164.240 ! service-policy global_policy global Cryptochecksum:85251c60c289c64cb8331d05b632c278 : end Enclave1 Context K02-ASA-Cluster/Enclave1# sh run : Saved : ASA Version 9.1(4) <context> ! firewall transparent hostname Enclave1 domain-name corp.sea9.com enable password <removed> encrypted passwd <removed> encrypted names ip local pool enclave1-pool 10.0.101.101-10.0.101.108 mask 255.255.255.0 ! interface BVI1 description Enclave1 ip address 10.1.1.251 255.255.255.0 ! interface Mgmt101 description Enclave 1 Management my management-only nameif management security-level 0 ip address 10.0.101.100 255.255.255.0 cluster-pool enclave1-pool ! interface outside nameif outside bridge-group 1 security-level 0 ! interface inside nameif inside bridge-group 1 security-level 100 ! dns domain-lookup management dns server-group DefaultDNS name-server 172.26.164.190 domain-name corp.sea9.com object network Management subnet 172.26.164.0 255.255.255.0 object network Enclave1-Mgmt-IP host 10.0.101.100 description Enclave 1 Managment IP address access-list CSM_FW_ACL_ extended permit icmp 10.10.66.0 255.255.255.0 10.1.1.0 255.255.255.0 access-list CSM_FW_ACL_ extended permit tcp 10.10.66.0 255.255.255.0 10.1.1.0 255.255.255.0 eq www access-list CSM_FW_ACL_ extended permit tcp 10.10.66.0 255.255.255.0 10.1.1.0 255.255.255.0 eq ftp access-list CSM_FW_ACL_ extended permit icmp 10.1.1.0 255.255.255.0 10.10.66.0 255.255.255.0 38 Appendix B—Device Configurations access-list CSM_FW_ACL_ extended permit tcp 10.1.1.0 255.255.255.0 10.10.66.0 255.255.255.0 eq www access-list CSM_FW_ACL_ extended permit tcp 10.1.1.0 255.255.255.0 10.10.66.0 255.255.255.0 eq ftp access-list CSM_FW_ACL_ extended permit ip security-group name SGT_1001_Enclave1 any security-group name enc1_30012_priv any access-list CSM_TFW_ACL_INBOUND_1 ethertype permit bpdu pager lines 24 logging enable no logging message 106015 no logging message 313001 no logging message 313008 no logging message 106023 no logging message 710003 no logging message 106100 no logging message 302015 no logging message 302014 no logging message 302013 no logging message 302018 no logging message 302017 no logging message 302016 no logging message 302021 no logging message 302020 flow-export destination management 172.26.164.240 2055 flow-export template timeout-rate 1 mtu management 1500 mtu outside 1500 mtu inside 1500 icmp unreachable rate-limit 1 burst-size 1 icmp permit any management icmp permit any outside icmp permit any inside no asdm history enable arp timeout 14400 access-group CSM_TFW_ACL_INBOUND_1 in interface outside access-group CSM_TFW_ACL_INBOUND_1 in interface inside access-group CSM_FW_ACL_ global route outside 0.0.0.0 0.0.0.0 10.1.1.254 1 route management 172.26.164.0 255.255.255.0 10.0.101.254 1 route management 192.168.250.18 255.255.255.255 10.0.101.254 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 aaa-server ISE_Radius_Group protocol radius aaa-server ISE_Radius_Group (management) host 172.26.164.187 key ***** radius-common-pw ***** aaa-server ISE_Radius_Group (management) host 172.26.164.239 key ***** radius-common-pw ***** cts server-group ISE_Radius_Group cts sxp enable cts sxp default password ***** cts sxp default source-ip 10.0.101.100 cts sxp connection peer 172.26.164.218 password default mode local listener cts sxp connection peer 172.26.164.217 password default mode local listener user-identity default-domain LOCAL aaa authentication enable console ISE_Radius_Group LOCAL aaa authentication http console ISE_Radius_Group LOCAL 39 Appendix B—Device Configurations aaa authentication ssh console ISE_Radius_Group LOCAL aaa accounting enable console ISE_Radius_Group aaa accounting ssh console ISE_Radius_Group aaa local authentication attempts max-fail 3 http server enable http 0.0.0.0 0.0.0.0 management no snmp-server location no snmp-server contact crypto ipsec security-association pmtu-aging infinite telnet timeout 5 ssh 172.26.164.0 255.255.255.0 management ssh timeout 5 ssh key-exchange group dh-group1-sha1 no threat-detection statistics tcp-intercept ! ! ! policy-map global-policy class class-default flow-export event-type all destination 172.26.164.240 ips inline fail-open ! service-policy global-policy global Cryptochecksum:bf5cfdd35116e819b568aef07919ffa0 : end Enclave 3 Context K02-ASA-Cluster/Enclave3# sh run : Saved : ASA Version 9.1(4) <context> ! hostname Enclave3 enable password <removed> encrypted names ip local pool enclave3-pool 10.0.103.101-10.0.103.108 mask 255.255.255.0 ! interface mgmt103 management-only nameif mgmt security-level 0 ip address 10.0.103.100 255.255.255.0 cluster-pool enclave3-pool ! interface outside nameif outside security-level 0 ip address 10.3.0.254 255.255.255.0 ! interface inside nameif inside security-level 100 ip address 10.3.1.254 255.255.255.0 ! access-list CSM_FW_ACL_ extended permit icmp 10.10.66.0 255.255.255.0 10.3.1.0 255.255.255.0 access-list CSM_FW_ACL_ extended permit tcp 10.10.66.0 255.255.255.0 10.3.1.0 255.255.255.0 eq ftp access-list CSM_FW_ACL_ extended permit tcp 10.10.66.0 255.255.255.0 10.3.1.0 255.255.255.0 eq www access-list CSM_FW_ACL_ extended permit icmp 10.3.1.0 255.255.255.0 10.10.66.0 255.255.255.0 40 Appendix B—Device Configurations access-list CSM_FW_ACL_ extended permit tcp 10.3.1.0 255.255.255.0 10.10.66.0 255.255.255.0 eq ftp access-list CSM_FW_ACL_ extended permit tcp 10.3.1.0 255.255.255.0 10.10.66.0 255.255.255.0 eq www access-list CSM_FW_ACL_ extended permit icmp any any pager lines 24 logging enable mtu inside 1500 mtu outside 1500 mtu mgmt 1500 icmp unreachable rate-limit 1 burst-size 1 icmp permit any inside icmp permit any outside icmp permit any mgmt no asdm history enable arp timeout 14400 access-group CSM_FW_ACL_ global route outside 0.0.0.0 0.0.0.0 10.3.0.1 1 route mgmt 172.26.164.0 255.255.255.0 10.0.103.254 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 aaa-server ISE_Radius_Group protocol radius aaa-server ISE_Radius_Group (inside) host 172.26.164.187 key ***** radius-common-pw ***** aaa-server ISE_Radius_Group (inside) host 172.26.164.239 key ***** radius-common-pw ***** cts server-group ISE_Radius_Group cts sxp enable cts sxp default password ***** cts sxp default source-ip 10.0.103.100 cts sxp connection peer 172.26.164.218 source 10.0.103.100 password default mode local listener cts sxp connection peer 172.26.164.217 source 10.0.103.100 password default mode local listener user-identity default-domain LOCAL aaa authentication enable console ISE_Radius_Group LOCAL aaa authentication http console ISE_Radius_Group LOCAL aaa authentication ssh console ISE_Radius_Group LOCAL aaa accounting enable console ISE_Radius_Group aaa accounting ssh console ISE_Radius_Group no snmp-server location no snmp-server contact auth-prompt prompt Enclave3 Context crypto ipsec security-association pmtu-aging infinite telnet timeout 5 ssh timeout 5 ssh key-exchange group dh-group1-sha1 no threat-detection statistics tcp-intercept ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto 41 Appendix B—Device Configurations message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect rsh inspect esmtp inspect sqlnet inspect sunrpc inspect xdmcp inspect netbios inspect tftp inspect ip-options class class-default ips inline fail-open ! service-policy global_policy global Cryptochecksum:02ed5d10127795179b0900f540e80f07 : end K02-ASA-Cluster/Enclave3# IPS Configuration sea-asaips-1# sh configuration ! -----------------------------! Current configuration last modified Fri Jan 17 19:57:45 2014 ! -----------------------------! Version 7.2(1) ! Host: ! Realm Keys key1.0 ! Signature Definition: ! Signature Update S771.0 2014-02-07 ! -----------------------------service interface exit ! -----------------------------service authentication exit ! -----------------------------service event-action-rules rules0 exit ! -----------------------------service host network-settings host-ip 172.26.164.195/24,172.26.164.254 host-name sea-asaips-1 telnet-option disabled sshv1-fallback enabled access-list 0.0.0.0/0 access-list 0.0.0.0/32 login-banner-text Connected to sea-asaips-1 dns-primary-server enabled address 172.26.164.190 exit dns-secondary-server disabled dns-tertiary-server disabled -proxy proxy-server address 64.102.255.40 port 8080 exit exit time-zone-settings 42 Appendix B—Device Configurations offset -5 standard-time-zone-name EST exit ntp-option enabled-ntp-unauthenticated ntp-server 172.26.164.254 exit summertime-option recurring summertime-zone-name EDT exit auto-upgrade cisco-server enabled schedule-option periodic-schedule start-time 00:00:00 interval 24 exit user-name bmcgloth exit exit exit ! -----------------------------service logger exit ! -----------------------------service network-access exit ! -----------------------------service notification exit ! -----------------------------service signature-definition sig0 variables ALLPORTS web-ports 0-65535 variables WEBPORTS web-ports 80-80,3128-3128,8000-8000,8010-8010,8080-8080,8888-8888,24326-24326 application-policy http-policy http-enable true aic-web-ports 80,3128,8000,8010,8080,8888,24326 exit exit signatures 2154 0 status enabled true exit exit signatures 64001 0 sig-description sig-name smb_nonstd_prt_1 exit engine fixed-tcp direction from-service max-payload-inspect-length 100 regex-string \xff[Ss][Mm][Bb] specify-service-ports yes service-ports 20,21,22,23,53,80,111,123,137,138,139,161,443,514,1433,1434 exit exit exit signatures 64003 0 sig-description sig-name snmp_nonstd_prt_1 exit engine fixed-udp event-action produce-alert max-payload-inspect-length 64 43 Appendix B—Device Configurations regex-string \x30[\x1A-\x7F]\x02\x01\[\x00\x01\x03] specify-service-ports yes service-ports 20,21,22,23,53,80,111,123,137,138,139,161,514,443,445,1433,1434 exit exit exit exit ! -----------------------------service ssh-known-hosts exit ! -----------------------------service trusted-certificates exit ! -----------------------------service web-server exit ! -----------------------------service anomaly-detection ad0 exit ! -----------------------------service external-product-interface exit ! -----------------------------service health-monitor exit ! -----------------------------service global-correlation global-correlation-inspection on global-correlation-inspection-influence standard reputation-filtering on test-global-correlation on exit ! -----------------------------service aaa exit ! -----------------------------service analysis-engine virtual-sensor vs0 anomaly-detection operational-mode detect exit physical-interface PortChannel0/0 exit exit sea-asaips-1# Nexus 7000 Configuration k02-n7k-a-k02-fp-sw-a# sh run !Command: show running-config !Time: Fri Feb 14 00:57:06 2014 version 6.1(2) switchname k02-fp-sw-a cfs ipv4 distribute cfs eth distribute feature private-vlan feature udld feature interface-vlan feature dot1x 44 Appendix B—Device Configurations feature hsrp feature lacp feature cts cts device-id k02-fp-sw-a password 7 <removed> cts role-based counters enable cts sxp enable cts sxp default password 7 <removed> cts sxp connection peer 10.0.101.100 source 172.26.164.218 password default mode listener cts sxp connection peer 10.0.102.100 source 172.26.164.218 password default mode listener cts sxp connection peer 10.0.103.100 source 172.26.164.218 password default mode listener cts sxp connection peer 172.26.164.18 source 172.26.164.218 password default mode speaker cts sxp connection peer 172.26.164.186 source 172.26.164.218 password default mode speaker cts sxp connection peer 192.168.250.22 source 192.168.250.252 password default mode listener cts role-based enforcement feature vpc feature pong logging level cts 6 logging level radius 6 username admin password 5 <removed> role vdc-admin username ise-user password 5 <removed> role vdc-operator ip domain-lookup ip domain-name corp.sea9.com ip name-server 172.26.164.190 use-vrf management radius-server key 7 <removed> radius distribute radius-server host 172.26.164.187 key 7 <removed> authentication accounting radius-server host 172.26.164.239 key 7 <removed> authentication accounting radius commit aaa group server radius ISE-Radius-Grp server 172.26.164.187 use-vrf management source-interface mgmt0 aaa group server radius aaa-private-sg server 172.26.164.187 use-vrf management source-interface mgmt0 system default switchport snmp-server user admin vdc-admin auth md5 <removed> priv <removed> localizedkey snmp-server user ise-user vdc-operator auth md5 0<removed> localizedkey rmon event 1 log trap public description FATAL(1) owner PMON@FATAL rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL rmon event 3 log trap public description ERROR(3) owner PMON@ERROR rmon event 4 log trap public description WARNING(4) owner PMON@WARNING rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO ntp distribute ntp server 172.26.164.20 use-vrf management ntp source-interface Vlan3250 ntp master 8 ntp commit aaa authentication login default group ISE-Radius-Grp aaa authentication dot1x default group ISE-Radius-Grp aaa accounting dot1x default group ISE-Radius-Grp aaa authorization cts default group ISE-Radius-Grp aaa accounting default group ISE-Radius-Grp no aaa user default-role ip route 10.0.0.0/16 172.26.164.254 ip route 10.3.0.0/16 10.3.0.254 name Enclave3 ip route 10.71.1.186/32 172.26.164.186 vrf context management ip route 0.0.0.0/0 172.26.164.254 vlan 1-2,20,98-99,200-219,666,2001-2019,3001-3019,3170-3173,3175-3179,3250-3251,3253-3255 45 Appendix B—Device Configurations vlan 2 name Native_VLAN vlan 20 name ASA-Cluster-Control vlan 98 name vsg-ha vlan 99 name vsg-data vlan 201 name NFS-Enclave1 vlan 202 name NFS-Enclave2 vlan 203 name NFS-Enclave3 vlan 204 name NFS-Enclave4 vlan 205 name NFS-Enclave5 vlan 206 name NFS-Enclave6 vlan 207 name NFS-Enclave7 vlan 208 name NFS-Enclave8 vlan 209 name NFS-Enclave9 vlan 666 name WAN-on7k vlan 2001 name D1-Enclave1 vlan 2002 name D1-Enclave2 vlan 2003 name D1-Enclave3 vlan 2004 name D1-Enclave4 vlan 2005 name D1-Enclave5 vlan 2006 name D1-Enclave6 vlan 2007 name D1-Enclave7 vlan 2008 name D1-Enclave8 vlan 2009 name D1-Enclave9 vlan 2010 name D1-Enclave10 vlan 2011 name D1-Enclave11 vlan 2012 name D1-Enclave12 vlan 2013 name D1-Enclave13 vlan 2014 name D1-Enclave14 vlan 2015 name D1-Enclave15 vlan 2016 name D1-Enclave16 vlan 2017 name D1-Enclave17 vlan 2018 name D1-Enclave18 46 Appendix B—Device Configurations vlan 2019 name D1-Enclave19 vlan 3001 name D2-Enclave1 vlan 3002 name D2-Enclave2 vlan 3003 name D2-Enclave3 vlan 3004 name D2-Enclave4 vlan 3005 name D2-Enclave5 vlan 3006 name D2-Enclave6 vlan 3007 name D2-Enclave7 vlan 3008 name D2-Enclave8 vlan 3009 name D2-Enclave9 vlan 3010 name D2-Enclave10 vlan 3011 name D2-Enclave11 vlan 3012 name D2-Enclave12 vlan 3013 name D2-Enclave13 vlan 3014 name D2-Enclave14 vlan 3015 name D2-Enclave15 vlan 3016 name D2-Enclave16 vlan 3017 name D2-Enclave17 vlan 3018 name D2-Enclave18 vlan 3019 name D2-Enclave19 vlan 3170 name NFS-VLAN vlan 3171 name core-services-primary private-vlan primary private-vlan association 3172 vlan 3172 name core-services-isolated private-vlan isolated vlan 3173 name vMotion-VLAN vlan 3175 name IB-MGMT-VLAN vlan 3176 name Packet-Control-VLAN vlan 3177 name infra-vtep-vxlan vlan 3178 name monitor-primary vlan 3179 name monitor-isolated vlan 3250 name sea-prod-mgmt vlan 3251 47 Appendix B—Device Configurations name vMotion vlan 3253 name prod-vtep-vxlan vlan 3254 name services vlan 3255 name services_HA spanning-tree port type edge bpduguard default spanning-tree port type edge bpdufilter default spanning-tree port type network default vpc domain 100 role priority 10 peer-keepalive destination 172.26.164.183 source 172.26.164.182 peer-gateway auto-recovery port-profile type port-channel UCS-FI switchport switchport mode trunk switchport trunk native vlan 2 spanning-tree port type edge trunk mtu 9216 switchport trunk allowed vlan 2,98-99,201-219,666,2001-2019,3001-3019 switchport trunk allowed vlan add 3170-3173,3175-3179,3250-3251,3253-3255 description <<**UCS Fabric Interconnect Port Profile **>> state enabled port-profile type ethernet Stand-alone-Management-Servers switchport spanning-tree port type edge trunk switchport trunk allowed vlan 98-99,3170-3173,3175-3179,3250,3254-3255 switchport trunk native vlan 2 mtu 9216 description <<** C-Series Management Server Profile **>> state enabled port-profile type ethernet Cloud-Services-Platforms switchport switchport mode trunk spanning-tree port type edge trunk switchport trunk allowed vlan 98-99,3175-3176,3250 description <<** CSP Port Profile **>> state enabled port-profile type port-channel FAS-Node switchport switchport mode trunk switchport trunk native vlan 2 spanning-tree port type edge trunk mtu 9216 switchport trunk allowed vlan 201-219,3170 description <<** NetApp FAS Node Port Profile **>> state enabled vlan 1 cts role-based vlan 2 cts role-based vlan 98 cts role-based vlan 99 cts role-based vlan 3009 cts role-based vlan 3170 cts role-based vlan 3173 48 enforcement enforcement enforcement enforcement enforcement enforcement Appendix B—Device Configurations cts role-based enforcement vlan 3175 cts role-based enforcement vlan 3177 cts role-based enforcement interface Vlan1 no ip redirects no ipv6 redirects interface Vlan5 no ip redirects no ipv6 redirects interface Vlan20 description <** ASA Cluster control **> no shutdown no ip redirects ip address 192.168.20.201/24 no ipv6 redirects interface Vlan200 description <** Enclave Uplink **> no shutdown no ip redirects ip address 10.10.0.3/24 no ipv6 redirects hsrp 1 authentication text c1sc0 preempt delay minimum 180 priority 25 forwarding-threshold lower 0 upper 0 timers 1 3 ip 10.10.0.1 interface Vlan666 no shutdown no ip redirects ip address 10.10.66.1/24 no ipv6 redirects interface Vlan2001 description <<** Enclave 1-outside**>> no shutdown no ip redirects ip address 10.1.1.252/24 no ipv6 redirects hsrp 1 authentication text c1sc0 preempt delay minimum 180 priority 15 forwarding-threshold lower 0 upper 0 timers 1 3 ip 10.1.1.254 interface Vlan2002 description <<** Enclave2-outside DGW **>> no shutdown no ip redirects ip address 10.10.2.201/24 no ipv6 redirects hsrp 1 authentication text c1sc0 preempt delay minimum 180 priority 25 forwarding-threshold lower 0 upper 0 49 Appendix B—Device Configurations timers 1 3 ip 10.10.2.1 interface Vlan2003 description <** Enclave 3-outside **> no shutdown no ip redirects ip address 10.3.0.3/24 no ipv6 redirects hsrp 1 authentication text c1sc0 preempt delay minimum 180 priority 15 forwarding-threshold lower 0 upper 0 timers 1 3 ip 10.3.0.1 interface Vlan3001 description <<** Enclave 1 Inside **>> no ip redirects no ipv6 redirects interface Vlan3002 description <<** VLAN 3002 Inside Enclave2 **>> no shutdown private-vlan mapping 32 no ip redirects no ipv6 redirects interface Vlan3009 description <<** Enclave 9 DGW - No ASA **>> no shutdown no ip redirects ip address 10.9.1.252/24 no ipv6 redirects hsrp 1 authentication text c1sc0 preempt delay minimum 180 priority 15 forwarding-threshold lower 0 upper 0 timers 1 3 ip 10.9.1.254 interface Vlan3171 private-vlan mapping 3172 ip address 192.168.0.3/24 no ipv6 redirects ip local-proxy-arp interface Vlan3175 no shutdown management no ip redirects ip address 172.26.164.218/24 no ipv6 redirects interface Vlan3250 description <** Production Management SVI **>> no shutdown no ip redirects ip address 192.168.250.252/24 no ipv6 redirects hsrp version 2 hsrp 1 authentication text c1sc0 preempt delay minimum 180 50 Appendix B—Device Configurations priority 15 forwarding-threshold lower 0 upper 0 timers 1 3 ip 192.168.250.1 interface port-channel8 description <<** NGA SPAN PORTS **>> switchport mode trunk switchport monitor interface port-channel9 switchport access vlan 3175 spanning-tree port type normal vpc 9 interface port-channel10 description <<** vPC peer-link **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 10,20,32,71,98-99,200-209,211-219 switchport trunk allowed vlan add 300-319,400-419,666,2001-2135,3001-3135 switchport trunk allowed vlan add 3170-3177,3250-3251,3253-3255 spanning-tree port type network vpc peer-link interface port-channel11 inherit port-profile FAS-Node description <<** fas_node1 **>> vpc 11 interface port-channel12 inherit port-profile FAS-Node description <<** fas_node2 **>> vpc 12 interface port-channel13 inherit port-profile UCS-FI description <<** k02-ucs-fab-a **> switchport mode trunk switchport trunk allowed vlan 2, 98-99, 201-219, 666, 2001-2019, 3001-3019 switchport trunk allowed vlan add 3170-3173, 3175-3179, 3250-3251, 3253-3255 spanning-tree port type edge trunk mtu 9216 vpc 13 interface port-channel14 inherit port-profile UCS-FI description <<** k02-ucs-fab-b **>> switchport mode trunk switchport trunk allowed vlan 2, 98-99, 201-219, 666, 2001-2019, 3001-3019 switchport trunk allowed vlan add 3170-3173, 3175-3179, 3250-3251, 3253-3255 spanning-tree port type edge trunk mtu 9216 vpc 14 interface port-channel20 description <<** k02-ASA-Cluster-Data **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 200,666,2001-2135,3001-3135 spanning-tree port type normal vpc 20 interface port-channel21 description <<** k02-ASA-1-Control **>> 51 Appendix B—Device Configurations switchport access vlan 20 spanning-tree port type normal no logging event port link-status no logging event port trunk-status vpc 21 interface port-channel22 description <<** k02-ASA-2-Control **>> switchport access vlan 20 spanning-tree port type normal vpc 22 interface port-channel23 description <<** k02-ASA-3-Control **>> switchport access vlan 20 spanning-tree port type normal vpc 23 interface port-channel24 description <<** k02-ASA-4-Control **>> switchport access vlan 20 spanning-tree port type normal vpc 24 interface port-channel3250 shutdown switchport mode trunk switchport trunk allowed vlan 3250 vpc 3250 interface Ethernet4/1 description <<** fas_node1:e3a **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 201-219,3170 mtu 9216 channel-group 11 mode active no shutdown interface Ethernet4/2 description <<** fas_node2:e3a **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 201-219,3170 mtu 9216 channel-group 12 mode active no shutdown interface Ethernet4/3 description <<** SEA Production Management **>> switchport mode trunk switchport trunk allowed vlan 3250 channel-group 3250 mode active no shutdown interface Ethernet4/4 interface Ethernet4/5 description <<** VPC Peer K02-ASA-1:T6 **>> switchport access vlan 20 spanning-tree port type normal channel-group 21 mode active no shutdown 52 Appendix B—Device Configurations interface Ethernet4/6 description <<** VPC Peer K02-ASA-2:T6 **>> switchport access vlan 20 spanning-tree port type normal channel-group 22 mode active no shutdown interface Ethernet4/7 description <<** VPC Peer K02-ASA-3:T6 **>> switchport access vlan 20 spanning-tree port type normal channel-group 23 mode active no shutdown interface Ethernet4/8 description <<** VPC Peer K02-ASA-4:T6 **>> switchport access vlan 20 spanning-tree port type normal channel-group 24 mode active no shutdown interface Ethernet4/9 description <<** VPC Peer K02-ASA-1:T8 **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 200,666,2001-2135,3001-3135 spanning-tree port type normal channel-group 20 mode active no shutdown interface Ethernet4/10 description <<** VPC Peer K02-ASA-2:T8 **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 200,666,2001-2135,3001-3135 spanning-tree port type normal channel-group 20 mode active no shutdown interface Ethernet4/11 description <<** VPC Peer K02-ASA-3:T8 **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 200,666,2001-2135,3001-3135 spanning-tree port type normal channel-group 20 mode active no shutdown interface Ethernet4/12 description <<** VPC Peer K02-ASA-4:T8 **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 200,666,2001-2135,3001-3135 spanning-tree port type normal channel-group 20 mode active no shutdown interface Ethernet4/17 inherit port-profile Cloud-Services-Platforms description <<** k02-n1110-1:Eth1 **>> no shutdown interface Ethernet4/18 53 Appendix B—Device Configurations interface Ethernet4/19 inherit port-profile Cloud-Services-Platforms description <<** k02-n1110-2:Eth1 **>> no shutdown interface Ethernet4/20 interface Ethernet4/25 interface Ethernet4/26 interface Ethernet4/27 description <<** k02-ucs-fab-a:1/27 switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 2,98-99,201-219,666,2001-2019,3001-3019 switchport trunk allowed vlan add 3170-3173,3175-3179,3250-3251,3253-3255 mtu 9216 channel-group 13 mode active no shutdown interface Ethernet4/28 description <<** k02-ucs-fab-b:1/28 **> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 2,98-99,201-219,666,2001-2019,3001-3019 switchport trunk allowed vlan add 3170-3173,3175-3179,3250-3251,3253-3255 mtu 9216 channel-group 14 mode active no shutdown interface Ethernet4/41 description <<** VPC Peer k02-fp-sw-b:4/41 **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 10,20,32,71,98-99,200-209,211-219 switchport trunk allowed vlan add 300-319,400-419,666,2001-2135,3001-3135 switchport trunk allowed vlan add 3170-3177,3250-3251,3253-3255 channel-group 10 mode active no shutdown interface Ethernet4/42 interface Ethernet4/43 description <<** VPC Peer k02-fp-sw-b:4/43 **>> switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 10,20,32,71,98-99,200-209,211-219 switchport trunk allowed vlan add 300-319,400-419,666,2001-2135,3001-3135 switchport trunk allowed vlan add 3170-3177,3250-3251,3253-3255 channel-group 10 mode active no shutdown interface Ethernet4/44 description <<** IB-Mgmt:mgmt-sw **>> switchport access vlan 3175 channel-group 9 mode active no shutdown interface Ethernet4/45 description eth 4/45 to r9-5548-b eth 1/17 switchport mode trunk switchport trunk allowed vlan 666 no shutdown 54 Appendix B—Device Configurations interface Ethernet4/46 interface Ethernet4/47 switchport mode trunk switchport monitor channel-group 8 no shutdown interface Ethernet4/48 switchport mode trunk switchport monitor channel-group 8 no shutdown interface mgmt0 ip address 172.26.164.182/24 logging monitor 6 line vty ip radius source-interface mgmt0 monitor session 1 type erspan-source erspan-id 1 vrf default destination ip 172.26.164.167 source interface port-channel20 both monitor session 2 description SPAN ASA Data Traffic from Po20 source interface port-channel20 rx destination interface port-channel8 no shut monitor session 3 type erspan-source erspan-id 3 vrf default destination ip 172.26.164.167 source vlan 2001 both Nexus 1Kv !Command: show running-config !Time: Tue Feb 18 14:37:46 2014 version 4.2(1)SV2(2.1a) svs switch edition advanced no feature telnet feature private-vlan feature netflow feature cts feature segmentation segment mode unicast-only segment distribution mac feature vtracker logging level radius 6 username admin password 5 <removed> role network-admin banner motd #Nexus 1000v Switch# ssh key rsa 2048 ip domain-lookup ip domain-name corp.sea9.com ip domain-name corp.sea9.com use-vrf management 55 Appendix B—Device Configurations ip name-server 172.26.164.190 use-vrf management ip host sea-vsm1 172.26.164.186 radius-server key 7 <removed> ip radius source-interface mgmt0 radius-server host 172.26.164.187 key 7 <removed> authentication accounting radius-server host 172.26.164.239 key 7 <removed> authentication accounting aaa group server radius aaa-private-sg aaa group server radius ISE-Radius-Grp server 172.26.164.187 server 172.26.164.239 use-vrf management source-interface mgmt0 hostname sea-vsm1 errdisable recovery cause failed-port-state vem 3 host id 6bd69d26-eeff-8f4d-9127-9d3eccad32d7 vem 4 host id e1166bcf-4fc8-b34b-bdcc-2f1ded6bb532 vem 9 host id fb302753-a797-e146-a7cc-6e21df2debc1 vem 10 host id 7836efbb-6907-2144-b5e5-4e5d009bb234 snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey snmp-server community private group network-admin ntp server 172.26.164.254 use-vrf management ntp source 172.26.164.186 aaa authentication login default group ISE-Radius-Grp aaa authentication cts default group ISE-Radius-Grp aaa authorization cts default group ISE-Radius-Grp aaa accounting default group ISE-Radius-Grp no aaa user default-role aaa authentication login error-enable vrf context management ip route 0.0.0.0/0 172.26.164.1 flow exporter sea-lancope-fc1 description <<** SEA Lancope Flow Collector **>> destination 172.26.164.240 use-vrf management transport udp 2055 source mgmt0 version 9 option exporter-stats timeout 300 option interface-table timeout 300 flow monitor sea-enclaves record netflow-original exporter sea-lancope-fc1 timeout inactive 15 timeout active 60 vlan 1-2,98-99,666,3170-3173,3175-3177,3250 vlan 2 name Native-VLAN vlan 98 name ServiceHAVlan vlan 99 name ServiceVlan vlan 666 name WAN-on7k vlan 3170 name NFS-VLAN vlan 3171 name core-services-primary private-vlan primary private-vlan association 3172 vlan 3172 56 Appendix B—Device Configurations name core-services-isolated private-vlan isolated vlan 3173 name vMotion-VLAN vlan 3175 name IB-MGMT-VLAN vlan 3177 name VXLAN_Encapsulation vlan 3250 name prod-ib-mgmt port-channel load-balance ethernet source-dest-ip-port-vlan port-profile default max-ports 32 port-profile default port-binding static port-profile type ethernet Unused_Or_Quarantine_Uplink vmware port-group shutdown description Port-group created for Nexus1000V internal usage. Do not use. state enabled port-profile type vethernet Unused_Or_Quarantine_Veth vmware port-group shutdown description Port-group created for Nexus1000V internal usage. Do not use. state enabled port-profile type ethernet system-uplink vmware port-group switchport mode trunk switchport trunk native vlan 2 switchport trunk allowed vlan 98-99,666,3170-3173,3175-3179,3250 system mtu 9000 channel-group auto mode on mac-pinning no shutdown system vlan 3170,3173,3175-3176,3250 state enabled port-profile type vethernet NFS-VLAN vmware port-group switchport mode access switchport access vlan 3170 no shutdown system vlan 3170 state enabled port-profile type vethernet IB-MGMT-VLAN vmware port-group switchport mode access switchport access vlan 3175 no shutdown system vlan 3175 state enabled port-profile type vethernet vMotion-VLAN vmware port-group switchport mode access switchport access vlan 3173 no shutdown system vlan 3173 state enabled port-profile type vethernet VM-Trafic-VLAN vmware port-group switchport mode access no shutdown state enabled port-profile type vethernet n1kv-L3 capability l3control vmware port-group switchport mode access 57 Appendix B—Device Configurations switchport access vlan 3175 no shutdown system vlan 3175 state enabled port-profile type vethernet WAN-on7k vmware port-group switchport mode access switchport access vlan 666 no shutdown system vlan 666 state enabled port-profile type vethernet VXLAN_Encapsulation vmware port-group switchport mode access switchport access vlan 3177 capability vxlan no shutdown state enabled port-profile type vethernet HA-Srvc vmware port-group switchport mode access switchport access vlan 98 no shutdown state enabled port-profile type vethernet vPath-Srvc vmware port-group switchport mode access switchport access vlan 99 no shutdown state enabled port-profile type vethernet PROD-IB-MGMT vmware port-group switchport mode access switchport access vlan 3250 no shutdown system vlan 3250 state enabled port-profile type vethernet core_services vmware port-group switchport mode private-vlan promiscuous switchport access vlan 3171 switchport private-vlan mapping 3171 3172 ip flow monitor sea-enclaves input no shutdown state enabled system storage-loss log time 30 vdc sea-vsm1 id 1 limit-resource vlan minimum 16 maximum 2049 limit-resource monitor-session minimum 0 maximum 2 limit-resource vrf minimum 16 maximum 8192 limit-resource port-channel minimum 0 maximum 768 limit-resource u4route-mem minimum 1 maximum 1 limit-resource u6route-mem minimum 1 maximum 1 cts device tracking cts interface delete-hold 60 cts sxp enable cts sxp default password 7 <removed> cts sxp default source-ip 172.26.164.186 cts sxp connection peer 172.26.164.217 password default mode listener vrf management cts sxp connection peer 172.26.164.218 password default mode listener vrf management interface port-channel1 58 Appendix B—Device Configurations inherit port-profile system-uplink vem 3 mtu 9000 interface port-channel2 inherit port-profile system-uplink vem 4 mtu 9000 interface port-channel7 inherit port-profile system-uplink vem 9 mtu 9000 interface port-channel8 inherit port-profile system-uplink vem 10 mtu 9000 interface mgmt0 ip address 172.26.164.186/24 interface Vethernet1 inherit port-profile core_services description sea-cs1, Network Adapter 1 vmware dvport 897 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.7F79 interface Vethernet2 inherit port-profile PROD-IB-MGMT description VMware VMkernel, vmk5 vmware dvport 866 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5664.103F interface Vethernet3 inherit port-profile PROD-IB-MGMT description VMware VMkernel, vmk5 vmware dvport 867 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5665.A497 interface Vethernet4 inherit port-profile IB-MGMT-VLAN description sea-cs1, Network Adapter 2 vmware dvport 78 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.34A7 interface Vethernet5 inherit port-profile IB-MGMT-VLAN description win2kr2-enterprise, Network Adapter 1 vmware dvport 79 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.7F34 interface Vethernet6 inherit port-profile core_services description sea-ad1, Network Adapter 3 vmware dvport 898 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.0ED1 interface Vethernet7 inherit port-profile IB-MGMT-VLAN description sea-ad1, Network Adapter 1 vmware dvport 64 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 000C.29E6.37E9 59 Appendix B—Device Configurations interface Vethernet8 inherit port-profile IB-MGMT-VLAN description sea-sql1, Network Adapter 1 vmware dvport 65 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 000C.29B6.1C11 interface Vethernet9 inherit port-profile IB-MGMT-VLAN description sea-vc1, Network Adapter 1 vmware dvport 66 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 000C.2997.C690 interface Vethernet10 inherit port-profile IB-MGMT-VLAN description sea-csm1, Network Adapter 1 vmware dvport 67 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 000C.292E.9471 interface Vethernet11 inherit port-profile VM-Trafic-VLAN description W2K8R2X64GPT-VM, Network Adapter 1 vmware dvport 130 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.6D3E interface Vethernet12 inherit port-profile IB-MGMT-VLAN description sea-ise1, Network Adapter 1 vmware dvport 69 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.6C4D interface Vethernet13 inherit port-profile IB-MGMT-VLAN description sea-n1kvsg-1, Network Adapter 2 vmware dvport 75 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.6EE4 interface Vethernet14 inherit port-profile IB-MGMT-VLAN description sea-vsc-oc, Network Adapter 1 vmware dvport 70 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.050E interface Vethernet15 inherit port-profile PROD-IB-MGMT description sea-pnsc1, Network Adapter 1 vmware dvport 871 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.75AA interface Vethernet16 inherit port-profile IB-MGMT-VLAN description sea-ocb, Network Adapter 1 vmware dvport 72 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.738B interface Vethernet17 inherit port-profile IB-MGMT-VLAN description sea-ocb-proxy, Network Adapter 1 vmware dvport 73 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.04A8 interface Vethernet18 inherit port-profile HA-Srvc description sea-n1kvsg-1, Network Adapter 3 vmware dvport 416 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" 60 Appendix B—Device Configurations vmware vm mac 0050.56AD.704E interface Vethernet19 inherit port-profile IB-MGMT-VLAN description sea-lancope-fc1, Network Adapter 1 vmware dvport 74 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.1DB3 interface Vethernet20 inherit port-profile IB-MGMT-VLAN description sea-ise2, Network Adapter 1 vmware dvport 76 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.314E interface Vethernet21 inherit port-profile IB-MGMT-VLAN description sea-splunk1, Network Adapter 1 vmware dvport 77 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.2DC7 interface Vethernet22 inherit port-profile n1kv-L3 description VMware VMkernel, vmk0 vmware dvport 167 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 5478.1A87.1BA6 interface Vethernet23 inherit port-profile PROD-IB-MGMT description sea-lancope-fc2, Network Adapter 1 vmware dvport 868 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.5E02 interface Vethernet24 inherit port-profile core_services description sea-app1, Network Adapter 1 vmware dvport 899 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.18DB interface Vethernet25 inherit port-profile core_services description sea-client1, Network Adapter 1 vmware dvport 900 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.55C6 interface Vethernet26 inherit port-profile IB-MGMT-VLAN description sea-inet1, Network Adapter 1 vmware dvport 85 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.3807 interface Vethernet27 inherit port-profile IB-MGMT-VLAN description app-1, Network Adapter 1 vmware dvport 82 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.74F1 interface Vethernet28 inherit port-profile IB-MGMT-VLAN description sea-lancope-smc1, Network Adapter 1 vmware dvport 80 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.4F2A interface Vethernet29 inherit port-profile vPath-Srvc 61 Appendix B—Device Configurations description sea-n1kvsg-1, Network Adapter 1 vmware dvport 448 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.6DDC interface Vethernet30 inherit port-profile IB-MGMT-VLAN description sea-n1kvsg-2, Network Adapter 2 vmware dvport 81 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.683C interface Vethernet31 inherit port-profile HA-Srvc description sea-n1kvsg-2, Network Adapter 3 vmware dvport 417 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.16CF interface Vethernet32 inherit port-profile vPath-Srvc description sea-n1kvsg-2, Network Adapter 1 vmware dvport 449 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.4E1C interface Vethernet33 inherit port-profile core_services description sea-splunk1, Network Adapter 2 vmware dvport 896 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.15C8 interface Vethernet34 inherit port-profile IB-MGMT-VLAN description sea-SpirentATC1, Network Adapter 1 vmware dvport 83 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.1EEA interface Vethernet35 inherit port-profile WAN-on7k description sea-SpirentATC1, Network Adapter 2 vmware dvport 514 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.5E1F interface Vethernet36 inherit port-profile IB-MGMT-VLAN description CUCSD-4.1.0.0, Network Adapter 1 vmware dvport 84 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.6F90 interface Vethernet37 inherit port-profile IB-MGMT-VLAN description sea-lancope-fc2, Network Adapter 2 vmware dvport 88 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.5E26 interface Vethernet38 inherit port-profile IB-MGMT-VLAN description sea-ucsd-BMA, Network Adapter 1 vmware dvport 86 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.0975 interface Vethernet39 inherit port-profile IB-MGMT-VLAN description sea-SpirentClient, Network Adapter 1 vmware dvport 87 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.63FF 62 Appendix B—Device Configurations interface Vethernet40 inherit port-profile PROD-IB-MGMT description sea-SpirentClient, Network Adapter 2 vmware dvport 869 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.4AEB interface Vethernet41 inherit port-profile IB-MGMT-VLAN description sea-ocum, Network Adapter 1 vmware dvport 89 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.0C5B interface Vethernet42 inherit port-profile n1kv-L3 description VMware VMkernel, vmk0 vmware dvport 160 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac A80C.0DDC.65D3 interface Vethernet43 inherit port-profile n1kv-L3 description VMware VMkernel, vmk0 vmware dvport 161 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac A80C.0DDC.7609 interface Vethernet44 inherit port-profile NFS-VLAN description VMware VMkernel, vmk1 vmware dvport 32 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5662.BE8C interface Vethernet45 inherit port-profile vMotion-VLAN description VMware VMkernel, vmk2 vmware dvport 100 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5661.361E interface Vethernet46 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk3 vmware dvport 288 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5661.12D9 interface Vethernet47 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk4 vmware dvport 289 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5660.B6DD interface Vethernet48 inherit port-profile NFS-VLAN description VMware VMkernel, vmk1 vmware dvport 33 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.566D.DE42 interface Vethernet49 inherit port-profile vMotion-VLAN description VMware VMkernel, vmk2 vmware dvport 101 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.566D.098D interface Vethernet50 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk3 vmware dvport 290 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" 63 Appendix B—Device Configurations vmware vm mac 0050.5665.FEFC interface Vethernet51 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk4 vmware dvport 291 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5663.370B interface Vethernet52 inherit port-profile n1kv-L3 description VMware VMkernel, vmk0 vmware dvport 169 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 5478.1A87.31D7 interface Vethernet53 inherit port-profile NFS-VLAN description VMware VMkernel, vmk1 vmware dvport 34 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5669.F2F9 interface Vethernet54 inherit port-profile vMotion-VLAN description VMware VMkernel, vmk2 vmware dvport 102 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5662.7871 interface Vethernet55 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk3 vmware dvport 292 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.566F.A14D interface Vethernet56 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk4 vmware dvport 293 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5663.2EE7 interface Vethernet57 inherit port-profile NFS-VLAN description VMware VMkernel, vmk1 vmware dvport 35 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5666.5098 interface Vethernet58 inherit port-profile vMotion-VLAN description VMware VMkernel, vmk2 vmware dvport 103 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.5666.03F8 interface Vethernet59 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk3 vmware dvport 294 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.566B.4BC1 interface Vethernet60 inherit port-profile VXLAN_Encapsulation description VMware VMkernel, vmk4 vmware dvport 295 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.566E.41A8 interface Vethernet61 inherit port-profile PROD-IB-MGMT 64 Appendix B—Device Configurations description sea-vc1, Network Adapter 2 vmware dvport 865 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.6ED1 interface Vethernet62 inherit port-profile PROD-IB-MGMT description sea-ad1, Network Adapter 2 vmware dvport 864 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.1CEF interface Vethernet63 inherit port-profile PROD-IB-MGMT description sea-cs1, Network Adapter 3 vmware dvport 870 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.26AA interface Vethernet64 inherit port-profile PROD-IB-MGMT description sea-vpxmgr, Network Adapter 2 vmware dvport 872 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.51BA interface Vethernet65 inherit port-profile core_services description sea-vpxmgr, Network Adapter 1 vmware dvport 901 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.5AAB interface Vethernet66 inherit port-profile IB-MGMT-VLAN description sea-vpxmgr, Network Adapter 3 vmware dvport 71 dvswitch uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" vmware vm mac 0050.56AD.1566 interface Ethernet3/5 inherit port-profile system-uplink interface Ethernet4/5 inherit port-profile system-uplink interface Ethernet9/5 inherit port-profile system-uplink interface Ethernet10/5 inherit port-profile system-uplink interface control0 ip address 192.168.250.186/24 clock timezone EST -5 0 line console boot kickstart bootflash:/nexus-1000v-kickstart.4.2.1.SV2.2.1a.bin sup-1 boot system bootflash:/nexus-1000v.4.2.1.SV2.2.1a.bin sup-1 boot kickstart bootflash:/nexus-1000v-kickstart.4.2.1.SV2.2.1a.bin sup-2 boot system bootflash:/nexus-1000v.4.2.1.SV2.2.1a.bin sup-2 ip route 10.71.1.182/32 172.26.164.218 ip route 10.71.1.183/32 172.26.164.217 monitor session 1 type erspan-source source interface Vethernet19 tx destination ip 172.26.164.167 erspan-id 1 ip ttl 64 ip prec 0 ip dscp 0 mtu 1500 65 Appendix B—Device Configurations header-type 2 monitor session 2 type erspan-source destination ip 172.26.164.167 erspan-id 2 ip ttl 64 ip prec 0 ip dscp 0 mtu 1500 header-type 2 no shut svs-domain domain id 101 control vlan 3176 packet vlan 3176 svs mode L3 interface mgmt0 svs connection vCenter protocol vmware-vim remote ip address 172.26.164.200 port 80 vmware dvs uuid "ba 86 2d 50 14 7b 59 7a-59 b7 87 d2 f3 59 d8 24" datacenter-name FlexPod_DC_1 max-ports 8192 connect vservice global type vsg tcp state-checks invalid-ack tcp state-checks seq-past-window no tcp state-checks window-variation no bypass asa-traffic vservice node sea-vsg1 type vsg ip address 172.26.164.168 adjacency l2 vlan 99 fail-mode close vnm-policy-agent registration-ip 192.168.250.250 shared-secret ********** policy-agent-image bootflash:/vnmc-vsmpa.2.1.1b.bin log-level info sea-vsm1# 66 Appendix C—About the Cisco Validated Design Program Appendix C—About the Cisco Validated Design Program The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments. For more information, visit http://www.cisco.com/go/designzone. ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, “DESIGNS”) IN THIS MANUAL ARE PRESENTED “AS IS,” WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. 67 Appendix C—About the Cisco Validated Design Program 68