SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
© 2016
VNS3 Plugins
VSN3:turret Base Container Guide
2016
© 2016
Table of Contents
2
Introduction 3
Configurable VNS3_base Plugin Container 7
Customizing VNS3_base Plugin Container 14
Putting it All Together 19
Resources 23
© 2016
Introduction
3
© 2016
VNS3:turret provides container based network services
4
waf content caching nids proxy load balancing custom
router switch firewall vpn concentrator
protocol
redistributor
dynamic &
srciptable sdn
VNS3 Core Components
firewall vpn concentrator
protocol
redistributor
extensible nfv
VNS3CoreComponents
router switch
Isolated Linux containers within VNS3 allow partners and customers to embed features
and functions safely and securely into their cloud network.
© 2016
Requirements
5
You have a cloud or virtual infrastructure account that Cohesive Networks can use for
enabling your access to the VNS3 Controller Images.
You have the ability to configure a client (whether desktop based or cloud based) to use
OpenVPN client software.
You have agreed to the VNS3 Terms and Conditions.
Basic knowledge of Linux software installation and use of command line tools.
© 2016
Getting Help with VNS3
6
This document assumes you have a VNS3 Controller instance launched and running in a
security group, network or similar that has the appropriate access rules included for
normal VNS3 operations. For any support issues, email us at support@cohesive.net


Please review the VNS3 Support Plans and Contacts before sending support inquiries. If
you need specific help with project planning, POCs, or audits, contact our professional
services team via sales@cohesive.net for details.
© 2016
Configurable Default Plugin Container
7
© 2016
VNS3:turret VNS3_Base overview
8
The VNS3:Turret VNS3_Base plugin uses a small footprint Ubuntu 12.04 LTS image as its
operating system. Customers are welcome to provide their own containers based on
other Linux distros compatible with the kernel used in their VNS3 edition.
The VNS3_Base has the unattended-upgrades package from Ubuntu which can be
configured to automatically install security patches from the public repositories.
The VNS3_Base is deployed to VNS3:turret using the containers mechanism. These
instructions cover customisation of the container image that will be used so that
customer access keys and and other software installations can be performed.
Please be familiar with the VNS3 plug-in configuration guide: http://cohesive.net/dnld/
Cohesive-Networks_VNS3-3.5-Container-System.pdf
© 2016
Getting the Default NIDS Plug-In
9
The Linux Container default plug in is accessible at the following URL:
https://vns3-containers-read-all.s3.amazonaws.com/VNS3_Base/VNS3_Base.export.tar.gz
This is a read-only Amazon S3 storage location. Only Cohesive Networks can update or
modify files stored in this location.
This URL can be used directly in a VNS3 Controller via the Web UI or API to import the
container for use into that controller. (General screenshot walkthrough and help available
in the plug-in configuration document.)
© 2016
Getting the Default WAF Plug-In
10
From the Container —> Images menu
item, choose Upload Image.
To use the pre-configured plugin paste
the URL into the Image File URL box.
© 2016
Getting the VNS3_Base Plug-In
11
When the Image has imported it will say
Ready in the Status Column.
To then launch a running VNS3_Base
container, choose Allocate from the
Action menu.
© 2016
Launching a NIDS Container
12
After selecting Allocate from the Actions menu
you then name your container, provide a
description and the command used to execute
the container.
The name and description should be
something meaningful within the context of
your organization and its policies.
In MOST cases the command used to run
plugin containers will be: /usr/bin/supervisord
However, this may vary with individual
containers, please consult each plug-in’s
specific documentation.
The command to run the WAF container
is: /usr/bin/supervisord
© 2016
Confirming the NIDS Container is running
13
After executing the Allocate operation you will
be taken to the Container Display page.
You should see your VNS3_Base Container
with the name you specified. The Status
should be Running and it should have been
given an IP address on your internal plug-in
subnet (in this case 192.51.100.4).
© 2016
Customizing VNS3_Base Plugin
14
© 2016
Accessing the VNS3_Base Container
15
Accessing a Container from the Public Internet or your internal
subnets will require additions to the inbound hypervisor firewall rules
with the VNS3 Controller as well as VNS3 Firewall.
The following example shows how to access an SSH server running
as a Container listening on port 22.
Network Firewall/Security Group Rule

Allow port 22 from your source IP or subnets.
VNS3 Firewall

Enter rules to port forward incoming traffic to the Container Network
and Masquerade outgoing traffic off the VNS3 Controller’s outer
network interface.
#Let the Container Subnet Access the Internet Via the VNS3
Controller’s Outer or Public IP

MACRO_CUST -o eth0 -s <VNS3_Base Container Network
IP> -j MASQUERADE
#Port forward port 33 to the Container port 22

PREROUTING_CUST -i eth0 -p tcp -s 0.0.0.0/0 --dport
33 -j DNAT --to <VNS3_Base Container Network IP>:22
© 2016
Securing the VNS3_Base container
16
By default the container has the following accounts, configured as described.
“root” - The root account is locked. The root account is not allowed to remote shell into
the container. This is our recommended approach. However, if you wish to, you can use
the “container_admin” account to unlock root, provide a root password, and edit /etc/ssh/
sshd_config to allow remote login by root.
“container_admin” - The default password is “container_admin_123!”

The default demo public key is also installed in the /home/container_admin/.ssh/
authorized_keys. PLEASE change this password and this key when configuring, or
create a new default WAF image as your base for future use, following your authentication
procedures. The account “container_admin” has “sudo” or superuser privileges, and is
allowed to remote shell into the container.
© 2016
Accessing via the default private key
17
THIS IS FOR INITIAL /
DEMONSTRATION
ACCESS ONLY! Delete
the contents of /home/
container_admin/.ssh/
authorized keys to
secure your containers.
Here is the default
private key for initial
login.
-----BE
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
© 2016
Primary files for customization
18
There are two significant files for securing the VNS3_Base container:
/etc/ssh/sshd_config 

Please ensure this file is configured to your organization’s best practices.
/home/container_admin/.ssh/authorized_keys

The base container comes with an example public key installed, and private key for use in
VNS3 documentation. Please remove after initial use or programmatic configuration.
© 2016
Putting it all together -
Using the built in TCP tools in VNS3_Base Plugin
19
© 2016
TCP utilities for traffic analysis
20
One of the more difficult parts of application deployment, connectivity and security in the
cloud or virtual environments is the virtual infrastructure environment is not well suited to
providing customers with the direct network flow to their device.
The VNS3_Base can be used to build other container plugins, but has the iftop and
tcpdump utilities built in. Both utilities take a -f argument which allows libcap syntax, but
display results in different ways.
To see traffic coming into your container in a graphical (curses-based) view you could
execute from a shell: `iftop -n -N -i eth0 -f “not port 22’
To see individual packet information in a scrolling display use: `tcpdump -pni eth0 -f “not
port 22”`
© 2016
NIDS Container Flow
21
User or interior traffic arrives at the VNS3 Controller.
Firewall rules can filter and send a subset of traffic to
the VNS3_Base container for analysis.
VNS3_Base container running TCP utilities like
tcpdump or if top.
The container should be sent a COPY of the
traffic, not sit between the source and
destination. Your
Encrypted
Overlay or
VLAN underlay
servers.
Outside Traffic
arrives at VNS3
Turret
Inside Traffic
arrives at VNS3
Turret
© 2016
Forwarding Web Traffic to the VNS3_Base Container
22
Forwarding traffic to the container uses the same technique as was
shown for accessing the container via Remote Shell.
VNS3 Firewall

Enter rules to send a copy of either incoming traffic (arriving on eth0
or tun0) or outgoing traffic (leaving eth0 or tun0).
#EXAMPLE: Copy all incoming tun0 (Overlay Network) traffic to the
NIDS container.

MACRO_CUST -j COPY --from tun0 --to <Container
Network IP> --inbound
#EXAMPLE: Copy all outgoing tun0 (Overlay Network) traffic to the TCP
Tools Container

MACRO_CUST -j COPY --from tun0 --to <Container
Network IP> —outbound
NOTE: At this time analyze inbound OR outbound at any given time
in order to prevent accidental traffic loops. It IS POSSIBLE to create
a traffic cycle which could “brick” your controller if you create
simultaneous inbound AND outbound rules with improper
parameters.
© 2016
VNS3 Configuration Document Links
23
VNS3 Product Resources - Documentation | Add-ons
VNS3 Configuration Instructions

Instructions and screenshots for configuring a VNS3 Controller in a single or multiple
Controller topology. Specific steps include, initializing a new Controller, generating
clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to
the Overlay Network. 



Questions about configuring the VNS3_Base elements effectively: support@cohesive.net

Mais conteúdo relacionado

Mais procurados

Designing scalable Docker networks
Designing scalable Docker networksDesigning scalable Docker networks
Designing scalable Docker networksMurat Mukhtarov
 
How VXLAN works on Linux
How VXLAN works on LinuxHow VXLAN works on Linux
How VXLAN works on LinuxEtsuji Nakai
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part iiKrunal Shah
 
Docker Multihost Networking
Docker Multihost Networking Docker Multihost Networking
Docker Multihost Networking Nicola Kabar
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07Truong NGUYEN
 
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks
 
Introduction to EMQ
Introduction to EMQIntroduction to EMQ
Introduction to EMQEMQ
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbChanaka Lasantha
 
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks
 
Introduction to EMQ X Enterprise
Introduction to EMQ X EnterpriseIntroduction to EMQ X Enterprise
Introduction to EMQ X EnterpriseEMQ
 
4. Kubernetes - Application centric infrastructure kubernetes, contiv
4. Kubernetes - Application centric infrastructure  kubernetes, contiv4. Kubernetes - Application centric infrastructure  kubernetes, contiv
4. Kubernetes - Application centric infrastructure kubernetes, contivJuraj Hantak
 
4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetes
4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetes4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetes
4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetesJuraj Hantak
 
Introducing bastion hosts for oracle cloud infrastructure v1.0
Introducing bastion hosts for oracle cloud infrastructure v1.0Introducing bastion hosts for oracle cloud infrastructure v1.0
Introducing bastion hosts for oracle cloud infrastructure v1.0maaz khan
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTTEMQ
 
Docker networking tutorial 102
Docker networking tutorial 102Docker networking tutorial 102
Docker networking tutorial 102LorisPack Project
 
VMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEX
VMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEXVMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEX
VMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEXDavid Pasek
 
6. hands on - open mano demonstration in remote pool of servers
6. hands on - open mano demonstration in remote pool of servers6. hands on - open mano demonstration in remote pool of servers
6. hands on - open mano demonstration in remote pool of serversvideos
 
5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Mano5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Manovideos
 
20171010 multitenancy in openshift
20171010 multitenancy in openshift20171010 multitenancy in openshift
20171010 multitenancy in openshiftSmals
 

Mais procurados (20)

Designing scalable Docker networks
Designing scalable Docker networksDesigning scalable Docker networks
Designing scalable Docker networks
 
How VXLAN works on Linux
How VXLAN works on LinuxHow VXLAN works on Linux
How VXLAN works on Linux
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part ii
 
Docker Multihost Networking
Docker Multihost Networking Docker Multihost Networking
Docker Multihost Networking
 
Nexus 1000v
Nexus 1000vNexus 1000v
Nexus 1000v
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07
 
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
 
Introduction to EMQ
Introduction to EMQIntroduction to EMQ
Introduction to EMQ
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql db
 
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
 
Introduction to EMQ X Enterprise
Introduction to EMQ X EnterpriseIntroduction to EMQ X Enterprise
Introduction to EMQ X Enterprise
 
4. Kubernetes - Application centric infrastructure kubernetes, contiv
4. Kubernetes - Application centric infrastructure  kubernetes, contiv4. Kubernetes - Application centric infrastructure  kubernetes, contiv
4. Kubernetes - Application centric infrastructure kubernetes, contiv
 
4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetes
4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetes4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetes
4. CNCF kubernetes Comparison of-existing-cni-plugins-for-kubernetes
 
Introducing bastion hosts for oracle cloud infrastructure v1.0
Introducing bastion hosts for oracle cloud infrastructure v1.0Introducing bastion hosts for oracle cloud infrastructure v1.0
Introducing bastion hosts for oracle cloud infrastructure v1.0
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 
Docker networking tutorial 102
Docker networking tutorial 102Docker networking tutorial 102
Docker networking tutorial 102
 
VMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEX
VMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEXVMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEX
VMware Networking, CISCO Nexus 1000V, and CISCO UCS VM-FEX
 
6. hands on - open mano demonstration in remote pool of servers
6. hands on - open mano demonstration in remote pool of servers6. hands on - open mano demonstration in remote pool of servers
6. hands on - open mano demonstration in remote pool of servers
 
5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Mano5. hands on - building local development environment with Open Mano
5. hands on - building local development environment with Open Mano
 
20171010 multitenancy in openshift
20171010 multitenancy in openshift20171010 multitenancy in openshift
20171010 multitenancy in openshift
 

Destaque

Bonus demografi pop_dev
Bonus demografi pop_devBonus demografi pop_dev
Bonus demografi pop_devKadir Ruslan
 
Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)
Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)
Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)Kadir Ruslan
 
Senior Care SOCIAL PROSPECTING WORKBOOK Notch
Senior Care SOCIAL PROSPECTING WORKBOOK NotchSenior Care SOCIAL PROSPECTING WORKBOOK Notch
Senior Care SOCIAL PROSPECTING WORKBOOK NotchGeorge Bardenheier Jr.
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Docker Chicago Meetup - July 2014
Docker Chicago Meetup - July 2014Docker Chicago Meetup - July 2014
Docker Chicago Meetup - July 2014Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks
 
MG Capabilities LI 5.2015
MG Capabilities LI 5.2015MG Capabilities LI 5.2015
MG Capabilities LI 5.2015Melissa Griffie
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...Cohesive Networks
 
Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...
Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...
Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...Kadir Ruslan
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Cohesive Networks
 
Pediculosis púbica (Phthirus pubis-Ladillas)
Pediculosis púbica (Phthirus pubis-Ladillas)Pediculosis púbica (Phthirus pubis-Ladillas)
Pediculosis púbica (Phthirus pubis-Ladillas)Denisse Labastida
 

Destaque (15)

Segunda secuencia didácticas 2016
Segunda secuencia didácticas 2016Segunda secuencia didácticas 2016
Segunda secuencia didácticas 2016
 
Guía 1. diseñando secuencias didácticas
Guía 1. diseñando secuencias didácticasGuía 1. diseñando secuencias didácticas
Guía 1. diseñando secuencias didácticas
 
Bemoles
BemolesBemoles
Bemoles
 
Bonus demografi pop_dev
Bonus demografi pop_devBonus demografi pop_dev
Bonus demografi pop_dev
 
Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)
Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)
Paparan prof. sri moertiningsih adioetomo ph.d (fgd 10 maret lamhannas ri)
 
Notch Interactive Agency Credentials
Notch Interactive Agency CredentialsNotch Interactive Agency Credentials
Notch Interactive Agency Credentials
 
Senior Care SOCIAL PROSPECTING WORKBOOK Notch
Senior Care SOCIAL PROSPECTING WORKBOOK NotchSenior Care SOCIAL PROSPECTING WORKBOOK Notch
Senior Care SOCIAL PROSPECTING WORKBOOK Notch
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Docker Chicago Meetup - July 2014
Docker Chicago Meetup - July 2014Docker Chicago Meetup - July 2014
Docker Chicago Meetup - July 2014
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
MG Capabilities LI 5.2015
MG Capabilities LI 5.2015MG Capabilities LI 5.2015
MG Capabilities LI 5.2015
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 
Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...
Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...
Kebijakan Pembangunan Sumber Daya Manusia dalam Menghadapi Periode Bonus Demo...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
Pediculosis púbica (Phthirus pubis-Ladillas)
Pediculosis púbica (Phthirus pubis-Ladillas)Pediculosis púbica (Phthirus pubis-Ladillas)
Pediculosis púbica (Phthirus pubis-Ladillas)
 

Semelhante a Cohesive Networks Support Docs: VNS3:turret Base Container Guide

Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks
 
AWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan NaydenovAWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan NaydenovBogdan Naydenov
 
Amazon VPC Best Practices 2016
Amazon VPC Best Practices 2016Amazon VPC Best Practices 2016
Amazon VPC Best Practices 2016AWSBulgaria
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Ryan Koop
 
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Michael Man
 
MuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual EventMuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual EventVikalp Bhalia
 
Managing multicast/igmp stream on Docker
Managing multicast/igmp stream on DockerManaging multicast/igmp stream on Docker
Managing multicast/igmp stream on DockerThierry Gayet
 
brocade-vcs-gateway-vmware-dp
brocade-vcs-gateway-vmware-dpbrocade-vcs-gateway-vmware-dp
brocade-vcs-gateway-vmware-dpAnuj Dewangan
 
Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...
Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...
Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...Ovadiah Myrgorod
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanCohesive Networks
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASACohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASACohesive Networks
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard FontanaBlack Duck by Synopsys
 

Semelhante a Cohesive Networks Support Docs: VNS3:turret Base Container Guide (20)

Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
 
AWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan NaydenovAWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan Naydenov
 
Amazon VPC Best Practices 2016
Amazon VPC Best Practices 2016Amazon VPC Best Practices 2016
Amazon VPC Best Practices 2016
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014
 
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
 
MuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual EventMuleSoft Meetup Vancouver 5th Virtual Event
MuleSoft Meetup Vancouver 5th Virtual Event
 
Managing multicast/igmp stream on Docker
Managing multicast/igmp stream on DockerManaging multicast/igmp stream on Docker
Managing multicast/igmp stream on Docker
 
brocade-vcs-gateway-vmware-dp
brocade-vcs-gateway-vmware-dpbrocade-vcs-gateway-vmware-dp
brocade-vcs-gateway-vmware-dp
 
Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...
Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...
Create a Varnish cluster in Kubernetes for Drupal caching - DrupalCon North A...
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASACohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASA
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard Fontana
 
Autopilot : Securing Cloud Native Storage
Autopilot : Securing Cloud Native StorageAutopilot : Securing Cloud Native Storage
Autopilot : Securing Cloud Native Storage
 

Mais de Cohesive Networks

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Cohesive Networks
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Cohesive Networks
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for JuniperCohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for JuniperCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent Cohesive Networks
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Cohesive Networks
 

Mais de Cohesive Networks (9)

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
 
Cohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for JuniperCohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for Juniper
 
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Cohesive Networks Support Docs: VNS3:turret Base Container Guide

  • 1. © 2016 VNS3 Plugins VSN3:turret Base Container Guide 2016
  • 2. © 2016 Table of Contents 2 Introduction 3 Configurable VNS3_base Plugin Container 7 Customizing VNS3_base Plugin Container 14 Putting it All Together 19 Resources 23
  • 4. © 2016 VNS3:turret provides container based network services 4 waf content caching nids proxy load balancing custom router switch firewall vpn concentrator protocol redistributor dynamic & srciptable sdn VNS3 Core Components firewall vpn concentrator protocol redistributor extensible nfv VNS3CoreComponents router switch Isolated Linux containers within VNS3 allow partners and customers to embed features and functions safely and securely into their cloud network.
  • 5. © 2016 Requirements 5 You have a cloud or virtual infrastructure account that Cohesive Networks can use for enabling your access to the VNS3 Controller Images. You have the ability to configure a client (whether desktop based or cloud based) to use OpenVPN client software. You have agreed to the VNS3 Terms and Conditions. Basic knowledge of Linux software installation and use of command line tools.
  • 6. © 2016 Getting Help with VNS3 6 This document assumes you have a VNS3 Controller instance launched and running in a security group, network or similar that has the appropriate access rules included for normal VNS3 operations. For any support issues, email us at support@cohesive.net 
 Please review the VNS3 Support Plans and Contacts before sending support inquiries. If you need specific help with project planning, POCs, or audits, contact our professional services team via sales@cohesive.net for details.
  • 7. © 2016 Configurable Default Plugin Container 7
  • 8. © 2016 VNS3:turret VNS3_Base overview 8 The VNS3:Turret VNS3_Base plugin uses a small footprint Ubuntu 12.04 LTS image as its operating system. Customers are welcome to provide their own containers based on other Linux distros compatible with the kernel used in their VNS3 edition. The VNS3_Base has the unattended-upgrades package from Ubuntu which can be configured to automatically install security patches from the public repositories. The VNS3_Base is deployed to VNS3:turret using the containers mechanism. These instructions cover customisation of the container image that will be used so that customer access keys and and other software installations can be performed. Please be familiar with the VNS3 plug-in configuration guide: http://cohesive.net/dnld/ Cohesive-Networks_VNS3-3.5-Container-System.pdf
  • 9. © 2016 Getting the Default NIDS Plug-In 9 The Linux Container default plug in is accessible at the following URL: https://vns3-containers-read-all.s3.amazonaws.com/VNS3_Base/VNS3_Base.export.tar.gz This is a read-only Amazon S3 storage location. Only Cohesive Networks can update or modify files stored in this location. This URL can be used directly in a VNS3 Controller via the Web UI or API to import the container for use into that controller. (General screenshot walkthrough and help available in the plug-in configuration document.)
  • 10. © 2016 Getting the Default WAF Plug-In 10 From the Container —> Images menu item, choose Upload Image. To use the pre-configured plugin paste the URL into the Image File URL box.
  • 11. © 2016 Getting the VNS3_Base Plug-In 11 When the Image has imported it will say Ready in the Status Column. To then launch a running VNS3_Base container, choose Allocate from the Action menu.
  • 12. © 2016 Launching a NIDS Container 12 After selecting Allocate from the Actions menu you then name your container, provide a description and the command used to execute the container. The name and description should be something meaningful within the context of your organization and its policies. In MOST cases the command used to run plugin containers will be: /usr/bin/supervisord However, this may vary with individual containers, please consult each plug-in’s specific documentation. The command to run the WAF container is: /usr/bin/supervisord
  • 13. © 2016 Confirming the NIDS Container is running 13 After executing the Allocate operation you will be taken to the Container Display page. You should see your VNS3_Base Container with the name you specified. The Status should be Running and it should have been given an IP address on your internal plug-in subnet (in this case 192.51.100.4).
  • 15. © 2016 Accessing the VNS3_Base Container 15 Accessing a Container from the Public Internet or your internal subnets will require additions to the inbound hypervisor firewall rules with the VNS3 Controller as well as VNS3 Firewall. The following example shows how to access an SSH server running as a Container listening on port 22. Network Firewall/Security Group Rule
 Allow port 22 from your source IP or subnets. VNS3 Firewall
 Enter rules to port forward incoming traffic to the Container Network and Masquerade outgoing traffic off the VNS3 Controller’s outer network interface. #Let the Container Subnet Access the Internet Via the VNS3 Controller’s Outer or Public IP
 MACRO_CUST -o eth0 -s <VNS3_Base Container Network IP> -j MASQUERADE #Port forward port 33 to the Container port 22
 PREROUTING_CUST -i eth0 -p tcp -s 0.0.0.0/0 --dport 33 -j DNAT --to <VNS3_Base Container Network IP>:22
  • 16. © 2016 Securing the VNS3_Base container 16 By default the container has the following accounts, configured as described. “root” - The root account is locked. The root account is not allowed to remote shell into the container. This is our recommended approach. However, if you wish to, you can use the “container_admin” account to unlock root, provide a root password, and edit /etc/ssh/ sshd_config to allow remote login by root. “container_admin” - The default password is “container_admin_123!”
 The default demo public key is also installed in the /home/container_admin/.ssh/ authorized_keys. PLEASE change this password and this key when configuring, or create a new default WAF image as your base for future use, following your authentication procedures. The account “container_admin” has “sudo” or superuser privileges, and is allowed to remote shell into the container.
  • 17. © 2016 Accessing via the default private key 17 THIS IS FOR INITIAL / DEMONSTRATION ACCESS ONLY! Delete the contents of /home/ container_admin/.ssh/ authorized keys to secure your containers. Here is the default private key for initial login. -----BE -----BEGIN RSA PRIVATE KEY----- MIIEoAIBAAKCAQEA1pIQ/2VxIR6DJx4/mKKfZJ2EuhAe+jJaXnbYMq33Zryum5ku /r7KKcgR97R7GV0McHo23BJP/SoQrbyvIwRVBurnH32Okxl/ymX0YeudOlLh2/R/ palDnPVOtuQnY836poGxp3/X2H86/MgrHOclbeGy8Ezm6+zwnl18VccqiGYMW06c a2qLGVMIh6WD03/p++l+QEPRmhAzfqWZJ02GG12lCK7ECODRELR0Y+ppe+yg2DaF QI8gywRDa6l9v7BTEc5l/k3j2xqJxNXaBVzgjCJmVc7dfgfR1io31IHiTw1M8YPf 5lNpMdfiV4DjcG9f6GcUuO6uXgMZucnQT3ldfwIBIwKCAQAGIW4zLsi3zav5zaoL rN/7j3jSHbe+AXBL14KFGunPvD+AydzFcypY9xZ0yqRucF9w7YyJ8eUHO7dVa8p9 V+UsFVcPhz6WfRJHnINTQT8Bqpi9JD4pTfqeFaMpzAEgG9P2IPZyf/7aTMcryzRu ikLl4eCKhdq2SJkpGJ0nBbDCEX3p8H9jDWKlPxZ4vEbeqZeDMV+PPhVjUtrElAMB amJY3/WmGPRH90pOO47vnZ+rSd/GLDpEuGYvjU7F64cBZUQbf4rYTCGW3dCyuw5g iChEeiOvbYEYRffEh0/fv3Bn31qFteeY7HXOSAGrRm/KuUxejkTTs3RZBOjFLmBj UuCrAoGBAPbWMrEueimj0zQcfxBlKFaph0DQQTFEXg0evgv+RitXdChooB9SmOe2 sOYbY36DX6V6QTzNsHOEoLuqdShPi3a9JIDyOAXdIBMTqt2SvywRBPJQffFoCJ+/ AbrfVr6Seu45C5t+aYlS8nULbphqp8Cvyof4ldV+5KyGtbllaNlPAoGBAN6JOoCy G+Td38HpaML9J9xioizahbPBXj1/qyP3e+idSubqpT7feMCn3wOF+haNc2NF6VEN qLTGEcKyAOA/TIySOel5rUZdpu5BmAVAADMeapMJWEXEblI4qJFd/sWJCP5wmZp/ lcSrDTLhcQJOci5LKSPOz/Czcpo9vOlVu8zRAoGAd+Rhw8YeFDmhGU+rbl0E9uSg x7WcAfyitepcTvfY8HrvRtO7fO2aubCBztoaYgVLtsZaM3nZXK4iL0QqRseM4ebX N1ET5ZdKF+T7OGvZMqkuSc9THXusatkeGPAi0Zeay3rLH6PM3EzcKjjAsG5RetkK mdCDSnDVeF6wCZen9IUCgYAMt2JtwQjogbUDxDHfQaqBnzx3l3VaupervicJXpld v9hk93coKgbmb/4ddV6/dcwUTSNGdc8gRdUhEXxklecd+boqmT0Z9rkU7c4sL4r7 m1aMDymdljIwlYX5rZmHoW46bNWTzMa6x/IgKiO2/SsYlpSi9d//IDJvNrpWee15 awKBgAczjW0Ag+nosFzklHhDAWIEZ+qgvdMcXf8pTOzgo0wyOl4SYTccp82Ffxee 25d8DyolvGgRjfDXKMyw7zfzwiknsZozEGNFDW+sgsPR9Pe1SQx07PtnUUflb3/C v5LiLZmgW+RFvQf7lGqQpQSpfPuY6H8vwjxlA89SP3UwTi4N -----END RSA PRIVATE KEY-----
  • 18. © 2016 Primary files for customization 18 There are two significant files for securing the VNS3_Base container: /etc/ssh/sshd_config 
 Please ensure this file is configured to your organization’s best practices. /home/container_admin/.ssh/authorized_keys
 The base container comes with an example public key installed, and private key for use in VNS3 documentation. Please remove after initial use or programmatic configuration.
  • 19. © 2016 Putting it all together - Using the built in TCP tools in VNS3_Base Plugin 19
  • 20. © 2016 TCP utilities for traffic analysis 20 One of the more difficult parts of application deployment, connectivity and security in the cloud or virtual environments is the virtual infrastructure environment is not well suited to providing customers with the direct network flow to their device. The VNS3_Base can be used to build other container plugins, but has the iftop and tcpdump utilities built in. Both utilities take a -f argument which allows libcap syntax, but display results in different ways. To see traffic coming into your container in a graphical (curses-based) view you could execute from a shell: `iftop -n -N -i eth0 -f “not port 22’ To see individual packet information in a scrolling display use: `tcpdump -pni eth0 -f “not port 22”`
  • 21. © 2016 NIDS Container Flow 21 User or interior traffic arrives at the VNS3 Controller. Firewall rules can filter and send a subset of traffic to the VNS3_Base container for analysis. VNS3_Base container running TCP utilities like tcpdump or if top. The container should be sent a COPY of the traffic, not sit between the source and destination. Your Encrypted Overlay or VLAN underlay servers. Outside Traffic arrives at VNS3 Turret Inside Traffic arrives at VNS3 Turret
  • 22. © 2016 Forwarding Web Traffic to the VNS3_Base Container 22 Forwarding traffic to the container uses the same technique as was shown for accessing the container via Remote Shell. VNS3 Firewall
 Enter rules to send a copy of either incoming traffic (arriving on eth0 or tun0) or outgoing traffic (leaving eth0 or tun0). #EXAMPLE: Copy all incoming tun0 (Overlay Network) traffic to the NIDS container.
 MACRO_CUST -j COPY --from tun0 --to <Container Network IP> --inbound #EXAMPLE: Copy all outgoing tun0 (Overlay Network) traffic to the TCP Tools Container
 MACRO_CUST -j COPY --from tun0 --to <Container Network IP> —outbound NOTE: At this time analyze inbound OR outbound at any given time in order to prevent accidental traffic loops. It IS POSSIBLE to create a traffic cycle which could “brick” your controller if you create simultaneous inbound AND outbound rules with improper parameters.
  • 23. © 2016 VNS3 Configuration Document Links 23 VNS3 Product Resources - Documentation | Add-ons VNS3 Configuration Instructions
 Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology. Specific steps include, initializing a new Controller, generating clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to the Overlay Network. 
 
 Questions about configuring the VNS3_Base elements effectively: support@cohesive.net