Network technologies and trends

October 12, 2015  7:03 PM

What is transaction lock feature in Palo Alto Networks Firewalls?

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
Administrator, Firewalls, lock, Network, Network Technology, Palo Alto Networks

Palo Alto Networks Firewalls can be administrated by multiple Administrators using WebUI access, it becomes quite challenging to see who is controlling the firewall and making either config changes or committing the changes done in Palo Alto Networks Firewalls.

To provide more flexibility and accounting Palo Alto Networks offers two types of locks

  1. Config Lock
  2. Commit Lock

Using these two features a Palo Alto Network Firewall administrator can prevent configuration changes or commit operations by another administrator. Until the lock is removed another administrator cannot do any changes.

Config Lock – Basically blocks other administrators from making changes to the configuration of the Palo Alto Firewall. One should set Config Lock at the global level. Only the administrator who set this lock or a superadmin can remove Config Lock.

Commit Lock – Basically block other administrators from committing any changes until all the locks have been released. By using this lock one can prevent any collisions occur when two administrators try to make changes to the Palo Alto Firewall at the same time. This lock releases automatically the moment the commit operation is completed by the administrator who started the commit activity first, or this can be release manually as well.

Any one can see, who is hold Commit Lock from the WebUI and can ask the concerned administrator to release the commit lock. Only the administrator who set this lock or a superadmin can remove the Commit Lock

From the below example its quite evident that the commit lock is held by the user admin and yasir is the user who has logged into the Palo Alto Firewall. Yasir cannot do any changes until admin completes his task. The only way to overcome this is either release the commit lock by admin or by the superadmin.

 Screen Shot 2015-10-12 at 9.47.43 PM

This little feature is quite handy and ensures who have control over the Palo Alto Firewall and I recommend one should enable this feature to ensure no changes are done accidently by the other administrator.

October 10, 2015  6:57 PM

“CCDE Study Guide” initial review

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
Cisco, Cisco certifications, Cisco Press, Network design, Networking, Protocols

Those who are perusing CCDE certification, they were eagerly waiting for the release of much awaited Cisco Press book of the year ” CCDE Study Guide” by Marwan Al-Shawi.

Thanks to Jamie Shoup of Cisco Press for providing me a copy of the title ” CCDE Study Guide” , I too was waiting for this title with lot of eagerness and quite happy to have a copy.

CCDE book

As you all know my journey of CCDE has begun and God willing I am planning for my success. Thought of sharing my initial reviews especially for those who are preparing for the CCDE exam.

I could see  Marwan Al-Shawi used comparative and analytical approach which certainly helps CCDE aspirers to practice the “Why Question” with regard to designs. Its been said those who asks questions they cannot avoid answers. CCDE is also about asking right questions .

I could able to read first two chapters, they are quite engaging and penned down in a very simple manner,  Marwan Al-Shawi ensured that the  content is brief and addresses all the  aspects of CCDE practical exam.The first chapter deals with Network design requirements , he talks about the common approach used to analyse and design the network, thought this not a new topic but its been presented in a very simple way, I liked this part.

This title is quite different from other Cisco Press books as  “Do I Know this Already? Quiz” section is missing and however the section “further reading” at the end of each chapter is quite good and helpful for some one to have quick recap of the concepts.

There are few typos I have seen in the first two chapters, which needs to be corrected by the publisher and also I have a recommendation for Cisco Press to have a proper hyper link to “Further Reading” topics, so that one can directly click the hyperlink and start reading. At present one need to search the suggested further reading topics.

To conclude I would give 5 stars to this wonderful title by Marwan Al-Shawi  and he stands right for the following  statement in the book.

“Therefore, you can use this book as an all-in-one study guide covering the various networking technologies, protocols, and design options in a business-driven approach. You can expand your study scope and depth of knowledge selectively on certain topics as needed.”

Once I am done with reading this title I will come out with a detailed review.

October 10, 2015  10:14 AM

Palo Alto Networks firewalls Account Administration Roles -101 – Series 2

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
API, CLI, Firewalls, Palo Alto Networks, XML

 Palo Alto Networks Firewall Admin role has three parts namely:

  • WebUI
  • XML API 
  • Command Line

Screen Shot 2015-10-10 at 11.55.12 AM

WebUI supports Enable, Read Only and Disable levels

XML API offers only Enable and Disable levels.

When it comes CLI only pre defined built-in roles are allowed, customization is not allowed in CLI mode.

Palo Alto Networks firewall offers following built-in roles

  • None 
  • superuser:
  • superreader
  • deviceadmin
  • vsysadmin
  • vsysreader

Lets see  what kind of privilege each user  have in Palo Alto Networks Firewall

  • none: will have no access cli mode of Palo Alto Networks Firewall,
  • superuser: is the root user of the Palo Alto Networks firewall, superuser will have  full configuration access of the firewall which also includes the access to create user accounts and virtual systems. This privilege also can create another user with superuser rights.
  • superreader:  will have full read access to the firewall except superreader cannot do any configuration to the Palo Alto Networks Firewall.
  • vsysadmin: wil have full configuration access to the selected virtual system on the Palo Alto Networks firewall.
  • vsysreader:  will have full read access to the selected virtual system on the firewall, and vsysreader cannot do any configuration to the selected virtual system on the Palo Alto Networks Firewall
  • deviceadmin:  will have full configuration access to the selected device except for creating user accounts and virtual system on the Palo Alto Networks firewall.
  • devicereader: will  have full read access to the selected device, and no configuration rights like deviceadmin on the Palo Alto Networks Firewall.

This is also one great feature from Palo Alto Networks, which ensures that one can assign the user privileges,  based on user roles and responsibilities. This also eases the task of Firewall Administrator he/she doesn’t need to build a  user profile from scratch.

October 8, 2015  6:11 PM

CCDE must read , Series 1 – Review for “Optimal Routing Design”

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
BGP, Cisco certifications, EIGRP, Network, Network design, OSPF, VPN

When it comes to CCDE preparations one should master many concepts, one should refer to plenty of  resources available in  form of books, articles, Cisco validated designs, Videos,RFCs etc.  For every journey there is a starting point, for CCDE I believe “Optimal Routing Design” is the path towards success.

Opitmal Routing Design

Many thanks to  Alvaro Retana, Don Slice &  Russ White to come out with such a great resource, which any designer can dream of. Though “Optimal Routing Design” has been penned down in 2005, yet it is quite relevant to today’s network design concepts. The concepts are well organized and the case studies add more value in each chapter. This title covers the following

  • Network Design Goals and Techniques
  • Applying the Fundamentals
  • EIGRP Network design
  • OSPF Network Design
  • IS-IS Network Design
  • BGP Cores and Network Scalability
  • High Availability and Fast Convergence
  • Routing Protocol Security
  • Virtual Private Networks

I thoroughly  enjoyed reading this title and quite benefitted from its contents and I am quite hopeful this title will empower me to conquer CCDE. As mentioned by Terry Slattery in Cisco Learning Network CCDE group discussions the publishers should seriously consider correcting those errors.

Since there are many resources and recommended books are there for CCDE I don’t see a reason for new revision of this book.   To conclude a very well written book which any CCDE aspirer cannot miss to read from cover to cover.

October 5, 2015  3:51 AM

Review for CCNA Security 210-260 Official Cert Guide

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
CCNA, CCNA Security, Cisco, Cisco Press, Email security, IPS, ISE, malware, Network security, Security threats, Social engineering, tacacs, VPN, Web security

I would like to thank my old time professional friend from Cisco Press Jamie Shoup for providing me a copy of newly released Cisco Press title ” CCNA Security 210-260 Official Cert Guide” penned by Omar Santos & John Stuppi.

This title comes with 19 chapters, which shows that the contents covered are in quite dept. CCNA is always a great starting point for fresh network engineers, Cisco ensures that by completing CCNA, one does possess good understanding of basic concepts and terminologies, so is this title. This ensures that one understands the concepts like fundamentals of Network Security, Security Threats, AAA, VPN, IPS, Email Security, Web Security , Securing virtual environments, ISE, Layer 2 security, NGIPS etc.

CCNA Security

The authors have done a  great job, the content is really written in very engaging way , I simply couldn’t able resist reading for at least couple hours with out any break.

I really liked the way how chapter 2 is penned down which deals with concepts like Social Engineering, different types of attacks, Malware detection tools etc.

This title begins with a typical Cisco Press title ” Do I Know this Already? Quiz” which really good which gives you an idea on how good you are and what are things you may need to focus more.Also the chapter ends with “Review all the Key Topics” is very handy and revises what you read.

One thing certainly needs some more clarity, is the chapter that deals with AAA  and TACACS+ configurations, its not easy to find good resources on AAA or ACS , so if the examples were explained with a sample topology and configurations would have added more value.

The Premium edition of this title comes with Pearson IT Certification Practice Test, which is really great and one can certainly monitor his/her progress by taking those tests. I have one more recommendations to the publishers is to provide the test engine for  MAC operating Systems as well.

To conclude really well written title which not only helps CCNA Security aspirers to archive their goal but also a great reference guide for any Network Security Engineer.

October 3, 2015  7:27 AM

Palo Alto Networks firewalls Account Administration Roles -101 – Series 1

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
Firewalls, LDAP, Palo Alto Networks, Radius, tacacs

Palo Alto Network Firewalls by default comes with a predefined admin account; further additional admin accounts can be added. Before jumping into types of roles Palo Alto Networks firewalls offers its better to get aware what different method Palo Alto Networks Firewall offers for Administrators authentication?

One can authenticate an Administrator account using:

  • Local Data Base
  • LDAP
  • Kerberos
  • Active Directory
  • User Certificates
  • TACACS+ *

* TACACS+ authentication option is available only after the 7.0 PAN-OS releases, prior to 7.0 PAN-OS one has to rely on RADIUS.

Adding TACACS+ option to new release of PAN-OS 7.0 is a great move from Palo Alto this shows how all other vendors are accepting TACACS+.

September 25, 2015  7:27 PM

CCNA Security version 3.0 is here

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
CCIE, CCNA, CCNA Security, Cisco, Cisco Press, cloud, Security, Virtualization

Cisco announces changes in the current CCNA Security exam, with new announcement Cisco ensured to include many newer technologies, which are widely deployed in today;s Enterprise Networks. The great thing in the CCNA Security version 3 is the addition of Cloud Web Security, Cloud and Virtualization. This shows how these technologies are going to dominate in coming days.

With addition of Cisco FirePOWER and FireSIGHT services it was anticipated that Cisco would come out with the revision of CCNA Security. I hope soon Cisco will make major revamp to CCIE Security exams.

Cisco Press also released new title “CCNA Security 210-260 Official Cert Guide” authored by Omar Santos and John Stuppi. This title can be purchased from Cisco Press website either in hard cover format or electronic format.

Soon I will come out with the review for this title as I do have a copy of this title. The first impressions look great but a through reading is needed to come out with an appropriate review.

September 23, 2015  8:24 AM

How to start the Journey of CCDE?

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
CCIE, Cisco

After completing my CCIE R&S I was wondering what to do next? Thought of continuing the journey with one more CCIE, but was not convinced of having multiple CCIEs, yet thinking what should be my next move.

Started focusing on other vendors, technologies and certifications and was quite happy and satisfied with its progress, planning to continue the same. CCDE is one such track, which always grabbed my attention, as it’s completely vendor neutral certification and now I am thinking of starting my journey of CCDE and I already started my planning with the same powerful questions which I asked myself before starting my CCIE journey.

When some one wants to start a new journey he needs to  plan the path and the road of success, while doing so I discovered Cisco Learning Network has everything one can imagine to start the journey of CCDE. I would recommend those who are planning for CCDE written exam to have a look at CLN CCDE page, its quite impressive as one can measure where he/she stands in terms of understanding the concepts, what are his/her strong points? What are the key technologies or concepts he/she needs a more attention.

It’s a one pit stop for all CCDE aspirers as in the Streamlined CCDE Written Preparation resources one can not only see what books to be referred, but also there are links for Cisco Validated Designs, YouTube videos and Cisco live videos. The credit goes to the early CCDEs and program mangers like

Orhan Ergun  – CCIE & CCDE

Elaine Lopes – CCDE and CCAr Program Manager

Andre Laurent – CCIE & CCDE

Virgilio Spaziani – CCIE & CCDE

Their hard work and commitment to help aspiring CCDEs is really commendable.

One can find me on both Google CCDE study group and Cisco Learning Network CCDE Study group for any further collaboration on the preparations of CCDE. I wish all the CCDE aspirers all the best.

September 19, 2015  4:43 PM

Palo Alto Networks Firewall Configuration Management Auditing

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
Auditing, Configuration management, firewall, router, Troubleshooting

Palo Alto Network Firewall offers configuration-auditing feature, using this feature one can compare any two configuration files and see the difference. Palo Alto firewalls after comparing any two configuration files, highlights the differences using color coding schemes. Following color codes are used to highlight the changes in comparison between any two configuration files.

Yellow: Indicates a change

As you can see from the below snap shot when the Palo Alto Networks Firewall was started it didn’t had any IP address assigned to interface Ethernet 1/1

After adding an IP address the audit result shows the addition in Yellow color

Screen Shot 2015-09-19 at 7.40.04 PM

Green: Indicates an addition

The below snapshot shows an that Ethernet 1/1 was added to virtual router and this reflected by green color.

Screen Shot 2015-09-19 at 7.26.38 PM

Red: indicates a deletion

The below snapshot clearly shows that virtual router was deleted and its been highlighted in red color.

Screen Shot 2015-09-19 at 7.30.09 PM

This innovative and graphical way of doing comparison between different versions of configuration proves to be a very handy tool for troubleshooting. These kinds of tiny little features makes Palo Alto Networks Firewall really of the next generation. Palo Alto came out with some unique features which differentiates them from rest of the player.

September 17, 2015  9:46 AM

Three golden rules for designing a Networks

Yasir Irfan Yasir Irfan Profile: Yasir Irfan
Hardware, LINKS, Network design, Routing protocols

When it comes to either designing a network  or upgrading an existing network with new design most of us think from technical prospective like what kind of hardware we need, what routing protocols we need to use , what type of links needed etc. This comes true for those who are deeply involved in technical tasks. Rather we need to focus more on the characteristics of the network, what is the motive or goals of the network design we are preparing for and how the network transports the traffic to its destination such that it serves the business needs.

The network which we are designing should be capable of the following characteristics

  • Reliable and resilient
  • Manageable
  • Scalable

These are the three golden rules which one can consider while designing a network.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: