www.tufin.club
Tufin Orchestration Suite 19-3
- Details
- Category: Version update
Tufin has just released TOS R19-3, the third and final version of the Tufin Orchestration Suite in 2019.
TOS 19-3 is available as GA now, delivering some improvements, e.g.
Change Automation and Orchestration
- Rule Modification Workflow
With this workflow it's possible to modify the fields Source and Destination within an existing rule. Here new as well as existing objects can be added or removed. This feature is fully integrated in SecureTrack Policy Browser and delivers full API support
Supported devices are Check Point R80, Cisco FMC, Palo Alto Panorama, Cisco ASA, and Juniper SRX - Group Ticket Notifications
Teams can work better now with this feature. The requester of a ticket can now specify a group of users that will receive all E-Mail notifications - Palo Alto Panorama FQDN Objects in Access Request
FQDN can be used now, so it's no more necessary to convert names to IP addresses when used in an Access Request - Check Point R80 - Support of IPv6 addresses
Access Requests now can use IPv6 addresses in source and/or destination. This is true for new as well as existing rules. Besides this, also new IPv6 objects can be created. Manual Target Selection in SecureChange is required
Devices and Platforms
- Check Point R80 syslog
Usually, Check Point Log/Management Servers deliver their logs to SecureTrack using LEA. If wanted, now these logs also can be sent by syslog to SecureTrack - Cisco ACI Visibility
The ACI policy is now shown in SecureTrack, including EPGs, VRFs, Contracts, Subjects, ... So an instant view of policy details is possible - Cisco ACI Path Analysis
ACI devices are included in SecureTrack Topology, so the traffic flow in and out of the ACI device is shown - Cicso FMC Visibility
Now FMC zones are shown in retrieved FMC rules, e.g. in Policy Prowser, View Policy etc. - Forcepoint
Improvements regarding speed of revision retrieval - PAN Panorama syslog
Panorama can be configured now to send syslog by TCP/TLS instead of UDP - PAN Panorama Device Groups
Panorama Device Groups (DG) can now be migrated to non-default SecureTrack domains from any level in the group hierarchy, improving management of Domains - VMware NSX-T
SecureTrack and Secure Change now support NSX-T. It includes Change Tracking, Clean Up, Violations, Policy Browser, Reports, Topology, etc.
REST API
- Check Point R80
- Adding or Updating Managed Devices (CMA or SMC) via API
- Adding new device (CMA or SMC) via API
- Palo Alto Panorama
- Support of URL Filtering using API
- SecureChange Designer
- Enhancements for Set Rule location via API
- Rule Modification Workflow
- Support of many features regarding the Rule Modification Workflow via API
- SecureApp
- Getting Application Interfaces is possible now using API
Further improvements as well as corrections are included.
The latest version of the Tufin Orchestration Suite can be found at the Tufin Portal: https://portal.tufin.com
F5 - "wrong arguments"
- Details
- Category: SecureTrack
When F5 devices are monitored with Tufin SecureTrack, every part of the configuration can be found here (except ACLs).
It might happen that in SecureTrack > Menu > Settings > Administration > Status the status sign is yellow, stating "Error: Wrong arguments". At the first glance, there seems to be a problem regarding authentication or version of F5. But this isn't necessarily so complicated.
Looking at the Client Log in /var/log/st for example this information can be found:
FAULT: 14713 20191221 08:24:06.041 what() -> Error occurred when pulling configuration from the device: Wrong arguments
"send_error "\n$expect_out(buffer)\n""
send_error "\nsent username\n"
send_error "\nsent username\n"
11255 20191221 08:24:05.030 Error occurred when pulling configuration from the device: Wrong arguments
FAULT: 11255 20191221 08:24:05.031 what() -> Error occurred when pulling configuration from the device: Wrong arguments
If you find the error mentioned above, just check the connection. Even if it isn't obvious, a connection time out might have occurred.
"Wrong arguments" is also displayed if there is no ssh connection possible between SecureTrack Server and F5.
SecureTrack R80 Upgrade Error
- Details
- Category: SecureTrack
When upgrading Check Point Management, MDS or CMA from R77.x to R80.x it seems quite easy to upgrade it in SecureTrack, too. Just go to Menu > Settings > Monitoring and select the device that has been upgraded. The Menu on the right side shows the option "Upgrade to R80", you select it and provide the credentials for the API user at the Check Point Management. After that, the device monitoring has been changed to R80 and everything runs fine.
Problem
What happens if "st stat" or Menu > Admininstration > Status shows an error:
myDevice 10.1.1.1 14 CMA 1001 valid Error: Upgrade device to R80 in Settings > Manage Devices > Monitored Devices
The situation seems a little bit confusing - the upgrade has been done in Check Point as well as Tufin SecureTrack, but the status shows an error as if the Management Server has not been upgraded in SecureTrack.
Reason for this error
The reason for this error is a change of the management type in the data base - and the change has not taken place in the data base. This is not the "normal way", but it might happen that the change is not recognized in SecureTrack. The differences are:
SmartCenter R77.x is referred as cp_smrt_cntr
SmartCenter R80.x is referred as cp_smc_r80plus
CMA R77.x is referred as cp_cma
CMA R80.x is referred as cp_domain_r80plus
Solution
First - as every time you work on the data base: Perform a backup (!)
For a Check Point CMA the necessary next procedure looks like this:
- Check the ID of the device using "st stat". This example uses the Management ID 14
- Check the current status of the device:
[root@TufinOS]# psql -Upostgres securetrack -xc "select cp_type from managements where management_id=14"
-[ RECORD 1 ]---
cp_type | cp_cma
[root@TufinOS ~] - Update the variable in the data base and re-check the status
[root@TufinOS ~]# psql -Upostgres securetrack -xc "update managements set cp_type='cp_domain_r80plus' where management_id=14"
UPDATE 1
[root@TufinOS ~]# psql -Upostgres securetrack -xc "select cp_type from managements where management_id=14"
-[ RECORD 1 ]--------------
cp_type | cp_domain_r80plus
[root@TufinOS ~] - Restart the monitored device
[root@TufinOS~]# st restart 14
Stopping SecureTrack process for server myDevice - 10.1.1.1 (Id: 14)
SecureTrack process stopped for server 10.1.1.1 (Id: 14)
SecureTrack for myDevice - 10.1.1.1 (Id: 14) was started successfully
[root@TufinOS ~]
After some seconds the status should have been changed - this can be checked either "st stat" or the WebUI.
The error shown above should not be shown any more. If other errors are shown, you need to continue troubleshooting. Maybe these links help:
https://www.tufin.club/index.php/24-securetrack/52-check-point-api-client-error
https://www.tufin.club/index.php/24-securetrack/73-check-point-api-client-error-part-2
Preventing Cluster HA failover
- Details
- Category: TOS classic
If TOS is configured to run as a cluster, a Virtual Cluster IP (VIP) is used for communication with SecureTrack and/or SecureChange server. Besides this, further interfaces are needed to configure a cluster, e.g. for Heartbeat. If the network interface of the Heartbeat is down, the cluster will do a failover. At first glance, this isn't a problem because users can still work using the VIP. But, for bringing TOS back to cluster mode with data replication, a maintenance window is recommended. The database sync takes some time and during this time the VIP is unreachable.
So if a cluster member is e.g. moved from one switch to another, a failover occurs. If this isn't wanted, the failure detection can be (temporarily) disabled by typing the command on the active member:
# hactl --pause-auto-failover
Run the command hactl status on both nodes after a few minutes and make sure the status shown is "unmanaged"
Then, replace the switch. If done so and having connected all cables on the active cluster member run the command:
# hactl --resume-auto-failover
After some (short) time, the status should be checked again using hactl status. It should be normal again, showing correct distribution of active / standby member as before.
TufinOS 2.19 available
- Details
- Category: TufinOS
In September 2019 Tufin has released TufinOS 2.19. This version is available for download now in the Tufin Portal (authentication required). TufinOS 2.19 is available as upgrade package only. So if you need to set up a new system, installing TufinOS 2.18 from ISO or USB is necessary befor upgrading to 2.19.
New features and updates of TufinOS 2.19 are:
- Update of 29 RPMs based on the latest version of CentOS 6.10
- Update of PostgreSQL to version 9.4.23
Please be aware that only TufinOS 2.19 is supported by Tufin now, i.e. older versions will also get no security related updates.
An updated description how to upgrade TufinOS in HA environments is available in the Tufin Portal.
AERAsec is 2018 EMEA Services Partner of the Year
- Details
- Category: Basics
Many thanks to Tufin for nominating us at Tufinnovate EMEA 2019 in Lisbon. We are proud to be awarded to be
2018 EMEA Service Provider of the Year
So about one year after becoming the first Tufin Service Delivery Partner in Central Europe, it's an honor for us to be awarded with this price.
Award Ceremony Tufinnovate 2019, Lisbon - Portugal, 11.09.2019
From left to right:
- Ruvi Kitov, CEO and Co-Founder Tufin Technologies
- Kevin Raff, IT Security Consultant AERAsec
- Dr. Matthias Leu, CEO and Founder AERAsec
- Mike Menegay, VP of Global Channels Tufin Technologies
- Remko Postma, Director of Channels EMEA Tufin Technologies
Page 10 of 22