Tufin.club
  • www.tufin.club
  • imprint
  • data privacy statement

www.tufin.club

Tufin Orchestration Suite 16-2

Details
Version update
Last Updated: 03 August 2016

Today, Tufin has published the second Major Release of TOS in 2016. Therefore it's called 16-2. Please find some information about changes in this version below.
This version includes some improvements, e.g.:

  • Optional configuration of the user interface without Adobe Flash components
  • Enhanced syslog support, up to 150k syslogs per second
  • Improvements regarding Distributed Architecture

Cloud:

  • Provisioning of AWS Security Groups, policy changes to AWS and built-in risk analysis checks
  • Unified Security Policy for AWS

Automation:

  • End-to-End Automation support for FortiManager ADOM Policies in SecureChangen, incl. Risk Analysis, Designer, Provisioning, Server Decomissioning
  • Configurable Designer Suggestions regarding objects selected
  • REST API allows the change of ownership of a Closed Ticket is possible now

Security and Compliance:

  • Find permissive Rules using the Rule Documentation feature to optimize policies
  • Rest API allows to configure Flow Exceptions in a Unified Security Policy

Devices and Platforms:

  • Fortinet:
    Full support of FortiManager 5.4 using ADOM Policies
  • Palo Alto:
    Support of Panorama 7.1 regarding Devices using Device Groups
  • Cisco:
    Cisco CSM 4.8 and 4.9 are now certified to work with TOS
  • Cisco:
    Cisco ASA 9.5 is now certified to work with TOS
  • Forcepoint:
    Stonesoft 5.10 is certified to work with TOS

 

Changes regarding SecureTrack:

  • Unitied Security Policy for AWS
  • Analyzing and Optimization of Policies using Rule Permissiveness Level
  • IPv6 Support for Stonesoft Devices, Definition of IPv6 Zones in Zone Manager is possible now
  • Filtering of Cisco ASA passwords is possible (optional)
  • Support of FortiManager 5.4 managing Devices using ADOM Policies
  • Managing Devices using Device Groups in Palo Alto Panorama 7.1 is possible
  • Using REST API allows to get matching rules for Unified Security Policy exceptions as well as to configure flow exceptions is the Unified Security Policy

Changes regarding SecureChange:

  • Provisioning of AWS groups
  • End-to-End Automation for FortiManager
  • Configurable Designer Suggestions - Object Selection
  • View of additional Palo Alto Network Fields
  • IPv6 Support for Stonesoft Policies and for Risk Analysis in Unified Security Policies

Changes regarding SecureApp:

  • View of additional Palo Alto Network Fields
  • Support of FortiManager ADOMs
  • IPv6 support allowing security compliance checks for violations to IPv6 Zones

 

Further improvements and corrections are included.

 The latest version of the Tufin Orchestration Suite can be found at the Tufin Portal: https://portal.tufin.com

 

TOP Plugin can't be uninstalled?

Details
SecureTrack
Last Updated: 25 July 2016

When using one or more TOP Plugin other devices than fully supported devices can be monitored. Even if the documentation is very basic, some use cases are there.

Uninstalling a TOP Plugin using the "Red X" in Menu > Settings > Monitoring > TOP Plugins might not be possible in some versions.
If you run into this problem, do an upgrade to TOS R16.1 HF3. This version allows to uninstall a TOP Plugin (again).

 

 

TOS admin access lost?

Details
Basics
Last Updated: 15 July 2016

For administration of Tufin SecureTrack and Tufin SecureChange you need at least one administrative account. This account must not be lost and the password must not be forgotten.

If it is forgotten, there is a way to reset the admin account if CLI access is possible as root.

 

SecureChange / SecureApp

Resetting the admin account here is quite easy. Just type

#  scw help
scw: Usage: scw help|info|version|reset-admin

and you see the solution. Resetting the account by

#  scw reset-admin

will deliver the password admin which needs to be changed at the next login.

 

SecureTrack

The procedure shown for SecureChange doesn't work for SecureTrack. But there is a command that will allow you to define a new (administrative) user.

# st_add_user

This command starts a routine to define a new user. You will be asked questions about username, password, Mail-Address and -configuration as well as real name adn date format.
After this procedure this user can be taken for a login and for modifying the "old" admin user. If needed, this new user can be deleted after having the password for the other admin account resetted.

 

How to connect Check Point Management to Tufin SecureTrack

Details
SecureTrack
Last Updated: 10 July 2016

How to connect a Check Point Security Management Server (SMS, aka SmartCenter) R77.x to SecureTrack:


Prepare the Check Point SMS

It's recommended to define a Permission Profile for Tufin's access to the SMS and the logs. If there is only SecureTrack and no provisioning by SecureChange is wanted, a Read-Only Profile is sufficient. To define it, go in the SmartDashboard Menu to Manage > Permission Profiles and define a Read-Only profile.

Next, an object of the type Host Node is needed representing the System Tufin SecureTrack is running on. This is necessary because the IP address is needed later when the OPSEC Application is defined. To define it, go to Manage > Network Objects > New > Host Node.

 

To initiate the Secure Internal Communication (SIC), defining an OPSEC Application is necessary. To do so, open Manage > Servers and OPSEC Applications and define a new one. Necessary protocols are LEA (Log Export API) to have access to logs as well as CPMI (Check Point Management Interface) to have access to the objects and rules.

It's necessary to configure the permissions of Tufin SecureTrack within Check Point. For CPMI as well as for LEA the Permission Profile defined earlier should be selected. You are free to allow further access, but it's not necessary if the use of only SecureTrack is planned.

 

After these steps, the SIC should be initiated by setting an Activation Key. This is a One-Time Password for authenticating Tufin SecureTrack at the SMS. When this authentication is successful, a newly generated certificate is transferred to SecureTrack. From then on, authentication is based on this certificate. The communication is encrypted as it is between the Check Point components like e.g. SMS and Firewall Module.

When the password is typed twice, the button Initialize finishes this part of the configuration.

Please don't forget to make this newly generated certificate available by installing the Database. This is done by Menu > Policy > Install Database. If you forget to install the database on the SMS, the connection to SecureTrack won't work.

 


Prepare the Check Point Rulebase

If there is a Firewall between Tufin SecureTrack and Check Point SMS, a rule must allow the necessary access. Besides the access using LEA and CPMI furhter connections are needed, e.g. for Certificate Management:

  • 18210/tcp
    Connection to SMS for authenticating using the one-time password and for retrieving the certificate
  • 18264/tcp
    Connnection needed to access the CRL running on the SMS to check if the certificate presented by SMS is valid
  • 18184/tcp
    Connection from SecureTrack to SMS / Logserver to retrieve log data (statistics) and Audit log data (recognition of actions done by administrators)
  • 18190/tcp
    Connection from SecureTrack to SMS with a CPMI client to retrieve the latest revision

So a rule needs to be configured. This is necessary if any firewall is between SecureTrack and SMS. When a Check Point Firewall is in between, the rule could look like this:

 


Configure Check Point SMS in Tufin SecureTrack

The Check Point SMS needs to be defined in SecureTrack so the configuration can be monitored. To do so, some steps are necessary. First of all, connect with administrative rights to Tufin SecureTrack using a web browser using HTTPS (443/tcp). In the default configuration doesn't redirect a HTTP request from port 80/tcp to the correct port.

 In the Menu go to Settings > Monitoring > Manage Devices. On the left pane all monitored devices are listed. On the right side a new device can be definded. Here, select Check Point SmartCenter.

After this selection a wizard starts, asking for several configuration options in five steps.

The Device Type can't be changed here since this option has been selected before. The other options are:

  • Name for Display
    Name shown in SecureTrack for this device
  • Domain
    If SecureTrack is configured to use Domains, the corresponding Domain can be selected there. Please be aware that using this option clearly separates all data.
  • Get revisions from <IP> or <Offline File>
    If the SMS is monitored live, the IP Address of the SMS is provided here. If there is no direct access, configuration data can be imported. Please be aware that this option requires a license also - even if there is no monitoring of the changes.
  • Usage Analysis
    Here it's selected which data are collected. Esp. when "Rule and Object Usage" reports are required, the first two options need to be selected. Besides this, it's recommended to select the enablement of the Topology. In this case, all information that require Topology is available (e.g. Policy Analysis, Zones, Compliance Rules...).

The next step is to authenticate using the One-Time Password and to retrieve the certificate used from then on to authenticate.

It's necessary to provide the name of the OPSEC Application configured in Check Point SmartDashboard. The Activation Key is the One-Time Password provided during configuration in Check Point SMS.

In many cases the next windows can be kept using "default" for the OPSEC settings.

If there were changes configured in $CPDIR/conf/sic_policy.conf they can be considered here. It's all about authentication used for LEA and CPMI. All relevant Check Point options can be selected, so a successful authenticated connection from Tufin SecureTrack to Check Point SMS is possible.

In some cases the configuration for the timing of monitoring needs to be adjusted.

As in many cases, the default setting is useful when the global configured timing is sufficient.

Finally, the configured connection should be tested. If this is ok, the button Save finalizes the configuration.

 


Monitoring the Check Point SMS

The status of monitoring the SMS can be checked using Menu > Settings > Administration > Status. Depending on the connection and the load on the Check Point SMS the status will remain some time in "Starting" and "Yellow". When it has changed to "Green" the SMS is shown under Menu > Compare also in green and after a short time the first revision will show up.

 

 

 

 

 

No Reports from one Firewall-Cluster?

Details
SecureTrack
Last Updated: 27 June 2016

Let's imgine following situation:

Tufin SecureTrack is licensed for 2 Firewall Clusters which are centrally managed by one Check Point Security Management Server (resulting in a single SecureTrack ID).
Reports for e.g. Rule and Object Usage deliver results for one Firewall Cluster only. Reports on the second Cluster don't contain any data.

This behavior isn't as expected since it cannot be the connectivity between the Log Server and SecureTrack. Besides this, logs for this cluster are there and shown in the tools by Check Point. So Log data are there but SecureTrack doesn't deliver any report.

 

This behaviour can be reasoned by a missing license! In our case only one FW-license was attached to the Firewall Cluster, but not the second one. So the Firewall Cluster not delivering reports wasn't licensed full and therefore no reports were generated. After (re-)attaching the license reports deliver results for both Firewall Clusters - as expected.

 

 

Upgrade from a very old version

Details
Version update
Last Updated: 11 June 2016

Situation

Tufin delivers new versions quite often. If you are working with TOS and all your requirements are fulfilled - fine. But sometimes an upgrade is recommended, e.g. if there are new features you want or support is needed. It's quite sure that Tufin Support will recommend an upgrade if you have a problem with a version which is very old.

Upgrades can't always be done inplace. Esp. when upgrading TufinOS from version 1.x to 2.x a fresh install of the OS is needed.
We do upgrades mostly running in virtualized environments. Using Snapshots it's easy to restore the older version if something went wrong.

The upgrade path

Example: Starting with TufinOS 1.1x and TSS 6.1
To upgrade from version 6.x to R16-1 these steps are recommended

  • Upgrade to version R12-6
  • Upgrade to TufinOS 1.17 (if not done before)
  • Upgrade to version R13-3 GA
  • Upgrade to version R14-1 GA
  • Upgrade to version R14-3 GA
  • Install TufinOS 2.11 and R14-3 GA. Then migrate the configuration to this version using backup/restore.
    If an upgrade of TufinOS isn't possible, upgrade to PSQL version 9.
  • Upgrade to R15-1 GA
  • Upgrade to TufinOS 1.21 - only needed if still TufinOS 1.x is used
  • Upgrade to R15-3 GA (direct upgrade to R16-1 is possible)
  • Upgrade to R15-4 GA
  • Upgrade to R16-1 GA

This procedure has been proven and should work in many situations.

 

 

Page 22 of 24
  • Start
  • Prev
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • Next
  • End
Bootstrap is a front-end framework of Twitter, Inc. Code licensed under MIT License. Font Awesome font licensed under SIL OFL 1.1.