- Category: SecureTrack
When setting up a USP, first of all the networks need to be assigned to Zones. This is done via Menu > Network > Zones. Here Zones and corresponding networks can be edited and/or imported.
In many cases a "joker" is needed to fetch all IP addresses which are not mentioned in a Zone. Since longer time the default Zone "Internet" is available here. It matches for all official IP addresses not being in another Zone.
Big enterprises have possibly also private IP addresses (RFC 1918) they don't trust. So here another "joker" is necessary. Current versions of SecureTrack allow to use:
Zone of all official IP addresses that are not belonging to any other Zone in SecureTrack
- Unassociated Networks
Zone of all private IP addresses that are not belonging to any other Zone in SecureTrack
So it's quite easy to set up a USP that matches for all IP addresses (official as well as private). It might look like e.g.
In this example, allowed and forbidden traffic between the Zones "Internal", "DMZ", "Internet", and "Unassociated Networks" is described, matching for all (official and private) IP addresses.
- Category: TOS
Some customers have moved to Check Point R80.30 (or they plan it).
Tufin will support R80.30 from TOS 19-1 HF3 on. (Link requires authentication to the Tufin Portal).
Earlier versions might result in problems when connecting R80.30 to Tufin.
Update August 2019: Tufin TOS 19-1 HF3 is available for download now
- Category: SecureTrack
What is Policy Analysis?
Since a long time SecureTrack offers Policy Analysis to check the way a packet takes through the topology. Besides the corresponding firewalls and routers, it's also shown if the packet is allowed to pass or not. Queries can be saved and run later. So it's possible to have many queries configured and to run them when needed, e.g. when a change in the Topology has taken place. As shown below, queries as well as results are quite easy to understand.
Policy Analysis in TOS 19-1 - upgrade
When upgrading to TOS 19-1 the Policy Analysis is still there and can be used. Additionally, the "Interactive Map" allows now to save queries.
Policy Analysis in TOS 19-1 - new installation
When TOS 19-1 is not upgraded but newly installed, Policy Analysis can't be found in the menu any more. This points out, that Tufin is going to remove the Policy Analysis and to move the functionality to the "Interactive Map". If Policy Analysis is needed in a new installation of 19-1 it can be activated via stconf:
- Using the WebUI
Log in to SecureTrack and open https://<IP_of_ST>/stcgitest.htm
Here you find the section Configuration > Edit StConf > Fetch Current Conf
When clicking the button, the configuration is shown. Browse down to the line that refers <show_legacy_pa>
Change <show_legacy_pa>0</show_legacy_pa> to <show_legacy_pa>1</show_legacy_pa>
and don't forget to press the button "Submit New Conf"
When you log in again, the menu shows Policy Analysis as wanted.
Even if you can use Policy Analysis in 19-1, please be aware that this feature will probably removed in one of the next versions.
Currently there is no way known, how to migrate queries of Policy Analysis to queries of Interactive Map.
If you know a way, please send me a note - thanks.
- Category: SecureChange
When configuring Tufin SecureChange, the corresponding SecureTrack server needs to be connected to the SecureChange server.
So in a first step an administrative user is configured in SecureTrack. This user is for a later authentication of SecureChange at SecureTrack.
Don't use reserved words like "Securechange" as username. This user won't be able to authenticate.
So if the user for SecureChange is configured, test it by logging in using the WebUI. If this works, SecureChange also will be able to authenticate.
The Authentication of SecureChange at SecureTrack is machine based. Using a certificate is currently not possible.
So use a very strong password not known to any person for this purpose.
The next step is to log in at SecureChange with permission to configure "Settings". In the menu select "SecureTrack".
This information needs to be provided if SecureTrack isn't configured to run on the same system as SecureChange:
- Select "Remote host" and provide the IP address of SecureTrack, SecureChange will connect to.
- Provide user name and password as configured in SecureTrack.
- optional: "Show link to SecureTrack" - sometimes useful for admins, but maybe confusing end users working with SecureChange. It selected, the IP address configured in (1) will be linked here.
- Provide "Internal IP of SecureChange server" means to fill in the IP address SecureTrack uses for connections to SecureChange. This IP address will also be in the link to SecureChange shown in the login screen of SecureTrack.
For (1) as (4) a host name can be configured also, but this name needs to be resolved using DNS.
If the configuration is ready, try the button "Test connection" on the right bottom of the page. This will test the connection and deliver a result. This result can be, that an authentication error has occurred, the connection couldn't be established - or that the connection is ok. If this is the case, press "Save" and the task is finished.
The test done checks not only the connection from SecureChange to SecureTrack, but also from SecureTrack to SecureChange. So it might happen that you can connect from SecureChange to SecureTrack using 443/tcp - and the WebUI delivers a connection error. This is because maybe the back connection from SecureTrack to SecureChange isn't possible. In this case, error message might point to other reasons. So it's useful to check the back connection.
Connecting SecureChange to SecureTrack is essential, since the license is held in SecureTrack. Besides this, SecureChange uses features of SecureTrack like e.g. Zones and USP as well as the Topology.
- Category: Version update
Tufin has released R19-1, the first version of the Tufin Orchestration Suite in 2019. TOS 19-1 is available as GA now, delivering some improvements, e.g.
- Interactive Map of SecureTrack allows to save queries now. This allows administrators to save the most important path queries and to re-use them again
- SecureApp has been optimized for color-blind access. It's compatible with corresponding industry standards now.
Change Automation and Orchestration
Clone Server Policy Workflow allows easy duplication of access permissions when new servers are introduced. This might also help when a server is moved from one address to another.
Supported platforms are Cisco ASA, Cisco Firepower, Check Point R80 (CMA, SmartCenter, MDS), Fortinet FortiManager advanced and Palo Alto Panorama advanced
Enhanced sorting of selections when adding or removing components. This might help e.g. when an assingment to some users / groups is done. The box for selecting / deselecting them can be sorted not only by name but also by "add" or "clear". This is relevant for "Access Request" and "Clone Server Policy" workflows.
Security, Risk and Compliance
- SecureTrack, SecureChange
Map Ticket to Rule is a new feature that maps a fully or paritally implemented ticket to rules. This mapping is based on results of the Verifier.
Enhancements for "Legacy Rules". The Designer now places changes above a legacy rule now only if the legacy rule traffic intersects the Access Request traffic. Until now, this was done always.
Enhanced USP allows to automatically trigger a violation for IP addresses that are not explicitely included in any USP. They can easily be added to relevant zones.
A new network zone called "Unassociated Networks" is predefined. It includes all private IP addresses that are not defined in any other zone. This is the "private equivalent" to the predefined zone "Internet". It's used in SecureTrack as well as SecureChange and SecureApp.
Devices and Platforms
NAT support for Palo Alto Panorama advanced to track changes on NAT rules
URL Filtering Support for Palo Alto Panorama advanced to track changes in URL Category
Cisco Nexus VXLAN Routing Support is implemented now and shown in the Interactive Map
Routes configured in Juniper MX Router Devices can be selected now, i.e. if there are many dynamic routes specific networks and routes can be added / deleted which might increase router performance
"Server Decommission" is supported now for Global Objects defined in Check Point MDS
- Support of new devices:
- Check Point R80.20 (Check Point API version 1.1)
- Forcepoint SMC 6.5 (SMC API version 6.4)
- Fortinet FortiManager 6.0.2
- Improvements for SecureTrack
- Unified Returned JSON Array Format is completed now
- Panorama Firewall Name to Rule- and Policy-related API (PolicyTargetDTO)
- Adding Devices via API is possible now (for Check Point R77, Cisco ASA without Virtual Contexts, more to follow)
- Get Panorama URL Categories
- Compare Traffice Between Devices
- Service Object Search
- Modify Unified Security Policy via API is possible now
- Improvements for SecureChange
- Clone Server Policy Request DTO
- Reject Ticket via API
- Map Rules to Ticket
Further improvements as well as corrections are included.
The latest version of the Tufin Orchestration Suite can be found at the Tufin Portal: https://portal.tufin.com
- Category: TufinOS
Starting with April 2019, Tufin has published TufinOS 2.18. This version is available for download now in the Tufin Portal.
If you start a new installation, you don't need to install and upgrade TufinOS 2.15 anymore, since TufinOS 2.18 is available for clean installation (ISO or Appliance) also.
New features and updates of TufinOS 2.18 are:
- 28 RPMs are updated to version CentOS 6.10, which is the latest version
- Microsemi Adaptec ARCCONF Command Line Utility version 3.01.23531
- PostgreSQL version 9.4.21-1PGDG.rhel6
- sTunnel version 5.50
- PAM Radius version 4.0
An updated description how to upgrade TufinOS in HA environments is available in the Tufin Portal.
Page 2 of 13