www.tufin.club
SecureTrack and Check Point R80.20
- Details
- Category: SecureTrack
Tufin SecureTrack supports Check Point R80.x since a longer time now. Using a Check Point Management R80.20 may result in a problem.
A Check Point Management R80.20 can be connected to SecureTrack without a problem - at the first glance. All checks regarding OPSEC and Management API are ok, the device is shown in green pointing out that everything is ok.
But getting a revision seems not possible. Everything is green, but no revision shows up. In the corresponding log the statement "Checkpoint error code: http_forbidden" can be found.
This problem can be solved by using the correct version of Tufin SecureTrack.
Check Point R80.20 is supported from TOS R18-2 HF 1.2 and TOS R18-3 GA on (not by RC).
Upgrading to one of these versions solve the problem.
Check Point API client error - part 2
- Details
- Category: SecureTrack
Some months ago, an article about potential problems connecting SecureTrack to a Check Point R80 Management Server has been published here. Most of the points are still true - except the option
Menu > Settings > Monitoring > Check Point Management R80 > Test Connectivity
is now also testing the API connect to the Check Point Management Server (e.g. in R18-3).
As pointed out in Tufin Knowledge Center #10413, one reason for an API client error is the API itself. At the CLI of this machine an "expert" user can (and should) check the status of the api to be sure it's up and running. Tufin points out the resolution to allow access to the API from "All IP addresses", which is correct.
It might happen that access isn't possible even if the change has been configured, published via SmartConsole and the API has been restarted using CLI. Assuming that access to port 443/tcp is granted, another reason might be possible. In our lab this problem has been found using Check Point R80.20 with SecureTrack R18-3. It might happen in your environment also, but not necessarily.
Even if the change of allowed IP addresses has been published and the API has been restarted, it might not be active for the API. This can be checked by an "expert" user
[Expert@SMS]# api status
API Settings:
---------------------
Accessibility: Require ip 127.0.0.1
Automatic Start: Enabled
So in this case, the change hasn't become active and the API allows access from 127.0.0.1 only. This might also not change when the API is restarted again. In this case, try the command
[Expert@SMS]# api reconf
API reconfigured successfully
[Expert@SMS]# api status
API Settings:
---------------------
Accessibility: Require all granted
Automatic Start: Enabled
After the completion of the first command, the change is active and SecureTrack can access the API.
Potential vulnerability in SecureTrack
- Details
- Category: SecureTrack
If Tufin SecureTrack is monitoring Cisco Firewalls and Routers, credentials to authenticate SecureTrack here need to be provided. Now it has been found, that the Enable Password may be exposed in a log file. This has been rated as "High Severity Vulnerability".
Please note that the password is shown in a log file of SecureTrack only, so only administrators with CLI access might get this information, but no unauthenticated attackers.
Affected versions of SecureTrack are R17-1, R17-2, R17-3, R18-1, R18-2 and R18-3, respectively.
A vulnerability fix will be included in HFs for supported versions:
- TOS 18-1: Fix is included in R18-1 HF3.1 which will be published November 4th, 2018
- TOS 18-2: Fix is included in R18-2 HF1 which will be published Novermber 7th, 2018
- TOS 18-3: Fix is included in R18-3 RC1.1 which will be published November 4th, 2018
If you use an older version please plan an update to a version supported by Tufin.
Newer versions of Tufin Orchestration Suite will have the Fix included.
Authentcating ST Users with LDAP Server
- Details
- Category: SecureTrack
Since many years it's possible to authenticate users and administrators of SecureTrack via LDAP Server. This method is different to the others using TACACS+ or RADIUS. Here, a user needs to be defined. In this profile, the authentication method is selected: Local, TACACS+ or RADIUS.
Authentication using LDAP is a little different. First of all attaching a LDAP Server to SecureTrack needs to be done by Menu > Configuration > External Authentication > LDAP
Testing if the authentication of SecureTrack at the LDAP Server with LDAP Bind password isn't possible yet.
The "Administrators group DN" includes a group of AD users that are entitled to have administrative rights in SecureTrack. "Users" with restricted rights are located in the "Users group DN".
These users are not listed in Menu > Configuration > Users until their first login, they don't need to be imported.
When a LDAP user logs in to SecureTrack the first time, SecureTrack will check his name and credentials using LDAP. Depending in which group the user is found he will geht the corresponding rights.
- Administrators group:
User gets full administrative rights, if a Multi-Domain environment is configured, the right will be "Super-Admin" - Users group:
User has restricted rights as "user", if a Multi-Domain environment is configured the right will be "Multi-Domain Users". But with the first login no device is showed to the user. This right has to be configured manually by an administrator after first login of the users.
Besides this, the user is shown in the list of configured users in SecureTrack with Authentication method LDAP.
Each time such a user authenticates, the password is checked against the LDAP server.
How to manage Licenses in SecureTrack
- Details
- Category: SecureTrack
Licensing in Tufin Orchestration Suite is done centrally in SecureTrack. Even if SecureChange / SecureApp is run on a separate server, licenses are stored in SecureTrack and published to the other machine. If a license is installed, it needs to be activated. This is quite easy using the "Generate" button. When getting the activated license, it should be installed in SecureTrack so it's bound to this system.
When switching from an Eval license to a permanent license (and vice versa) it might happen that the newly installed license isn't recognized correctly. In this case, some CLI commands regarding the database are useful.
Before you continue, create a BACKUP of your installation of SecureTrack!
It includes all configuration and also the license. Be careful when you use the commands below - without license Tufin Orchestration Suite will not work at all!
For getting further information or deleting licenses CLI access to SecureTrack is necessary.
As usual for Tufin commands, this needs to be done as root or using the sudo command.
Next steps could be:
Show the currently installed licenses
[root@TufinOS ~]# psql securetrack -Upostgres -c "select * from st_licenses"
Delete all licenses of type "full", i.e. "real" licenses
[root@TufinOS ~]# psql securetrack -Upostgres -c "delete from st_licenses where license_type='full'"
Delete all licenses of type "evaluation"
[root@TufinOS ~]# psql securetrack -Upostgres -c "delete from st_licenses where license_type='evaluation'"
Delete all licenses of both types, i.e. "full" and "evaluation"
[root@TufinOS ~]# psql securetrack -Upostgres -c "delete from st_licenses"
As written above, be careful with these commands and use them only when a current Backup is done!
Tufin Orchestration Suite 18-2
- Details
- Category: Version update
Tufin has released R18-2, the second version of the Tufin Orchestration Suite in 2018. TOS 18-2 is available as GA now, delivering some improvements, e.g.
Cloud
- SecureTrack
Automatically Onboard AWS VPCs
VPCs are automatically detected now, which covers adding or removing them.
Security Policy Change Automation and Orchestration
- SecureChange
Commit Policy Changes. Using this function, policies are pushed from the Management Server to the Firewalls using the Designer. Supported for Check Point, Palo Alto and Fortinet - SecureTrack, SecureChange
The feature Change Windows allows to schedule time slots for committing policies from Management Server to Firewalls, including new report features - SecureChange
Customizable Rule Names for FortiManager allow to define a rule name directly from the SecureChange Designer when changes are implemented. - SecureChange
Change Automation Enhancements for Cisco Firepower allow to implement changes of the security policy automatically.
Devices and Platforms
- SecureTrack
Inline Layer Support for Check Point R80.10 - SecureTrack
Migrate or Delete Multiple Devices for some Cisco and Check Point Devices using “Device Bulk Tasks” - Support of new devices
- VMware NSX 6.4.0
- Cisco ASA 9.8
- Fortinet FortiManager 5.6.3
- Fortinet FortiGate 5.4.7 and 5.6.3
- Forcepoint SMC 6.4
- Palo Alto Panorama 8.1
REST API
- Improvements for SecureTrack/SecureChange/SecureApp
Upgrades of REST API Stanadard (JAX_RS) from 1.1 to 2.1, compliant with Java EE8 Apache CXF (which implements JAX_RS 2.1) upgraded from 2.6.16 to 3.2.1 - Improvements for SecureTrack
- Unified Returned JSON Array Format for these APIs:
Get devices, Get device by Id, Add offline device, Update offline device, Get rules by device, Get specific rule, Rule Search APIs - Generic Devices APIs:
Fully manage adding, deleting, or modifying generic devices to the Interactive Map via the REST APIs. New argument “update_topology”. - Sync Topology APIs
Synchronization of Interactive Map by “Fast Topology Sync” or “Full Topology Snyc” - Generic VPN connections API
Retrieval of a list of generic VON in the Topology Map - Check Point Inline Layer Support
Parameter “include_subpolicy” allows support of this mode - Additional Data Returned for Check Point Devices
API responses for “get devices”, “installed_policy” and “parent_id" - Filtering Service Group Members
Optional parameter “show_members” with more information - Support for Pagination in USP Exceptions
Better management of a large number of USP Exceptions - Retrieve Domains from SecureTrack
New “Synchronize Domains” API retrieves all domains from SecureTrack, also synchronizing SecureChange Domains
- Unified Returned JSON Array Format for these APIs:
Further improvements as well as corrections are included.
The latest version of the Tufin Orchestration Suite can be found at the Tufin Portal: https://portal.tufin.com
Page 13 of 22