Wednesday, 1 September 2021

Accelerate Data Lake on Cisco Data Intelligence Platform with NVIDIA and Cloudera

Cisco Data Intelligence Platform, Cisco Prep, Cisco Learning, Cisco Guides, Cisco Tutorial and Materials, Cisco Preparation, Cisco Career

The Big Data (Hadoop) ecosystem has evolved over the years from batch processing (Hadoop 1.0) to streaming and near real-time analytics (Hadoop 2.0) to Hadoop meets AI (Hadoop 3.0). These technical capabilities continue to evolve, delivering the data lake as a private cloud with separation of storage and compute. Future enhancements include support for a hybrid cloud (and multi-cloud) enablement.

Cloudera and NVIDIA Partnerships

Cloudera released the following two software platforms in the second half of 2020, which, together, enables the data lake as a private cloud:

◉ Cloudera Data Platform Private Cloud Base – Provides storage and supports traditional data lake environments; introduced Apache Ozone, the next generation filesystem for data lake

◉ Cloudera Data Platform Private Cloud Experiences – Allows experience- or persona-based processing of workloads (such as data analyst, data scientist, data engineer) for data stored in the CDP Private Cloud Base.

Today we are excited to announce that our collaboration with NVIDIA has gone to the next level with Cloudera, as the Cloudera Data Platform Private Cloud Base 7.1.6. will bring in full support of Apache Spark 3.0 with NVIDIA GPU on Cisco CDIP.

Cisco Data Intelligence Platform (CDIP)

Cisco Data Intelligence Platform (CDIP) is a thoughtfully designed private cloud for data lake requirements, supporting data-intensive workloads with the Cloudera Data Platform (CDP) Private Cloud Base and compute-rich (AI/ML) and compute-intensive workloads with the Cloudera Data Platform Private Cloud Experiences — all the while providing storage consolidation with Apache Ozone on the Cisco UCS infrastructure. And it is all fully managed through Cisco Intersight. Cisco Intersight simplifies hybrid cloud management, and, among other things, moves the management of servers from the network into the cloud.

CDIP as a private cloud is based on the new Cisco UCS M6 family of servers that support NVIDIA GPUs and 3rd Gen Intel Xeon Scalable family processors with PCIe Gen 4 capabilities. These servers include the following:

◉ Cisco UCS C240 M6 Server for Storage (Apache Ozone and HDFS) with CDP Private Cloud Base — extends the capabilities of the Cisco UCS rack server portfolio with 3rd Gen Intel Xeon Scalable Processors, supporting more than 43% more cores per socket and 33% more memory than the previous generation.

◉ Cisco UCS® X-Series for CDP Private Cloud Experiences — a modular system managed from the cloud (Cisco Intersight). Its adaptable, future-ready, modular design meets the needs of modern applications and improves operational efficiency, agility, and scale.

Cisco Data Intelligence Platform, Cisco Prep, Cisco Learning, Cisco Guides, Cisco Tutorial and Materials, Cisco Preparation, Cisco Career

CDIP is designed for hybrid clouds to help customers address the needs of modern apps and extensible data platforms. They can further accelerate their AI/ML and ETL workloads on their data lake with GA of Apache Spark 3.0 enabling GPU-accelerated workloads powered by NVIDIA RAPIDS data science libraries in the CDP Private Cloud Base 7.1.6.

The NVIDIA RAPIDS suite of open-source software libraries gives you the freedom to execute end-to-end data science and analytics pipelines entirely on GPUs. RAPIDS uses NVIDIA CUDA and exposes GPU parallelism to accelerate ETL and machine-learning workloads. NVIDIA RAPIDS Accelerator for Apache Spark leverages GPUs to accelerate data processing in Apache Spark 3.0 using the RAPIDS libraries. This allows users to run existing Apache Applications ten times faster with no code changes.

On the AI/ML side, NVIDIA GPUs integrates with libraries like TensorFlow and PyTorch to accelerate the training of Neural Networks for various use cases, such as Computer Vision and Natural Language processing, on a single GPU node or on multiple nodes, reducing the training time from weeks to days (or hours). This saves our customers valuable time.

The Cisco, NVIDIA, and Cloudera three-way partnership brings our joint customers a much richer data lake experience through solution technology advancements, validated designs, and it all comes with full product support.

Source: cisco.com

Tuesday, 31 August 2021

Everything You Need to Study for the Cisco 200-201 CBROPS Exam

The 200-201 CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals exam is associated with Cisco CyberOps Certification. Passing this exam satisfies a part of the requirements for earning the Cisco CyberOps certification. The exam is intended to assess the candidates’ skills and expertise concerning security concepts, security monitoring, host-based analysis, security policies & procedures, and network intrusion analysis. It’s important to expand skills in these skill areas before sitting for this exam. There are no former prerequisites needed to opt for the Cisco 200-201 CBROPS exam. Though, the applicants should understand all the topics included in the exam syllabus before taking this certification exam.

Important Information on Cisco 200-201CBROPS Exam

Cisco 200-201 CBROPS is a 120-minute exam comprising 95-105 questions that need to be finished in 120 minutes. To register for the exam, visit the Pearson VUE website and log in to your account and schedule your exam. The exam is available in the English language. You must prepare thoroughly for this Cisco exam to ensure your success.

The 200-201 CBROPS exam includes a broad range of topics classified under five domains. Each of these topics has a list of subtopics with their comprehensive sections. It’s suggested that you go through their details before taking the exam. The objectives incorporated in this Cisco certification exam are mentioned below:

  • Network Intrusion Analysis
  • Security Monitoring
  • Security Policies and Procedures
  • Security Concepts
  • Host-Based Analysis

Applicants should pay close attention to the percentage of the exam topics as they indicate the weight of questions that may be exacted from each of them. You’ll find the breakdown of each domain on the exam webpage. The learners should also take time to read other related topics as the questions may be administered from the areas not covered in these objectives.

Help Your Career with Cisco CyberOps Associate 200-201 Exam

Tips for Successful 200-201 CBROPS Exam Preparation

Studying and preparing are important to success in exams. And now that you know what to expect from the actual 200-201 CBROPS, let’s see how you can enhance your understanding and pave your path to success:

1. Take Advantage of Official Training Resources

The official training course offered by Cisco for the 200-201 exam is the Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0. It is instructor-led training, in which the applicants have the chance to learn from Cisco certified instructors how to avoid security breaches and retain their organization’s systems updated. Moreover, this course is accessible in the classroom or virtual modes. Furthermore, if your schedule is too busy, you can go for the e-learning version.

2. Gain Practical Experience

Practical experience can help you acquire skills and techniques you may not get from the books or training courses. If you become familiar with the TCP/IP and Ethernet networking, your chances of passing the actual Cisco 200-201 CBROPS exam with a good score improve considerably. Moreover, you can obtain prior experience in working with the Windows operating systems and Linux. Additionally, understanding the basic networking security concepts will give you a comparative strength over other applicants.

3. Set Yourself Up for Success with 200-201 CBROPS Practice Tests

Practice tests will help you identify your knowledge and preparation level. Practice tests for Cisco 200-201 CBROPS exam can be found on third-party websites. By performing practice tests, you learn how to deal with the tricky questions and the topics on which you require to concentrate more. Moreover, practice tests will help you strengthen your self-confidence as you know what to expect in the actual Cisco 200-201 exam.

4. Join an Online Community

Joining online study groups and online communities proves to be really helpful throughout your exam preparations. They help you learn from the experience of experts. You can also ask and solve your doubts. The professionals give valuable perceptions for you to obtain this certification.


Enjoy the Successful CyberOps Career with Cisco 200-201 CBROPS Certification

Conclusion

As you can see, if you want to pass the Cisco 200-201 on the first attempt, you have everything for it. You only require to use authentic study materials and prepare with dedication. So, your Cisco Certified CyberOps Associate certification is almost in your hand. All the Best!

Monday, 30 August 2021

Cisco Nexus Data Broker Now an App on Nexus Dashboard and Ready for Enterprise Networks

Cisco Nexus Data Broker has seen tremendous success and traction with data center customers since its inception. Our customers really liked the idea of using the same Nexus Data Center switch for building the packet broker network for their monitoring needs. They didn’t need to invest in additional skill development to manage purpose-built packet broker appliances. They could streamline the procurement and availability of spares and stock in their inventory. And they benefited from a much lower price point compared to the purpose-built packet broker appliances.

Data Broker Controller as an App on Cisco Nexus Dashboard

I am very excited to announce the next stage in evolution of Nexus Data Broker. Let’s start with the name change. We are changing the name to Nexus Dashboard Data Broker or Nexus Dashboard Data Broker. Why change the name? With the latest release, we have made the Data Broker Controller application available as an app on Cisco Nexus Dashboard (Figure 1).  

Cisco Nexus Data Broker, Cisco Enterprise Networks, Cisco Exam Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Learning, Cisco Preparation
Figure 1. Nexus Dashboard and Nexus Dashboard Data Broker

When you go into Cisco DC App Store, you will find the Cisco Nexus Dashboard Data Broker app to download and install. We are in the process of making all Day 2 applications run as services on top of the Nexus Dashboard platform and we did this with Nexus Data Broker. This new model of Data Broker Controller software distribution and run time .

There’s no need to download additional software from a download center for the first or future upgrades. The Nexus Dashboard Data Broker app is like a smartphone app, installed and upgraded directly from the Nexus Dashboard in the app store.

Nexus Dashboard Data Broker for Enterprise Networks


With the newest release of Nexus Dashboard Data Broker, we are expanding the scope of Nexus Dashboard Data Broker to enterprise network deployments, including campus and branch locations.  You can create a copy of the traffic using test access point (TAP) or switched port analyzer (SPAN) from Cisco Catalyst to Nexus Dashboard Data Broker solution (Figure 2). We have simplified the deployment of the Nexus Dashboard Data Broker solution for enterprise networks further by automating the SPAN configuration from the Nexus Dashboard Data Broker Controller via Cisco DNA Center or directly on Cisco Catalyst switches. I am really excited about extending the benefits of Nexus Dashboard Data Broker to enterprise networks.

Cisco Nexus Data Broker, Cisco Enterprise Networks, Cisco Exam Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Learning, Cisco Preparation
Figure 2. Nexus Data Broker for Enterprise Networks

Introducing Cisco Nexus 3550-F Fusion Layer 1 as TAP in Nexus Dashboard Data Broker Solution


Another exciting new capability we’re announcing is the addition of Cisco Nexus 3550-F Fusion Layer 1 platform as a TAP device (Figure 3). With it you can use the TAP functionality provided by the Nexus 3550-F Fusion switch with complete automation of TAP configuration from the Nexus Dashboard Data Broker Controller GUI.

Cisco Nexus Data Broker, Cisco Enterprise Networks, Cisco Exam Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Learning, Cisco Preparation
Figure 3. Automation of TAP Provisioning from the Nexus Dashboard

GUI and Usability Enhancements

Finally, I would like to mention the usability and user interface enhancements made to the newest Nexus Dashboard Data Broker Controller 3.10.1 release. The GUI is completely redesigned with the latest and greatest GUI framework and architecture, aligned with Nexus Dashboard and Nexus Dashboard services. This redesigned GUI framework lays the foundation for further enhancements and alignment in the areas of topology and other GUI screens (Figure 4).

Cisco Nexus Data Broker, Cisco Enterprise Networks, Cisco Exam Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Learning, Cisco Preparation
Figure 4. New GUI for Nexus Dashboard Data Broker Dashboard

Sneak Peek into Upcoming Releases


What’s next in the pipeline for Nexus Dashboard Data Broker in the next 6-9 months? We will focus on further improving the user interface and the user experience by upgrading the topology to the blueprint and framework provided by Nexus Dashboard. We will also focus on increasing the scale to support more source ports and tool ports to meet ever-increasing demand.

Try It, You’ll Like It


If you are already a Nexus Dashboard Data Broker user, I invite you to try the new 3.10.1 release and see the enhancements for yourself. If you are not a current user, I strongly believe that we have a great product that solves your packet brokering needs at a very attractive price point and I invite you to evaluate the product for your packet broker infrastructure.

As always, we are standing by to provide you with the necessary resources to make your deployment successful and to listen to your feedback for further product improvements.

Source: cisco.com

Saturday, 28 August 2021

Classic Smart Licensing vs Smart Licensing Using Policy (SLUP)

Cisco Prep, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Certification, Cisco Career

Customer requirements are keep changing, and Cisco is focusing more on network to be more software-focused and less hardware-dependent. Cisco Smart Licensing supports this vision by software license management. Smart Licensing is a flexible software licensing model that simplifies the way you activate and manage licenses across your organization.

Smart Licensing simplifies the way customers activate and manage licenses across their organization in below ways:

◉ License flexibility: Licenses are not node-locked to hardware, so customers can easily pool license entitlements and move them around freely through their network as needed.

◉ Easy activation: Smart Licensing establishes a pool of software licenses that can be used across an entire organization; no Product Activation Keys (PAKs) are needed for registrations.

Why Smart-Licensing Using Policy?

Though Cisco supports various deployment mechanism for tracking and reporting of License usage, yet it was not easily adaptable for all kinds of deployments. There were feedback and requirements from few customers, to make Smart Licensing more favourable for adoption.

Some of the challenges are:

◉ With SL Registration – Devices has to be always connected to the Internet to reach CSSM which is a deployment concern

◉ On-Prem Satellite server introduce more cost to deployment and maintenance

◉ SLR facilitates only air-gapped networks

◉ Any deployments that do not support either of these models, have to run their devices in Unregistered/Eval expired state, even after licenses are purchased.

Because of the above challenges, this brings to me to next section, that is Smart Licensing Using Policy.

What’s Smart Licensing Using Policy?

Smart Licensing took a major step towards simplifying the way customers activate and manage their Enterprise Networking devices. Smart Licensing Using Policy now provides a simpler and more flexible deployment method. 

Cisco Prep, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Certification, Cisco Career

All enterprise networking products such as the Catalyst 9000 series switches, routing platforms (ASR1K, ISR1K, ISR4K), Cisco Catalyst 9800 Series Wireless Controllers, IOT routers and switches support Smart Licensing Using Policy.

Benefits of Smart Licensing Using Policy


1. Smart Licensing using Policy eliminates Day 0 deployment friction (device on-boarding).

◉ Device just works out of box and enabling immediate value for Cisco customers.

◉ Since there is no evaluation mode at device boot, device registration before use of device is not required.

2. Smart Licensing using Policy complies with customer’s security policies, eliminating risk.

◉ Connectivity of the device to the internet is not required for software compliance.

◉ Utility/tools available to report license consumption periodically for online customers; For offline customers, utility available to upload reports offline.

3. Smart Licensing using Policy reduces OPEX costs.

◉ Customer network operation success is not tied to the software procurement process. In classic Smart Licensing, Day0 must be 100% accurate for network to deploy, which adds opex costs.

Thursday, 26 August 2021

Latest Cisco 200-301 Certification Exam Sample Questions and Answers

Cisco CCNA Exam Description:

This exam tests a candidate's knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. The course, Implementing and Administering Cisco Solutions (CCNA), helps candidates prepare for this exam.

Cisco 200-301 Exam Overview:

Application Aware Networking with Cisco SD-WAN

Part 2: Optimizing Application Experience

As applications are migrating to the cloud and being offered either as Software-as-a-Service (SaaS) or built as cloud native infrastructure, the network must become more application aware, programmable, and intelligent to deliver the best experience to users. My previous blog post discussed how Cisco Software-Defined WAN (SD-WAN) provides seamless connectivity to applications from anywhere. This blog post explores how applications can take advantage of and work cooperatively with the network to obtain a higher quality of experience through network policy, telemetry, and other features that promote security, reliability, and efficiency.

Application Experience with Cisco SD-WAN

Most enterprise are using SaaS applications for their day-to-day operations and adopting many different cloud environments as their IT infrastructure for business-critical applications. Organizations can custom-select different cloud services for specific functions and to take advantage of flexibility, performance, agility, and cost savings.

These SaaS applications are being consumed by a diverse set of devices, locations, and types of users who are constantly on the move. Enterprises face numerous challenges in terms of automation and management of this multifaceted environment. Meanwhile, application and user requirements are continuously and rapidly evolving. Traditional methods of planning and rollout may not meet current needs. What’s required is a network that is self-learning, aware, and adaptable to address application requirements dynamically and in real-time.

As enterprise application data traverses the internet and encounters congestion, packet loss and high latencies can occur. This results in a sub-optimal experience for users. Cisco SD-WAN, with advanced App Aware Routing based on network and application health telemetry, provides intelligent path selection and policy enforcement. These contribute to an optimal application experience by adopting to the changing needs of an application based on a user’s location, health of the network, and health of the application. Cisco SD-WAN provides best performing SLA for all types of traffic bound to cloud or to on-prem networks.

Application Optimization and Experience for SaaS

Figure 1. Multi Path SaaS Access with Cisco SD-WAN

To provide the most optimal SaaS application experience, the SD-WAN fabric must first classify the application, select the best SaaS point of presence (PoP) to serve users, and then decide the most optimal path to the selected PoP that meets the SLA needs of the user.

Example: Microsoft Office 365 Application Suite Experience


Network Based Application Recognition (NBAR) is used to classify distinct URLs for different applications. Applications can be mapped based on different traffic precedence or sensitivity. Typically, applications are categorized into Optimize, Allow, or Default categories. But with end-to-end telemetry using Application Infused Path Feedback (AIPF) an SD-WAN controller can use telemetry imported from Microsoft to optimize applications more granularly based on best path selection logic.

Figure 2. Transforming User Experience with Microsoft – Cisco SD-WAN Telemetry

The SD-WAN fabric continuously monitors the performance of alternate paths to SaaS and selects the best path based on the performance and network metrics such as loss, latency, etcetera. Here’s how application aware networking with Cisco SD-WAN works.

Step 1: DNS requests to the SaaS applications are sent on all available WAN paths

Figure 3. Cloud Access to SaaS Services with Dual DIA.

Step 2: DNS resolution for the configured SaaS application is completed on all possible path options.

Figure 4. Cisco SD-WAN SaaS adoption options.

Step 3: Periodic HTTP pings to the configured cloud onramp a SaaS application on each Direct Internet Access (DIA) circuit and probe for loss and latency. The best path selected is based on defined policies. When none of the paths are considered optimal, Cisco has added support for the user to either select the suboptimal path (best of worst) or redirect traffic elsewhere. This action is also based on defined policies.

Step 4: Quality of experience is calculated based on loss, latency, and perceived user experience as determined by telemetry data exchanged with SaaS applications.

At the heart of the enhanced application experience is the ability to combine application health perceived by the users in conjunction with the current health of the network as observed by the SD-WAN fabric to select the best path to Office 365.

Example: Application Experience of a Cloud Hosted Application in Google Cloud Platform


One of the fundamental questions of application aware networking is how network application developers can program the network to meet application needs. Cisco has developed a solution working closely with the Google Cloud Platform (GCP) team to allow DevOps teams to denote the traffic profile of an application using Google Cloud Service Directory, which can Inform vManage to set up a network policy to meet an application’s requirements in a programmable manner.

Different traffic profiles can be associated with different services as needed. Application teams deploy Kubernetes workloads with metadata annotations, properly classifying application services according to certain traffic profiles (e.g., video streaming or VoIP). The integration of service directory with Google Cloud Identity and Access Management (IAM) ensures that only those on the application team with the appropriate permissions can modify the traffic profile for a service.

Figure 5. Cisco Google Application Optimization Workflow

Step 1: Application team adds metadata annotation to a workload deployment.

Step 2: -Monitoring engine runs in the Kubernetes cluster and actively monitors the deployed services and publishes the metadata to the service registry.

Figure 6. Containers with Meta Data Annotations published in Service Directory

Step 3: vManage on the SD-WAN side connects to the service registry and periodically polls to keep track of updates regarding the services exposed. SD-WAN policies can be updated when changes are detected.

Step 4: SD-WAN application policy is created and maps the service-associated metadata into the detailed SD-WAN policies programmed by NetOps in the SD-WAN controller. The policies are dynamically updated based on metadata annotations published and polled periodically via the service registry.

These simple four steps allow an application developer to express the needs of the application in a programmable manner. The controller then sets up policies for the SD-WAN fabric to meet the application requirements.

Source: cisco.com

Friday, 20 August 2021

Cisco Ultra Cloud Core Repels Pro Hackers

Cisco Ultra Cloud, Cisco Prep, Cisco Tutorial and Material, Cisco Career, Cisco Guides, Cisco Preparation

Security is critical when developing new technology and that’s never going to change. Those with ill intent work 24 hours per day, seven days per week to discover vulnerabilities in servers, routers, and security devices that can be exploited. Whether it’s to release viruses or collect millions of dollars in ransomware, tech criminals will never stop committing crimes. The best we can do is protect our hardware, software, and firmware with zero trust and the utmost cyber security built in as a foundational concept rather than bolted on later as an afterthought.

With security at the forefront of everything we do, Cisco recently collaborated in a 5G hackathon with Finnish Transport and Communications Agency Traficom and Junction, an international non-profit ethical hacking and tech community which hosts the annual 48-hour event in Helsinki. This hackathon, held June 18-20, 2021, brought together entrepreneurs, developers, designers, and students from around the globe with a goal of helping local and multinational companies build viable, secure solutions to real-world challenges in 5G networks and services.

Cisco participated in this event, alongside Ericsson, Nokia and others, with an offer of 10,000 Euros in prize money to try to hack into the Cisco Ultra Cloud Core. Some of world’s leading cyber security professionals were asked to search for hidden flags and discover/document any vulnerabilities found in our 5G core. We knew going in that collaboration between vendors, researchers, regulatory authorities, solution developers, and the ethical hacker community would benefit everyone involved when building secure networks and services.

To set the stage for this event, appropriately named “I Bet You Can’t Get In”, the Mobility Technical Marketing Engineer (TME) group constructed this challenge in a way that created a bona fide environment in which to work while still protecting our core lab assets from nefarious activity. The mobility TME began by building a VMware cluster fully isolated from the lab with internet connectivity via a Cisco Adaptive Security Virtual Appliance (ASAv) firewall. Once we had a secure, remote-access sandbox environment prepared, a second team worked to bring up the 5G core on the VMware cluster.

More than 80 global participants organized into teams joined the Cisco challenge and were given access to the test lab through Anyconnect VPN. The challenge was then broken up into three primary facets: collecting user traffic to find the “needle” (a motivational quote from Steve Jobs), obtaining Command-Line Interface (CLI) access to the User Plane Function (UPF) to discover administrator account details, and exploiting a REST API to retrieve any information possible.

On a Friday evening (now that’s dedication!), we led the kickoff meeting to lay out the challenge via a live Webex session. The event commenced at 8 pm local time and the teams of hackers worked through the night and into the morning. On Saturday we held a check-in meeting to examine the progress they’d made. At that time, many of the hackers had given up. Aside from port scan results, no one had managed to gain access or even come close to meeting the challenge. Our team then dropped a few hints such as revealing the password of the UPF’s operator account. Following this hint, two teams utilized the monitor interface tool to locate the Steve Jobs quote, thus solving the first challenge.

The second part of the challenge, SSH CLI interfaces on 5G NFs, held its own, as did the third portion involving REST APIs. The only “hardening” involved was to disable SSH access to the Kubernetes (K8s) nodes, and in the end, only the first challenge was solved (buried in http and gtpu).

Finally, Team cKobclz79 was awarded the first prize of 5,000 Euros based on their ability to solve the first challenge and find the quote. Team Steamy Jofa was awarded the second prize of 3,000 Euros based on continued effort and overall tenacity. However, no other teams achieved enough progress to earn the third prize, so we decided to donate that money to a local Finnish charity.

At the conclusion of the event, we had a chance to speak with the winning three-member Team cKobclz79. As alumni of Aalto University in Finland, they frequently receive notifications of various events involving their alma mater. With an interest in misusing APIs and searching for design flaws in network architecture, they felt a 5G cybersecurity hack offered the perfect chance to keep up with the trends and technologies and acquire penetration testing skills in the industry.

The team began by scanning the network to locate an entry point, and once they found some hosts with open ports, they started searching for vulnerabilities. While digging deeper and sniffing internal traffic, they expanded their knowledge of 5G architecture, learning new terms and better understanding connections between nodes. The team found different parts of the challenge difficult due to having divergent backgrounds. One member struggled to understand the architecture and documentation but had no trouble with the tech stack, another wasn’t sure if they were on the right track because of so many hosts, while the third found several attack points that were not required for the challenge but nevertheless interesting.

With an attitude that no technology is truly safe, the team knew most security vulnerabilities reside in misconfigurations and leaked internal tech stack information, but during initial reconnaissance, they gained access through a system design flaw. They found that a websocket in a staging server would allow them to send commands. A check of other ports then revealed a Docker image whose source code provided a window into how commands were sent. By performing remote code execution, they established the reverse shell as root. This allowed them to install tools to scan the network and examine internal traffic. Enumerating the internal network gave them insight into other nodes based on the 5G architecture documentation provided to start the challenge.

Cisco Ultra Cloud, Cisco Prep, Cisco Tutorial and Material, Cisco Career, Cisco Guides, Cisco Preparation

The team then found a Docker registry from which they could pull the image and get the code for CLI access. This websocket GUI allows system administrators to connect to cluster manager and maintain the operation of Ultra Cloud Core.

Cisco Ultra Cloud, Cisco Prep, Cisco Tutorial and Material, Cisco Career, Cisco Guides, Cisco Preparation

Following an internal network scan, they found the K8s master node that could be reached from cluster manager. With no firewall to block communication from cluster manager to K8s master, they discovered that a service account credential to connect to the K8s cluster would have allowed them to run commands using kubectl they installed in cluster manager. They could then disrupt existing services or deploy malicious images to trick customers into connecting to them since all services are deployed, controlled, and managed by K8s master.

This event was a huge success and every participant derived value from it. Although we can’t definitively say that Cisco Ultra Cloud Core can’t possibly be hacked, this experience proved that it’s far more difficult than one might imagine. The event allowed technology vendors to put their 5G core to the test, and although these dedicated hackers did their best, they couldn’t hack our core.

As security becomes an increasing concern with the proliferation of 5G and IoT technologies, this event served as a great learning experience for the Cisco mobility team. As new threats exploit the wider footprint of these emerging technologies, challenges like this serve as one of many methods for gaining insights into future attacks so that we can design and build more resilient networks and services.

Source: cisco.com