Cisco Tetration - Hands-On Lab

Module19: Policy Analysis - NopCommerce

In this module we will perform Policy Analysis for the NopCommerce Windows application. We will analyze the ruleset that we tuned previously, learn how to filter out unnecessary flows from cluttering the Policy Analysis view, and also purposely create Escaped flows to gain insight into their cause and learn how to remediate them.

The below diagram is an important one because it depicts the flow that is both specific to, and critical for Microsoft server applications. Microsoft uses a range of 16,383 ports for a technology known as “RPC” or “Remote Procedure Calls”. Specifically, they use TCP ports 49195-65535. While RPC is not a Microsoft protocol and not unique to only Microsoft workloads, it is most commonly found in environments that have Windows servers. In fact, it could easily be said that almost every data center and cloud environment that has Windows server workloads will almost certainly be utilizing their version of RPC - namely MSRPC. Since the destination port for RPC is dynamically chosen at execution time, and because that port can fall anywhere in the above mentioned range, it is critical that policy generated by Tetration includes these destination port ranges for virtually any Windows server that needs to communicate with an Active Directory Domain Controller using Windows Server domains protocols - such as authentication. While not every server necessarily needs to authenticate often, when necessary it is critical that it be allowed to do so. We want to ensure that these AD servers have policy instantiated that allow other windows servers (and workstation clients) to communicate with them on these ports.

In our case, we have the MS-SQL server set to use Domain Authentication rather than the built-in SA (System Account) user, which we have seen time and again in corporate environments, because it allows DBAs and domain admins to easily update passwords in a central location that databases distributed across the organization all use, rather than reaching out to every SQL server and updating the local SA account password when necessary (say in the event that a DBA moves on from the org).

Another common place you may find RPC in use is with NFS. You will likely encounter the usage of RPC in many other environments and should be on the lookout for it and other ephemeral port-range protocols like it. A quick parting thought is that you should look out for other ephemeral port “hopping” protocols besides RPC, when building policy in a production deployment of Tetration. A quick example that comes to mind is “RTP” or “Real Time Protocol”. RTP and its sister - RTCP (Real Time Control Protocol) together use a range of UCP ports from 16384-32767, and will likely be found anywhere that VoIP is used - such as with IP Phones and Telepresence units talking to one another as well as a slew of other devices such as voice gateways and call recorders.


Click here to view a video of the tasks necessary to perform policy analysis for the nopCommerce app.


Steps for this Module

Step 001 - Navigate to the nopCommerce App Workspace
Step 002 - Click on Policy Analysis
Step 003 - Filter on a MISDROPPED: PERMITTED flow
Step 004 - Filter out flows with TCP RST or FIN
Step 005 - View filtered results
Step 006 - Delete TCP 1433 from the policies
Step 007 - Filter for flows with TCP port 1433
Step 008 - View current flows for TCP port 1433
Step 009 - Run Quick Policy Analysis on a flow
Step 010 - Observe Quick Policy Analysis results
Step 011 - Click on Analyze Latest Policies
Step 012 - Enter a reason
Step 013 - View the revision history
Step 014 - Filter for Escaped flows
Step 015 - Run Quick Policy Analysis
Step 016 - View Quick Policy Analysis results
Step 017 - Add TCP port 1433 back to the policy
Step 018 - Analyze latest policies
Step 019 - Enter a reason
Step 020 - Click on the point in the graph where we had escaped flows
Step 021 - Perform Quick Policy Analysis


Step 001

Navigate to the nopCommerce application workspace.

Step 002

Click on Policy Analysis and click to filter out Permitted flows. Hover your mouse over points in the graph. A popup will be displaced showing how many Misdropped, Escaped, and Rejected flows were detected at that point on the graph.

Step 003

You should see some flows that have a disposition of MISDROPPED:PERMITTED. Click on one of those flows. This is seen typically on Windows machines and occurs during the end of a connection. Notice the TCP flags of FIN and RST in the flow details.

Step 004

The flows with TCP RST and/or FIN flags set can be ignored, so let’s filter them out. In the Filters field, enter the following: not Fwd TCP Flags contain RST not Rev TCP Flags contains RST. Then click Filter Flows.

Step 005

Click on the graph on a point past the point that we last analyzed policy, and observe any rejected or misdropped flows. There should be minimal, if any misdropped and some rejected for Netbios traffic.

Step 006

Click on Policies. To show how Escaped flows can be seen based on changes in the policy, we are going to cause some Escaped flows to show up by deleting TCP port 1433 from the nopCommerce-App to nopCommerce-DB rule.

Note that this would break the application under normal circumstances if this was a live version of the polciies. We aren’t in enforcement yet so we aren’t affecting the application. In addition, even if we were in enforcement we can safely experiment with policies by modifying them and then analyzing via Policy Analysis. The changes would not be implemented until we enforced the new version of the policy.

Step 007

Return to Policy Analysis and enter the filter enter Provider Port = 1433, then click Filter Flows. Click the Permitted button to enable viewing of permitted flows.

Step 008

Click on a point in the graph and then click on one of the flows under Flow Observations.

Step 009

Click on Quick Policy Analysis.

Step 010

Click on Find Matching Policies. Notice that although the graph is currently showing permitted, the current policies will Deny the traffic as expected. This allows us to examine previous traffic against current policy.

Step 011

Click on Policy Analysis and select Analyze Latest Policies.

Step 012

Enter a reason.

Step 013

In a few minutes, we should begin to see Escaped flows over on the right side of the graph. Click on the clock icon and note the time you enabled Policy Analysis.

Step 014

Click back on the graph and filter for Escaped flows by turning off the Permitted, Misdropped, and Rejected buttons. Set the time range to the last 1 hr.

You may have to wait a few minutes to see the escaped flows indicated on the graph. It usually takes the graph about 5 minutes to catch up from the time you publish new policies (by clicking Analyze Latest Policies).

Step 015

Click on the escaped flow for TCP port 1433. Notice that this time the Consumer Outbound Policy indicates DENY. Click Quick Policy Analysis.

Step 016

Click Find Matching Policies, and the Policy Decision should be DENY. The rule denying the traffic is the Catch-All, since we removed TCP 1433 from the ruleset.

Step 017

Return to Default Policies and re-add TCP port 1433 to the nopCommerce-App to nopCommerce-DB rule.

Step 018

Click on Policy Analysis, and Analyze Latest Policies.

Step 019

Add a reason.

Step 020

Click on the Escaped flow in the diagram.

Step 021

Click on the flow and do a Quick Policy Analysis. The Policy Decision should now be ALLOW.

YOU HAVE FINISHED THIS MODULE

Return to Table of Contents Go to Top of the Page Continue to the Next Module