Cisco Tetration - Hands-On Lab

Module22: Policy Enforcement - Global Services and Common Policies

In this module we will enable Enforcement on the Global Services and Common Policies application workspaces. This will cause rules to be generated on the hosts in Windows Firewall in the case of Windows and iptables on the Linux hosts.


Click here to view a video showing the necessary tasks to be performed to take the hierarchical Global Policy as well as Common App Policy into full enforcement mode.


Steps for this Module

Step 001 - Open a session to the MS Active Directory server
Step 002 - Search for and open Windows Firewall
Step 003 - View Inbound Rules
Step 004 - Examine Tetration rules
Step 005 - Navigate to Inventory Search Step 006 - Search for AD server
Step 007 - Navigate to Policies
Step 008 - View current Policies
Step 009 - Enable enforcement for Global Services
Step 010 - Choose policy version to enforce
Step 011 - Navigate to the Common Policy app workspace
Step 012 - Enable enforcement on Common Policy
Step 013 - Choose policy version to enforce
Step 014 - Navigate to Inventory Search
Step 015 - Enter workload profile for the AD server
Step 016 - Navigate to Policies
Step 017 - View the Policies
Step 018 - View new rules created in Windows Firewall


Step 001

Open a session to the Active Directory server.

Step 002

Click on the Search icon in the toolbar and search for “Firewall”. Open the Windows Defender Firewall control panel.

Step 003

Click on Inbound Rules.

Step 004

Scroll down to locate the Tetration rules. There will be a few rules that are created by default by Tetration.

Step 005

Navigate to Inventory Search.

Step 006

Enter the Filter Hostname contains AD and click on the AD server IP address.

Step 007

Click on Policies.

Step 008

Notice there are only two ALLOW rules here with any to allow communication on all ports and protocols.

Step 009

Navigate to the Global Services app workspace and click on the Enforcement tab. Click on Enforce Policies.

Step 010

Choose the version of policy to be enforced. Normally this would be the latest analyzed policy, however this could be used to revert an already enforced policy back to a previous version if needed.

Step 011

Navigate to the Common Policy application workspace.

Step 012

Click on the Enforcement tab and click Enforce Policies.

Step 013

Select the latest version of policy and click Accept and Enforce.

Step 014

Navigate to Inventory Search.

Step 015

Enter the Filter Hostname contains AD, click Search and then click on the AD server IP address.

Step 016

On the workload profile screen click on Policies.

Step 017

There should now be many more rules listed here. It may take a minute or so before the new policies are shown. Adjust the time range and refresh the screen as necessary until the new policies show up. These are a representation of the firewall rules that were created in Windows Firewall.

Step 018

Go back to the session to the AD server, and examine the Inbound Rules in Windows Firewall. There should be many more rules created by Tetration.

YOU HAVE COMPLETED THIS MODULE

Return to Table of Contents Go to Top of the Page Continue to the Next Module