<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Finding patch levels on networking equipment and hardening our network for DDoS risks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4180657#M1075588</link>
    <description>&lt;P&gt;CCP is for routers only and not a maintained product.&lt;/P&gt;
&lt;P&gt;Prime Infrastructure offer a compliance report as part of its many features. It will show you all security issues regarding PSIRTs and configuration problems with your devices - routers, switches, ASAs etc. SolarWinds NCM can do similar.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Nov 2020 03:14:27 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-11-09T03:14:27Z</dc:date>
    <item>
      <title>Finding patch levels on networking equipment and hardening our network for DDoS risks</title>
      <link>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4150283#M1073854</link>
      <description>&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Our management wants to know at a short notice which of our networking equipment like our Cisco ASA firewalls, routers are missing patches for the vulnerabilities. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;I know a networking team member can go to each networking equipment, log in to the device, open a command line interface, get the version of software running and see if that is the latest version released by Cisco or not, but this is a manual process and we have lot of Cisco devices so doing this would take up lot of time from the networking team.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;For our desktops, laptops we have Qualys cloud agents installed which can generate a report of&amp;nbsp;desktops, laptops which are missing patches with level 4,5 severity. This allows management to allocate more people to patching team so they can complete the work sooner.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Is there a quick way to determine patch levels of our networking equipment, ASA firewalls, Aggregation Services Routers, VPN concentrators, Firepower Threat Defense etc. to see which device is vulnerable to which vulnerabilities which are shown by CVE numbers like CVE 2020-3452?&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Management has heard about Distributed Denial-of-Service(DDoS) attacks and wants to know how well we are prepared for it.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;2. I know severe DDoS attacks need a mitigation service like CloudFlare, Akamai who have the bandwidth to absorb the extra attack packets, but what level of hardening can we do to detect a DDoS attack and withstand it using our ASA firewalls, Aggregation Services Routers, VPN concentrators, Firepower Threat Defense etc.?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Any suggestions would be helpful.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Sep 2020 09:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4150283#M1073854</guid>
      <dc:creator>s_p_92</dc:creator>
      <dc:date>2020-09-13T09:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: Finding patch levels on networking equipment and hardening our network for DDoS risks</title>
      <link>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4150347#M1073857</link>
      <description>&lt;P&gt;You can use the free Cisco Network Assistant to inventory your devices and show which have CVEs and PSIRTs applicable to the code version they are running.&lt;/P&gt;
&lt;P&gt;For DDOS protection you can follow this Cisco guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/resources/guide_ddos_defense" target="_blank"&gt;https://tools.cisco.com/security/center/resources/guide_ddos_defense&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It's a Cisco-specific superset of IETF BPC 38:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.ietf.org/html/bcp38" target="_blank"&gt;https://tools.ietf.org/html/bcp38&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FTD isn't mentioned in the guide but there are some equivalent settings to ASA threat protection in the Network Analysis Policy (if you're using FMC).&lt;/P&gt;</description>
      <pubDate>Sun, 13 Sep 2020 12:29:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4150347#M1073857</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-09-13T12:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: Finding patch levels on networking equipment and hardening our network for DDoS risks</title>
      <link>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4180634#M1075583</link>
      <description>&lt;P&gt;Thanks Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for the late response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have around 400 devices so Cisco network assistant may not work as it is for networks with 80 devices from &lt;A href="https://www.cisco.com/c/en/us/products/cloud-systems-management/network-assistant/index.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/cloud-systems-management/network-assistant/index.html &lt;/A&gt;&lt;/P&gt;&lt;P&gt;It is a mix as we have mostly Cisco devices but also some Palo alto, Checkpoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can Cisco Configuration Professional (Cisco CP) work for managing&amp;nbsp;400 devices(switches, routers, access points, controllers, ASA firewalls) or is that more for Cisco access routers only?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I saw your useful suggestions at &lt;A href="https://community.cisco.com/t5/network-management/good-network-monitoring-tool/td-p/2337986" target="_blank"&gt;https://community.cisco.com/t5/network-management/good-network-monitoring-tool/td-p/2337986&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all the support you provide in this forum!&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 00:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4180634#M1075583</guid>
      <dc:creator>s_p_92</dc:creator>
      <dc:date>2020-11-09T00:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Finding patch levels on networking equipment and hardening our network for DDoS risks</title>
      <link>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4180657#M1075588</link>
      <description>&lt;P&gt;CCP is for routers only and not a maintained product.&lt;/P&gt;
&lt;P&gt;Prime Infrastructure offer a compliance report as part of its many features. It will show you all security issues regarding PSIRTs and configuration problems with your devices - routers, switches, ASAs etc. SolarWinds NCM can do similar.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 03:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-patch-levels-on-networking-equipment-and-hardening-our/m-p/4180657#M1075588</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-11-09T03:14:27Z</dc:date>
    </item>
  </channel>
</rss>

