NetSec Daily
5 subscribers
5 photos
30 links
πŸ”’ Daily network security in 60 seconds.
Vulnerabilities Β· Quizzes Β· Puzzles Β· CLI Tips
For engineers & IT pros.
Download Telegram
⚠️ Mistake: Leaving IPS/DLP engines on default sensitivity across all traffic β†’ CPU spikes to 100%, packets drop β†’ tune inspection profiles per zone, disable on trusted internal links, use threat feeds instead of brute-force scanning. Game changer. πŸ”₯
🚨 Vulnerability Alert

πŸ“‹ CVE: CVE-2026-20186
🎯 Affected: Cisco Identity Services Engine (ISE)
⚑ Severity: CRITICAL (CVSS 9.9)

πŸ“ Summary: An authenticated attacker with Read-Only Admin credentials can execute arbitrary OS commands on ISE via a crafted HTTP request. Successful exploitation leads to user-level access that can be escalated to root.

πŸ›‘οΈ What to do:
- Patch immediately per Cisco PSIRT advisory
- Restrict ISE management access to trusted networks only
- Monitor for unusual HTTP requests to ISE admin interface
- In single-node deployments, failover options are limited β€” prioritize patching
- Enforce MFA on all ISE admin accounts (Read/Write/Read-Only)
- Log and alert on privilege escalation attempts

πŸ”— Check Cisco PSIRT for patched ISE version β€” do not delay.

#CVE #PatchNow #NetSecDaily

---
Powered by NetArchAI Β· 28 Apr 2026
Telegram Tip:

πŸ”₯ Most people set firewall rules to "allow" and call it a day β€” but half their traffic never hits those rules because of routing loops or asymmetric paths. Check your traffic flow with packet captures before blaming the firewall. Saves hours of debugging.

---

PAN-OS URL Filtering Question:

When you test URL filtering categories in PAN-OS, why does a domain sometimes pass the test but still get blocked in production traffic β€” and what's the first thing you should check in your policy?
πŸ“– Deep Dive: How MSTP Maps VLANs to Instances

---

Most engineers config MSTP and pray it works β€” then can't explain why VLAN 50 takes a different path than VLAN 51.

Here's the uncomfortable truth: MSTP doesn't care about your VLAN numbers. It only cares about MSTI (Multiple Spanning Tree Instance) mappings. Get this wrong, and you're running 4000 VLAN instances on a single tree. Chaos.

---

## The Mapping Logic

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ VLAN 10, 20, 30, 40 ──┐ β”‚
β”‚ β”œβ”€β”€β†’ MSTI 1 (IST Region A) β”‚
β”‚ VLAN 50, 60, 70, 80 β”€β”€β”˜ β”‚
β”‚ β”‚
β”‚ VLAN 100, 110, 120 ────→ MSTI 2 (IST Region B) β”‚
β”‚ β”‚
β”‚ VLAN 200, 210, 220 ────→ MSTI 3 (IST Critical) β”‚
β”‚ β”‚
β”‚ All unmapped VLANs ────→ CIST (Common IST) β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜


CIST = Common Spanning Tree (default, processes all unmapped VLANs)
MSTI 1, 2, 3... = Custom instances (you define topology per instance)

---

## How It Actually Works

1. You declare a Region β€” All switches in Region must have:
- Same Region Name
- Same Revision Level (0–65535)
- Same VLAN-to-MSTI mapping table

2. You map VLANs to instances:
   VLAN 10–49 β†’ MSTI 1
VLAN 50–99 β†’ MSTI 2
VLAN 100+ β†’ MSTI 3


3. Each MSTI runs its own STP algorithm (like independent RSTP instances)
- VLAN 10 blocked on port Eth1/1? No effect on VLAN 50
- You can load-balance: odd VLANs root on Switch A,

---
Powered by NetArchAI Β· 29 Apr 2026
Did you know: FortiOS doesn't actually kill idle sessions at timeout β€” it just stops refreshing the session table entry. Active traffic still flows until the firewall reboots or memory pressure hits. Catch more than you'd expect lingering. πŸ”₯
🧠 NetSec Quiz: Firewall SSL Decryption

Think you know this? Most engineers get at least one of these wrong. Answers drop tomorrow evening.

Q1: Forward-proxy SSL decryption works by:
A) Breaking TLS entirely
B) The firewall dynamically re-signs server certificates with its own CA that clients trust
C) Using the original server's private key
D) Only at Layer 2

Q2: Which endpoint behavior commonly breaks SSL decryption?
A) ARP caching
B) Certificate pinning
C) DNS caching
D) TCP window scaling

Q3: TLS 1.3 features that complicate legacy middlebox decryption include:
A) No cipher changes
B) Encrypted extensions, ECH, and removal of static-RSA key exchange
C) Lower port numbers
D) Looser SNI

πŸ“ Drop your answers in the comments. Solutions tomorrow at 8 PM IST.
#NetSecDaily #Quiz

---
Powered by NetArchAI Β· 30 Apr 2026
πŸ“ Quiz answers were posted this morning β€” scroll up to check your score.
βš”οΈ War Story Friday

πŸ“ Scenario: Bank in Bangalore. Two FortiGate 3200s running VRRP for HA. Primary had a memory leak. Secondary was fully sync'd and ready. Everyone thought they were protected.

πŸ’₯ What happened: Primary started degrading at 2 AM. Memory creeping toward 95%. Engineers expected automatic failover. It never came. Why? Secondary kept seeing VRRP advertisements from the dying primary and stayed slave. For 4 hours, traffic crawled through a box held together with hope and swap space. RTO? Shot. RTO breach? βœ… Reported to RBI.

πŸ” Root cause: VRRP preemption was disabled on both units during initial setupβ€”some consultant's "stability best practice" (🀦). When the primary degraded, it didn't crash, so it never lost VRRP priority. Secondary dutifully stayed backup. Without preempt enabled, the backup won't take over unless the master is dead, not just dying.

# WRONG (What they had)
config system ha
set mode a-p
set priority 100
set preempt disable ← THIS killed them
set hbdev port1
end

# CORRECT (What saved them)
config system ha
set mode a-p
set priority 100
set preempt enable ← Allows better unit to take over
set preempt-delay 300 ← Wait 5min before flip (avoid flapping)
set hbdev port1
set monitor port2
end


πŸ› οΈ The fix: Enabled preempt with a 300-second delay. Primary still owned the role, but now if it degraded below a health threshold, secondary could claim VRRP in under 5 minutes. Added CPU + memory monitoring to trigger failover before total collapse.

πŸ“š Lesson: Preemption isn't a "stability risk"β€”it's a feature. It ensures the healthiest unit leads, not the oldest. Disable it only if you have a documented reason (spoiler: you don't).

πŸ”§ Prevention tip: Add this to your HA checklist:
- Enable preempt
- Set preempt-delay to 180–300 sec
- Monitor HA priority drift in syslog
- Weekly: SSH into secondary, manually lower its priority, watch failover trigger, restore. This proves your HA actually works.

#NetSecDaily #

---
Powered by NetArchAI Β· 01 May 2026
⚠️ Mistake: Leave default OSPF reference-bandwidth (100 Mbps) on 100G links β†’ all your high-speed links show identical cost, routing goes sideways β†’ recalc: auto-cost reference-bandwidth 100000 (Mbps) then redistribute or reload OSPF neighbors πŸ”§
🧩 Saturday Brain Teaser

Here's a scenario. Spot the bug:

HA failover test drops active sessions even though config sync shows healthy.

πŸ” Reply with your answer. Hint + solution tonight at 8 PM IST.

#NetSecDaily #BrainTeaser #Troubleshooting

---
Powered by NetArchAI Β· 02 May 2026
🧩 Saturday Brain Teaser

Here's a scenario. Spot the bug:

HA failover test drops active sessions even though config sync shows healthy.

🐞 Bug: Session sync is enabled, but floating/virtual addresses and license state aren't mirrored; the secondary comes up without the license for the session-mirror feature.
πŸ› οΈ Fix: Sync licenses and virtual router/floating IPs, verify HA covers session state not just config.

#NetSecDaily #BrainTeaser #Troubleshooting
🚨 Most engineers can't troubleshoot a flapping BGP peer at 3 AM because they don't know where to LOOK. You're staring at a dead route, your boss is breathing down your neck, and you're running blind between three vendor CLIs. Stop guessing.

---

πŸ“‹ CLI Cheat Sheet: BGP Received Routes from Peer

FortiOS:
get router info bgp neighbors <peer-ip>
get router info bgp network
diagnose ip route list bgp


PAN-OS:
Check vendor docs β€” PAN-OS is firewall-centric; 
BGP route inspection typically via operational CLI:
show routing route bgp


IOS-XE:
show bgp ipv4 unicast neighbors <peer-ip> received-routes
show bgp ipv4 unicast summary
show ip bgp neighbors <peer-ip> routes


---

πŸ’Ύ Pro tip: Pair show bgp neighbors <IP> received-routes (IOS-XE) with show bgp ipv4 unicast <prefix> to trace path. If routes aren't showing up, check show bgp ipv4 unicast neighbors <IP> advertised-routes on the peer side first β€” the problem is usually upstream.

Know your vendor. FortiOS BGP is simpler but less granular than IOS-XE. PAN-OS isn't meant for heavy BGP ops β€” if you're running complex eBGP there, you're using the wrong tool.

Save this. You WILL need it at 2 AM.

#NetSecDaily #CheatSheet #CLI #BGP #Routing

---
Powered by NetArchAI Β· 03 May 2026
Did you know: most engineers pcap everything then filter later β€” backwards. Capture filters run on the NIC before hitting RAM, so tcpdump -i eth0 "tcp port 443" uses 100x less CPU and disk than capturing all traffic. Set it right at capture time. 🎯
🎴 NetSec Flashcard: Route Maps

⚠️ Most engineers confuse Route Maps with static routes β€” then wonder why their traffic policy doesn't work.

πŸ“ What: Route Maps are policy-based routing engines that match traffic patterns (source IP, protocol, port, ACL) and apply actions (set metric, set next-hop, set community, set local preference). They're the glue between your intent and your data plane β€” ACL-driven traffic steering on steroids.

πŸ”§ CLI Examples:

Cisco IOS-XE (BGP local preference steering):
route-map PREF_ISP1 permit 10
match ip address ACL_CRITICAL
set local-preference 200
!
router bgp 65000
neighbor 203.0.113.1 route-map PREF_ISP1 in


Cisco IOS-XE (PBR β€” policy-based routing):
route-map PBR_TO_ISP2 permit 10
match ip address 101
set ip next-hop 192.168.1.254
!
int gi0/0
ip policy route-map PBR_TO_ISP2


FortiOS (Policy routing β€” traffic steering):
config router policy
edit 1
set input-device port1
set srcaddr all
set dstaddr REMOTE_SUBNET
set action accept
set protocol 0
set gateway 10.0.0.1
next
end


PAN-OS (Policy-based routing β€” via route profile):
set network routing profiles <profile_name> routing-table unicast
set network routing profiles <profile_name> routing-table unicast priority-rule <rule> action forward
set network routing profiles <profile_name> routing-table unicast priority-rule <rule> next-hop <ip>


πŸ’‘ Pro Tip: Route Maps execute sequentially β€” first match wins. If your traffic isn't steering, check permit/deny logic and sequence numbers. Also: always verify with show route-map output before applying to production. One bad sequence can blackhole your entire subnet. And remember β€” Route Maps work inbound/outbound on neighbors or interfaces; they don't work magically in the middle.

#NetSecDaily #NetworkEngineering #BGP #PBR #RouteMaps #CiscoIOS #FortiOS

---
Powered by NetArchAI Β· 04 May 2026
Tip 1:
Most people forget to disable default routes before adding policy routes on FortiGate β€” then wonder why traffic doesn't match their intent. Pro move: always check your static routing table first, policy routes sit above it in the lookup chain. πŸ”₯

Tip 2:
# FortiOS: Policy routes evaluated BEFORE static routes
config router policy
edit 1
set input-device port1
set src 10.0.1.0 255.255.255.0
set gateway 10.99.0.1
next
end

# Verify priority:
show router policy

Policy route wins. Static route is fallback. πŸ›£οΈ
🚨 Vulnerability Alert

πŸ“‹ CVE: CVE-2026-20186
🎯 Affected: Cisco Identity Services Engine (ISE)
⚑ Severity: CRITICAL (CVSS 9.9)

πŸ“ Summary:
Authenticated attacker with Read-Only Admin creds can send a malformed HTTP request to execute arbitrary OS commands on ISE. Escalation to root possible β€” game over for your NAC layer.

πŸ›‘οΈ What to do:
β€’ Patch immediately β€” check Cisco PSIRT for ISE advisory + fixed versions
β€’ Restrict ISE admin console access to jump hosts only
β€’ Enable MFA on all ISE admin accounts (no exceptions)
β€’ Monitor ISE logs for unusual HTTP requests to sensitive endpoints
β€’ Segment ISE on dedicated VLAN, firewall ingress to management IPs only
β€’ If you're running ISE in your BFSI/Healthcare environment β€” this is P0

⚠️ Why this matters: ISE is your AAA/NAC gatekeeper. Compromise = network access control bypassed, rogue devices on-net, lateral movement to servers.

πŸ”— Check Cisco PSIRT advisory for patched versions β€” don't delay.

#CVE #PatchNow #NetSecDaily #ISE #NAC

---
Powered by NetArchAI Β· 05 May 2026
⚠️ Mistake: Assuming TCP window scale factor in Wireshark matches what the switch sees β€” it doesn't. Wireshark calculates it client-side, but your actual throughput depends on both endpoints negotiating it during handshake. Always verify with netstat -s on both sides if performance feels off. Trust the packet capture, not the GUI math. πŸ”
πŸ“– Deep Dive: How QUIC Achieves 0-RTT Connection

---

Most engineers still think TLS handshakes are unavoidable. They're wrong β€” and your HTTP/3 deployments are already bleeding latency because you don't understand session resumption.

## The Problem TLS 1.3 Couldn't Fully Solve

Standard TLS 1.3: 1-RTT minimum
- Client hello β†’ Server hello β†’ encrypted data = 1 round trip

QUIC 0-RTT: Send data before handshake completes
- Client sends encrypted payload on connection establishment
- Uses cached session parameters from previous connection

## How It Actually Works

Connection N (Initial)
β”œβ”€ Client sends ClientHello + Session Ticket Request
β”œβ”€ Server responds with ServerHello + NEW_SESSION_TICKET
└─ Client caches: encryption key, cipher suite, IP/port validation token

Connection N+1 (0-RTT Magic)
β”œβ”€ Client: "Remember me? Here's token + encrypted payload"
└─ Server: Decrypts immediately, processes data IN PARALLEL with handshake


ASCII Reality:

TRADITIONAL TLS 1.3 (1-RTT)
Client ──────────────────────────────────> Server
ClientHello
<─────────────────────────────────
ServerHello + certificate
──────────────────────────────────>
Finished (encrypted)
<─────────────────────────────────
Finished (encrypted)
══════════════════════════════════════════
[NOW safe to send app data]

QUIC 0-RTT (0-RTT)
Client ──────────────────────────────────> Server
Initial + 0-RTT crypto + app payload
<─────────────────────────────────
Handshake response (same RTT!)
══════════════════════════════════════════
[App data ALREADY received by server]


## The Mechanics

Session Ticket = Pre-shared Key (PSK)
- Server issues: NEW_SESSION_TICKET frame with:
- Encrypted session state
- Resumption secret
- Validity lifetime (TTL)
- Identity obfuscation token

Client stores:
Ticket: [opaque blob]
PSK Identity: [hash of ticket]
Early Secret: [derived from resumption secret]
Early Data

---
[Powered by NetArchAI](https://netarchai.com) Β· 06 May 2026
Telegram Tip:

Most people set their OSPF hello timers to defaults and wonder why failovers take forever. Drop them to 3 seconds with a dead interval of 10, and watch your convergence time actually make sense. Your backup link will kick in before anyone notices. πŸ”„

---

Question:

If your floating static route has an AD of 150 but OSPF is 110, what happens when OSPF flaps repeatedly β€” does your backup path ever get a chance to stabilize, or are you just creating a thrashing loop?
🧠 NetSec Quiz: Firewall SSL Decryption

Think you know this? Most engineers get at least one of these wrong. Answers drop tomorrow evening.

Q1: Forward-proxy SSL decryption works by:
A) Breaking TLS entirely
B) The firewall dynamically re-signs server certificates with its own CA that clients trust
C) Using the original server's private key
D) Only at Layer 2

Q2: Which endpoint behavior commonly breaks SSL decryption?
A) ARP caching
B) Certificate pinning
C) DNS caching
D) TCP window scaling

Q3: TLS 1.3 features that complicate legacy middlebox decryption include:
A) No cipher changes
B) Encrypted extensions, ECH, and removal of static-RSA key exchange
C) Lower port numbers
D) Looser SNI

πŸ“ Drop your answers in the comments. Solutions tomorrow at 8 PM IST.
#NetSecDaily #Quiz

---
Powered by NetArchAI Β· 07 May 2026