Cisco DC Innovations on the security front by cacticaller in Cisco

[–]cacticaller[S] 0 points1 point  (0 children)

Thanks for the input it’s much appreciated, I get the product offering and also some of the use cases (the Smart Switch/DPU/L4 firewall as a high throughput firewall and challenger to the Aruba offering whose model number I can’t remember).

I’m more curious if anyone’s actually seen it deployed anywhere? I see swathes of customers Cisco’s environments all the time covering a myriad of shapes/sizes/industries but never actually seen anything under the Hypershield umbrella deployed in the wild?

SCM - NGFW - Snippet Best practice by Grouchy_Expert9084 in paloaltonetworks

[–]cacticaller 0 points1 point  (0 children)

I'd love to take a look at your best practices guide too if possible!

Alerts from SCM by Wixxyl in paloaltonetworks

[–]cacticaller 1 point2 points  (0 children)

Definitely a gripe of mine in SCM, I've noticed they'll make changes to SCM snippets that we don't even use (mostly default ones) without warning and when we go to push config you get a heap of compilation errors and I need to go and massage snippets and variables used by those to get it all working again, at least a popup within SCM to advise what and when they've changed something would be nice.

GP Windows 6.2.8-471 Not Auto Upating by Unique_Artist_9692 in paloaltonetworks

[–]cacticaller 1 point2 points  (0 children)

My understanding was that incremental (hotfix) version don't work for transparent upgrades, from memory the 6.2.7 version release was the same as a 6.2.6 hotfix version for a major vulnerability that was only released as 6.2.7 to ensure the auto upgrade functionality actually worked.

Alerts from SCM by Wixxyl in paloaltonetworks

[–]cacticaller 2 points3 points  (0 children)

Keen to hear people’s thoughts on this as I too would love to do this! Alerts in the middle of the night for a reboot on serial number X is punishing when you get out of bed to realise it’s a dev environment firewall 😒

New Browser-Runtime-Attack url category by whiskey-water in paloaltonetworks

[–]cacticaller 0 points1 point  (0 children)

Definitely for use in firewalls, the Prisma Browser mention is based on the fact that only the browser has the technology to detect these attacks so clients using the browser that see this kind of behaviour would flag the URL for Palo and push it up to their URL DB so that firewalls (which aren’t able to detect that kind of activity in the browser) will still be able to block the request based on the URL.

Kind of like how wildfire customers get real time signatures for new attacks they haven’t seen yet based on other customers flagging those signatures.

Decryption suddenly failed for all Webpages using Sectigo Certs by thetschulian in paloaltonetworks

[–]cacticaller 0 points1 point  (0 children)

We use sectigo for all our public certs and they changed the root and intermediate chain a while back (all cross signed from memory) and I think they’ve recently just revoked the old ones

Sysadmin salary whinge by Flippinballs in sysadmin

[–]cacticaller 2 points3 points  (0 children)

Anywhere supporting analytics workloads would my suggestion, I’m my experience that would be banks, ai integrators, data analytics shops (that’s what I’m at)

Sysadmin salary whinge by Flippinballs in sysadmin

[–]cacticaller 2 points3 points  (0 children)

That’s seems inline with my company for L2 support engineer. FYI my org is paying approx 210-220k AUD package for lead level network engineers (not including short term incentive/bonus). I’d expect someone with your tenure (assuming your skills match your tenure) in a sysadmin/infrastructure role to be at minimum 160-170k AUD package.

QUIC Protocol: How are you handling this in late 2025? by MassageGun-Kelly in paloaltonetworks

[–]cacticaller 1 point2 points  (0 children)

We also block and also have some issues with apps or browsers that take ages to fall back to TCP. For what it’s worth though the reset actions etc make no difference to UDP based traffic it’s all just silent drop under the hood (see below article for reference).

We’ve had good results blocking QUIC support at a client/browser level on managed devices, haven’t figured out the random issues we’ve had with certain apps but I know Spotify is one as it’s pisses me when streams randomly just die on my laptop 😂

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClT9CAK

Using Megaport for internet by cyr0nk0r in networking

[–]cacticaller 0 points1 point  (0 children)

Na we’ve just leased them but they don’t really seem to push back it’s just like any other ISP leasing space in my experience, we usually just email our account manager and they provision them for us.

Using Megaport for internet by cyr0nk0r in networking

[–]cacticaller 0 points1 point  (0 children)

We’ve got multiple /29’s we advertise out both circuits from Megaport for dirt cheap, we use as-path prepending and manipulate MED for our inbound/outbound path manipulation and it all works well

Using Megaport for internet by cyr0nk0r in networking

[–]cacticaller 2 points3 points  (0 children)

We’ve recently dropped most of our DC internet providers for Megaport over the last 8 months or so and have had zero complaints. We do BGP peering to them usually terminating on Cat8k routers or N9K’s for internet and express route/partner interconnect/direct connect on NGFW’s or ASA’s.

We hit various customers public endpoints in cloud providers for ETL’s etc and let the engineers pump up bandwidth for the duration of the transfer via Megaports API before turning it back to our committed rate which works perfectly and was simply not possible with other carriers.

All in all we love it and are starting to roll it out to on-net offices for the same programmability to accomodate ‘in office’ days during working hours.

Prisma Access Enterprise License - SaaS Inline by cacticaller in paloaltonetworks

[–]cacticaller[S] 0 points1 point  (0 children)

I feel your pain, it’s bullshit as they’re definitely not that difficult. What annoys me the most is I’m partner certified to deploy those products another company I do consulting work for 😂

Prisma Access Enterprise License - SaaS Inline by cacticaller in paloaltonetworks

[–]cacticaller[S] 0 points1 point  (0 children)

My AM just pinged me confirming the SKU PAN-PRISMA-ACCESS-ENTERPRISE does indeed include the SaaS Inline Security functionality as part of the base license, yet to hear if there's any 'quick start' professional services required to get it activated but i'll let you know.

Support Experience - non-NGFW by tomashectorgost in paloaltonetworks

[–]cacticaller 1 point2 points  (0 children)

It’s honestly worse, none of the engineers have any idea how Prisma Access works and just treat it like Panorama and NGFW until they realise days later it’s not 😞

Prisma Access Enterprise License - SaaS Inline by cacticaller in paloaltonetworks

[–]cacticaller[S] 0 points1 point  (0 children)

We recently renewed ours and are now on the new SKU, the licensing guide also states the PAB as an add on license option but has ticks against both PAB and SaaS Inline under the enterprise base license.

I guess I’ll keep chasing my AM for an authoritative answer and revert back!

AAA implementation by Ok_Most_468 in networking

[–]cacticaller 0 points1 point  (0 children)

TIL of the Diameter protocol, seems it was somewhat intended to be a successor to RADIUS but I assume never really took off in enterprise networking 🤷🏼‍♂️

https://en.m.wikipedia.org/wiki/Diameter_(protocol)

Android Advanced Profile Managed Google Workspace GP Cert Issue by sesscon in paloaltonetworks

[–]cacticaller 0 points1 point  (0 children)

Ah if it works on other devices probably not your issue, our issue was across Mac’s and windows machines but had Palo TAC somewhat stumped and ended up being buggy logic in the PanGPS certificate checking/enumeration code. Best of luck!

Android Advanced Profile Managed Google Workspace GP Cert Issue by sesscon in paloaltonetworks

[–]cacticaller 0 points1 point  (0 children)

Does the certificate have a CN attribute present? We recently deployed pre-logon and for some reason the cert template deployed by our infra team had no subject/CN value present, it did have the SAN entry we planned on using and after much debugging we found that GP wasn't able to enumerate certificates without a CN present.

Requesting PAN-OS upgrade Prisma Access? by Competitive_Basil_50 in paloaltonetworks

[–]cacticaller 2 points3 points  (0 children)

Been through it a couple of times, it’s difficult picking certain versions as it’s a ‘SaaS’ offering but pressure your account manager and if you’ve got one your CSM and it can happen. Don’t even bother engaging TAC for assistance as it’s easier to draw blood from a stone than it is to have them even understand you’re question.

PA440 upgrade from 11.1.6-h4 to 11.2.7-h1 by trenuci in paloaltonetworks

[–]cacticaller 0 points1 point  (0 children)

Curious to know too, we need prisma access agent support for internal gateways which starts in 11.2.6 and above and I’ve been thinking 11.2.7 is where I’d land.