Skip to content

Commit 45d80bc

Browse files
committed
lab3 updates with cve
1 parent 19f7b7d commit 45d80bc

File tree

8 files changed

+41
-43
lines changed

8 files changed

+41
-43
lines changed

labs/lab2/nginx-oss/etc/nginx/conf.d/tls-cars.example.com.conf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ server {
1010

1111
# Update the following lines for NGINX cert and key directives and file locations
1212

13-
ssl_certificate /etc/ssl/nginx/1-day.crt;
14-
ssl_certificate_key /etc/ssl/nginx/1-day.key;
13+
ssl_certificate /etc/ssl/nginx/cars.crt;
14+
ssl_certificate_key /etc/ssl/nginx/cars.key;
1515

1616
ssl_protocols TLSv1.1 TLSv1.3;
1717
ssl_ciphers HIGH:!aNULL:3DES;
File renamed without changes.
File renamed without changes.
204 KB
Loading
58.1 KB
Loading
97.8 KB
Loading
183 KB
Loading

labs/lab3/readme.md

Lines changed: 39 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,34 @@ This Panel shows basic Network level information from the Linux OS about the net
107107

108108
<br/>
109109

110+
## Nginx One CVEs Deep Dive
111+
112+
![CVE](media/lab3_none-cves.png)
113+
114+
One of the nice security feature of the NGINX One Console is the ability to provide a CVE summary with `High-Medium-Low Severity` classes. Clicking those classes reveals which Instances fall under them.
115+
116+
1. Using the Overview Dashboard CVEs Panel, Click on the `High` Severity link. This will provide a List View of the Instances that have CVEs that are classified under `High` Severity.
117+
118+
![High CVEs](media/lab3_none-cves-high.png)
119+
120+
1. Click on the `basics-plus1` Instance. This will provide the Instance level Details, you will see a `CVEs` Section, this time with the Name, Severity and Description for each CVEs applicable to the instance.
121+
122+
![Basics-plus1 CVE](media/lab3_basics-plus1-cves.png)
123+
124+
1. If you click on one of the CVEs name hyperlink, for example `CVE-2024-39792`, it will directly open the CVE website on a new tab with detailed information and possible remediations.
125+
126+
![High CVE redirect](media/lab3_basics-plus1-cves-redirect.png)
127+
128+
1. In similar fashion explore, click on the `Medium` Severity link within the Overview Dashboard and explore all the other CVEs that are classified under `Medium` Severity.
129+
130+
1. Another alternate way to look into CVEs is to navigate to the `Security` tab. This opens a new window in the left pane that shows all the F5 announced CVEs that are related to NGINX. This view also has a counter besides the CVE Name that shows how many instances are impacted by that particular CVE.
131+
![CVE Security Pane](media/lab3_none-security-pane.png)
132+
133+
1. Clicking on the CVE name opens a new pane that shows you the instances impacted by that particular CVE. `View More` link would directly open the CVE website on a new tab similar to earlier steps.
134+
![CVE Security Pane Details](media/lab3_none-security-pane-details.png)
135+
136+
<br/>
137+
110138
## Nginx One Certificates Deep Dive
111139

112140
![Certs](media/lab3_none-certs.png)
@@ -124,7 +152,7 @@ Another nice feature of the Nginx One Console is the ability to quickly see the
124152

125153
![Certs](media/lab3_basics-oss1-certs.png)
126154

127-
1. If you Click on the actual certifcate file, for example `30-day.crt`, it will give you a List of all the Instances that are using that same certificate.
155+
1. If you Click on the actual certificate file, for example `30-day.crt`, it will give you a List of all the Instances that are using that same certificate.
128156

129157
![Cert Details](media/lab3_30-day-cert-details.png)
130158

@@ -219,31 +247,7 @@ Ok, so now what?? You can fix all these. Just Click the `Edit Configuration` P
219247

220248
<br/>
221249

222-
~~~CONTINUE FROM HERE WIP~~~~
223-
224-
## Nginx One CVEs Deep Dive
225-
226-
![CVE](media/lab7_none-cves.png)
227-
228-
One of the nice security feature of the NGINX One Console is the ability to provide a CVE summary with `High-Medium-Low Severity` classes. Clicking those classes reveals which Instances fall under them.
229-
230-
1. Using the Overview Dashboard CVEs Panel, Click on the `High` Severity link. This will provide a List View of the Instances that have CVEs that are classified under `High` Severity.
231-
232-
![High CVEs](media/lab7_none-cves-high.png)
233-
234-
1. Click on the `basics-plus1` Instance. This will provide the Instance level Details, you will see a `CVEs` Section, this time with the Name, Severity and Description for each CVEs applicable to the instance.
235-
236-
![Basics-plus1 CVE](media/lab7_basics-plus1-cves.png)
237-
238-
1. If you click on one of the CVEs name hyperlink, for example `CVE-2024-39792`, it will directly open the CVE website on a new tab with detailed information and possible remediations.
239-
240-
![High CVE redirect](media/lab7_basics-plus1-cves-redirect.png)
241-
242-
1. In similar fashion explore, click on the `Medium` Severity link within the Overview Dashboard and explore all the other CVEs that are classified under `Medium` Severity.
243-
244-
<br/>
245-
246-
#### Optional: How to Pull and Run individual containers
250+
## (Optional Exercise): Check how to Pull and Run individual containers
247251

248252
If you would like to just run a few containers without Docker Compose, here are some examples to try. Notice that the `$TOKEN with Dataplane Key` must be set and used for Registration with the Nginx One Console:
249253

@@ -268,25 +272,19 @@ If you would like to just run a few containers without Docker Compose, here are
268272
269273
```
270274

271-
### Nginx Container Images with Nginx Agent installed for Nginx One Console
272-
273-
For Reference: Find all the currently available `Nginx OSS` containers with Agent installed. Curl the `Docker Registry`:
274-
275-
```bash
276-
curl https://docker-registry.nginx.com/v2/nginx/agent/tags/list | jq
277-
278-
```
279-
280-
For Reference: Find all the currently available `NginxPlus` containers with Agent installed. Curl the `Nginx Private Registry`, you will need your `nginx-repo Certificate and Key` files for this command:
275+
## (Optional Exercise): Check Container registry for all Nginx Container Images with Nginx Agent installed
281276

282-
```bash
283-
curl https://private-registry.nginx.com/v2/nginx-plus/agent/tags/list --key nginx-repo.key --cert nginx-repo.crt | jq
277+
1. Find all the currently available `Nginx OSS` containers with Agent installed. Curl the `Docker Registry`:
284278

285-
```
286-
287-
<br/>
279+
```bash
280+
curl https://docker-registry.nginx.com/v2/nginx/agent/tags/list | jq
281+
```
288282

283+
1. Find all the currently available `Nginx Plus` containers with Agent installed. Curl the `Nginx Private Registry` ( **NOTE:** you will need your `nginx-repo Certificate and Key` files to run this command):
289284

285+
```bash
286+
curl https://private-registry.nginx.com/v2/nginx-plus/agent/tags/list --key nginx-repo.key --cert nginx-repo.crt | jq
287+
```
290288

291289
<br/>
292290

0 commit comments

Comments
 (0)