You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: labs/lab3/readme.md
+39-41Lines changed: 39 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,6 +107,34 @@ This Panel shows basic Network level information from the Linux OS about the net
107
107
108
108
<br/>
109
109
110
+
## Nginx One CVEs Deep Dive
111
+
112
+

113
+
114
+
One of the nice security feature of the NGINX One Console is the ability to provide a CVE summary with `High-Medium-Low Severity` classes. Clicking those classes reveals which Instances fall under them.
115
+
116
+
1. Using the Overview Dashboard CVEs Panel, Click on the `High` Severity link. This will provide a List View of the Instances that have CVEs that are classified under `High` Severity.
117
+
118
+

119
+
120
+
1. Click on the `basics-plus1` Instance. This will provide the Instance level Details, you will see a `CVEs` Section, this time with the Name, Severity and Description for each CVEs applicable to the instance.
1. If you click on one of the CVEs name hyperlink, for example `CVE-2024-39792`, it will directly open the CVE website on a new tab with detailed information and possible remediations.
1. In similar fashion explore, click on the `Medium` Severity link within the Overview Dashboard and explore all the other CVEs that are classified under `Medium` Severity.
129
+
130
+
1. Another alternate way to look into CVEs is to navigate to the `Security` tab. This opens a new window in the left pane that shows all the F5 announced CVEs that are related to NGINX. This view also has a counter besides the CVE Name that shows how many instances are impacted by that particular CVE.
1. Clicking on the CVE name opens a new pane that shows you the instances impacted by that particular CVE. `View More` link would directly open the CVE website on a new tab similar to earlier steps.
@@ -124,7 +152,7 @@ Another nice feature of the Nginx One Console is the ability to quickly see the
124
152
125
153

126
154
127
-
1. If you Click on the actual certifcate file, for example `30-day.crt`, it will give you a List of all the Instances that are using that same certificate.
155
+
1. If you Click on the actual certificate file, for example `30-day.crt`, it will give you a List of all the Instances that are using that same certificate.
@@ -219,31 +247,7 @@ Ok, so now what?? You can fix all these. Just Click the `Edit Configuration` P
219
247
220
248
<br/>
221
249
222
-
~~~CONTINUE FROM HERE WIP~~~~
223
-
224
-
## Nginx One CVEs Deep Dive
225
-
226
-

227
-
228
-
One of the nice security feature of the NGINX One Console is the ability to provide a CVE summary with `High-Medium-Low Severity` classes. Clicking those classes reveals which Instances fall under them.
229
-
230
-
1. Using the Overview Dashboard CVEs Panel, Click on the `High` Severity link. This will provide a List View of the Instances that have CVEs that are classified under `High` Severity.
231
-
232
-

233
-
234
-
1. Click on the `basics-plus1` Instance. This will provide the Instance level Details, you will see a `CVEs` Section, this time with the Name, Severity and Description for each CVEs applicable to the instance.
1. If you click on one of the CVEs name hyperlink, for example `CVE-2024-39792`, it will directly open the CVE website on a new tab with detailed information and possible remediations.
1. In similar fashion explore, click on the `Medium` Severity link within the Overview Dashboard and explore all the other CVEs that are classified under `Medium` Severity.
243
-
244
-
<br/>
245
-
246
-
#### Optional: How to Pull and Run individual containers
250
+
## (Optional Exercise): Check how to Pull and Run individual containers
247
251
248
252
If you would like to just run a few containers without Docker Compose, here are some examples to try. Notice that the `$TOKEN with Dataplane Key` must be set and used for Registration with the Nginx One Console:
249
253
@@ -268,25 +272,19 @@ If you would like to just run a few containers without Docker Compose, here are
268
272
269
273
```
270
274
271
-
### Nginx Container Images with Nginx Agent installed for Nginx One Console
272
-
273
-
For Reference: Find all the currently available `Nginx OSS` containers with Agent installed. Curl the `Docker Registry`:
For Reference: Find all the currently available `NginxPlus` containers with Agent installed. Curl the `Nginx Private Registry`, you will need your `nginx-repo Certificate and Key` files for this command:
275
+
## (Optional Exercise): Check Container registry for all Nginx Container Images with Nginx Agent installed
1. Find all the currently available `Nginx Plus` containers with Agent installed. Curl the `Nginx Private Registry` ( **NOTE:** you will need your `nginx-repo Certificate and Key` files to run this command):
0 commit comments