Run Apps on Cisco ISR Routers
Earlier this month we joked that the Sguil project was acquired by Cisco, such that Sguil would be integrated into Cisco platforms. Cisco routers already run Tcl, but now thanks to Cisco's new Application eXtension Platform, other possibilities are developing. According to Optimize Branch Footprint with Application Integration, Cisco says:
Sun used to say The Network is the Computer. Cisco now states The Network as a Platform. In other words, why deploy another server or appliance if you can just run it on your Cisco router?
I am unsure how this will play out. I figure Cisco just wanted to add to the confusion caused by virtualization with their own take on consolidating platforms. At some point I see one giant box (labelled Skynet probably) with a massive antenna to which we all connect our dumb terminals via wireless.
I'd like to get a Cisco 2800 series ISR router to try this out... donations are welcome. :)
- Linux-based integration environment with downloadable Software Development Kit (SDK)
- Multiple applications support with the ability to segment and guarantee CPU, memory, and disk resources
- Certified libraries to implement C, Python, Perl, and Java applications
- Supported by Cisco 1841, 2800, and 3800 Series Integrated Services Route
Sun used to say The Network is the Computer. Cisco now states The Network as a Platform. In other words, why deploy another server or appliance if you can just run it on your Cisco router?
I am unsure how this will play out. I figure Cisco just wanted to add to the confusion caused by virtualization with their own take on consolidating platforms. At some point I see one giant box (labelled Skynet probably) with a massive antenna to which we all connect our dumb terminals via wireless.
I'd like to get a Cisco 2800 series ISR router to try this out... donations are welcome. :)
Comments
As security profesionals devices like these pose a pardigm shift. We think of full OS to be Linux, *BSD, MacOS, or Windows. Most technical implementation guides are written that these assets must posses AV and other NIST 800-53-ish controls. With the platform being so specialiazed yet so open, how do you deal with the implications?
seperation of duties? Ask Cisco and wave your hand in front of their eyes when you get the dear in the headlights response.
One of the technical guys I respect the most likes to quote "Let routers route, firewalls firewall, and hosts host."
Having deployed over 6000 2800 series routers running CME (Voip) and Firewall IOS I seen no problem mixing services, if configured correctly.
As for the single function devices, that fight was lost many years ago, security features, VoIP, the merging of IPS and firewall, WLAN on switches, etc... it’s a natural evolution that shortens the ROI.
Learn or die gentleman---then again the world always middle-level techs, or you can find a small shop.
http://www.blackhat.com/presentations/bh-dc-08/FX/Whitepaper/bh-dc-08-fx-WP.pdf
Do you think these kinds of developments will ultimately make the routing infrastructure a more attractive target for exploits or do you think this is no big deal?