Cisco Live Protect
Cisco Live Protect is a security feature that
-
provides real-time, kernel-level security using eBPF technology through the Tetragon agent embedded in NX-OS,
-
enables Common Vulnerabilities and Exposures (CVE) compensating controls and zero-day attack mitigation without software upgrades or reboots, and
-
uses NXSecure to manage and activate the feature, configuring Tetragon for monitoring, detection, and logging of security events for enhanced threat visibility and telemetry integration.
While managing data center network infrastructure, security and uptime are non-negotiable. Patch updates for CVEs lead to operational disruptions and unacceptable downtime for critical systems. With Cisco Live Protect feature, you can address emerging vulnerabilities immediately by deploying real-time shields that mitigate CVE exploitation. This proactive approach eliminates the need for disruptive patching, emergency maintenance, or urgent code upgrades in your data center. Thus, the Live Protect feature allows you to maintain continuous protection and operational stability.
![]() Note |
|
Key concepts of Cisco Live Protect
The Live Protect feature secures NX-OS and provides enhanced security and software integrity assurance for the NX-OS device control plane. A few key concepts of this feature are:
-
Extended Berkeley Packet Filter – Also abbreviated as eBPF, is a powerful Linux kernel technology that enables programmable, safe, and efficient kernel extensions for networking, security, and observability, forming the foundation for advanced Cisco security and networking features.
-
Tetragon – This is an agent developed by Isovalent and embedded in NX-OS. It compiles CVE compensating controls into eBPF policies that run in the kernel, enabling advanced monitoring and enforcement of security policies in real time. It provides protection and security through the Cisco Live Protect feature.
-
NXSecure – This is the NX-OS security configuration tool that activates and manages Live Protect. When enabled, NXSecure starts the Tetragon agent and related containers on the switch. NXSecure uses eBPF internally to track, detect, and report security events such as file, process, and system call anomalies.
NXSecure configures and controls the Tetragon agent’s operation, which continuously monitors the system for security threats and generates event logs.
-
Tracing policies – The Live Protect feature uses tracing policies to provide security observability. These policies are packaged with the NX-OS image.
-
Modes – The two modes in Cisco Live Protect are:
-
Monitoring mode – Based on the configured policies, the monitoring mode allows the system to detect and generate log files for each anomaly event. Beginning with Release 10.6(1)F, monitoring mode is supported.
Event logs – Event logs are generated in the monitoring mode. You can export the event logs using telemetry, if you have configured the correct sensor path for NXSecure.
-
Enforce mode – Beginning with Release 10.6(2)F, enforce mode is supported. In enforce mode, Cisco Live Protect actively blocks or mitigates detected threats in real time. This mode provides proactive protection by enforcing security policies that prevent exploitation of vulnerabilities such as privilege escalation and control-plane DDoS attacks. Enforcement happens at the kernel level, allowing immediate mitigation without requiring software upgrades, reboots, or downtime.
The enforce mode uses NXSecure embedded in NX-OS to apply the kernel-level security shields. This enables continuous protection of Nexus 9000 series switches against emerging Common Vulnerabilities and Exposures (CVEs) while maintaining operational stability and uptime.
-
-
Add-on policy packages – This allows you to install additional live protect policies when such policies are available for the current running software version on the switch. Live protect policies would be released either for enforce or monitor mode. Additional commands are available to change the mode between enforce and monitor. You can disable the mode temporarily using a few commands mentioned in Modify the policy mode section. To add or remove Live Protect Policy packages, see Add or remove Cisco Live Protect policy packages.

Note
We recommend to install policies in monitoring mode (default mode) for a short duration and observe the effectiveness of the policy. The show nxsecure policy status command provides the hit counts, which can be used to identify if there are any conflicts with the regular switch functions. If there are no hit counts observed during the normal switch function, the policy can be changed to enforce mode.
switch# show nxsecure policy status ID NAME PACKAGE Original Override CURRENT HITS LP00002 nx-infra-6-access lp00002-1.0.1.pkg monitor none monitor 0 LP00004 nx-infra-2-file lp00004-1.0.1.pkg enforce monitor monitor 1
Feedback