76

Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Embed Size (px)

Citation preview

Page 1: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN
Page 2: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Cisco Firewall BasicsMark Cairns, Consulting Systems Engineer

BRKSEC-1020

Page 3: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN
Page 4: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Mark Cairns

• Based in Richmond, VA and cover select accounts in VA, DC and MD

• 17 years experience with Cisco Security Products

• CCIE #17755, Security

• You can reach me at [email protected] and @12LISN2

Consulting Systems Engineer, GSSO supporting US Commercial

Page 5: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Session Information

• This is an introductory session

• It is not meant for professionals with deep knowledge of firewalls and Cisco ASA

• This session is not for you if you want to deep dive into configurations for specific features / functionality

• References may be made to advanced functionality for context but we will stay at a fairly high level

Basic Firewall Understanding

Page 6: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

• Introduction

• Back to Basics - Firewalls in General

• Where and Why – The Edge, Data Center and Hosted Environment

• What – Cloud Management, Security Zones, Physical and Virtual Appliances

• Additional Functions – When a Taller Wall Isn’t Enough

• Did you know? – Two use cases for ASA and Secure Group Tags

Agenda

Page 7: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Firewalls in General

Page 8: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Securing/Hardening for What Purpose or Need?

SubversionBots, Viruses, and Worms

Spyware and Adware

DisruptionDenial of service attacks

Advanced Persistent Threats (APTs)

Penetration Attempt

Zero-day Attacks

Hacker Attacks

Data LossData theft and/or

interception

Identity theft

Page 9: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

FirewallsWhat are they?

• Primary filtering appliances/VMs that work at both the network and application layers

• Provide a platform for the features/functionality needed for network security

• VPNs (remote-access and site to site)

• NGIPS

• Anti-malware

• Next-generation security should not abandon proven stateful inspection capabilities in favor of application and user ID awareness by itself

• Comprehensive network security solution needs includes firewalls, next-generation firewalls (application inspection and filtering) and next generation intrusion prevention systems (context aware)

• The firewall often is the conduit from which other defense components combat the threats that face the network

Page 10: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Where and Why

Page 11: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Filtering on a Tuple?

• The genesis of firewalls was initially a means to filter traffic based on the five tuple

• Source IP address – the IP address of the initiator of the IP packet

• Destination IP Address – the IP address of the destination of the IP packet

• Source Port – UDP or TCP port used by initiator to establish communications with destination

• Destination Port – UDP or TCP port used by destination to establish communications with source

• IP Protocol – the specific IP protocol used in the communication

Packet

Page 12: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Filtering – IP Protocols

• ICMP (1)

• TCP (6)

• UDP (17)

• GRE (47)

• ESP (50)

• AH (51)

• EIGRP (88)

• OSPF (89)

http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml

Packet

Page 13: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Stateful Inspection

• Most routers and switches can filter based on the five tuple…why a firewall then?

• Stateful firewalls track L3/L4 traffic as it leaves and returns to the network

• Connections are maintained in the connection table tracking five tuple and additional information such as sequence

Packet

Packet

TCP outside:2.2.2.2/80 (2.2.2.2/80) inside:1.1.1.1/35478 (1.1.1.1/35478), flags UIO, idle 4m39s, uptime 6m16s, timeout 1h0m, bytes 3002

Src IP – 2.2.2.2

Dest IP – 1.1.1.1

Src Port – TCP/80

Dest Port – TCP/35478

Src IP – 1.1.1.1

Dest IP – 2.2.2.2

Src Port – TCP/35478

Dest Port – TCP/80*Best Practice – Limit outbound connections to known services and hosts such as SMTP servers only for port 25.

Page 14: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Network Address Translation

• Network address translation (NAT) is the mapping of IP addresses from a private network to a public network

• NAT gives network administrators and security administrators:

• Access to non-publically routable IPv4 space

• Cost savings because addresses are not cheap

• Allows for masquerading of internal network addresses

• IPv4 Address space is exhausted

Packet

Src IP – 3.3.3.3

Dest IP – 2.2.2.2

Src Port – TCP/35478

Dest Port – TCP/80

Src IP – 10.1.1.1

Dest IP – 2.2.2.2

Src Port – TCP/35478

Dest Port – TCP/80

Page 15: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Edge With DMZ

• Similar to a basic edge design with the addition of inbound traffic

• Traffic inbound from the DMZ to the trusted network may or may not pass the firewall.

Page 16: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Edge With DMZ - VPN

• Multiple path options for VPN with trusted and untrusted packets.

• VPN Concentrator may be connected outside the firewall

• Trusted traffic path usually depends on source. Employee or Vendor, B2B, etc.

*Best Practices – Remember that controlling access from a VPN to an internal resource is not a dead end! Jump box scenario.

Hide your firewall with private IP space on the outside.

Page 17: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Tiered DMZs

• Typically seen in multi-tiered hosting for e-commerce

• Forces all traffic between tiers to pass firewall rules

• Can help mitigate risk and contain exploits and/or breaches within a DMZ

Page 18: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Bridge across your DMZs

• Sometimes referred to as clean and dirty DMZs

• VPN, Video, etc.

• Avoids hair-pinning

*Best Practice – Use destination NAT with a block of unused private IPs for outbound L2L VPN instead of routing individual remote IPs.

Page 19: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Split Firewalls

• Not common without Layer 3

• Forces routing on endpoints

Page 20: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Split Firewalls

• Layer 3 hop between firewalls

• Avoids hair-pinning

• May still have an optional trusted connection

Page 21: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Securing the WAN

• Typical MPLS WAN

• Does not ensure privacy

Page 22: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Internet based WAN

• Lower cost alternative to MPLS

• Dictates VPN for routing and privacy

• Direct Internet Access (DIA) adds security risk

Page 23: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Internet based WAN

• Secure router combines functions

• Inspect DIA

• Typically no need for inbound access directly from Internet

Page 24: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

From branch to SOHO

• Add trusted connectivity to an untrusted environment

• Leverages firewalling and authentication

Page 25: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Manage to Scale

• Growth dictates migration from on-box to off-box management

• Control and Data plane is local to firewall

Page 26: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Scale to the Cloud

• Move control plane to cloud portal

• Data plane remains local

• OpEx cost reduction

Page 27: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Data Center Clustering for Performance and Scale

• Handles asymmetric traffic associated with VPC/VSS

• N+1 redundancy

• Keeps DC design intact

• Scale to 16 firewalls

Page 28: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Securing VMs and Hosting Environments

Page 29: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

What is the right solution?

Page 30: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Cloud Networking Group

Page 31: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

About Cisco Cloud-Managed Networking

• Cisco Meraki: a complete cloud-managed networking solution

• Wireless, switching, security, WAN optimization, and MDM, centrally managed over the web

• Built from the ground up for cloud management

• Integrated hardware, software, and cloud services

• Leader in cloud-managed networking

• Among Cisco’s fastest-growing portfolios

• Tens of millions of devices connected worldwide

• Recognized for innovation

• Gartner Magic Quadrant, InfoWorld Technology of the Year, CRN Coolest Technologies

Page 32: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Distributed networks

Centralized cloud

management scales to

thousands of sites

Multi-site visibility and control Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring and alerts

Zero-touch provisioning Devices automatically provision from the cloud, no staging required; self-configuring site-to-site VPN

Traffic acceleration WAN optimization and web caching accelerates and de-duplicates network traffic; application-aware QoS prioritizes productivity apps

Page 33: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Automated site-to-site VPN

Site-to-site IPsec VPN in just two

clicks in the Dashboard

Simple Creates L3 site-to-site VPN tunnels with just 2 clicks in the dashboard

Automatic Comparable to Cisco DMVPN, it creates a mesh or hub-and-spoke VPN tunnel

between all peers and adjusts to IP changes

Resilient Automatic failover over to secondary WAN link or 3G/4G USB modem

Page 34: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Diverse Security

Best IPSSourcefire IDS / IPS, updated

every day

Content

Filtering

4+ billions URLS, updated in

real-time

Geo-based

security

Block attackers from rogue

countries

AV / anti-

phishing

Kaspersky AV, updated every

hour

PCI

compliance

PCI L1 certified cloud-based

management

Page 35: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Choosing the right MX for your environment

MX64 / 64W

MX80

MX100

MX400

MX600

Z1

Small branches

(~50 users)

Where FW Throughput

200 Mbps

Large

branch/campus

(~10,000 users)

Large

branch/campus

(~2,000 users)

Mid-size branches

(~100 users)

Mid-size branches

(~500 users)

Unique Features

802.11ac Wireless

(MX64W)

High-speed uplinks

Built-in redundancy

Modular interface

Large Web cache (4TB)

250 MbpsLarge Web cache (1TB)

500 MbpsGigabit uplinks

Large Web cache (1TB)

1 Gbps

2 Gbps

High-speed uplinks

Built-in redundancy

Modular interface

Large Web cache (1TB)

For teleworkers

(1-5 users)

Dual-radio wireless

FW throughput: 50

Mbps

All devices support 3G/4G

Page 36: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Zone Based Firewall

Page 37: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Zone Based Firewall

G0/1.103

G0/0G0/1.101

DMZ

InternetTrusted

TCP/UDP/ICMP

Response OK

All Traffic Permit

Support for:

• ISR, ASR, CSR

• NAT

• WAAS

• VRFs

• Redundancy

• VTIs for VPNs

• Deep Packet Inspection

Page 38: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Configuring ZBFzone security Internet

zone security Trusted

zone security DMZ

interface LISP0

zone-member security DMZ

!

interface GigabitEthernet0/0

description Public Outside

zone-member security Internet

!

interface GigabitEthernet0/1.101

description Inside

zone-member security Trusted

!

interface GigabitEthernet0/1.103

description Public DMZ

zone-member security DMZ

Create Zones

Assign interfaces to security zones

Page 39: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Configuring ZBFclass-map type inspect match-any All_Protocols

description - Match all outgoing protocols

match protocol tcp

match protocol udp

match protocol icmp

policy-map type inspect trusted-to-internet

class type inspect All_Protocols

inspect

class class-default

drop

policy-map type inspect DMZ

class class-default

pass

zone-pair security Trusted->Internet source Trusted destination Internet

service-policy type inspect trusted-to-internet

zone-pair security Internet->DMZ source Internet destination DMZ

service-policy type inspect DMZ

zone-pair security DMZ->Internet source DMZ destination Internet

service-policy type inspect DMZ

Create Inspection Class

Create Inspection Policy

Create Zone Pairs and Associate Policy

Page 40: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

ASA – Physical and Virtual

Page 41: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Cisco ASA 5500 Series PortfolioComprehensive Solutions from SOHO to the Data Center

Multi-Service

(Firewall/VPN and IPS)

Pe

rfo

rma

nce

an

d S

ca

lab

ility

Data CenterCampusBranch Office Internet Edge

ASA 5585-X SSP-20(10 Gbps, 125K cps)

ASA 5585-X SSP-60(40 Gbps, 350K cps)

ASA 5585-X SSP-40(20 Gbps, 200K cps)

ASA 5585-X SSP-10(4 Gbps, 50K cps)

ASA 5555-X (4 Gbps,50K cps)

ASA 5545-X (3 Gbps,30K cps)

ASA 5525-X (2 Gbps,20K cps)

ASA 5512-X (1 Gbps, 10K cps)

ASA 5515-X (1.2 Gbps,15K cps)

SOHO

ASA 5505 (150 Mbps, 4K cps)

Page 42: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

ASA 5500-X Firewall Hardware Comparison

ASA 5512-X ASA 5515-X ASA 5525-X ASA 5545-X ASA 5555-X

64Bit Multi Core Processors Yes Yes Yes Yes Yes

Maximum Memory 4 GB 8 GB 8 GB 12 GB 16 GB

Maximum Storage Form Factor 8 GB eUSB 8 GB eUSB 8 GB eUSB 8 GB eUSB

Base I/O Ports6 x 1GbE Cu

1 x 1GbE Cu Mgmt

6 x 1GbE Cu

1 x 1GbE Cu Mgmt

8 x 1GbE Cu

1 x 1GbE Cu Mgmt

8 x 1GbE Cu

1 x 1GbE Cu Mgmt

8 x 1GbE Cu

1 x 1GbE Cu

Expansion I/O Module6 x 1GbE Cu

or 6 x 1GbE SFP

6 x 1GbE Cu

or 6 x 1GbE SFP

6 x 1GbE Cu

or 6 x 1GbE SFP

6 x 1GbE Cu

or 6 x 1GbE SFP

6 x 1GbE Cu

or 6 x 1GbE SFP

Power SupplySingle Fixed Power

Supply

Single Fixed Power

Supply

Single Fixed Power

Supply

Dual Hot-Swappable

Redundant Power

Supply

Dual Hot-Swappable

Redundant Power

Supply

VPN Crypto Hardware

Accelerator Yes Yes Yes Yes Yes

IPS Hardware Accelerator No No Yes Yes Yes

ASA 5500-X

Page 43: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

ASA 5585-X Firewall Module Hardware Comparison

ASA SSP-10 ASA SSP-20 ASA SSP-40 ASA SSP-60

Processor1 x 2.0 GHz

(2 cores/

4 threads)

1 x 2.13 GHz

(4 cores/

8 threads)

2 x 2.13 GHz

(8 cores/

16 threads)

2 x 2.46 GHz

(12 cores/

24 threads)

Maximum memory 6 GB 12 GB 12 GB 12 GB

Maximum storage 2 GB eUSB 2 GB eUSB 2 GB eUSB 2 GB eUSB

Ports 2 SFP+

8 x 1 GE Cu

2 x 1 GE Cu mgmt

2 SFP+

8 x 1GE Cu

2 x 1 GE Cu mgmt

4 SFP+

6 x 1 GE Cu

2 x 1 GE Cu mgmt

4 SFP+

6 x 1GE Cu

2 x 1 GE Cu mgmt

Security1 Cavium Nitrox 1620

1.5 Gbps

AES 256

2 Cavium Nitrox 1620

3 Gbps

AES 256

3 Cavium Nitrox 1620

4.5 Gbps

AES 256

4 Cavium Nitrox 1620

6 Gbps

AES 256

ASA 5585-X

Page 44: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

ASA 5585-X (FirePOWER Next-Generation IPS)

Internet Edge/

Campus

ASA 5585 SSP10F10

Internet

Edge/Campus

ASA 5585 SSP20F20

Campus/

Data Center

ASA 5585 SSP40F40

Data Center

ASA 5585 SSP60F60

PerformanceMax firewall

Max traditional IPS

Max IPS

Max IPS + AVC

Max IPsec VPN

Max IPsec/SSL VPN peers

4 Gbps

2 Gbps

2.5 Gbps

2 Gbps

1 Gbps

5000

10 Gbps

3 Gbps

7 Gbps

3.5 Gbps

2 Gbps

10,000

20 Gbps

5 Gbps

10 Gbps

6 Gbps

3 Gbps

10,000

40 Gbps

10 Gbps

15 Gbps

10 Gbps

5 Gbps

10,000

Platform CapabilitiesMax firewall connections

Max connections per second

Packets per second (64 byte)

Base I/O

Max I/O

VLANs supported

High availability supported

1 million

50,000

1.5 million

8 x 1 GE + 2 x 10 GE

16 x 1 GE + 4 x 10 GE

250

A/A and A/S

2 million

125,000

3 million

8 x 1 GE + 2 x 10 GE

16 x 1 GE + 4 x 10 GE

250

A/A and A/S

4 million

200,000

5 million

6 x 1 GE + 4 x 10 GE

12 x 1 GE + 8 x 10 GE

250

A/A and A/S

10 million

350,000

9 million

6 x 1 GE + 4 x 10 GE

12 x 1 GE + 8 x 10 GE

250

A/A and A/S

Page 45: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

New Additions to the 5500 Portfolio5506X with FirePOWER Services

• Max 250 Mbps AVC throughput

• Max 125 Mbps AVC and NGIPS

• 90 Mbps AVC or IPS with 440 byte HTTP

• ASDM 7.3.x or CSM and FireSIGHT

• Available in hardened and wireless configurations

Page 46: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

New Additions to the 5500 Portfolio5508X with FirePOWER Services

• Max 450 Mbps AVC throughput

• Max 250 Mbps AVC and NGIPS

• 180 Mbps AVC or IPS with 440 byte HTTP

• ASDM 7.3.x or CSM and FireSIGHT

Page 47: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

New Additions to the 5500 Portfolio5516X with FirePOWER Services

• Max 850 Mbps AVC throughput

• Max 425 Mbps AVC and NGIPS

• 300 Mbps AVC or IPS with 440 byte HTTP

• ASDM 7.3.x or CSM and FireSIGHT

Page 48: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Horizontal Scaling through Clustering

Up to 16 Units

Firewall maximum throughput: 640 Gbps

Firewall + FirePOWER® IPS maximum

throughput: 160+ Gbps

FirePOWER IPS 440-byte throughput: 96 Gbps

Page 49: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Cisco ASAv Firewall and Management Features

Cisco® ASA 9 Feature Set

Cisco

ASAv

Removed clustering and

multiple-context mode

10 vNIC interfaces and VLAN tagging

Virtualization displaces multiple-context and clustering

Parity with all other Cisco ASA platform features

SDN (Cisco APIC) and traditional (Cisco ASDM and CSM)

management tools

Dynamic routing includes OSPF, EIGRP, and BGP

IPv6 inspection support, NAT66, and NAT46/NAT64

REST API for programmed configuration and monitoring

Cisco TrustSec® PEP with SGT-based ACLs

Zone-based firewall

Equal-Cost Multipath

Failover Active/Standby HA model

Page 50: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

* Lab Edition license is built in with 100-Kbps throughput and 100 total

connections allowed

Cisco ASAv Platforms

100 Mbps

1 Gbps

2 Gbps

Cisco®

ASAv5

Cisco®

ASAv10

Cisco®

ASAv30

Page 51: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

ASAv Deployed in Amazon Web Services

• Management (required) interface - used for SSH/ASDM

access from the Jumpbox, and is provided by default.

It has no Public/Elastic IPs and can not be used for through

traffic.

• Outside Interface (required) - used to connect ASAv to the

public network and is an alternative path for management

access

• Inside Interface (required) and DMZ Interface (optional) – as

in previous slides are used to connect ASAv to internal

subnets

Cisco®

ASAv30

In AWS

Ubuntu1

jumpbox

Management

(no routes)

Inside

Internet

Ubuntu3

Outside

(default route)

DMZ

Ubuntu2

Internetadmin

Page 52: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Routed Firewall

Outside1

Inside

Shared

DMZ

Security Zone

Inside

Outside2

Gateway 1 Gateway 2

Cisco®

ASAv

Routed

client

host2

host1

• Routed – Tenant Edge use case

• Traditional Layer 3 boundary

• First-hop gateway to hosts

• Enable physical and VM hosts

• Dynamic routing

• Support VPN

Page 53: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Transparent Firewall

Cisco®

ASAv

Transp

client

Segment-1

Segment-3

host1

host2

Segment-2

Segment-4

Gateway • Bridge up to 4 interfaces / sub-interfaces

• NAT and ACLs are available

• Traditional Layer 2 boundary between hosts

• All segments in one broadcast domain

Page 54: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Cisco ASAv Data Sheet - Performance and Scale

Data Sheet Metric Cisco® ASAv5 Cisco ASAv10 Cisco ASAv30

Stateful Inspection Throughput (Maximum) 100 Mbps 1 Gbps 2 Gbps

Stateful Inspection Throughput

(Multi-Protocol)50 Mbps 500 Mbps 1 Gbps

3DES/AES VPN Throughput 30 Mbps 125 Mbps 300 Mbps

Connections per Second 8,000 20,000 60,000

Concurrent Sessions 50,000 100,000 500,000

VLANS 25 50 200

Bridge Groups (2 VLANs/BVI) 12 25 100

Cisco® Cloud Web Security Users 50 150 500

IPsec VPN Peers 50 250 750

Cisco AnyConnect® or

Clientless User Sessions50 250 750

UC Phone Proxy 50 250 1000

Cisco UCS® C260 M2

Cisco UCS B200 M3

Intel Xeon processor E5-2640

Tested on Hardware

9.3.2

Page 55: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Over, Through or Around The Wall

Page 56: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Things Change

Page 57: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN
Page 58: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Introducing

Industry’s First Threat-Focused NGFW

#1 Cisco Security announcement of the year!

• Integrating defense layers helps organizations

get the best visibility

• Enable dynamic controls

to automatically adapt

• Protect against advanced threats

across the entire attack continuum

Proven Cisco ASA firewalling

Industry leading NGIPS and AMP

Cisco ASA with FirePOWER Services

Page 59: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Application Visibility and Control

Page 60: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Host Profiles

• What OS?

• What Services?

• What Applications?

• What Vulnerabilities?

Page 61: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Impact Assessment

Impact FlagAdministrator

ActionWhy

1 Act immediately,

vulnerable

Event corresponds

to vulnerability

mapped to host

2 Investigate,

potentially vulnerable

Relevant port open

or protocol in use,

but no vuln mapped

3Good to know,

currently not

vulnerable

Relevant port not

open or protocol

not in use

4 Good to know,

unknown target

Monitored network,

but unknown host

0 Good to know,

unknown networkUnmonitored network

Page 62: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Indications of Compromise (IoCs)

IPS Events

Malware Backdoors

Exploit Kits

Web App Attacks

CnC Connections

Admin Privilege Escalations

SI Events

Connections

to Known CnC IPs

Malware Events

Malware Detections

Office/PDF/Java Compromises

Malware Executions

Dropper Infections

Page 63: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Advanced Malware Analysis

Page 64: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Network File Trajectory – Where Has It Been Seen?

Page 65: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Host File Trajectory – What Has It Done?

Page 66: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Security Threats and Notifications

http://www.cisco.com/security

Notification Registration

Current News

Page 67: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Use Cases For Secure Group Tags

Page 68: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

ASA Policy Enforcement with MDM

AP

WLC

ASA

Web Server

ISE MDM

Leverage security groups to authorize endpoints based on MDM compliance.

Compliance check

Security Group Query

SXP

Create Security Groups on ISE

1 Compliant

2 Non-Compliant

Policy on ASA by Security Group

1

2

3

4

5

6

7

8

9

Page 69: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

ASA Policy Enforcement with Nexus 1000V

AP

WLC

ASA

VirtualWeb

Server

ISE

Leverage security groups to automate provisioning of virtual servers.

Security Group Query

SXP

Create Port Profiles on N1000V

• DMZ

• Web

• HR

Policy on ASA by Security Group

23

4

5

6

78

10

1000V

SXP

vCenter

HTTPS

9

1

11

Page 70: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Thank you

Page 71: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Complete Your Online Session Evaluation

Don’t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online

• Give us your feedback to be entered into a Daily Survey Drawing. A daily winner will receive a $750 Amazon gift card.

• Complete your session surveys though the Cisco Live mobile app or your computer on Cisco Live Connect.

Page 72: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Participate in the “My Favorite Speaker” Contest

• Promote your favorite speaker through Twitter and you could win $200 of Cisco Press products (@CiscoPress)

• Send a tweet and include

• Your favorite speaker’s Twitter handle @12LISN2

• Two hashtags: #CLUS #MyFavoriteSpeaker

• You can submit an entry for more than one of your “favorite” speakers

• Don’t forget to follow @CiscoLive and @CiscoPress

• View the official rules at http://bit.ly/CLUSwin

Promote Your Favorite Speaker and You Could Be a Winner

Page 73: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Continue Your Education

• Demos in the Cisco campus

• Walk-in Self-Paced Labs

• Table Topics

• Meet the Engineer 1:1 meetings

• Related sessions

Page 74: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN
Page 75: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Security Cisco Education OfferingsCourse Description Cisco Certification

Implementing Cisco IOS Network Security (IINS)

Implementing Cisco Edge Network Security Solutions

(SENSS)

Implementing Cisco Threat Control Solutions (SITCS)

Implementing Cisco Secure Access Solutions (SISAS)

Implementing Cisco Secure Mobility Solutions

(SIMOS)

Focuses on the design, implementation, and monitoring of a comprehensive

security policy, using Cisco IOS security features

Configure Cisco perimeter edge security solutions utilizing Cisco Switches, Cisco

Routers, and Cisco Adaptive Security Appliance (ASA) Firewalls

Deploy Cisco’s Next Generation Firewall (NGFW) as well as Web Security, Email

Security and Cloud Web Security

Deploy Cisco’s Identity Services Engine and 802.1X secure network access

Protect data traversing a public or shared infrastructure such as the Internet by

implementing and maintaining Cisco VPN solutions

CCNA® Security

Securing Cisco Networks with Threat Detection and

Analysis (SCYBER)

Designed for professional security analysts, the course covers essential areas of

competency including event monitoring, security event/alarm/traffic analysis, and

incident response

Cisco Cybersecurity Specialist

Network Security Product and Solutions Training For official product training on Cisco’s latest security products, including Adaptive

Security Appliances, NGIPS, Advanced Malware Protection, Identity Services

Engine, Email and Web Security Appliances see

www.cisco.com/go/securitytraining

For more details, please visit: http://learningnetwork.cisco.com

Questions? Visit the Learning@Cisco Booth or contact [email protected]

Page 76: Cisco Firewall Basics - clnv.s3. · PDF file• This session is not for you if you want to deep dive into configurations for specific features / functionality ... Edge With DMZ - VPN

Design Cisco Education OfferingsCourse Description Cisco Certification

Designing Cisco Network Service Architectures

(ARCH)

Provides learner with the ability to perform conceptual, intermediate, and

detailed design of a network infrastructure that supports desired capacity,

performance, availability required for converged Enterprise network

services and applications.

CCDP® (Design Professional)

Designing for Cisco Internetwork Solutions

(DESGN)

Instructor led training focused on fundamental design methodologies used

to determine requirements for network performance, security, voice, and

wireless solutions. Prepares candidates for the CCDA certification exam.

CCDA® (Design Associate)

For more details, please visit: http://learningnetwork.cisco.com

Questions? Visit the Learning@Cisco Booth or contact [email protected]