Brksec 2050
Brksec 2050
Brksec 2050
Typical Deployment
Scenarios
BRKSEC-2050
Jeff Fanelli
Technical Solutions Architect [email protected]
#jefanell
About your speaker
Jeff Fanelli
Technical Solutions Architect (2006)
Cisco Global Security Sales Organization
#jefanell
Trivia!
Im from the only U.S. state you can drive
south into Canada from..
About your speaker
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Cisco Firepower Sessions: Building Blocks
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Todays Agenda
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
ASA Adaptive Security Appliance
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Firepower NGIPS Platforms
Firepower Next Generation IPS
Best of breed IPS
Based on open source Snort
Integrated Advanced Malware Protection
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
ASA with FirePOWER Services
Analytics &
Visibility and Control (AVC)
Automation
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Firepower Threat Defense
CISCO COLLECTIVE SECURITY INTELLIGENCE
WWW
Malware
High Intrusion URL Filtering
Protection
Availability Prevention
Analytics &
Network Application Automation
Firewall and Visibility Network
Network Identity Based
Identity-Policy
Routing &Control Profiling
Profiling Policy Control
Control
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Firepower 6.0 on ASA Upgrade vs Migrate
Choose Firepower Services or unified Threat Defense Software
FirePOWER
Services 5.4
ASA 9.5.x
Upgrade Re-Image**
FirePOWER
*Firepower Services **All shipping ASA 5500-
6.0 compatible ASA
Services 6.0 or Firepower
Threat Defense
X supported, except
Version Required 5585-X and 5505
ASA 9.5.x+ * 6.x
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
What are the Firepower 6 Deployment Options?
Firepower Appliances ASA with Firepower Firepower Threat Defense
Services (Unified Software Image)
FirePOWER
Firepower Services 6.0 Firepower
Appliaces Threat Defense
6.0 ASA 9.5.x 6.0
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Firepower 4100 Series
Introducing four new high-performance models
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Cisco Firepower 9300
Platform
High-speed, scalable security
Multiservice
Modular Carrier Class
Security
Benefits Benefits Benefits
Standards and interoperability Integration of best-in-class security Industry-leading performance:
Flexible architecture Dynamic service stitching 600% higher performance
30% higher port density
Features Features*
Template-driven security Cisco ASA container Features
Secure containerization for Cisco Firepower Threat Defense Compact, 3RU form factor
customer apps containers: 10-Gbps/40-Gbps I/O; 100-Gbps
RESTful/JSON API NGIPS, AMP, URL, AVC ready
Third-party orchestration and Third-party containers: Terabit backplane
management Radware DDoS Low latency, intelligent fast path
Other ecosystem partners Network Equipment-Building
System (NEBS) ready
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Software Support Physical Platforms
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Software Support - Virtual Platforms
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Firepower NGFW Software
Summary of Capabilities in Firepower 6
Threat Innovation Enterprise Management Unified Image
DNS Inspection and Sinkholing Domains with Role-Based Unified ASA and Firepower
Access Rules
URL-based Security Intelligence Unified ASA and Firepower
Policy Hierarchy with Objects
SSL Decryption Inheritance
Transparent and Routed
ThreatGRID Analysis Deployment
Security Intelligence
Unparalleled knowledge about the Internet
AMP
Integration
Sandbox dynamic analysis,
locally and in the cloud
Key Firepower 6.0 Capabilities
Flexible Deployment
Multi-Domain SSL Decryption
Management Threat detection inside SSL
encrypted traffic
Separated Event Data,
SOC OPERATORS
Reports and Network
Maps, with RBAC
Integrated Protection
CUSTOMER / NETWORK 3 Advanced Access Control with
CUSTOMER / NETWORK 1
ISE Device Profiling
and Security Group Tags
CUSTOMER / NETWORK 2
Captive Portal
Active Authentication
and Guest support
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Integrated SSL Decryption
Multiple Deployment modes
Passive Inbound (known keys)
Inbound Inline (with or without keys)
Outbound Inline (without keys)
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
URL-Based Security Intelligence
Extension of IP-based SI
TALOS dynamic feed, 3rd party feeds and
lists
Multiple categories: Malware, Phishing,
CnC,
Multiple Actions: Allow, Monitor, Block,
Interactive Block,
Policy configured via Access Rules or
black-list
IoC tags for CnC and Malware URLs
New Dashboard widget for UR SI
Black/White-list URL with one click URL-SI
Categories
DNS Inspection
Security Intelligence support for domains
Addresses challenges with fast-flux domains
Cisco provided and user defined DNS lists:
CnC, Spam, Malware, Phishing
Multiple Actions: Block, Domain Not Found,
Sinkhole, Monitor
Indications of Compromise extended with
DNS Security Intelligence
New Dashboard widget for DNS SI
DNS List Action
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
NGFW Policy
DNS SI: C&C servers
Connection to Sinkhole IP
X Sinkhole
Endpoint
(10.15.0.21)
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
OpenAppID Integration
Open source application-focused detection language that enables users to create, share and implement custom application detection.
What is OpenAppID ?
Open source app-focused detection
language
> 2500 detectors contributed by Cisco
> 20,000 downloads of the detection
pack since last September
Snort-community supported
Simple Language
Reduced dependency on vendor release
cycles
Written using the Lua scripting language
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
File Property Analysis and Local Malware Checks
Identify popular/common malware on the appliance via ClamAV
Reduced need to send samples to the cloud for dynamic analysis
Local assessment of container files for malware viability inside nested content.
File Composition report with risk assessment
Added Automatic analysis:
PDF
Office Documents
Others: EXE/DLL, MSOLE2
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Captive Portal - Configuration
Action
Authentication Type
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
ISE Integration
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
ISE Integration Screen Shot
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Management Platform Options
Firepower Management Center 6.0: Overview
Single manager for Firepower Threat Defense
Can also manage Firepower appliance and Services deployments
Unified policy management for Firepower appliances and Firepower Threat
Defense
One
Rule
Table
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Global Policies
1
Multi-domain Global Objects
2
3
USA INDIA UK
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
External Authentication
for Administration
LDAP / AD or RADIUS
Example allows External
Users to be defined that exist
in Active-Directory for FMC or
shell login
Can stack multiple methods
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
New Capabilities in 6.1 Release
New capabilities in 6.1
Enterprise Management Threat Innovation Unified Image
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Lookup features Whois
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
AMP Private Cloud
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
FMC 6.1 HA
Very different from 5.4 FMC HA
Active/Standby Deployment
Failover manual
Sybase database duplicated
Both FMC nodes receive
events from each sensor
Policy changes made on primary
are copied over to the secondary
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
ISE remediation in 6.1 using pxGrid
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
RESTful API & API Explorer
Free tool build into the FMC that can be used to use the REST API
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Integrated risk reports
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
VDI Identity: The Problem
user2 Internet
user1
Citrix Logon
Server-hosted desktops
192.168.0.23
what?
is 192.168.0.23
user1 or user2?
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Firepower Identity Sources
ASA
FTD w/FPS
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Added Virtual support for FTD and FMC
BRKSEC-2020 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Firepower Device Manager
Free local manager for managing a single Firepower Threat Defense device
Targeted for SMB market
Designed for Networking
Security Administrator
Beta is only available
on Kenton models
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Firepower Features
Safe Search YouTube EDU enforcement
Filter inappropriate content from search results
Critical for enabling education customers
Utilizes a new Snort preprocessor: HTTP header modification Pre-processor
Last preprocessor in Snort preprocessor chain
Based on AppID & FW rule engine, HTTP header pre-proc will generate modified packet
Safe Search
Action varies depending on search engine
YouTube EDU
Injects X-YouTube-Edu-Filter
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
True-IP Policy for XFF Proxy Headers
Currently True-IP Policy are not used for policy decisions.
Will be able to specify which source IPs are trusted for these headers
Will display client IP information in all relevant event tables
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Active authentication enhancements
Kerberos authentication
Kerberos provides secure authentication without user credentials leaving the hands of the user
Similar to NTLM, browsers can be configured to transparently authenticate the user
Using Kerberos, the firewall can provide secure, transparent, ticket-based authentication
Guest access
Before 6.1, guest policies could be
provided to users that failed authentication
With 6.1, there is a new button on the
portal page. This button allows a user to
choose guest access without trying to
authenticate.
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Identity policy configuration for Kerberos
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
FTD Specific Features
Inline Security Group Tags (SGT)
Behavior in 6.0
SGTs in network traffic were not utilized
Access policy rules used IP to SGT mapping provided by ISE
SGTs could not be defined locally on the FMC
Behavior in 6.1
SGTs in network traffic are utilized
SGTs seen in traffic take precedence SGT to IP mapping provided by ISE
Untagged traffic is still matched to rule using IP to SGT mapping provided by ISE
ISE integration is no longer needed SGTs can be defined in FMC
If ISE integration is enabled, locally defined SGTs are not available
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Inline Security Group Tags (SGT) configuration
Locally defined SGTs are objects on the FMC
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Rate limiting configuration
QOS Policy is a new policy type with separate policy table
Not associated with an Access Control Policy directly associated with devices
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Prefilter Policies
New type of policy called Prefilter policies
Precedes access control policy
Together with access control policy, allows control of both tunneled and tunneling protocol
Also used to facilitate tools to migrate from ASA to NGFW
First you must enable multicast routing (may be enabled from IGMP or PIM page)
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Deployment Modes
Requirements: Availability and Scaling
Scaling IPS with ASA5585-X Clustering
Up to 16 ASA5585-X IPS
Stateless load balancing by external switch
Support for VPC and LACP
Cluster Control Protocol/Link
State-sharing between Firewalls for concerted
operation and high availability
Every session has a primary and secondary owner
ASA
ASA provides traffic symmetry to IPS modules
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Internal
Network
Requirements: Availability and Scaling
Scaling IPS for the DC with Dedicated Appliances Core
VPC/VSS are both a challenge and an asset for IPS
With VSS/VPC, traffic for a single flow can go across
either switch
IPS (normalizer) needs to see a full bi-directional TCP session vPC Peer-link
N7K
Load-splitting and per-switch symmetry via ECLB
Inter-switch flow-affinity using inter-VRF routing
Up to 160Gbs Max IPS throughput / 80 Gbps Real World vPC
Average
Access
IPS Solution
DC Servers
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
FirePOWER Services Support All Current ASA
Deployment Models
Can Mix and Match on same hardware to maximize value and visibility
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Firepower Threat Defense High Availability
Active/Standby only
Stateful failover mode only
Primarys policies are synchronized to Secondarys
FMC
Two nodes connected by one or two dedicated
connections called failover links FTD FTD
Active Standby
Management interface on each unit has/maintains a
distinct management IP address
Config/Policy updates are sent to the current active node
by FMC
On FP9300 platforms, failover is only supported
across blades in different chassis
in non-cluster mode
with matching interfaces on separate blades
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Firepower Threat Defense for VMware
Firepower
ASAv
NGIPSv
9.x
5.4
Migrate Upgrade
Upgrade
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Virtual FTD prerequisites
Set up Smart Licensing on Firepower Management Center
Smart Licensing Product Registration
Evaluation Mode
Download OVA
Ngfw-6.0.0-xxx.ova
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Virtual FTD Installation steps (vSphere)
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Deployment Designs
Use Cases
Requirement
Service
ISP
Connectivity and Availability Requirement: Provider Remote VPN
Firewall for High Availability (Redundancy) Users
FW in HA
Solution
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Firewall Policies Edge Firewall
Use Cases
1. Inbound (Outside->in)
2.Outbound (Inside->Out)
Firepower
Services
ASA
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Firewall Policies Edge Firewall - Inbound
Policy Requirements
Static NAT to a DMZ server
Policy to control inbound ports (TCP/80, TCP/443, Passive FTP )
Policy to inspect inbound traffic by SNORT engine (security over connectivity)
Policy to control file types uploaded to DMZ server
Configuration Steps
Configure NAT ASA
Configure Inbound ACLs on outside interface
Create File policy
Configure Access policy Firepower MC
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Firewall Policies Edge Firewall - Inbound
ASDM:
Configure NAT ASA
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Firewall Policies Edge Firewall - Inbound
Configure Inbound ACLs on outside interface (if required by interface levels)
Optionally controlled exclusively in Firepower Management Center
ASDM:
CLI:
object-group service DM_INLINE_TCP_1 tcp
port-object eq ftp
port-object eq http
port-object eq https
access-list Outside_access_in line 1 extended permit tcp any object
WebServer5 object-group DM_INLINE_TCP_1
access-group Outside_access_in in interface Outside
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Firewall Policies Edge Firewall - Inbound
Create the file policy
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Firewall Policies Edge Firewall - InBound
Configure Access policy in Firepower Management Center
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Firewall Policies Edge Firewall - InBound
Configure Access policy Firepower MC
Firewall Policies Edge Firewall - Inbound
Configure Access policy Firepower Management Center
Firewall Policies Edge Firewall - InBound
Configure Access policy Firepower Management Center
Firewall Policies Edge Firewall - InBound
Configure Access policy Firepower Management Center
Firewall Policies Edge Firewall - Inbound
Configure Access policy Firepower Management Center
Firewall Policies Edge Firewall - Inbound
Configure Access policy Firepower MC
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Firewall Policies Edge Firewall - Outbound
Dynamic NAT
User authentication
Per user policy
Application control
Reputation
Category
Policy to inspect outbound traffic by SNORT engine (connectivity over security)
Policy to control files based on AMP disposition from the Internet
Configuration Steps
Configure Dynamic Port Address Translation ASA
Create File policy
Configure Access policy Firepower MC
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Firewall Policies Edge Firewall - Outbound
Configure Dynamic Port Address Translation ASA
ASDM:
CLI:
nat (Inside,Outside) 1 source dynamic any interface description Dynamic NAT
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Firewall Policies Edge Firewall - Outbound
Create File policy
Firewall Policies Edge Firewall - Outbound
Configure Access policy Firepower Management Center
Firewall Policies Edge Firewall - Outbound
Configure Access policy Firepower Management Center
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Firewall Policies Edge Firewall - Outbound
Configure Access policy Firepower Management Center
Firewall Policies Edge Firewall - Outbound
Configure Access policy Firepower Management Center
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Firewall Policies Edge Firewall - Outbound
Configure Access policy Firepower Management Center
Deployment Designs
Use Cases
FW in HA
Solution
Security Application: Firepower Threat Defense application with
Campus/Priv vPC / Port-
FMC
ate Network Channel
Private Network
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Firepower Threat Defense Edge Example
Wired and Wireless Interface Configuration and Zone
Assignments
Dynamic NAT for Direct Internet Access traffic
User authentication
Group identity based Application Control
Selective Decryption Policy
DNS Sink-holing
Policy to inspect outbound traffic by SNORT engine
(connectivity over security)
Policy to control files based on AMP disposition from the
Internet
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
IPv4 + IPv6 Support
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Dynamic NAT for Direct Internet Access
Automatic and Manual (complex) NAT Support for FTD including IPv6
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Identity Policy based on Passive Authentication
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Access Control Policy blocking inappropriate content
105
Access Control Policy Identity Control
Can Mix and Match AD & ISE Identity Groups (Guest, BYOD, etc)
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Active Directory Realm Configuration
Multiple Entries
LDAP / LDAPS
Assigned to Identity
Policy for Active or
Passive Authentication
107
Identity Services Engine PXGrid Integration
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
TrustSec Security Group Tag based identity from ISE
Can also reference Identity Services Engine identified Device Profiles
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
SSL Decrypt is fully configurable
Can specify by application, certificate fields / status, ciphers, etc
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
DNS Sink-holing / Traffic Drop Rule Set
Based on DNS query results of client
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Security Intelligence DNS Global Settings
Whitelist / Blacklist capabilities
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Custom IPS Policy
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Malware and File Analysis
Attached to Access Policy
2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Deployment Designs
Use Cases
Other Modes
Firepower Threat Defense Inline Sets
Allows IPS (or IDS) inspection of
traffic bridge between physical
interfaces
IDS TAP mode use in conjunction
with external splitter / SPAN
sessions.
Can be configuration in addition to
routed / transparent NGFW
interfaces on FTP Device
Be careful not to exceed platform
performance limitations!
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Promiscuous Interface
Only copies of the packets are sent to
the sensor
Mostly detection, limited protection
Promiscuous Interface
Optional prevention through external
blocking
SPAN Destination Port
Separate device must send copies of the or VACL Capture
packets
Span (or monitor) from a switch
Ethernet Switch
VACL capture from a switch
Network Taps
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
ASA - FTD Migration Tool
ASA FTD Migration
Firepower 6.1 introduces migration support for key ASA configurations
Access Rules,
NAT and Limited
referenced availability
Objects in phase-1
Support for
ASA 9.1.x
onwards
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Input for Migration Tool
Migration tool supports ASA config files in .txt and .cfg format
ASA version command in config file is mandatory for Migration (ex: ASA
version 9.1)
ASA configuration file should have ACL and NAT policies
ASA configuration file with version 9.1 and above from any ASA models
(including vASA) can be used for FTD/FMC migration.
Firepower Threat Defense Summary
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Complete Your Online Session Evaluation
Give us your feedback to be
entered into a Daily Survey
Drawing. A daily winner will
receive a $750 Amazon gift card.
Complete your session surveys
through the Cisco Live mobile
app or from the Session Catalog
on CiscoLive.com/us.
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Security Joins the Customer Connection Program
Customer User Group Program
19,000+
Members
Who can join: Cisco customers, service Strong
providers, solution partners and training partners
Private online community to connect with Join in World of Solutions
peers & Ciscos Security product teams
Security zone Customer Connection stand
Monthly technical & roadmap briefings via
WebEx Learn about CCP and Join
New member thank-you gift*
Opportunities to influence product direction Customer Connection Member badge ribbon
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Thank you
Appendix
Life Of A Packet
Flow Diagrams
ASA-5506/5506W-X Back Panel
2 3 4
1 7 8
5 9
6
1) Power LED: Green -> power applied OK
2) Status LED: Green blinking -> system is booting up
Green solid -> successful boot
Orange -> error during boot-up
3) Active LED: Green -> unit is Active in failover pair
Orange -> unit is Standby in failover pair
Off -> not part of a failover pair
4) WLAN Module not lit for 5506/Supported in the 5506W
5) GE ports: Left-side LED Green -> link. Right-side LED blinking -> network activity
6) Console Ports: RJ-45 and mini-USB Connector. If mini-USB is connected, RJ-45 becomes disconnected
7) GE Management Port
8) USB port for external storage shows up as disk1
9) Reset Pin
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
ASA-5506H-X (Ruggedized) 6
3 4 5 7
1 2
5V AC
1) Power LED: Green -> power applied OK
2) Status LED: Green blinking -> system is booting up
Operating 20 to 60C Green solid -> successful boot
Temperature Orange -> error during boot-up
3) Active LED: Green -> unit is Active in failover pair
Orange -> unit is Standby in failover pair
Off -> not part of a failover pair
4) GE ports: Left-side LED Green -> link. Right-side LED blinking -> network activity
5) Console Ports: RJ-45 and mini-USB Connector.
6) GE Management Port
7) USB port for external storage shows up as disk19)
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
ASA-5508-X/5516-X Back Panel
USB Port
Serial Console
RJ45/USB SSD
8x GE Ethernet ports
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
ASA-5512-X & 5515-X Back Panel
Dedicated Mgmt Port (1GE)
Status LEDs
I/O Expansion Slot Serial Console
Fixed Power Supply
6 x 1GE Cu Ports
USB Port
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
ASA-5525-X & 5545-X / 5555-X Back Panel
Dedicated Mgmt Port (1GE)
Two GE Management
10GE and GE ports
ASA SSP Ports
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Firepower 4100 Series Front and Rear View
SSD1 SSD2
Power Mgmt. SYS
Console SSD Status 1 3 5 7 NetMod 1 (Slot) NetMod 2 (Slot)
ACT
2 4 6 8
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Firepower 9300
Supervisor Network Modules
Application deployment and orchestration 10GE/40GE and future 100GE
Network attachment and traffic distribution Hardware bypass for inline NGIPS
Clustering base layer for ASA/FTD
Security Modules
Embedded Smart NIC and crypto hardware
Cisco (ASA, FTD) and third-party (Radware DDoS) applications
Standalone or clustered within and across chassis
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Cisco Firepower Threat Defense for ISR
FirePOWER Threat Defense Cisco 4000 Series ISR
+
Cisco ISR G2 Series
AppX + Security
License
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
FirePower 8300
Single-pass, high-performance, low-latency
Flexible in Software
Firepower NGIPS & AMP
Flexible in Hardware
Modular for options in Interfaces, including
10GE and 40GE
High-Performance:
15Gbps with 8350
Cost Effective
Best in class for IPS by NSS Labs
Best in class for NGFW by NSS Labs
Best in class for Breach Detection by NSS
Labs
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Cisco FirePOWER Platform Features
Virtual 7000 7100 8100 8200/8300
1GE Interfaces YES YES YES YES
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
FTD Packet Processing Flow
No DROP No
RX Ingress Existing NAT Advanced No
Pkt Conn TrustPath? DROP
Interface Untranslate ACL
Permit
Yes
No
No No
No No
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Detailed ASA SFR Packet Flow
YES
1 2 3 4 5 6
NO NO NO
DROP DROP DROP
7 8 9 10 11
NAT IP Egress L3 L2 XMIT
Header Interface Route YES Addr YES PKT
NO NO
DROP DROP
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Life of a packet in Routed mode
Application, URL
Yes reputation/Category based
IP Application access control enforcement
Reputation/ Identification IPS policy enforcement
SI
File/Network AMP policy Trustpat
enforcement h or
Event gen Allow
Yes No
No DROP No
RX
Existing
Ingress NAT No
Pkt Interface
Conn/Cluste Advanced TrustPath? DROP
Untranslate
r redirect ACL
permit
Yes
No
No No
No No
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Life of a packet in Transparent mode
Application, URL
Yes reputation/Category based
IP Application access control enforcement
Reputation/ Identification IPS policy enforcement
SI
File/Network AMP policy Trustpat
enforcement h or
Event gen Allow
Yes No
DROP No
No
Existing NAT
RX Ingress No
Pkt
Conn/Cluste Untranslat Advanced TrustPath? DROP
Interface
r redirect e ACL
permit
Yes
No
DROP Yes
L2
ASA ALG NAT IP Entry? TX
Checks Header Pkt
No
No
DROP DROP
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Life of a packet in Passive mode
Application, URL
Yes reputation/Category based
RX Ingress
Existing No IP Update
Application access control enforcement
Pkt Conn/Cluste TrustPath? Reputation/ Trustpath
Interface Identification IPS policy enforcement
r redirect SI
File/Network AMP policy Trustpat
enforcement h
Yes Yes Event gen
No
No or DROP
DROP DROP
Redirect Allow
DROP
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Life of a packet in Inline pair mode
Application, URL
Yes reputation/Category based
RX Ingress
Existing No IP Application Update
access control enforcement
Pkt Conn/Cluste TrustPath? Reputation/ Identification Trustpath
Interface IPS policy enforcement
r redirect SI
File/Network AMP policy Allow or
enforcement Trustpat
Yes Yes Event gen h
No
Deny
DROP
Redirect
DROP
TX
Pkt
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
Life of a packet in Inline pair tap mode
Application, URL
Yes reputation/Category based
Existing Copy IP Update
RX Ingress No Application access control enforcement
Conn/Cluste TrustPath? Packet Reputation/ Trustpath
Pkt Interface Identification IPS policy enforcement
SI Trustpat
r redirect File/Network AMP policy h
enforcement
Yes Yes No Event gen
DROP
DROP No or
Redirect Allow
DROP
TX
Pkt
BRKSEC-2050 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 146