© 2018 Cisco Systems, Inc. All Rights Reserved
© 2018 Cisco Systems, Inc. All Rights Reserved
2
............................................................................................................... 2
............................................................. 2
.................................................................................................. 3
......................................................................................................... 3
....................................................................................... 4
................................................................. 6
................................................................................. 7
................................................................................................................ 7
........................................................................................................ 8
..................................................................................... 8
............................................................................................. 8
............................................................................................ 8
...................................................................................................... 9
........................................................................................... 9
...................................................................................................... 10
................................................................................................ 10
........................................................................... 11
1
© 2018 Cisco Systems, Inc. All rights reserved.
................................................................... 12
................................................................................................ 13
.................................................................................................................. 13
................................................................................. 14
................................................................................. 14
............................................................................................................................. 15
................................................................................. 15
................................................................................. 15
..................................................................................................... 16
................................................................................. 16
................................................................................. 17
................................................................... 17
................................................................................................................... 17
2
© 2018 Cisco Systems, Inc. All rights reserved.
3
© 2018 Cisco Systems, Inc. All rights reserved.
NGFW Policies: Efficiently Building Zero-Trust
• Like traditional firewall policies, rules run from
Layer 2-4 Fast Path top to bottom
IP Security Blocking • Some functions (fast path, IPSec, SSL, and
traffic normalization) run before traffic is
matched against an Access Control Rule
Leaf • Good to always be reducing the potential
Domain number of rules that any traffic pattern can
hit.
Layer 3 – 7, • Exp: SSH matches more than tcp/22
Security Group Tag, • Caveat: matches without port info means
and Identity some packets will potentially pass until
Matching the app is detected.
• Each matched ACL has it’s own threat
monitoring conditions (IPS, Malware, IPS
Variables)
• The model can apply to policy “blocks” and/or
leaf-domains.
Threat Inspection
Final Action And Blocking
(Block, IPS, Network Discovery)
4
© 2018 Cisco Systems, Inc. All rights reserved.
5
© 2018 Cisco Systems, Inc. All rights reserved.
Packets and Policies: Know What’s Happening Where
Prefilter
Policy ASA/Lina
Fastpathed
Firepower
SSL Network DNS Identity Intrusion Network Access Malware Intrusion
Policy Analysis Policy Policy Policy Discovery Control & File Policy
Policy (NAP) Policy Policy Policy
$VAR
$VAR Objects
Knowing your detection process impacts:
• How you analyze the data Element Enabled in AC Policy
• How you tune your security appliance 9
6
© 2018 Cisco Systems, Inc. All rights reserved.
7
© 2018 Cisco Systems, Inc. All rights reserved.
8
© 2018 Cisco Systems, Inc. All rights reserved.
9
© 2018 Cisco Systems, Inc. All rights reserved.
10
© 2018 Cisco Systems, Inc. All rights reserved.
11
© 2018 Cisco Systems, Inc. All rights reserved.
12
© 2018 Cisco Systems, Inc. All rights reserved.
13
© 2018 Cisco Systems, Inc. All rights reserved.
14
© 2018 Cisco Systems, Inc. All rights reserved.
15
© 2018 Cisco Systems, Inc. All rights reserved.
16
© 2018 Cisco Systems, Inc. All rights reserved.
17
© 2018 Cisco Systems, Inc. All rights reserved.
18
© 2018 Cisco Systems, Inc. All rights reserved.