Cisco Umbrella Access
Cisco Umbrella Access
You can configure the device to redirect DNS requests to Cisco Umbrella, so that your FQDN policy defined
in Cisco Umbrella can be applied to user connections. The following topics explain how to configure the
Umbrella Connector to integrate the device with Cisco Umbrella.
• About Cisco Umbrella Connector, on page 1
• Licensing Requirements for Cisco Umbrella Connector, on page 2
• Guidelines and Limitations for Cisco Umbrella, on page 2
• Configure Cisco Umbrella Connector, on page 4
• Monitoring the Umbrella Connector , on page 9
• History for Cisco Umbrella Connector, on page 12
Cisco Umbrella
1
Cisco Umbrella
Cisco Umbrella Registration
• Proxy—If you have no block rules for an FQDN, and Cisco Umbrella determines that it belongs to a
suspicious site, then the DNS reply returns the IP address of the Umbrella intelligent proxy. The proxy
can then inspect the HTTP connection and apply URL filtering. You must ensure that intelligent proxy
is enabled from the Cisco Umbrella dashboard (Security Setting > Enable Intelligent Proxy).
• Block—If you explicitly block an FQDN, or Cisco Umbrella determines that it belongs to a malicious
site, then the DNS reply returns the IP address of the Umbrella cloud landing page for blocked connections.
Once registered, the device details will appear on the Cisco Umbrella dashboard. You can then change which
policy is attached to a device. During registration, either the policy you specify in the configuration is used,
or the default policy is assigned. You can assign the same Umbrella policy to multiple devices. If you specify
the policy, the device ID you receive differs from what you would get if you did not specify a policy.
Failover
• The active unit in the high availability pair registers the pair as a single unit with Cisco Umbrella. Both
peers use the same device ID, which is formed from their serial numbers:
Cisco Umbrella
2
Cisco Umbrella
Guidelines and Limitations for Cisco Umbrella
Cluster
• The cluster control unit registers the cluster as a single unit with Cisco Umbrella. All peers use the same
device ID. For multiple context mode, a security context in the cluster is considered a single unit across
all peers.
Additional Guidelines
• Redirection to Cisco Umbrella is done for DNS requests in through traffic only. DNS requests that the
system itself initiates are never redirected to Cisco Umbrella. For example, FQDN-based access control
rules are never resolved based on Umbrella policy, nor are any FQDNs that are used in other commands
or configuration settings.
• The Cisco Umbrella Connector works on any DNS request in through traffic. However, the block and
proxy actions are effective only if the DNS response is then used for HTTP/HTTPS connections, because
the IP address returned is for a web site. Any blocked or proxied addresses for non-HTTP/HTTPS
connections will either fail or complete in a misleading fashion. For example, pinging a blocked FQDN
would result in pinging the server that hosts the Cisco Umbrella cloud block page.
Note Cisco Umbrella does try to intelligently identify FQDNs that might be
non-HTTP/HTTPS, and does not return the IP address to the intelligent proxy
for those FQDNs for proxied domain names.
• The system sends DNS/UDP traffic only to Cisco Umbrella. If you enable DNS/TCP inspection, the
system does not send any DNS/TCP requests to Cisco Umbrella. However, DNS/TCP requests do not
increment the Umbrella bypass counter.
• If you enable DNScrypt for Umbrella inspection, the system uses UDP/443 for the encrypted session.
You must include UDP/443 along with UDP/53 in the class map that applies DNS inspection for Cisco
Umbrella for DNScrypt to work correctly. Both UDP/443 and UDP/53 are included in the default
inspection class for DNS, but if you create a custom class, ensure that you define an ACL that includes
both ports for the match class.
• DNScrypt uses IPv4 only for the certificate update handshake. However, DNSscrypt does encrypt both
IPv4 and IPv6 traffic.
• Cisco Umbrella and ASA FirePOWER processing are not compatible for a given connection. If you want
to use both services, you must exclude UDP/53 and UDP/443 from ASA FirePOWER processing. For
example, if you are currently redirecting all traffic to the ASA FirePOWER module, you must update
the class to use an access list match. The access list should start by denying any connections to the
Umbrella servers on destination ports UDP/53 and UDP/443, then permit any source to any destination.
The ACL and match statements would be similar to the following:
Cisco Umbrella
3
Cisco Umbrella
Configure Cisco Umbrella Connector
class-map sfr
match access-list sfr
policy-map global_policy
class sfr
sfr fail-open
• There must be an IPv4 route to the Internet that can reach api.opendns.com (registration uses IPv4 only).
You also must have routes to the following DNS resolvers, and your access rules must allow DNS traffic
to these hosts. These routes can go through either the data interfaces or the management interface; any
valid route will work for both registration and DNS resolution. The default servers that the system uses
are indicated; you can use the other servers by configuring the resolver in the Umbrella global settings.
• 208.67.220.220 (system default for IPv4)
• 208.67.222.222
• 2620:119:53::53 (system default for IPv6)
• 2620:119:35::35
• The system does not support the Umbrella FamilyShield service. If you configure the FamilyShield
resolvers, you might get unexpected results.
• When evaluating whether to fail open, the system considers whether the Umbrella resolver is down, or
if an intervening device drops the DNS request or response based on how long it has waited for the
response after sending out the request. Other factors, such as no route to the Umbrella resolver, are not
considered.
• To unregister a device, first delete the Umbrella configuration, then delete the device from the Cisco
Umbrella dashboard.
• Any web requests that use IP addresses instead of FQDN will bypass Cisco Umbrella. In addition, if a
roaming client obtains DNS resolution from a different WAN connection than the one that goes through
an Umbrella-enabled device, connections that use those resolutions bypass Cisco Umbrella.
• If a user has an HTTP proxy, then the proxy might be doing DNS resolution, and the resolutions will not
go through Cisco Umbrella.
• NAT DNS46 and DNS64 are not supported. You cannot translate DNS requests between IPv4 and IPv6
addressing.
• The EDNS record will include both the IPv4 and IPv6 host addresses.
• If the client uses DNS over HTTPS, then the cloud security service will not inspect DNS and HTTP/HTTPS
traffic.
Cisco Umbrella
4
Cisco Umbrella
Install the CA Certificate from the Cisco Umbrella Registration Server
Procedure
Step 3 If it is not already enabled, configure DNS servers and enable DNS lookup on the interfaces.
Configure the settings on the Configuration > Device Management > DNS > DNS Client page.
You can use your own servers, or configure the Cisco Umbrella servers. DNS inspection automatically redirects
to the Cisco Umbrella resolvers even if you configure different servers.
• 208.67.220.220
• 208.67.222.222
• 2620:119:53::53
• 2620:119:35::35
-----BEGIN CERTIFICATE-----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 Umbrella
5
Cisco Umbrella
Configure the Umbrella Connector Global Settings
BmeBDAECAjAIBgZngQwBAgMwDQYJKoZIhvcNAQELBQADggEBAHert3onPa679n/gWlbJhKrKW3EX
3SJH/E6f7tDBpATho+vFScH90cnfjK+URSxGKqNjOSD5nkoklEHIqdninFQFBstcHL4AGw+oWv8Z
u2XHFq8hVt1hBcnpj5h232sb0HIMULkwKXq/YFkQZhM6LawVEWwtIwwCPgU7/uWhnOKK24fXSuhe
50gG66sSmvKvhMNbg0qZgYOrAKHKCjxMoiWJKiKnpPMzTFuMLhoClw+dj20tlQj7T9rxkTgl4Zxu
YRiHas6xuwAwapu3r9rxxZf+ingkquqTgLozZXq8oXfpf2kUCwA/d5KxTVtzhwoT0JzI8ks5T1KE
SaZMkE4f97Q=
-----END CERTIFICATE-----
Procedure
Step 1 Choose Configuration > Firewall > Advanced > Certificate Management > CA Certificates.
Step 2 Click Add.
Step 3 Enter a Trustpoint Name, such as ctx1 or umbrella_server.
Step 4 Select Paste Certificate in PEM Format, then paste the certificate into the box.
It does not matter if you include the BEGIN CERTIFICATE and END CERTIFICATE lines.
Procedure
Cisco Umbrella
6
Cisco Umbrella
Enable Umbrella in the DNS Inspection Policy Map
Step 5 (Optional.) Select EDNS Timeout and change the idle timeout after which a connection from a client to the
Umbrella server will be removed if there is no response from the server.
The timeout is in hours:minutes:seconds format, and can be from 0:0:0 to 1193:0:0. The default is 0:02:00 (2
minutes).
Step 6 (Optional.) In Resolver IPv4 and Resolver IPv6, configure the addresses of the non-default Cisco Umbrella
DNS servers, which resolve DNS requests, that you want to use.
If you do not configure these options, the system uses the default servers.
Step 7 (Optional.) Configure the local domain names for which Umbrella should be bypassed.
You can identify local domains for which DNS requests should bypass Cisco Umbrella and instead go directly
to the configured DNS servers. For example, you can have your internal DNS server resolve all names for
the organization's domain name on the assumption that all internal connections are allowed.
You can specify either a single regular expression class that includes the regular expression objects that define
the local domains, or enter the names directly as regular expression objects. You can also combine these,
although you can have at most one class.
Click the Manage button next to the Local Domain Bypass Regex Class option to create the class. You can
also click the Manage button from the Add/Edit dialog box for regular expressions to create those objects.
Procedure
Step 1 Choose Configuration > Firewall > Objects > Inspect Maps > DNS.
Step 2 Double-click the preset_dns_map inspection map to edit it.
Step 3 Click the Umbrella Connections tab and enable the connection to Cisco Umbrella in the cloud.
• Umbrella—Enables Cisco Umbrella. You can optionally specify the name of the Cisco Umbrella policy
to apply to the device in the Umbrella Tag field. If you do not specify a policy, the default policy is
applied. After registration, the Umbrella device ID is displayed next to the tag.
Cisco Umbrella
7
Cisco Umbrella
Verify the Umbrella Registration
• Enable Dnscrypt—Enables DNScrypt to encrypt connections between the device and Cisco Umbrella.
Enabling DNScrypt starts the key-exchange thread with the Umbrella resolver. The key-exchange thread
performs the handshake with the resolver every hour and updates the device with a new secret key.
Because DNScrypt uses UDP/443, you must ensure that the class map used for DNS inspection includes
that port. Note that the default inspection class already includes UDP/443 for DNS inspection.
• Fail Open—Enable fail open if you want DNS resolution to work if the Umbrella DNS server is
unavailable. When failing open, if the Cisco Umbrella DNS server is unavailable, Umbrella disables
itself on this policy map and allows DNS requests to go to the other DNS servers configured on the
system, if any. When the Umbrella DNS servers are available again, the policy map resumes using them.
If you do not select this option, DNS requests continue to go to the unreachable Umbrella resolver, so
they will not get a response
You can also verify the running configuration (filter on policy-map). The umbrella command in the policy
map updates to show the device ID. You cannot directly configure the device ID when you enable this
Cisco Umbrella
8
Cisco Umbrella
Monitoring the Umbrella Connector
command. The following example edits the output to show the relevant information. You can also see the
device ID in ASDM by editing the DNS inspection map used for Umbrella; the ID is displayed on the Umbrella
Connections tab.
Cisco Umbrella
9
Cisco Umbrella
Monitoring the Umbrella Service Policy Statistics
DNScrypt ingress: rcvd 804, decrypt 402, bypass 402, inject 402
DNScrypt: Certificate Update: completion 10, failure 1
The detailed output shows DNScrypt statistics and the keys used.
Cisco Umbrella
10
Cisco Umbrella
Monitoring Umbrella Syslog Messages
48DD:E6D3:C058:D063:1098:C6B4:BA6F:D8A7:F0F8:0754:40B0:AFB3:CB31:2B22:A7A4:9CEE
Client Public key
6CB9:FA4B:4273:E10A:8A67:BA66:76A3:BFF5:2FB9:5004:CD3B:B3F2:86C1:A7EC:A0B6:1A58
NM key Hash
9182:9F42:6C01:003C:9939:7741:1734:D199:22DF:511E:E8C9:206B:D0A3:8181:CE57:8020
Cisco Umbrella
11
Cisco Umbrella
History for Cisco Umbrella Connector
Cisco Umbrella support. 9.10(1) You can configure the device to redirect DNS requests to Cisco
Umbrella, so that your Enterprise Security policy defined in Cisco
Umbrella can be applied to user connections. You can allow or block
connections based on FQDN, or for suspicious FQDNs, you can redirect
the user to the Cisco Umbrella intelligent proxy, which can perform
URL filtering. The Umbrella configuration is part of the DNS inspection
policy.
We added or modified the following screens: Configuration > Firewall
> Objects > Umbrella, Configuration > Firewall > Objects >
Inspect Maps > DNS.
Cisco Umbrella Enhancements. 9.12(1) You can now identify local domain names that should bypass Cisco
Umbrella. DNS requests for these domains go directly to the DNS
servers without Umbrella processing. You can also identify which
Umbrella servers to use for resolving DNS requests. Finally, you can
define the Umbrella inspection policy to fail open, so that DNS requests
are not blocked if the Umbrella server is unavailable.
We modified the following screens: Configuration > Firewall >
Objects > Umbrella, Configuration > Firewall > Objects > Inspect
Maps > DNS.
Cisco Umbrella
12