75

Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

  • Upload
    lyhanh

  • View
    248

  • Download
    9

Embed Size (px)

Citation preview

Page 1: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020
Page 2: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Firewall DeploymentEric Kostlan – Technical Marketing Engineer

BRKSEC-2020

Page 3: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Session Objectives

Upon successful completion of this session, the attendee will be able to:

• Compare and contrast the Cisco firewall solutions

• Determine which firewall solution is appropriate for which use case

• Describe how resilience is provided through high availability and clustering

• Utilize traditional and next-generation firewall features to provide effective network security

Page 4: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Related Sessions (Thursday)

BRKSEC-2032 - FP NGIPS Deployment and Operationalisation Thursday 10 Mar 2:30 PM - 4:00 PM – 207Mark Pretty, Consulting Systems Engineer, Cisco

BRKSEC-3010 - Firepower 9300 Deep Dive Thursday 10 Mar 4:30 PM - 6:00 PM – 207Andrew Ossipov, Principal Engineer, Cisco

BRKSEC-2763 - ASA and FirePOWER in ACI Thursday 10 Mar 4:30 PM - 6:00 PM – 208Goran Saradzic, Technical Marketing Engineer, Cisco

Page 5: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Related Sessions (Friday)

BRKSEC-3032 - Advanced - ASA Clustering Deep DiveFriday 11 Mar 8:45 AM - 10:45 AM – 104Andrew Ossipov, Principal Engineer, Cisco

BRKSEC-3055 - Troubleshooting: ASA Firepower NGFW Friday 11 Mar 2:00 PM - 4:00 PM – 104Prapanch Ramamoorthy, Engineer, Technical Services, Cisco

Page 6: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

• Cisco Product Family

• Firewall Technologies

• Firewall Deployment Modes

• Use Case

• Firewall Deployment at the Edge

• Firewall Deployment in the Data Centre

• Conclusion

Agenda

Page 7: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Cisco Firewall Product Family

Page 8: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

The Cisco Firewall Zoo

• Adaptive Security Appliance (ASA) – hardened firewall appliance, proprietary OS, Ethernet and fibre ports on box. (1G/10G)

• ASA SM – Next Gen line card for Catalyst 6500, no physical interfaces, runs ASA code image

• Adaptive Security Virtual Appliance Firewall (ASAv) – Virtual ASA that runs with a full ASA code base, not dependent upon Nexus1000v

• ASA with FirePOWER Services – ASA firewall appliance which integrates a full installation of FirePOWER NGFW, NGIPS, AMP and Contextual Services

• VSG – Virtual Security Gateway – Zone-based Virtual firewall dependent upon Nexus1000v Switch – mentioned but not detailed in this session

• Cisco Firepower NGFW with Firepower Thread Defense (FTD)NGFW

Page 9: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Cisco IPS and Firewall Offerings

• Traditional ASA

• Firepower appliances

• Acquisition of Sourcefire was October, 2013

• ASA with Firepower Services

• Product integration with separate management solutions and program space

• Feature complete for both ASA and Firepower

• Cisco Sourcefire NGFW with Firepower Threat Defense (FTD)

• Unified management and program space (not packet copy)

• Feature parity with Firepower

• ASA features being phased in

Page 10: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Cisco NGFW and ASA Product Family

Perf

orm

an

ce a

nd

Scala

bil

ity

ASA 5506WASA 5506-XASA 5506H ASA 5508-X

ASA 5525-X

ASA 5545-X

ASA 5555-X

ASA 5585-X Series(SSP 10, 20, 40, 60)

ASA 5516-X

SMB & Distributed

Enterprise

Commercial &

Enterprise

Data Centre, High Performance

Computing, Service Provider

FP 9300

FP 4100 Series(4110, 4120, 4140)

Page 11: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Security ModulesEmbedded packet/flow classifier (Smart NIC) and crypto hardware

CPUs with a total of 24 or 36 physical cores (48 or 72 with hyperthreading)

Standalone or clustered within (up to 240Gbps) and across (1Tbps+) chassis

SupervisorApplication deployment and orchestration

Network attachment (10GE/40GE) and traffic distribution

Clustering base layer for ASA Firewall or Cisco NGFW

Firepower 9300 Overview

1

3

2

Page 12: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020
Page 13: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020
Page 14: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020
Page 15: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Fixed 8x SFP+ (10G) fixed ports

Security Engine

Modular system2x Network Modules (NetMod) slots

2x 2.5” SSD Slots

Firepower 4100 Series Front View

1 3 5 7

Power LED

Console

Mgmt

USB

Locater

SSD

SYS LEDs SSD1 SSD2

NetMod 1 (Slot) NetMod 2 (Slot)

2 4 6 8

Page 16: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020
Page 17: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Network Modules and Transceivers Support

All external network modules require fiber or copper transceivers

Fail To Wire Network Modules provide hardware bypass functionality

1GE optical SFP support

1GE copper SFP support

10 GE optical SFP+

10 GE optical SFP-S

10 GE Twinax Support

Support for both Single Mode and Multi Mode optical cable

40 GE QSFP Support

4x10 GE breakouts for each 40 GE port

Support for both Single Mode and Multi Mode optical cable

Support for direct-attach copper cable

8x1

0G

E

4x4

0G

E

Page 18: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020
Page 19: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020
Page 20: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Industrial Security Appliance (ISA)

• Software

• Firewall: ASA

• IPS: Firepower Services

• Identify and block threats

• Generic

• OT protocol specific

• OT application specific

• Application Visibility and Control

• Protocols

• Applications

• Individual commands

Page 21: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Firewall Deployment Modes

Page 22: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Firewall Design: Modes of Operation• Routed Mode is the traditional mode of the firewall. Two or

more interfaces that separate L3 domains – Firewall is the Router and Gateway for local hosts

22

10.1.1.0/24

192.168.1.0/24

192.168.1.1

10.1.1.1

IP:192.168.1.100GW: 192.168.1.1

NAT

DRP

Page 23: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

192.168.1.0/24

192.168.1.1

IP:192.168.1.100GW: 192.168.1.1

Firewall Design: Modes of Operation• Routed Mode is the traditional mode of the firewall. Two or

more interfaces that separate L3 domains – Firewall is the Router and Gateway for local hosts

• Transparent Mode is where the firewall acts as a bridge functioning at L2

• Transparent mode firewall offers some unique benefits in the DC

• Transparent deployment is tightly integrated with our ‘best practice’ data Centre designs

23

VLAN192

VLAN1920

Page 24: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Firewall Design: Modes of Operation• Routed Mode is the traditional mode of the firewall. Two or

more interfaces that separate L3 domains – Firewall is the Router and Gateway for local hosts

• Transparent Mode is where the firewall acts as a bridge functioning at L2

• Transparent mode firewall offers some unique benefits in the DC

• Transparent deployment is tightly integrated with our ‘best practice’ data Centre designs

• Multi-context Mode involves the use of virtualized firewalls called security contexts, which can be either routed or transparent mode

24

Separate Policies Separate Control PlaneSeparate Data PlaneDedicated Interfaces

Page 25: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Firewall Design: Modes of Operation• Routed Mode is the traditional mode of the firewall. Two or

more interfaces that separate L3 domains – Firewall is the Router and Gateway for local hosts

• Transparent Mode is where the firewall acts as a bridge functioning at L2

• Transparent mode firewall offers some unique benefits in the DC

• Transparent deployment is tightly integrated with our ‘best practice’ data Centre designs

• Multi-context Mode involves the use of security contexts, which can be either routed or transparent mode

• Mixed (Multi-context) Mode combine routed and transparent mode virtualized firewalls on the same chassis or cluster of chassis

25

Separate Policies Separate Control PlaneSeparate Data PlaneDedicated Interfaces

Page 26: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

ASA Traffic Zones

• Assign multiple logical interfaces to a Traffic Zone

• Load-balances connections to multiple ISPs, using 6-tuple

• Return traffic matched to the connection entry fromany interface in a zone

• All zone interfaces must be at the same security level

• Seamless connection switchover to another egress interface in the same zone on failure

• Enables Layer 3 Massively Scalable Data Centre (MSFC) spine-and-leaf model

• Only supported in routed mode firewall

outside1 outside2

inside 1 inside 2

In Zone

Out Zone

http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/interface-zones.html

Page 27: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

NGFW (FTD) Device Deployment Modes

• Routed or transparent mode configured with setup dialog

• Changing between these modes requires re-registering with FMC

• Policies will be re-deployed

• Routed

• Layer 3 firewall

• Most typical deployment for edge

• Transparent

• Layer 2 firewall

Page 28: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

NGFW (FTD) Security Zones

• True zone based firewall

• Security zones are collections of interfaces or sub-interfaces

• Policy rules can apply to source and/or destination security zones.

• Security levels are not used

Page 29: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Optional Interface Modes

• By default, all interfaces are firewall interfaces

• Optionally, specific interfaces can extracted for use as IDS or IPS

• IDS Mode

• Inline Tap

• Passive

• IPS Mode

• Inline

Page 30: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Mix and Match Interface Modes

Routed or TransparentA

B

C

D

F

G

H

I

Inline Pair 1

Inline Pair 2Inline Set

E J

Policy TablesPassive

Interfaces

Inline Tap

Page 31: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Failover and Clustering

Page 32: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

ASA Failover Active-Standby

• All features are supported when using A/S including SSLVPN and NGFW/NGIPS

• Both ASAs in pair must be identical in software, memory and interfaces (including SSM/SSP modules) and mode

• Not recommended to share the state and failover link

• Use a dedicated link for each if possible

• Long distance LAN failover is supported if latency is less than 100 ms

Primary

ASA

(active)

Backup

ASA

(standby)

Failover

State

Page 33: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

How Failover Works

Primary

ASA

(active)

Secondary

ASA

(standby)

Failover

State

HELLO HELLO

Failover link passes Hellos between active

and standby units every 15 seconds

(tunable from 200msec-15 seconds)

Page 34: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

How Failover Works

Primary

ASA

(active)

Secondary

ASA

(standby)

Failover

StateHELLO

HELLO

HELLO

After three missed hellos, local unit sends

hellos over all interfaces to check health of its

peer - Whether a failover occurs depends on

the responses received

If no Response…

Page 35: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

How Failover Works

Backup

ASA

(standby)

Failover

State

If no Response…

Secondary

ASA

(active)

Local Unit

Becomes Active

Page 36: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

ASA Failover Active-Active

• Active-Active is 2 reciprocal pairs of Active-Standby Virtual Firewalls

• Requires Virtualisation (Multi-Context) which (may) require additional licensing

• Virtualisation does not yet support SSLVPN/Remote Access VPN

• No load-balancing or load-sharing support

• Not true Active/Active flow

• True Active/Active flow accomplished with ASA Clustering

• Subnet/VLAN can only be active on one node at a time

CTX1

(Active)

Failover

State

CTX2

(Active)

CTX2

(Standby)CTX1

(Standby)

VLAN10

VLAN20

VLAN30

VLAN40

Page 37: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Scaling Provided by Clustering• Up to 16 ASAs-X

• For ASA 5586-X• FW MAX Throughput: 640 Gbps• Firepower IPS 440 Byte

Throughput: 96 Gbps

• Each Sourcefire Sensor is anindependent instance• ASAs share connection state

information• Sourcefire Sensors do not share

signature state information

• State-sharing between firewalls for symmetry and high availability• Every session has a Owner Ownership managed by

Director node• ASA provides traffic symmetry to Firepower module

Page 38: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Asymmetric Traffic• Depending on the Access Switch

running vPC, either upstream link could be used to send the return traffic.

• This is one easy way asymmetry can get introduced.

• Deploying Security Devices that do not integrate into modern designs gets very difficult.

• These problems get more complicated when moving to distributed dataCentres.

• One requirement for inserting security services into this deployment is that it has to handle that traffic will be asymmetric

N7K

Access

vPC

Core

DC Servers

vPC Peer-link

Outside

Page 39: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Cluster mode

39

• Spanned Etherchannel Mode

• ASA interfaces are grouped in EtherChannel. LACP must be used in conjunction.

• ASA share a system IP and MAC, and together they act as a single logical link. Switch use ECLB to balance load to each ASA.

• Each interface also has its own private MAC address which is used in LACP auto negotiation if enabled.

• Individual Mode

• ASA interfaces on each ASA have its own IP and MAC

• Upstream router can use PBR or ECMP to balance packets to individual units

*New Versions of ASA Code have exceeded this limitation with cLACP and ASA Clustering

Page 40: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

EtherChannel Basics

• EtherChannel LAG (IEEE standard is 802.3ad) allows up to 16 physical Ethernet links to be combined into one logical link. 8 links can be active and forwarding data*

• Ports must be of same capabilities: duplex, speed, type, etc.

• Benefits of EtherChannel are increasing scale, load-balancing and HA

• Load balancing is performed via a Load-Balancing Hashing Algorithm – Cisco default is src-dst IP

• Recommended Hash is either default or src-dst ip-l4-port

• EtherChannel uses LACP (Link Aggregation Control Protocol)

• Static LAG can be used, but should be aware of potential traffic black holes this may cause

LACP Load Balance

src-dst-IP (hash)

Page 41: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Virtual Port Channel

• vPC (like VSS) is known as Multi-Chassis EtherChannel

• Common in the Data Centre

• Allow multiple devices to share multiple interfaces

• STP is active, but does not impact throughputbecause all links are active. There are no STP blocked ports

• A vPC Peer Link is used on Nexus 5K/6K/7K devices to instantiate the vPC domain and allow sharing

• Peer Link synchronizes state between vPC peers VPC PEER LINK

LACP Load Balance

src-dst-IP (hash)

10G

10G

20G

Page 42: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

EtherChannel on the ASA

42

• Supports 802.3ad and LACP/cLACP standards

• Direct support for vPC/VSS - CVD

• No issues with traffic normalization or asymmetry

• Up to 8 active and 8 standby links*

• 100Mb, 1Gb, 10Gb are all supported – must match

• Supported in all modes (transparent, routed, multi-context)

• Configurable hash algorithm (default is src/dest IP)

• SHOULD match the peer device for most deterministic flows

• Redundant interface feature and LAG on ASA are mutually exclusive

• Not supported on 4GE SSM (5540/50) or 5505

• ASA 9.2+ cluster allows 32 port active EtherChannel

*Non-clustered ASA allows 16 active and 16 standby links supported with cLACP

Page 43: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

vPC

vPC

ASA Cluster with FirePOWER Services Module for NGIPS

ASA Cluster

1. ASA appliances with FirePOWER

services modules are deployed as a

Spanned Etherchannel cluster to

represent a single logical device.

2. Cluster member that gets the first

packet for a connection assumes full

processing ownership for all

associated packets.

3. Clustering automatically redirects

asymmetrically received packets to

connection owner for full processing.

4. Local FirePOWER module has full

visibility into the flow due to localized

processing.

Page 44: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

vPC

vPC

ASA Cluster with FirePOWER Appliances for NGIPS

ASA Cluster

1. ASA appliances are deployed as a

Spanned Etherchannel cluster to

represent a single logical device

operating in multiple-context mode.

2. An in-line FirePOWER appliance

attaches to each ASA cluster member

in a context sandwich.

3. Clustering automatically redirects

asymmetrically received packets to ASA

connection owner for full processing.

4. Local FirePOWER appliance has full

visibility into the flow due to localized

processing. Optional EEM script on the

switch speeds up failure detection.

Page 45: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Cluster Between Data Centres

45

• Best practice maximum latency needs to be a RTT of 20 ms

• Can be spanned etherchannel modeor individual mode

*New Versions of ASA Code have exceeded this limitation with cLACP and ASA Clustering

Page 46: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Use Case

Page 47: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

CLINET (clinet.com)

• CLINET (clinet.com) is a fictional company created for understanding use cases in ASA Firewall deployment

• Company requirements and configuration examples are based upon real-life customer conversations and deployments

• Only designs we have fully certified in the Validated Design Lab

• Cisco Validated Design (CVD) approved configuration(s)DesignZone: http://www.cisco.com/go/designzoneVMDC (Data Centre CVD): http://www.cisco.com/go/vmdc New Data Centre Security CVDs: http://www.cisco.com/go/designzonesecuredc

Cisco LIVE Information Networking Company

Page 48: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Deploy Redundant ASA(s) in

Routed Mode for Edge/DMZ

Note: Storage architecture not depicted in this layout, nor will it be discussed

Deploy Virtual ASA

(ASAv) in Virtual

environment (hypervisor)

Deploy Clustered ASA(s): in Routed

Mode for PCI and Transparent Mode for

Data Centre / Access Fabric

CLINET (clinet.com) Network Topology

Page 49: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Edge Aggregation

VDC

Edge

Aggregation

ISP-A ISP-B

DMZ Network(2)

(Public Web/DB)

VPC VPC

G0/0G0/1

T0/6 T0/7

G0/4

G0/5

G0/2

G0/3

Edge Routers

running HSRP –

FHRP address is

128.107.1.1

1

1

FW deployed in L3 ‘routed’ mode,

with NAT and ACLs – Routing

protocol will be used on inside -

2

2

Inside Interface

using

EtherChannel

4

4

Active/Standby HA

will be used at the

edge

7

7

Two DMZ Zones will be created:

1- Web Public (www, DNS, smtp)

2- Partner Intranet (wwwin, Oracle

link)

VLAN 150

Public Web DMZ – 10.200.1.0/24

VLAN 151

Partner Intranet– 10.100.100.0/24

Web/App/dB (Oracle) 172.16.25.250

6

6

Outside and DMZ

using Redundant

Interfaces

3

3

3

VLAN 2

Diversion

network

for

Scanning

VLAN

120

Inside

Network

‘Trusted

Zone”

5

Use-case specific Internal Zones:

VL2 – Security Diversion network for

scanning questionable traffic

VL120 – Primary Internal Zone - services the

primary internal network

VL1299 – Isolated Internal DMZ for BYOD /

contractor / unknown – Internet access only

5

VLAN

1299 DMZ

Zone for

contractor

/ BYOD

unknown

clinet.com Edge ASA Deployment Details

clinet.com ASN 65345

IP Range 128.107.1.0/24

Page 50: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

ASA Cluster

ASA Clustering is used for scale

and HA – Leverages cLACP for

Data Plane (EtherChannel)

3

3

clinet.com DC AGG ASA Deployment Details • General Requirements

Data Centre

Core

(Routed)

Data Centre

AggregationPCI Zone

Core VDC

PCI VDC Aggregation

VDC

Virtual Access /

Compute Networks

cLACP

OSPF Routed Core

Use-case specific Internal

Zones from Edge

Aggregation into core

VLAN 2

Diversion

network

for

Scanning

VLAN 120

Inside

Network

‘Trusted

Zone”

VLAN

1299 DMZ

Zone for

contractor /

BYOD

unknown

1

1 1

DC Core is routed using OSPF.

Routing will remain in place (on

DC Switches). ASA must be

deployed without disrupting

current L3 architecture

4

4

PCI-CTX (Routed)

ASA FW deployed in ‘mode-multi’

mixed-mode system. Will have both

L3 and L2 contexts to solve use case

VLAN 1299 DMZ BYOD

BYOD-CTX

(Transparent)

VLAN 201 Oracle dB1

PTNR-CTX

(Transparent)

BYOD/Unknown DMZ and

Partner Oracle Access

controlled by ASA vFW

2

2

2

2

2

Virtual ASA deployed within

hypervisor to protect East/West

Traffic Flows

5

cLACP

Page 51: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

ASA Cluster

clinet.com Data Centre Compute ASAv Deployment • General Requirements

Data Centre

Core

(Routed)

Data Centre

AggregationPCI Zone

Core VDC

PCI VDC Aggregation

VDC

Virtual Access /

Compute Networks

cLACP

OSPF Routed Core

VLAN 2

Diversion

network

for

Scanning

VLAN 120

Inside

Network

‘Trusted

Zone”

VLAN

1299 DMZ

Zone for

contractor /

BYOD

unknown

PCI-CTX (Routed)

VLAN 1299 DMZ BYOD

BYOD-CTX

(Transparent)

VLAN 201 Oracle dB1

VLAN 445 AD, exch, etc.

PTNR-CTX

(Transparent)

Virtual ASA deployed within

hypervisor to protect East/West

Traffic Flows

cLACP

Page 52: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

CLINET Upgrading to NGFW and NGIPS

• Internet Edge

• Application Visibility and Control (AVC)

• Intrusion Prevention (IPS)

• Advance Malware Protection (AMP)

• Data Centre

• Focus on IPS

• AMP if you are allowing uploads of files

• Applications should be known

• Layer 1, 2 or 3 may be appropriate

• Compute

• Virtual NGFW and NGIPS are available, if required

Which Next Generation Features to Deploy Were

Page 53: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Next Generation Features and Performance

Category FP 4110 FP 4120 FP 4140

Large Packet Firewall (1500 byte UDP) 20Gbps 40Gbps 60Gbps

Firewall Throughput 10Gbps 20Gbps 30Gbps

NGFW - FW+AVC Perf. (440byte) 4 – 6 Gbps 6 – 8 Gbps 10 -15 Gbps

NGFW - FW+AVC+IPS Perf.(440byte) 2 – 4 Gbps 3 – 6 Gbps 6-12 Gbps

NGFW - FW+AVC+IPS+AMP Perf. (440byte) 2 Gbps 2.5Gbps 5Gbps

NGFW - FW+AVC+IPS+AMP+URL Perf. (440byte) 2 Gbps 2.5Gbps 5Gbps

NGFW - Enable Logging Impact (Max %) 15% 15% 15%

Standalone NGIPS Perf. - No FW/AVC (440byte) -“balanced” base policy, no tuning

4 Gbps 8.5Gbps 12Gbps

Page 54: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Firewall Deployment at the Edge

Page 55: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Implement HA

– Active-Standby

– HSRP

Determine Next Generation Capabilities

– IPS

– AVC

– URL Filtering

– AMP

Configure traditional Firewall Capabilities

– NAT

– ACL

– Routing

ASA Deployment Checklist (Edge)

1

4

2

6

7

8

9

3

5

Page 56: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

NAT on the ASA or NGFW (FTD)

• Single translation rule table

• Access Lists reference the internal (real) IP address and not the global

• Manual NAT (Twice NAT)

• Allows for bi-directional translation

• Allows to specify both Source and Destination NAT within a single line

• More flexibility in creating NAT rules (one-to-one, one-to-many, many-to-many, many-to-one)

• Automatic NAT (Auto NAT or Object-based)

• Single rule per object

• Useful for less complex scenarios

56

Page 57: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

NAT Processing Semantics

• Rules are processed in order (like ACEs inside of an ACL) – caching of those rules’ IDs inside Data Plane structures assures of this

• Rule ID is used to change it’s place inside the list

• Manual NAT rules are always processed first

• Within Manual NAT rules list, only the order matters – it doesn’t take into account dynamic/static nature of the statement

• Auto NAT rules are processed next

• Auto NAT Rule ordering is predefined based on the following order of precedence: • static over dynamic

• longest prefix

• lower numeric (start from 1st octet)

• lexicographic ordering of object-names

57

Page 58: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Virtual Access /

Compute

Edge Agg

VDC

Edge

Aggregation

ISP-A ISP-B

DMZ Network(2)

(Public Web/DB)

G0/0G0/1 G0/2

G0/3

0VLAN 150 – 10.150.1.0/24 .100 .110 .250

VLAN 151 – 10.151.100.0/24 .200 .20150

VLAN 2

10.2.1.0/24

VLAN 120

10.120.1.0/24

VLAN 1299

10.255.255.0/24

100

49

25

T0/6T0/7

Data Centre

FHRP 128.107.1.1

VLAN 201 Oracle 172.16.25.250

VLAN 445 AD, exch, 10.245.10.0/24 .245 .250

Web DNS SMTP/OWA

Web SQL

AD Exchange

Oracle dB1

Outside Network

128.107.1.0/24

1

1

Diversion and BYOD are specific

subnets and will require

dedicated NAT rules. Inside

serves the entire DC via many

subnets, thus NAT rules will be

more generic

22

VL1299 BYOD/Unknown

Subnet only uses the

Internet

3

3

Public DNS Server is used in all

use cases; internal DNS servers

use .110 for recursive queries.

4

4 VL150 Public DMZ serves data

only to Internet. SMTP/OWA

server must communicate with

AD & Exchange in DC VL445

5

5

VL151 Partner DMZ serves web

intranet data to Partners. Web

.200 uses SQL Data .201 to

populate fields. SQL .201

leverages the back-end Oracle

dB in VLAN201. Partner Web

uses public DNS but public DMZ

does not need any access to

partner DMZ

6

6

6

VL201 and VL445 contain the server

resources used by the DMZ

networks. These resources need to

be available using real identities

7

7

7

7

Edge NAT Use Case Requirements

Page 59: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Access Control Lists

• Like Cisco IOS, ACLs are processed from top down, sequentially with an implicit deny all at the bottom

• A criteria match will cause the ACL to be exited

• ACLs can be enabled/disabled based ontime ranges

• ACLs are made up of Access Control Entries (ACE)

• Remarks can be added per ACE or ACL

• ACE may include objects such as user/group, SGT, etc.

• ASA references the Real-IP in ACLs

59

Page 60: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Virtual Access /

Compute

Edge Agg

VDC

Edge

Aggregation

ISP-A ISP-B

DMZ Network(2)

(Public Web/DB)

G0/0G0/1 G0/2

G0/3

0VLAN 150 – 10.150.1.0/24 .100 .110 .250

VLAN 151 – 10.151.100.0/24 .200 .20150

VLAN 2

10.2.1.0/24

VLAN 120

10.120.1.0/24

VLAN 1299

10.255.255.0/24

100

49

25

T0/6T0/7

Data Centre

FHRP 128.107.1.1

VLAN 201 Oracle 172.16.25.250

VLAN 445 AD, exch, 10.245.10.0/24 .245 .250

Web DNS SMTP/OWA

Web SQL

AD Exchange

Oracle dB1

Outside Network

128.107.1.0/24

1

1

Diversion and BYOD networks

are outbound only

Inside Network is outbound only

but will need to use the PubDMZ

22

VL1299 BYOD/Unknown

Subnet only uses the

Internet

3

3

Public DNS Server is used in all

use cases; internal DNS servers

use .110 for recursive queries.

4

4 VL150 Public DMZ serves data

only to Internet. SMTP/OWA

server must communicate with

AD & Exchange in DC VL445

5

5

VL151 Partner DMZ serves web

intranet data to Partners. Web

.200 uses SQL Data .201 to

populate fields. SQL .201

leverages the back-end Oracle

dB in VLAN201. Partner Web

uses public DNS but public DMZ

does not need any access to

partner DMZ

6

6

6

VL201 and VL445 contain the server

resources used by the DMZ

networks. These resources need to

be available using real identities

7

7

7

7

Edge ACL Use Case Requirements

Page 61: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Dynamic Routing on ASA and NGFW (FTD)

• Static routing including policy based routing (PBR)

• Dynamic routing

• RIP

• OSPF

• EIGRP

• BGP

• Multicast routing

• NGFW does not yet have parity with ASA for dynamic routing

• No PBR

• No EIGRP

• No Multicast routing

61

Page 62: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Firewall Deployment in the Data Centre

Page 63: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Specific Items for ASA in the Data Centre

– Verify deployment mode –routed or transparent or both (mode multi)

– Create Virtualized Firewalls where applicable Multi-context Firewall common, especially for Multi-

tenancy

– Transparent Mode Firewalls Deploying Transparent Mode

How Transparent Mode Works

– Comparing Virtual and Physical Firewall Deployments for the DC based upon requirements

Implement Clustering

– Clustering Basics

– Clustering deployment in the clinet.com Data Centre

Deploying ASAv (Virtual ASA)

– ESXi Deployment

ASA Deployment Checklist (Data Centre)

1

3

2

4

5

6

7

Page 64: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Security Contexts

64

• Multiple virtual firewalls in one physical ASA chassis (or Cluster)

• Meets network separation/ stateful filtering requirement(s) for regulatory compliance / multi-tenant use-cases

• Each virtualized firewall is considered a separate “context”

• Each context has a separate Control Plane, Data Plane, dedicated config memory space and dedicated interfaces• Interfaces are not shared amongst contexts

• Physical interfaces are mapped to contexts and each context maps to a configuration

• Each context implements a unique, self-contained policy

• Maximum number of virtualized firewalls in one physical appliance is 250 (licensed feature)• Up to 250 contexts in an ASA Cluster

Page 65: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

System Context:

Physical ports assigned

65

• All virtualized firewall configurations must define a System context and an Admin context

Admin Context:

Remote root access and

access to all contexts

Security

Contexts

CTX 1

CTX 2

CTX 3

Admin

System

• There is no policy inheritance between contexts

Security Context Configuration

Page 66: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

• Limits

• ASA physical limit of 1024 total interfaces/VLANs

• Each transparent mode context is allowed 250 totalbridge groups each with up to 4 interfaces (VLANs)per context or transparent mode Firewall

• Each routed-mode context is allowed up to themaximum number of remaining interfaces (of 1024)

• Restrictions

• Remote Access VPN is not yet supported (S2S is supported)

• MAC addresses for virtual interfaces are automatically set to physical interface MAC

• Admin context can be used for traffic, but grants privileges of whomever manages the Admin context to all other contexts, use with caution

66

1024 Int.

Total

250 BVI

4 Int.

max max

max max

Up to

1000

Up to

1024

Up to

1024

ASA Multi-Context Mode Limits and Restrictions

Page 67: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Benefits of Transparent Mode

• Very popular architecture in data Centre environments

• Existing Nexus/DC Network Fabric does not need to be modified to employ L2 Firewall!

• Simple as changing host(s) VLAN ID

• Firewall does not need to run routing protocols / become a segment gateway

• Firewalls are more suited to flow-based inspection (not packet forwarding like a router)

• Routing protocols can establish adjacencies through the firewall

• Protocols such as HSRP, VRRP, GLBP can cross the firewall

• Multicast streams can traverse the firewall

• Non-IP traffic can be allowed (IPX, MPLS, BPDUs)

• (CVD) most internal DC zoning scenarios recommend Transparent FW (L2) deployed versus Routed Firewall (L3)

• L3 Use-cases still valid, especially in Multi-tenant and Secure Enclave architectures

Page 68: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Transparent Mode Firewall

• Firewall functions like a bridge (“bump in the wire”) at L2

• Only ARP packets pass without an explicit ACL

• Full policy functionality is included, NAT, ACLs, Service Policy, NGFW/NGIPS, etc.

• Same subnet exists on all interfaces in the bridge-group

• Different VLANs on inside and outsideinterfaces

• Focus on specific ‘use-case’ when deploying transparent mode

Page 69: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Cisco ASAv

Get multiple-hypervisor support with traditional network interaction modes using any virtual switch.

Hyper-V

Hyper-V Manager and

PowerShell deployments

Generation 1 guests

VMware

vSphere client, ovftool, and

vCentre OVF Config Dialog

VMware ESXi 5.x, 6.x, Fusion

E1000

Public Cloud

Amazon Web Services

AMI in the marketplace

Day 0 and Any Virtual Switch

vSwitch or dvSwitch

Cisco® AVS

Cisco Nexus® 1000V

(no vPath) Open vSwitch

Cisco® ACI Integration

KVM

Cisco ASAv qcow2 image

KVM 1.0 Virtio driver

AmazonWeb Services

KVM

Microsoft

Windows

VMware

Fusion Azure MarketplaceMicrosoft

Azure

Page 70: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Next Generation Virtual Offerings

• vNGIPS

• Operates at layer 1 with inline pairs and inline pair sets

• Supported on ESXi

• vNGIPS for AWS

• Operates at layer 3

• vNGFW (FTD)

• Operates at ether layer 2 or layer 3 depending on firewall mode

• Operates at layer 1 with inline pairs and inline pair sets

Page 71: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Conclusion

Page 72: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Session Summary

You should now be able to:

• Compare and contrast the Cisco firewall solutions

• Determine which firewall solution is appropriate for which use case

• Describe how resilience is provided through high availability and clustering

• Utilize traditional and next-generation firewall features to provide effective network security

Page 73: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Complete Your Online Session Evaluation

Give us your feedback and receive a

Cisco Live 2016 T-Shirt!Complete your Overall Event Survey and 5 Session

Evaluations.

• Directly from your mobile device on the Cisco Live

Mobile App

• By visiting the Cisco Live Mobile Site

http://showcase.genie-connect.com/clmelbourne2015

• Visit any Cisco Live Internet Station located

throughout the venue

T-Shirts can be collected in the World of Solutions

on Friday 11 March 12:00pm - 2:00pm

Learn online with Cisco Live!

Visit us online after the conference for full

access to session videos and

presentations. www.CiscoLiveAPAC.com

Page 74: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020

Thank you

Page 75: Firewall Deployment - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2016/anz/pdf/BRKSEC-2020.pdf · Firewall Deployment Eric Kostlan –Technical Marketing Engineer BRKSEC-2020