Cisco Next-Generation Security Solutions All-In-One Cisco ASA Firepower Services, NGIPS, and AMP
Cisco Next-Generation Security Solutions All-In-One Cisco ASA Firepower Services, NGIPS, and AMP
Cisco Next-Generation Security Solutions All-In-One Cisco ASA Firepower Services, NGIPS, and AMP
2
Cisco Next-Generation Security
Solutions
All-in-one Cisco ASA FirePOWER Services, NGIPS, and AMP
3
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA
FirePOWER Services, NGIPS, and AMP
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
ISBN-13: 978-1-58714-446-2
ISBN-10: 1-58714-446-8
The information is provided on an “as is” basis. The authors, Cisco Press,
4
and Cisco Systems, Inc. shall have neither liability nor responsibility to any
person or entity with respect to any loss or damages arising from the
information contained in this book or from the use of the discs or programs
that may accompany it.
The opinions expressed in this book belong to the author and are not
necessarily those of Cisco Systems, Inc.
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest
quality and value. Each book is crafted with care and precision, undergoing
rigorous development that involves the unique expertise of members from
the professional technical community.
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service
marks have been appropriately capitalized. Cisco Press or Cisco Systems,
Inc. cannot attest to the accuracy of this information. Use of a term in this
book should not be regarded as affecting the validity of any trademark or
service mark.
5
Cover Designer: Chuti Prasertsith
Americas Headquarters
Cisco Systems. Inc.
San Jose, CA
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers,
and fax numbers are listed on the Cisco Website at
www.cisco.com/go/offices.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco
Lumin, Cisco Nexus, Cisco Stadium Vision, Cisco Telepresence, Cisco
WebEx, DCE, and Welcome to the Human Network are trademarks;
Changing the Way We Work. Live, Play, and Learn and Cisco Store are
service marks; and Access Registrar, Aironet, AsyncOS. Bringing the
Meeting To You. Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP,
6
CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco
IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems
logo, Cisco Unity, Collaboration Without Limitation, EtherFast,
EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare,
GigaDrive, HomeLink, Internet Quotient, IOS, Phone, iQuick Study,
IronPort, the IronPort logo, LightStream, Linksys, MediaTone,
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking
Academy. Network Registrar, PCNow, PIX, PowerPanels, ProConnect,
ScriptShare, SenderBase, SMARTnet, Spectrum Expert. StackWise, The
Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the
WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its
affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property
of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0812R)
7
About the Authors
Omar Santos, CISSP No. 463598, is a principal engineer of Cisco’s
Product Security Incident Response Team (PSIRT), where he mentors and
leads engineers and incident managers during the investigation and
resolution of security vulnerabilities in all Cisco products. Omar has held
information technology and cybersecurity positions since the mid-1990s.
Omar has designed, implemented, and supported numerous secure networks
for Fortune 500 companies and the U.S. government. Prior to his current
role, he was a technical leader within the World Wide Security Practice and
Cisco’s Technical Assistance Center (TAC), where he taught, led, and
mentored many engineers.
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security
Appliance, 2nd edition
Network Security with NetFlow and IPFIX: Big Data Analytics for
Information Security
8
CCNA Security 210-260 Complete Video Course
9
York, NY, USA, 51-60
Kampanakis, P.; Perros, H.; Beyene, T., SDN-Based Solutions for Moving
Target Defense Network Protection, A World of Wireless, Mobile and
Multimedia Networks (WoWMoM), 2014 IEEE 15th International
Symposium, vol., no., pp.1,6, 19-19 June 2014
In his free time, Panos has a passion for basketball, and he never likes to
lose.
Aaron is the author of the following books and courses, as well as many
published white papers and design guides:
10
CCNA Security 210-260 Complete Video Course
11
About the Technical Reviewers
Foster Lipkey, SFCE, is a senior member of the Cisco Firepower TAC
team supporting Firepower, FireSIGHT, AMP for Endpoints, and Threat
Grid, as well as third-party integrations. He has been a leader in developing
tools and procedures for supporting the Cisco Firepower and AMP security
software platforms. Prior to working for Sourcefire/Cisco, he was an
applications solutions specialist as a contractor for the National Cancer
Institute (NCI), supporting Java enterprise applications for the NCI’s Center
for Biomedical Informatics and Information Technology. Foster’s primary
areas of interest are enterprise security and security automation.
Mason Harris, CCIE No. 5916, is the chief solutions architect at vArmour,
a cloud security startup based in Mountain View, California. He is
responsible for all enterprise and platform architecture in both private and
public cloud deployments. Previously he was a technical solutions architect
for Cisco, focusing primarily on security architectures in the data center
with Cisco’s 27 largest customers. Mason has more than 24 years of
experience in systems architecture and is one the few individuals in the
world to have attained five CCIE certifications. He also holds the CISSP,
GPEN, and GCIH certifications. When not thinking about security topics,
Mason can be found backpacking on long trails or at home with his family.
A lifelong UNC Tarheels fan, he holds an undergraduate degree from UNC-
Chapel Hill and a master’s degree from NC State University, with a minor
in Arabic.
12
Dedications
This work is dedicated to those who aim high and constantly try to move
science and technology forward.
—Panos Kampanakis
I would like to dedicate this book to my lovely wife, Jeannette, and my two
beautiful children, Hannah and Derek, who have inspired and supported me
throughout the development of this book. I also dedicate this book to my
father, Jose, and to the memory of my mother, Generosa. Without their
knowledge, wisdom, and guidance, I would not have the goals that I strive
to achieve today.
—Omar Santos
First and foremost, this book is dedicated to my amazing best friend, fellow
adventurer, and wife, Suzanne. To my two awesome and brilliant children,
Eden and Nyah, and Mom and Pop. There is nothing in this world more
important than family, and my family drives me to be better and do better,
every day.
—Aaron Woland
13
Acknowledgments
We would like to thank the technical editors, Foster Lipkey and Mason
Harris, for their time and technical expertise. They verified our work and
corrected us in all the major and minor mistakes that were hard to find, and
they steered us in new directions and to achieve more.
We would like to thank the Cisco Press team, especially Denise Lincoln and
Christopher Cleveland, for their patience, guidance, and consideration.
Their efforts are greatly appreciated.
Kudos to the Cisco Security Business Group and Cisco Security Services
for delivering such great products and services.
Finally, we would like to thank Cisco for enabling us to constantly learn and
chase our career aspirations all these years.
14
Contents at a Glance
Introduction
Index
15
Contents
Introduction
Cisco ASA 5500-X Series Next-Generation Firewalls and the Cisco ASA
with FirePOWER Services
16
Web Security Appliance
Summary
Inline Mode
17
The URL Filtering License
Summary
18
Setting Up the Cisco ASA FirePOWER Module in Cisco ASA 5585-X
Appliances
Installing the Boot Image and Firepower System Software in the Cisco ASA
5585-X SSP
Installing the Boot Image and Firepower System Software in the SSD of
Cisco ASA 5500-X Appliances
Uploading ASDM
Configuring an Interface
Security Intelligence
HTTP Responses
19
Configuring Intrusion Policies
Custom Rules
Summary
20
Useful ASA Debugging Commands
Summary
1-to-1 Signatures
Ethos Engine
Spero Engine
Indicators of Compromise
Advanced Analytics
The Cloud
Private Cloud
Summary
21
Introduction to Advanced Malware Protection (AMP) for Networks
Form Factors
File Rules
Summary
AMP Reports
Summary
Outbreak Control
22
Custom Detections
Application Control
Exclusion Sets
Windows Policies
General Tab
File Tab
Network Tab
MAC Policies
General Tab
File Tab
Network Tab
Linux Policies
General Tab
23
File Tab
Network Tab
Download Connector
Proxy Complications
Summary
24
Default Users
Summary
NGIPS Basics
NGIPS Modes
Flow Handling
Policy Definition
Summary
25
Chapter 11 Configuring Cisco Next-Generation IPS
Policy
Policy Layers
Variables
Committing a Policy
Snort Rules
Rule Anatomy
Rule Headers
Rule Body
Writing a Rule
Firepower Recommendations
Performance Settings
Stack/Cluster
Summary
Analysis
Intrusion Events
26
Reports
Incidents
Alerts
SNMP Alerts
Email Alerts
Syslog Alerts
Correlation Policies
Troubleshooting
Audit
Health Monitoring
Syslogs
Summary
Index
27
Introduction
This book covers Cisco next-generation network security products and
solutions. It provides detailed guidance for designing, configuring, and
troubleshooting the Cisco ASA with FirePOWER Services, Cisco next-
generation IPS appliances, Cisco Web Security Appliance (WSA), and
Cisco Email Security Appliance (ESA) with the new Advanced Malware
Protection (AMP) integration, as well as the Cisco AMP Threat Grid
malware analysis and threat intelligence and Cisco Firepower Management
Center (FMC).
28
for Endpoints and AMP for Networks; an overview of AMP Threat Grid;
Cisco Email Security; Cisco Web Security; Cisco Identity Services Engine
(ISE); Cisco Meraki Cloud Managed MDM and Security Appliances; and
the Cisco VPN solutions.
29
how AMP for Content Security fits within the AMP architecture, describing
the components and configuration of File Reputation and File Analysis
Services, along with the reporting for those services.
Chapter 8, “Cisco AMP for Endpoints”: This chapter dives into Cisco
AMP for Endpoints, custom detections, application control, AMP for
Endpoints installation, and policy management for applicable operating
systems (Windows, Mac, Linux, and Android). The chapter also reviews the
usage of the AMP cloud console.
30
reporting, incidents, alerting, and correlation policies. It then provides
troubleshooting and health monitoring options that help administrators
identify and find the root cause of potential issues in the system.
The conventions used to present command syntax in this book are the same
conventions used in the IOS Command Reference:
31
Chapter 1. Fundamentals of Cisco Next-
Generation Security
The threat landscape today is very different from that of just a few years
ago. Many bad actors are causing major disruptions to enterprises, service
providers, and governments with a combination of simple attacks and very
sophisticated, well-organized, and well-funded attack campaigns. A large
number of these advanced attacks are difficult to detect and remain in
networks for long periods of time.
Cisco ASA 5500-X Series next-generation firewalls and the Cisco ASA
with FirePOWER Services
32
AMP Threat Grid
Note
Encryption
33
Droppers
Social engineering
Zero-day attacks
34
open platforms that cover the network, endpoints, users, and the cloud.
These platforms must be scalable and centrally managed for device
configuration consistency.
You as a security professional need to face the fact that you will get
attacked, and eventually some of the devices in your network will be
compromised. Security technologies and processes not only should focus on
detection but also should provide the capability to mitigate the impact of a
successful attack. Figure 1-2 illustrates the attack continuum.
35
have already taken place with next-generation intrusion prevention systems
(NGIPS), Email Security, and Web Security Appliance with AMP. These
solutions provide the capabilities to contain and remediate an attack to
minimize data loss and additional network degradation.
Tip
What is the difference between FirePOWER and Firepower? Cisco uses the
term FirePOWER (uppercase POWER) when referring to the Cisco ASA
FirePOWER Services module and uses Firepower (lowercase power) when
referring to the FTD unified image and newer software.
The members of the Cisco ASA family come in many shapes and sizes, but
they all provide a similar set of features. Typically, smaller model numbers
represent smaller capacity for throughput. The main standalone appliance
model number begins with a 55, but there are also devices in the Cisco ASA
family that go into a switch, such as a 6500. Table 1-1 describes the various
models of the ASA family.
36
Table 1-1 Cisco ASA Models
The Cisco ASA family provides a very comprehensive set of features and
next-generation security capabilities. For example, it provides capabilities
such as simple packet filtering (normally configured with access control
lists [ACLs]) and stateful inspection. The Cisco ASA family also provides
support for application inspection/awareness. A Cisco ASA device can
listen in on conversations between devices on one side and devices on the
other side of the firewall. The benefit of listening in is that the firewall can
pay attention to application layer information.
The Cisco ASA family also supports Network Address Translation (NAT),
the capability to act as a Dynamic Host Configuration Protocol (DHCP)
server or client or both. The Cisco ASA family supports most of the interior
gateway routing protocols, including Routing Information Protocol (RIP),
Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest
Path First (OSPF). It also supports static routing. A Cisco ASA device also
can be implemented as a traditional Layer 3 firewall, which has IP
addresses assigned to each of its routable interfaces. The other option is to
37
implement a firewall as a transparent (Layer 2) firewall, in which case the
actual physical interfaces are not configured with individual IP addresses,
but a pair of interfaces operate like a bridge. Traffic that is going across this
two-port bridge is still subject to the rules and inspection that can be
implemented by the ASA. In addition, a Cisco ASA device is often used as
a head-end or remote-end device for VPN tunnels for both remote-access
VPN users and site-to-site VPN tunnels. The Cisco ASA family supports
IPsec and SSL-based remote-access VPNs. The SSL VPN capabilities
include support for clientless SSL VPN and full AnyConnect SSL VPN
tunnels.
The Cisco ASA family also provides a basic botnet traffic filtering feature.
A botnet is a collection of computers that have been compromised and are
willing to follow the instructions of someone who is attempting to centrally
control them (for example, 200,000 machines all willing [or so
commanded] to send a flood of ping requests to the IP address dictated by
the person controlling these devices). Often, users of these computers have
no idea that their computers are participating in a coordinated attack. An
ASA device works with an external system at Cisco that provides
information about the Botnet Traffic Filter Database and so can protect
against such attacks.
Note
Cisco acquired the company Sourcefire to expand its security portfolio. The
Cisco ASA FirePOWER module provides NGIPS, Application Visibility
and Control (AVC), URL filtering, and AMP. This module runs as a separate
application from the classic Cisco ASA software. The Cisco ASA
FirePOWER module can be a hardware module on the ASA 5585-X only or
a software module that runs in an SSD in all other models.
38
module. There are no additional licenses required in a Cisco ASA device.
FirePOWER Services running on the Cisco ASA 5506-X, 5508-X, and
5516-X can be managed using Adaptive Security Device Manager (ASDM),
and the licenses can be installed using ASDM. In all Cisco ASAs with
FirePOWER Services managed by a Firepower Management Center, the
license is installed on the Firepower Management Center and used by the
module.
Note
39
Next-Generation Firewall, IPS, and VPN Services, third edition, covers the
configuration and troubleshooting of site-to-site IPsec VPNs and all forms
of remote-access VPNs (IPsec, clientless SSL, and client-based SSL).
The Cisco FTD is unified software that includes Cisco ASA features, legacy
FirePOWER Services, and new features. FTD can be deployed on Cisco
Firepower 4100 and 9300 appliances to provide next-generation firewall
(NGFW) services. In addition to being able to run on the Cisco Firepower
4100 Series and the Firepower 9300 appliances, FTD can also run natively
on the ASA 5506-X, ASA 5506H-X, ASA 5506W-X, ASA 5508-X, ASA
5512-X, ASA 5515-X, ASA 5516-X, ASA 5525-X, ASA 5545-X, and ASA
5555-X. It is not supported in the ASA 5505 or the 5585-X.
All of the Cisco Firepower 4100 Series models are one rack-unit (1 RU)
appliances and are managed by the Cisco Firepower Management Center.
The Cisco Firepower 9300 appliances are designed for very large
enterprises or service providers. They can scale beyond 1 Tbps and are
designed in a modular way, supporting Cisco ASA software, Cisco FTD
40
software, and Radware DefensePro DDoS mitigation software.
Note
The Cisco FTD can run on Cisco Unified Computing System (UCS) E-
Series blades installed on Cisco ISR routers. Both the FMC and FTD are
deployed as virtual machines. There are two internal interfaces that connect
a router to an UCS E-Series blade. On ISR G2, Slot0 is a Peripheral
Component Interconnet Express (PCIe) internal interface, and UCS E-Series
Slot1 is a switched interface connected to the backplane Multi Gigabit
Fabric (MGF). In Cisco ISR 4000 Series routers, both internal interfaces
are connected to the MGF.
A hypervisor is installed on the UCS E-Series blade, and the Cisco FTD
software runs as a virtual machine on it. FTD for ISRs is supported on the
following platforms:
Cisco ISR G2 Series: 2911, 2921, 2951, 3925, 3945, 3925E, and 3945E
Cisco ISR 4000 Series: 4331, 4351, 4451, 4321, and 4431
41
appliances running Cisco FirePOWER Next-Generation IPS Services
support throughput speeds from 2 Gbps up through 60 Gbps.
Cisco FirePOWER 7000 Series appliances: These are the base platform
for the Cisco FirePOWER NGIPS software. Base platforms support
throughput speeds from 50 Mbps up through 1.25 Gbps.
42
and up to 10 million IPS events.
Computer virus: Malicious software that infects a host file or system area
to perform undesirable outcomes such as erasing data, stealing information,
or corrupting the integrity of the system. In numerous cases, these viruses
multiply again to form new generations of themselves.
Worm: A virus that replicates itself over the network, infecting numerous
vulnerable systems. In most cases, a worm executes malicious instructions
on a remote system without user interaction.
43
Exploit: A malicious program designed to exploit, or take advantage of, a
single vulnerability or set of vulnerabilities.
There are numerous types of commercial and free antivirus software. The
following are a few examples of commercial and free options:
Avast
44
F-Secure Anti-virus
Kaspersky Anti-virus
McAfee AntiVirus
Panda Antivirus
Sophos Antivirus
Norton AntiVirus
ClamAV
Immunet AntiVirus
Note
There are numerous other antivirus software companies and products. The
following link provides a comprehensive list and comparison of the
different antivirus software available on the market:
http://en.wikipedia.org/wiki/Comparison_of_antivirus_software.
45
HIPS obsolete. For example, Cisco Advanced Malware Protection (AMP)
for Endpoints provides granular visibility and control to stop advanced
threats missed by other security layers. Cisco AMP for Endpoints takes
advantage of telemetry from big data, continuous analysis, and advanced
analytics provided by Cisco threat intelligence to be able to detect, analyze,
and stop advanced malware across endpoints.
Cisco AMP for Endpoints provides advanced malware protection for many
operating systems, including Windows, Mac OS X, Android, and Linux.
Attacks are getting very sophisticated and can evade detection of traditional
systems and endpoint protection. Today, attackers have the resources,
knowledge, and persistence to beat point-in-time detection. Cisco AMP for
Endpoints provides mitigation capabilities that go beyond point-in-time
detection. It uses threat intelligence from Cisco to perform retrospective
analysis and protection. Cisco AMP for Endpoints also provides device and
file trajectory capabilities to allow a security administrator to analyze the
full spectrum of an attack. Device trajectory and file trajectory support the
following file types in Windows and Mac OS X operating systems:
MSEXE
MSCAB
MSOLE2
ZIP
ELF
MACHO
MACHO_UNIBIN
SWF
JAVA
Note
46
The Mac OS X connector does not support SWF files. The Windows
connector does not scan ELF, JAVA, MACHO, or MACHO_UNIBIN files at
the time of this writing. The Android AMP connector scans APK files.
47
and emerging threats.
There are several types of email-based threats. The following are the most
common:
Spear phishing: Phishing attempts that are more targeted. Spear phishing
emails are directed to specific individual or organizations. For instance, an
attacker may perform a passive reconnaissance on an individual or
organization by gathering information from social media sites (for example,
Twitter, LinkedIn, Facebook) and other online resources. Then the attacker
may tailor a more directed and relevant message to the victim to increase
the probability that the user will be fooled to follow a malicious link, click
an attachment containing malware, or simply reply to the email and provide
sensitive information. Another phishing-based attack, called whaling,
specifically targets executives and high-profile users.
The following are the different Email Security Appliance (ESA) models:
48
Cisco C680: A high-performance ESA model for service providers and
large enterprise
Cisco C170: An ESA model designed for small businesses and branch
offices
The Cisco ESA runs the Cisco AsyncOS operating system. Cisco AsyncOS
supports numerous features that help mitigate email-based threats.
The following are examples of the features supported by the Cisco ESA:
Data loss prevention (DLP): The ability to detect any sensitive emails
and documents leaving the corporation. The Cisco ESA integrates RSA
email DLP for outbound traffic.
49
encrypt the message.
Note
The Cisco ESA acts as the email gateway for an organization, handling all
email connections, accepting messages, and relaying messages to the
appropriate systems. The Cisco ESA can service email connections from the
Internet to users inside a network and from systems inside the network to the
Internet. Email connections use Simple Mail Transfer Protocol (SMTP).
The ESA services all SMTP connections, by default acting as the SMTP
gateway.
Tip
50
Private listeners for email coming from hosts in the corporate (inside)
network (These emails are typically from internal groupware, Exchange,
POP, or IMAP email servers.)
Cisco ESA listeners are often referred to as SMTP daemons, and they run
on specific Cisco ESA interfaces. When a listener is configured, the
following information must be provided:
Listener properties such as a specific interface in the Cisco ESA and the
TCP port that will be used. The listener properties must also indicate
whether it is a public or a private listener.
The hosts that are allowed to connect to the listener, using a combination
of access control rules. An administrator can specify which remote hosts
can connect to the listener.
The Cisco Hybrid Email Security solution combines both cloud-based and
on-premises ESAs. This hybrid solution helps Cisco customers reduce their
onsite email security footprint and outsource a portion of their email
security to Cisco, while still allowing them to maintain control of
confidential information within their physical boundaries. Many
organizations must comply with regulations that require them to keep
sensitive data physically on their premises. The Cisco Hybrid Email
Security solution allows network security administrators to remain
compliant and to maintain advanced control with encryption, DLP, and
onsite identity-based integration.
51
For an organization to be able to protect its environment against web-based
security threats, security administrators need to deploy tools and mitigation
technologies that go far beyond traditional blocking of known bad websites.
Today, you can download malware through compromised legitimate
websites, including social media sites, advertisements in news and
corporate sites, and gaming sites. Cisco has developed several tools and
mechanisms to help customers combat these threats, including and Cisco
Web Security Appliance (WSA), Cisco Security Management Appliance
(SMA), and Cisco Cloud Web Security (CWS). These solutions enable
malware detection and blocking, continuous monitoring, and retrospective
alerting.
52
Figure 1-3 WSA Explicit Proxy Configuration
Step 2. The Cisco WSA connects to the website on behalf of the internal
user.
53
Step 2. The internal router (R1) redirects the web request to the Cisco
WSA, using WCCP.
Step 3. The Cisco WSA connects to the website on behalf of the internal
user.
Figure 1-5 demonstrates how the WCCP registration works. The Cisco
WSA is the WCCP client, and the Cisco router is the WCCP server.
During the WCCP registration process, the WCCP client sends a registration
announcement (“Here I am”) every 10 seconds. The WCCP server (the
Cisco router, in this example) accepts the registration request and
acknowledges it with an “I see you” WCCP message. The WCCP server
waits 30 seconds before it declares the client as “inactive” (engine failed).
WCCP can be used in large-scale environments. Figure 1-6 shows a cluster
of Cisco WSAs, where internal Layer 3 switches redirect web traffic to the
cluster.
54
Figure 1-6 Cisco WSA Cluster Example
55
Cisco WSA S370: A WSA designed for medium-size organizations with
1500 to 6000 users. A 2 RU appliance with 4 (1 quad core) CPUs, 4 GB or
memory, and 1.8 TB of disk space.
The Cisco WSA runs the Cisco AsyncOS operating system. Cisco AsyncOS
supports numerous features that help mitigate web-based threats. The
following are examples of these features:
Layer 4 traffic monitor: The Cisco WSA is used to detect and block
spyware. It dynamically adds IP addresses of known malware domains to
databases of sites to block.
File reputation: Using threat information from Cisco Talos, this file
reputation threat intelligence is updated every 3 to 5 minutes.
56
File retrospection: After a malicious attempt or malware is detected, the
Cisco WSA continues to cross-examine files over an extended period of
time.
Application visibility and control: The Cisco ASA can inspect and even
block applications that are not allowed by the corporate security polity. For
example, an administrator can allow users to use social media sites like
Facebook but block micro-applications such as Facebook games.
Cisco SMA M680: Designed for large organizations with more than
57
10,000 users
Cisco SMAV M600v: Designed for organizations with more than 5000
users
Cisco SMA M380: Designed for organizations with 1000 to 10,000 users
Cisco SMAV M300v: Designed for organizations with 1000 to 5000 users
Cisco SMA M170: Designed for small business or branch offices with up
to 1000 users
Cisco SMAV M100v: Designed for small business or branch offices with
up to 1000 users
Note
Cisco also has a Cisco SMAV M000v that is used for evaluations only.
Cisco ASA
Cisco WSA
58
is offloaded from the hardware appliances to the cloud, reducing the impact
to hardware utilization and reducing network latency. Figure 1-8 illustrates
how the transparent proxy functionality through a connector works.
In Figure 1-8, the Cisco ASA is enabled with the Cisco CWS connector at a
branch office and protects the corporate users at the branch office with these
steps:
Step 2. The Cisco ASA forwards the request to the Cisco CWS global
cloud infrastructure.
Step 3. Cisco CWS notices that example.org has some web content (ads)
that is redirecting the user to a known malicious site.
59
Step 4. Cisco CWS blocks the request to the malicious site.
60
network services and enterprise data. Cisco ISE provides support for
multiple mobile device management (MDM) solutions to enforce policy on
endpoints. ISE can be configured to redirect users to MDM onboarding
portals and prompt them to update their devices before they can access the
network. Cisco ISE can also be configured to provide Internet-only access
to users who are not compliant with MDM policies.
Security monitoring
Detection systems
61
administrators to pre-enroll devices or dynamically add users as they try to
connect to the corporate network. An administrator can push apps and
content or restrict network access based on user groups.
Note
Note
62
Numerous enterprises, service providers, and other institutions deploy
virtual private networks (VPNs) to provide data integrity, authentication,
and data encryption to ensure confidentiality of the packets sent over the
Internet or another unprotected network. VPNs are designed to avoid the
cost of unnecessary leased lines. Many different protocols are used for VPN
implementations, including the following:
63
Summary
Cisco makes some of the most complete and advanced security products in
the industry. These products and solutions provide visibility, policy
enforcement, and advanced threat protection across the network and the
entire attack continuum. This chapter introduces the new threat landscape
and the attack continuum. It also provides details about the Cisco ASA
5500-X Series next-generation firewalls and the Cisco ASA with
FirePOWER Services, Cisco FTD, the Firepower 4100 and 9300
appliances, Cisco’s NGIPS, Firepower Management Center, Cisco AMP for
Endpoints, Cisco AMP for Networks, and Cisco AMP Threat Grid. It also
provides an introduction to email and web security, describing the Cisco
ESA, Cloud Email Security, Cisco WSA, and Cisco CWS. This chapter also
introduces other Cisco core security products, such as Cisco ISE, Cisco
Meraki cloud-managed MDM, and Cisco Meraki cloud-managed security
appliances and briefly explains the available Cisco VPN solutions. The
chapters that follow focus on the latest next-generation platforms.
64
Chapter 2. Introduction to and Design of Cisco
ASA with FirePOWER Services
This chapter provides an introduction to the Cisco ASA with FirePOWER
Services solution. It also provides design guidance and best practices for
deploying Cisco ASA with FirePOWER Services. This chapter covers the
following topics:
65
visibility and control across the extended network during the full attack
continuum:
AMP and file control: You can detect, track, capture, analyze, and
optionally block the transmission of files, including malware files and
nested files inside archive files in network traffic. File control also enables
66
you to detect and block users from sending or receiving files of different
specified types over a multitude of application protocols. You can configure
file control as part of the overall access control policies and application
inspection.
The Cisco ASA FirePOWER module can be a hardware module on the ASA
5585-X only or a software module that runs in a solid state drive (SSD) in
all other Cisco ASA 5500-X models.
Note
The Cisco ASA FirePOWER Services module is not supported in the 5505.
For the 5512-X through ASA 5555-X, you must install an SSD. The SSD is
standard on the 5506-X, 5508-X, and 5516-X.
Inline mode
Inline Mode
When the Cisco ASA FirePOWER module is configured in inline mode, the
traffic passes through the firewall policies before it is sent to the Cisco
ASA FirePOWER module.
Figure 2-1 illustrates the order of operations when the Cisco ASA
FirePOWER module is configured in inline mode.
67
Figure 2-1 Inline Mode
5. The Cisco ASA FirePOWER module inspects the traffic and applies its
security policies and takes appropriate actions. If traffic is not compliant
with security policies or is determined to be malicious, the Cisco ASA
FirePOWER module sends back a verdict to the ASA, and the ASA blocks
the traffic and alerts the network security administrator. All valid traffic is
allowed by the Cisco ASA.
68
service policy is sent to the Cisco ASA FirePOWER module.
Figure 2-2 illustrates the order of operations when the Cisco ASA
FirePOWER module is configured in promiscuous monitor-only mode:
As you can see, the most secure and effective way to configure the Cisco
ASA FirePOWER module is in inline mode. You can configure the Cisco
ASA FirePOWER module in promiscuous monitor-only mode when you are
69
evaluating and performing capacity planning for a new deployment.
The Cisco ASA FirePOWER module modes are a bit different than those of
the Cisco FirePOWER Series of appliances, which support the following
deployment modes/options:
Clustering
Passive
Inline
Routed
Switched
Note
70
Administrators can configure the Cisco Firepower Management Center
hosted on a separate appliance or deployed as a virtual machine (VM).
Figure 2-3 shows a Cisco ASA with FirePOWER Services being managed
by a Cisco Firepower Management Center (FMC) in a VM.
In Figure 2-3 the Cisco Firepower Management Center manages the Cisco
ASA FirePOWER module via its management interface. The following
section provides important information about configuring and accessing the
Cisco ASA FirePOWER module management interface.
In the Cisco ASA 5585-X, the Cisco ASA FirePOWER module includes a
separate management interface. All management traffic to and from the
Cisco ASA FirePOWER module must enter and exit this management
interface, and the management interface cannot be used as a data interface.
71
several operations, such as automated system software updates and threat
intelligence updates. If the module is managed by the Firepower
Management Center, the FMC is the one that needs to have Internet access to
perform those tasks.
Figure 2-4 shows an example of how you can physically connect the Cisco
ASA FirePOWER module management interface to be able to reach the
Internet via the Cisco ASA interface.
The Cisco ASA is managed via the interface named management 0/0 in this
example. This interface is configured with the IP address 192.168.1.1. The
Cisco ASA FirePOWER module is managed via the interface named
management 1/0, configured with the IP address 192.168.1.2. The Cisco
ASA FirePOWER module is being managed by a virtual Cisco Firepower
72
Management Center. Both interfaces are connected to a Layer 2 switch in
this example.
Note
You can use other cabling options with the Cisco ASA FirePOWER module
management interface to be able to reach the Internet, depending on how you
want to connect your network. However, the example illustrated in Figure 2-
4 is one of the most common scenarios.
Figure 2-6 shows a Cisco ASA 5516-X running Cisco ASA FirePOWER
Services.
73
Figure 2-6 Cisco ASA 5500-X FirePOWER Module Management Interface
Note
74
Figure 2-7 Cisco ASA 5500-X FirePOWER Module Default Gateway
If you must configure the management interface separately from the inside
interface, you can deploy a router or a Layer 3 switch between both
interfaces, as shown in Figure 2-8. This option is less common, as you still
need to manage the ASA via the inside interface.
In Figure 2-8, the Cisco ASA FirePOWER module default gateway is the
router labeled R1, with the IP address 10.1.2.1. The Cisco ASA’s inside
75
interface is configured with the IP address 10.1.1.1. The Cisco ASA
FirePOWER module must have a way to reach the inside interface of the
ASA to allow for on-box ASDM management. On the other hand, if you are
using FMC, the Cisco ASA FirePOWER module needs to have a way to
reach the FMC.
It is really important that you understand the capabilities of each Cisco ASA
model before you select the one that is appropriate for your specific
deployment. Table 2-1 lists the maximum application visibility and control
(AVC) and NGIPS throughput on each Cisco ASA–supported model.
For a complete and up-to-date Cisco ASA model comparison, visit Cisco’s
ASA website, at cisco.com/go/asa.
76
Throughput
You have already learned that the Cisco ASA FirePOWER module can be
managed by the Firepower Management Center or ASDM, in the case of the
Cisco ASA 5506-X and 5508-X. The Firepower Management Center and
the Cisco ASA FirePOWER module require different licenses. These
licenses are installed in the Cisco FirePOWER module and the Cisco
Firepower Management Center. There are no additional licenses required in
the Cisco ASA.
The following are the different types of Cisco ASA FirePOWER Services
licenses:
Protection
Control
Malware
URL Filtering
77
intrusion detection and prevention, file control, and security intelligence
filtering. The intrusion detection and prevention capabilities are used to
analyze network traffic for intrusions and exploits, to alert the network
security administrator and optionally block offending packets. File control
allows network security administrators to detect and (optionally) block
users from sending or receiving files of specific types over specific
application protocols.
Note
The Malware license also allows you to inspect and block a set of file
types, based on malware intelligence and dispositions. The Malware
license is covered later in this chapter.
Tip
You can configure access control policies without a license; however, if you
do this, you will not be able to apply the policy until the Protection license
is added to the Cisco ASA FirePOWER module. If the Protection license is
for some reason deleted, the Cisco ASA FirePOWER module ceases to
detect intrusions and file events, and it is not able to reach the Internet for
either Cisco-provided or third-party security intelligence information.
78
The Control license allows a network security administrator to implement
user and application control. The administrator does this by adding user and
application settings to access control rules. As with the Protection license,
you can add user and application conditions to access control rules without
a Control license. You cannot apply the policy until the Control license is
installed and enabled in the Cisco ASA FirePOWER module, however.
79
Note
Note
You can view the installed licenses in the Cisco ASA FirePOWER module
by navigating to System > Licenses in the Cisco Firepower Management
Center. The Licenses page lists all the licenses in the devices managed by
the Cisco Firepower Management Center, as shown in Figure 2-10.
80
Figure 2-10 Cisco Firepower Management Center Licenses Page
Another way to view the installed licenses in the Cisco ASA FirePOWER
module is by navigating to Devices > Device Management in the Cisco
Firepower Management Center. Then click the device for which you want to
see the details, as shown in Figure 2-11.
81
Figure 2-11 Cisco Firepower Management Center Device Management
This section covers how to add a license to the Cisco ASA FirePOWER
module after you receive the activation key provided by Cisco when you
purchase the license. The following are the steps to add a license:
82
Figure 2-12 Adding a New License in the FMC
Step 3. Copy and paste the license into the License field and click Submit
License. If you do not have the license, follow the instructions onscreen to
obtain your license.
If you are configuring the Cisco ASA FirePOWER module using ASDM,
you can manage and install FirePOWER licenses by navigating to
Configuration > ASA FirePOWER Configuration > Licenses, as shown
in Figure 2-13.
83
Figure 2-13 Adding a New License in ASDM
In addition, the Mobile User Security (MUS) feature is not compatible with
the Cisco ASA FirePOWER module. You must disable MUS if it is enabled
in the Cisco ASA.
All other Cisco ASA application inspections are compatible with the Cisco
ASA FirePOWER module.
84
Operations
When the Cisco ASA FirePOWER module is deployed, the Cisco ASA
processes all ingress packets against access control lists (ACLs),
connection tables, Network Address Translation (NAT), and application
inspections before traffic is forwarded to the FirePOWER Services module.
In order for the Cisco ASA to redirect packets to the Cisco ASA
FirePOWER module, you need to configure redirection policies using the
Cisco ASA Modular Policy Framework (MPF), as illustrated in Figure 2-
14.
Figure 2-14 Cisco ASA MPF, Redirecting Traffic to the Cisco ASA
FirePOWER Module
Note
Chapter 3 covers how to configure the Cisco ASA MPF to redirect traffic to
the Cisco ASA FirePOWER module.
85
Figure 2-15 shows the Cisco ASA packet processing order of operations.
Step 2. The Cisco ASA checks to see if there is an existing connection for
the source and destination hosts for that specific traffic. If there is an
existing connection, the Cisco ASA bypasses the ACL checks and performs
application inspection checks and proceeds to step 5.
Step 3. If there is no existing connection for that traffic, the Cisco ASA
performs the NAT checks (or untranslate process).
Step 4. The Cisco ASA allows or denies traffic based on the rules in the
configured ACLs.
Step 6. The Cisco ASA forwards the packet to the Cisco ASA FirePOWER
module. If promiscuous monitor-only mode is configured, only a copy of the
packet is sent to the Cisco ASA FirePOWER module. If the Cisco ASA
FirePOWER module is configured in inline mode, the packet is inspected
and dropped if it does not conform to security policies. If the packet is
compliant with security policies and Cisco ASA FirePOWER module
protection capabilities, it is sent back to the ASA for processing.
86
Step 7. The Cisco ASA determines the egress interface based on NAT or
Layer 3 routing.
Figure 2-16 shows the packet flow in the Cisco ASA 5585-X.
In Cisco ASA 5585-X appliances, the SSP running Cisco ASA software
processes all ingress and egress packets. No packets are directly processed
by the Cisco ASA FirePOWER module (SSP) except for the Cisco ASA
FirePOWER module management port.
The Cisco ASA supports high availability using failover and clustering.
This section covers the deployment of the Cisco ASA FirePOWER module
in failover scenarios. Clustering is covered later in this chapter.
Active/standby
Active/active
87
In active/standby failover, one unit in a failover pair is always active, and
the other one is in standby. Figure 2-17 illustrates active/standby failover.
The standby device drops all transit traffic that it may receive and accepts
only management connections. For a switchover to occur automatically, the
active unit must become less operationally healthy than the standby. The
failover event moves all transit traffic to the peer device, even if the actual
impact on the previously active unit is localized. When running in multiple-
context mode, all contexts switch over at the same time. Active/standby
failover is the only option when running in single-context mode.
88
You act as a service provider and want to provide firewall services to
customers; however, you do not want to purchase additional physical
firewalls for each client.
You currently manage many physical firewalls, and you want to integrate
security policies from all firewalls into one physical firewall.
Accept configuration commands from the user and replicate them to the
standby peer. All management and monitoring of a failover pair should
happen on the active unit because configuration replication is not a two-way
process. Making any changes on the standby ASA causes configuration
inconsistency that may prevent subsequent command synchronization and
create issues after a switchover event. If you inadvertently made a change
on the standby device, exit the configuration mode and issue the write
standby command on the active unit to restore the proper state. This
command completely overwrites the existing running configuration of the
standby unit with the running configuration of the active ASA.
Process all transit traffic, apply configured security policies, build and
tear down connections, and synchronize the connection information to the
standby unit, if configured for stateful failover.
Send NetFlow Secure Event Logging (NSEL) and syslog messages to the
configured event collectors. When necessary, you may configure the standby
unit to transmit syslog messages with the logging standby command. Keep
89
in mind that this command doubles the connection-related syslog traffic from
the failover pair.
Build and maintain dynamic routing adjacencies. The standby unit never
participates in dynamic routing.
Stateful failover is not available on the Cisco ASA 5505 platform. When
stateful replication is enabled, an active ASA synchronizes the following
additional information to the standby peer:
90
have to reestablish after a failover event.
Most VPN data structures, including security associations (SA) for site-to-
site tunnels and remote-access users. Only some clientless SSL VPN
information remains stateless.
Stateful failover supports only Cisco ASA software features. The Cisco
ASA FirePOWER module tracks connection state independently, and the
Cisco ASAs do not synchronize their configuration or any other stateful data
in failover. When a Cisco ASA switchover occurs, the Cisco ASA
FirePOWER module typically recovers existing connections transparently
to the user, but some advanced security checks may apply only to new flows
that are established through the newly active Cisco ASA and its local
application module.
91
Figure 2-18 Active/Active Failover
Group 1: All newly created contexts belong to this group by default. The
admin context must always be a member of this group. By default, the
primary unit owns this group, and you typically keep it this way.
92
have to change its ownership to the secondary ASA after assigning all the
desired contexts. Keep in mind that both groups have to be active on the
same unit in order to move contexts between groups 1 and 2.
You should deploy active/active failover only when you can effectively
separate the network traffic flows into these two independent groups. Keep
in mind that interface sharing is not supported between contexts that belong
to different failover groups.
You must be able to separate the traffic flows into multiple contexts such
that no interfaces are shared between contexts in different failover groups.
Keep in mind that not all features are supported in multiple-context mode.
If a switchover occurs, a single physical device must carry the full traffic
load that was originally intended for two ASA units. This effectively
reduces the benefits of load balancing because you should only plan the
overall load on the failover pair for this worst-case scenario with a single
remaining unit.
Fail open
Fail close
93
When the Cisco ASA FirePOWER module is configured to fail open, all
traffic still passes through the Cisco ASA if the module fails. In contrast,
when the Cisco ASA FirePOWER module is configured to fail close, all
traffic stops through the Cisco ASA if the module fails.
All cluster members must have identical hardware configuration, SSP types,
application modules, and interface cards.
Clustered Cisco ASA provides flow symmetry and high availability to the
Cisco ASA FirePOWER module. Packets and flows are not dropped by the
Cisco ASA FirePOWER module but instead are marked for “drop” or “drop
with TCP reset” and sent back to the corresponding Cisco ASA. This
methodology allows the Cisco ASA to clear the connection from the state
94
tables and send TCP resets, if needed.
95
Figure 2-21 Cisco ASA Cluster Configured in Individual Interface Mode
In individual interface mode, the cluster master owns the virtual IP on data
interfaces for management purposes only. All members get data interface IP
addresses from IP address pools in the order in which they join the cluster.
When Cisco ASAs are configured in a cluster, one member is elected as the
master, and other Cisco ASAs are slaves. The master may be the first unit to
join the cluster or may be based on a configured priority. A new master is
elected only if the elected master fails. The master unit handles all
management and centralized functions, and the configuration is locked on
slaves.
Figure 2-22 illustrates the steps in the cluster master election process.
Step 1. A Cisco ASA with clustering enabled boots and immediately looks
96
for a master within the cluster.
Step 3. If a master already exists, the Cisco ASA assumes the role of slave
and synchronizes the configuration with the master Cisco ASA.
97
Figure 2-23 A New TCP Connection in a Cisco ASA Cluster
Step 1. A new TCP connection attempt is received from the client (TCP
SYN packet).
Step 2. The Cisco ASA that receives the TCP SYN (connection attempt)
becomes the flow owner and adds the TCP SYN cookie. It then delivers the
packet to the server.
Step 3. The server may reply with a TCP SYN ACK (response) through
another unit in the cluster.
Step 5. The flow owner delivers the TCP SYN to the client.
Step 6. The flow owner updates the flow director with the connection
information.
98
Figure 2-24 illustrates how a new UDP or another pseudo-stateful
connection is established and tracked within a cluster.
Step 2. The Cisco ASA that receives the connection attempt queries the
flow director to see if a connection already exists for that host.
Step 3. The Cisco ASA that received the packet becomes the flow owner if
no connection was found.
Step 5. The flow owner updates the director with the new connection
information.
Step 6. The server responds to the client. If another Cisco ASA in the
cluster receives the response, it forwards the packet to the flow owner and
becomes the flow forwarder.
99
Step 7. The flow forwarder queries the director to see what Cisco ASA is
the flow owner.
Step 8. The director updates the flow forwarder with the flow owner
information.
Step 9. The flow forwarder forwards the server response to the flow
owner.
There are several Cisco ASA features where connections are centralized,
such as VPN management, application inspection, and AAA for network
access. If a feature is handled in a centralized way, the cluster master
controls all the tasks.
Note
Note
All features that are handled in a centralized way have flows always
residing on the master unit in the cluster.
100
Figure 2-25 Centralized Connections in a Cisco ASA Cluster
Step 2. The Cisco ASA that receives the connection attempt recognizes the
centralized feature and redirects the connection attempt to the master.
Step 3. The master becomes the owner and delivers the packet to the server.
Step 4. The master updates the director with the connection information.
101
Figure 2-26 Flow Owner Failure
Step 2. The flow owner fails. This can be because of a power failure,
hardware failure, or some other event, such as a system crash.
Step 3. The client sends the next packet to the server, and another cluster
member receives the packet.
Step 4. The Cisco ASA that receives the packet queries the director.
Step 5. The director detects that the original flow owner failed and assigns
a new owner.
102
Deploying the Cisco ASA FirePOWER Services in the
Internet Edge
Figure 2-28 illustrates how a Cisco ASA with the FirePOWER module is
deployed in an office in New York, terminating SSL and IPsec (IKEv2)
VPN tunnels from remote clients in the Internet.
103
Figure 2-28 Cisco ASA FirePOWER Module in a Remote-Access VPN
Scenario
In the example illustrated in Figure 2-28, the remote-access VPN clients are
using the Cisco AnyConnect client; however, clientless SSL VPN is also
supported.
Figure 2-29 illustrates how two Cisco ASAs with FirePOWER modules are
deployed in the headquarters office in New York (ASA 1) and a branch
office in Raleigh, North Carolina (ASA 2), establishing a site-to-site IPsec
VPN tunnel. In addition, ASA 2 in New York is also terminating a site-to-
site IPsec VPN tunnel to a router (R1) of a business partner in Las Vegas.
104
Figure 2-29 Cisco ASA FirePOWER Module in a Site-to-Site IPsec VPN
Scenario
The data center can be a very complex world. It not only provides a rich set
of services and architectures but also hosts the crown jewels of an
organization. It is extremely important to maintain visibility of everything
that is happening in the data center. The concept of “north-to-south” and
“east-to-west” is often used in describing the types of communication (or
flow) within and to the outside of the data center:
105
communication.
The data center architecture consists of three primary modular layers with
hierarchical interdependencies:
Data center foundation: This is the primary building block of the data
center, on which all other services rely. Regardless of the size of the data
center, the foundation must be resilient, scalable, and flexible to support
data center services that add value, performance, and reliability. The data
center foundation provides the computing necessary to support the
applications that process information and the seamless transport between
106
servers, storage, and the end users who access the applications.
User services: These services include email, order processing, and file
sharing or any other applications in the data center that rely on the data
center foundation and services, like database applications, modeling, and
transaction processing.
Figure 2-31 illustrates some of the components of the data center services
architecture.
107
Figure 2-31 The Data Center Services Architecture
Firewalls (In the example illustrated in Figure 2-31, Cisco ASAs with
FirePOWER modules are deployed.)
108
Application delivery features
Note
The Cisco ASAv supports both traditional tiered data center deployments
and the fabric-based deployments of Cisco ACI environments. The Cisco
ASAv can also be deployed in cloud environments like Amazon Web
Services (AWS).
Figure 2-32 shows an example in which four Cisco ASAs with FirePOWER
modules are deployed in two separate sites (site A and site B).
109
Figure 2-32 Cisco ASA FirePOWER Module in a Geographically
Dispersed Data Center
In the example illustrated in Figure 2-32, the cluster of four Cisco ASAs is
fully extended between the two data centers, using the cluster control links
(CCL) operating at Layer 2 with a latency of less than 10 milliseconds. A
single spanned EtherChannel for transient data is used on the cluster side.
The local data links are also configured with EtherChannels at the switch
pairs on each site.
Tip
The data VLANs between the switches are not extended to prevent network
loops.
110
Next-generation intrusion prevention systems (NGIPS)
URL filtering
In the Cisco ASA, you can use FTD in single context mode and in routed or
transparent mode. Multiple context mode is not supported at this writing.
The following are the Cisco ASA 5500-X models that support a reimage to
run the FTD software:
ASA 5506-X
ASA 5506W-X
ASA 5506H-X
ASA 5508-X
ASA 5512-X
ASA 5515-X
ASA 5516-X
ASA 5525-X
ASA 5545-X
ASA 5555-X
To reimage one of the aforementioned Cisco ASA models, you must meet the
following prerequisites:
You must have a Cisco Smart Account. You can create one at Cisco
Software Central (https://software.cisco.com).
You need to review the FTD software version release notes to become
familiar of the supported features, as Cisco continues to add features very
111
regularly.
Add at least a base FTD license to your Smart Account (for example, L-
ASA5516T-BASE=).
You must have access to the console port of the Cisco 5500-X appliance
on which FTD software will be installed, either directly from the computer
being used for installing FTD software or through a terminal server.
Understand that when you reimage and install FTD software on your Cisco
ASA, all previous files and configurations saved on the ASA are lost.
You need to have the required minimum free space (3 GB plus the size of
the boot software) available on the flash (disk0).
You must have access to a TFTP server to host the FTD images.
In Chapter 3, you will learn how to reimage and install the FTD software in
supported Cisco ASA models.
Summary
112
covered, including deploying Cisco ASA FirePOWER Services at the
Internet Edge, in site-to-site and remote-access VPN scenarios, and in the
data center. At the end of the chapter, you learned a few details about the
FTD software and prerequisites prior to installation on a supported Cisco
ASA model.
113
Chapter 3. Configuring Cisco ASA with
FirePOWER Services
This chapter provides step-by-step guidance on how to set up and configure
the Cisco ASA with FirePOWER Services module. The following topics
are covered in this chapter:
Configuring the Cisco ASA FirePOWER services module for the FMC
Figure 3-1 shows an example of how you can physically connect the Cisco
ASA FirePOWER module management interface to be able to reach the
Internet by using the Cisco ASA interface.
114
Figure 3-1 Cisco ASA 5585-X Management Interfaces
Figure 3-1 shows the Cisco ASA 5585-X with a module running Cisco ASA
software and a module running FirePOWER Services. The Cisco ASA
software is managed by using the interface named Management 0/0 in this
example. This interface is configured with the IP address 10.10.1.1. The
Cisco ASA FirePOWER module is managed by using the interface named
Management 1/0, configured with the IP address 10.10.1.2.
You can access the Cisco ASA FirePOWER module command-line interface
(CLI) by using the serial console port or Secure Shell (SSH).
Cisco ASA 5585-X appliances have a dedicated console port for the Cisco
ASA FirePOWER module. You can use a DB-9 to RJ-45 serial cable or a
USB serial adapter to connect to the console.
Note
In all other Cisco ASA models, you connect to the Cisco ASA console and
then you connect by using the backplane to the “module” or solid state drive
(SSD) by using the session sfr command. The Cisco ASA 5506-X, Cisco
ASA 5508-X, and Cisco ASA 5516-X also come with a mini-USB console
115
port that you can use.
You can also connect to the Cisco ASA FirePOWER module by using SSH,
with the default IP address.
Table 3-1 lists all the default parameters and credentials of the Cisco ASA
FirePOWER module.
Installing the Boot Image and Firepower System Software in the Cisco
ASA 5585-X SSP
Note
If you purchased a new Cisco ASA with FirePOWER Services, you do not
need to reimage the system to install upgrade packages.
To install the boot image, you need to transfer the image from a TFTP server
to the Management-0 port on the ASA Firepower SSP by logging in to the
module’s Console port.
116
Tip
The Management-0 port is in the first slot on an SSP. This management port
is also known as Management 1/0; however, it appears as Management-0 or
Management 0/1 in ROMMON.
Figure 3-2 illustrates a topology with a Cisco ASA with a Firepower SSP
and a TFTP server. The Cisco ASA Firepower SSP management interface is
configured with IP address 10.10.1.1 and the TFTP server with 10.10.1.2.
Step 1. Place the boot image and a system software package on the TFTP
server so that they can be accessed by the Cisco ASA FirePOWER module.
Step 4. As the system is booting, break out of the boot process by pressing
Esc (the Escape key on your keyboard). If you see grub start to boot the
system, you are too late, and you have to reboot the system again.
Step 5. From the ROMMON prompt, configure the IP address for the
Firepower SSP, the TFTP server address, the gateway, and the boot image
path and filename. The following example shows the configuration used in
this example:
ADDRESS=10.10.1.1
117
SERVER=10.10.1.2
GATEWAY=10.1.1.2
IMAGE= asasfr-5500x-boot-6.0.0-1005.img
Step 7. Start the download and boot process by using the tftp command.
Note
The boot takes several minutes. When it is finished, you see a login prompt.
Step 8. Log in as admin, with the password Admin123, which is the default
password.
Step 11. Configure the IP address. You can configure a static IPv4 or IPv6
address or use DHCP (for IPv4) or stateless autoconfiguration if you are
configuring IPv6.
Step 12. Identify at least one DNS server and set the domain name and
search domain.
Note
The management address, the gateway, and DNS information are the key
settings to configure. Administrators often forget to set up the DNS server
correctly, and this causes problems later in the configuration.
118
Step 13. Optionally, enable NTP and configure the NTP servers to set the
system time.
Step 14. Install the system software image by using the system install
[noconfirm] url command. Here is an example:
Note
Note
The following sections cover how to perform the initial setup of the Cisco
ASA FirePOWER module in Cisco ASA 5500-X appliances.
Tip
119
Cisco is always adding new models to its next-generation security
appliances. Visit Cisco’s Firepower compatibility guide to obtain the most
recent information:
www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepower-
compatibility.html.
Installing the Boot Image and Firepower System Software in the SSD of
Cisco ASA 5500-X Appliances
As you have already learned in this chapter, if you purchase a new Cisco
ASA 5500-X appliance with the Cisco ASA FirePOWER module, the
module software and required SSDs come preinstalled and ready to
configure. However, you need to install the Cisco ASA Firepower boot
software, partition the SSD, and install the system software if you are
adding a new Cisco ASA FirePOWER software module to an existing Cisco
ASA or if the SSD needs to be replaced.
Tip
The flash (disk0) should have at least 3 GB of free space plus the space
needed for the boot software in order to perform the reimaging process. If
you are running the Cisco ASA in multi-context mode, you need to complete
the reimaging steps in the system execution space. You also need to shut
down any other modules from the Cisco ASA CLI, as shown in Example 3-
1.
The commands in Example 3-1 shut down and uninstall the IPS software
120
module (if installed on the Cisco ASA) and reboot the Cisco ASA. If you
have a Cisco ASA CX module, you can use the same commands except use
the cxsc keyword instead of ips.
Note
If you are just reimaging the Cisco ASA FirePOWER module, use the sw-
module module sfr shutdown and sw-module module sfr uninstall
commands.
Complete the following steps to install the boot image and the Firepower
system software in the SSD of a Cisco ASA 5500-X appliance:
Step 1. Download the Firepower boot image and system software packages
from Cisco.com.
Step 2. Transfer the boot image to the ASA. You can do this by using the
CLI or the ASDM. If you select to install the image by using the ASDM, you
can place the boot image on your workstation and upload it from there or
you can place it on an FTP, TFTP, HTTP, HTTPS, SMB, or SCP server. In
the ASDM, select Tools > File Management and choose the appropriate
file transfer command, either Between Local PC and Flash or Between
Remote Server and Flash. Figure 3-3 illustrates how to transfer the file
between the remote server and flash.
121
Figure 3-3 ASDM File Transfer
If you choose to transfer the file by using the CLI, place the boot image on a
TFTP, FTP, HTTP, or HTTPS server and then use the copy command to
transfer it to the Cisco ASA flash. To transfer the file by using TFTP, enter
the following command:
Step 4. After the boot image is transferred to disk0 (flash), use sw-module
module sfr recover configure image disk0: file to recover the Firepower
module and install the boot image, as demonstrated here:
122
NY-asa# sw-module module sfr recover configure image
disk0:asasfr-5500x-boot-5.4.1-69.img
Step 5. Use the sw-module module sfr recover boot command to load the
Firepower boot image. This takes approximately 5 to 15 minutes.
Step 6. Use the session command to connect to the Firepower module from
the Cisco ASA, as demonstrated in the example that follows. The default
username is admin, and the default password is Admin123:
Note
The session command fails with a message about not being able to connect
over ttyS1 if the module has not completed the boot process.
Step 7. Configure the module so that you can install the system software
package using the setup command, as shown here:
asasfr-boot> setup
123
avoid name resolution problems during setup. You can also set the domain
name and search domain.
Step 8. Install the system software image by using the system install
[noconfirm] url command. You can transfer the file using HTTP, HTTPS, or
FTP. The following example demonstrates how to install the system
software image by using HTTP:
Upgrading
Starting upgrade process ...
Populating new system image
When the Firepower module reboots and you use the session command to
access the module, you see a different login prompt, as shown in Example
3-2.
124
Click here to view code image
When the Cisco ASA is booted with no configuration, it offers a setup menu
that enables you to assign the initial parameters, such as the device name
and an address for the management interface. You can choose to go through
the initial setup menu for quick configuration. Example 3-3 shows the boot
process (console output) for an ASA 5508.
125
Last reset cause: PowerCycleRequest
DIMM Slot 0 : Present
DIMM Slot 1 : Present
Boot in 10 seconds.
Located '.boot_string' @ cluster 840607.
#
Attempt autoboot: "boot disk0:/asa951-lfbff-k8.SPA"
######################################################################
#####################################################################
#####################################################################
#####################################################################
#####################################################################
#####################################################################
#####################################################################
#####################################################################
####################################################################
126
/dev/sdb1: 120 files, 838432/1918808 clusters
dosfsck(/dev/sdb1) returned 0
Processor memory 3754858905
127
Botnet Traffic Filter : Disabled perpetual
Cluster : Disabled perpetual
VPN Load Balancing : Enabled perpetual
****************************** Warning
*******************************
This product contains cryptographic features and is
subject to United States and local country laws
governing, import, export, transfer, and use.
Delivery of Cisco cryptographic products does not
imply third-party authority to import, export,
distribute, or use encryption. Importers, exporters,
distributors and users are responsible for compliance
with U.S. and local country laws. By using this
product you agree to comply with applicable laws and
regulations. If you are unable to comply with U.S.
and local laws, return the enclosed items immediately.
libgcc, version 4.8.1, Copyright (C) 2007 Free Software Foundation, Inc.
libgcc comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it under the
General
Public License v.3 (http://www.gnu.org/licenses/gpl-3.0.html)
See User Manual (''Licensing'') for details.
128
Inc.
libstdc++ comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it under the
General
Public License v.2 (http://www.gnu.org/licenses/gpl-2.0.html)
See User Manual (''Licensing'') for details.
Mdadm tools, version 3.2.6, Copyright (C) 1989, 1991 Free Software
Foundation, Inc.
Copyright (C) 2002-2009 Neil Brown <[email protected]>
mdadm comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it under the
General
Public License v.2 (http://www.gnu.org/licenses/gpl-2.0.html)
See User Manual (''Licensing'') for details.
129
INFO: Power-On Self-Test complete.
In the first highlighted line in Example 3-3, the Cisco ASA starts loading the
Cisco ASA software image and then verifies the activation key (license
key), as you can see in the other highlighted lines. Then it lists all the open
source licenses used in the software and performs system health checks. At
the end of the boot process you get a prompt, which by default is ciscoasa>;
this prompt changes, however, after you change the device hostname.
In Example 3-4, the Cisco ASA prompts you to specify whether you wish to
go through the interactive menu to preconfigure the device. If you type no,
the interactive menu is not shown, and the Cisco ASA shows the ciscoasa>
prompt. If you type yes, the default option, the Cisco ASA walks you
through the configuration of a number of parameters.
The Cisco ASA shows the default values in brackets ([]) before prompting
you to accept or change them. To accept the default input, press Enter. After
you go through the initial setup menu, the Cisco ASA displays the summary
of the new configuration before prompting you to accept or reject it.
130
Month [Jul]: Jan
Day [6]:6
Time [01:08:57]: 21:27:00
Management IP address: 192.168.1.1
Management network mask: 255.255.255.0
Host name: NY-1
Domain name: securemeinc.org
IP address of host running Device Manager: 192.168.1.88
You can assign the initial parameters and features by using either CLI
commands or the ASDM.
Tip
You can rerun the interactive setup process by using the setup command in
configuration mode.
Before you access the ASDM graphical console, you must install the ASDM
software image on the local flash of the Cisco ASA if it is not present
already. The ASDM interface only manages a local Cisco ASA. Therefore,
131
if you need to manage multiple Cisco ASAs, you must install the ASDM
software on all the Cisco ASAs. However, a single workstation can launch
multiple instances of ASDM to manage more than one appliance.
Uploading ASDM
You can use the dir command to determine whether the ASDM software is
installed. If the Cisco ASA does not have an ASDM image, your first step is
to upload an image from an external file server, using one of the supported
protocols. The appliance needs to be set up for basic configuration,
including the following:
Image IP addresses
After you set up basic information, use the copy command to transfer the
image file, as shown in Example 3-5, where an ASDM file, named asdm-
751.bin, is being copied from a TFTP server located at 172.18.82.10. Verify
the content of the local flash after the file is successfully uploaded.
Accessing tftp://172.18.82.10/asdm-715.bin...!!!!!!!!!!!!!!!!!!
! Output omitted for brevity.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Writing file disk0:/asdm-715.bin...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
132
! Output omitted for brevity.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
22658960 bytes copied in 51.30 secs (420298 bytes/sec)
NY-1# dir
Directory of disk0:/
135 -rwx 22834188 06:18:02 Jan 06 2016 asdm-715.bin
136 -rwx 37767168 06:22:46 Jan 06 2016 asa951-smp-k8.bin
4118732802 bytes total (3955822592 bytes free)
When the ASDM file is accessed, the Cisco ASA loads the first ASDM
image that it finds from the local flash. If multiple ASDM images exist in the
flash, use the asdm image command and specify the location of the ASDM
image you want to load. This ensures that the appliance always loads the
specified image when ASDM is launched. The following commands sets up
the Cisco ASA to use asdm-715.bin as the ASDM image file:
The Cisco ASA uses the Secure Sockets Layer (SSL) protocol to
communicate with the client. Consequently, the Cisco ASA acts as a web
server to process the requests from the clients. You must enable the web
server on the appliance by using the http server enable command.
The Cisco ASA discards the incoming requests until the ASDM client’s IP
address is in the trusted network to access the HTTP engine. To enable the
HTTP engine and set up the appliance to trust the 192.168.1.0/24 network
connected to the management interface, enter the following commands:
133
Note
The SSL VPN implementation on the Cisco ASA requires you to run the
HTTP server on the appliance. Starting with Cisco ASA software version
8.0, you can set up the Cisco ASA to terminate both the SSL VPN and
ASDM sessions on the same interface, using the default port 443. Use
https://<ASAipaddress>/admin to access the GUI for administrative and
management purposes.
You can access the ASDM interface from any workstation whose IP address
is in the trusted network list. Before you establish the secure connection to
the appliance, verify that IP connectivity exists between the workstation and
the Cisco ASA.
134
Figure 3-4 Accessing the ASDM URL
The Cisco ASA presents its self-signed certificate to the workstation so that
a secure connection can be established. If the certificate is accepted, the
Cisco ASA prompts you to present authentication credentials. If the ASDM
authentication or enable password is not set up, there is no default username
or password. If the enable password is defined, there is no default
username, and you must use the enable password as the login password. If
user authentication is enabled on the Cisco ASA through use of the aaa
authentication http console command, then those login credentials must be
provided. After a successful user authentication, the appliance presents two
ways to launch ASDM:
Run Cisco ASDM as a local application: The Cisco ASA offers a setup
utility called asdm-launcher.msi, which can be saved to the workstation’s
local hard drive.
135
Run Cisco ASDM as a Java Web Start application: The Cisco ASA
launches ASDM in the client’s browser as a Java applet. This option is not
feasible if a firewall that filters out Java applets exists between the client
and the Cisco ASA.
Note
Note
When you first launch the ASDM, the Cisco Smart Call Home functionality
may prompt you to enable error and health information reporting either
anonymously or by registering the product. You can choose not to enable if
you are not interested.
If the user authentication is successful, the ASDM checks the current version
of the installer application and downloads a new copy, if necessary. It loads
the current configuration from the Cisco ASA and displays it in the GUI, as
shown in Figure 3-5.
136
Figure 3-5 ASDM Home Screen
After you have established connectivity to the Cisco ASA, by using either
the CLI or the ASDM, you are ready to start configuring the device. The
following section guides you through basic setup of the Cisco ASA.
The default device name (also known as the hostname) of a Cisco ASA is
ciscoasa. It is highly recommended that you set a unique device name to
identify the Cisco ASA on the network. In addition, networking devices
usually belong to a network domain. A domain name appends the
unqualified hostnames with the configured domain name. For example, if the
Cisco ASA tries to reach the host secweb by its hostname and the
configured domain name on the Cisco ASA is securemeinc.org, the fully
qualified domain name (FQDN) of the host is secweb.securemeinc.org.
In a new Cisco ASA, you can configure the Telnet and enable passwords.
137
The Telnet password is used to authenticate remote sessions by using either
the Telnet protocol or SSH. Prior to Cisco ASA software version 9.0(2), the
default Telnet password was cisco. In version 9.0(2) and later, you must
define a Telnet password using the password command. In addition, for an
SSH connection, there is no default username or password in version 8.4(2)
and later. You must configure the aaa authentication ssh console command
to enable AAA authentication.
Example 3-6 shows the configuration you use in the CLI. The hostname is
changed using the hostname command, the domain name is changed using
the domain-name command, and the Telnet and enable passwords are
changed using the password and enable password commands, respectively.
Tip
If you view the configuration after adding the passwords, the Cisco ASA
displays the encrypted passwords as follows:
Configuring an Interface
138
Ethernet, and 10-Gigabit Ethernet interfaces, depending on the platform.
They also include one management interface (Management 0/0) in all one-
rack unit (1 RU) models and two management interfaces (Management 0/0
and Management 0/1) in ASA 5580s and ASA 5585s. In addition, you can
create one or more subinterfaces in each physical interface. The Fast
Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet interfaces are used to
route traffic from one interface to another, based on the configured policies,
whereas the management interface is designed to establish out-of-band
connections.
The Cisco ASA protects the internal network from external threats. Each
interface is assigned a name to designate its role on the network. The most
secure network is typically labeled as the inside network, whereas the least
secure network is designated as the outside network. For semi-trusted
networks, you can define them as demilitarized zones (DMZs) or any logical
interface name. You must use the interface name to set up the configuration
features that are linked to an interface.
The Cisco ASA also uses the concept of assigning security levels to the
interfaces. The higher the security level, the more protected the interface.
Consequently, the security level is used to reflect the level of trust of this
interface with respect to the level of trust of another interface on the Cisco
ASA. The security level can be between 0 and 100. Therefore, the most
trusted network is placed behind the interface with a security level of 100,
whereas the least protected network is placed behind an interface with a
security level of 0. A DMZ interface should be assigned a security level
between 0 and 100.
Note
Cisco ASA enables you to assign the same security level to more than one
interface. If communication is required between the hosts on interfaces at
139
the same security level, use the same-security-traffic permit inter-
interface global configuration command. In addition, if an interface is not
assigned a security level, it does not respond at the network layer.
By default, you do not need to define an access control list (ACL) to permit
traffic from a high security–level interface to a low security–level interface;
however, if you want to restrict traffic flows from a high security–level
interface destined to a low security–level interface, you can define an ACL.
If you configure an ACL for traffic originating from a high security–level
interface to a low security–level interface, it disables the implicit permit
from that interface. All traffic is now subject to the entries defined in that
ACL.
An ACL must explicitly permit traffic traversing the security appliance from
a lower to a higher security–level interface of the firewall. The ACL must
be applied to the lower security–level interface or globally.
Note
140
failover.
The ASDM enables you to configure the speed, duplex, and media type on
an interface by opening the Edit Interface dialog box for the interface and
clicking the Configure Hardware Properties button. By default, the speed
and duplex are set to auto and can be changed to avoid link negotiations. If
the speed and duplex settings do not match the speed and duplex settings on
the other end of the Ethernet connection, you may see packet loss and
experience performance degradation. The media type is either RJ-45 for
copper-based interfaces or SFP for fiber-based interfaces. RJ-45 is the
default media type.
Tip
The Ethernet-based interfaces on the Cisco ASA 5500 Series use the auto-
MDI/MDIX (media-dependent interface/media-dependent interface
crossover) feature, which does not require a crossover cable when
connecting interfaces of two similar types. These interfaces perform an
internal crossover when a straight network cable connects two similar
141
interfaces. This feature works only when both the speed and duplex
parameters are set to auto-negotiate.
Example 3-8 shows the outside interface set up with a connection speed of
1000 Mbps, using full-duplex mode.
The Cisco ASA shows the output of interface-related statistics when you
issue the show interface command from the CLI. Example 3-9 shows
GigabitEthernet0/0 set up as the outside interface and has an IP address of
209.165.200.225 and GigabitEthernet0/1 set up as the inside interface with
an IP address of 192.168.10.1. This command also shows the packet rate
and the total number of packets entering and leaving the interface.
142
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collisions, 0 deferred
0 lost carrier, 0 no carrier
input queue (curr/max packets): hardware (0/1) software (0/11)
output queue (curr/max packets): hardware (0/19) software (0/1)
Traffic Statistics for "outside":
70081 packets input, 23044675 bytes
13540 packets output, 6992176 bytes
49550 packets dropped
1 minute input rate 1 pkts/sec, 362 bytes/sec
1 minute output rate 1 pkts/sec, 362 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 1 pkts/sec, 342 bytes/sec
5 minute output rate 1 pkts/sec, 362 bytes/sec
5 minute drop rate, 0 pkts/sec
Interface GigabitEthernet0/1 "inside", is up, line protocol is up
Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec
Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)
MAC address 000f.f775.4b55, MTU 1500
IP address 192.168.10.1, subnet mask 255.255.255.0
1447094 packets input, 152644956 bytes, 0 no buffer
Received 1203884 broadcasts, 0 runts, 0 giants
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
20425 L2 decode drops
332526 packets output, 151244141 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collisions, 0 deferred
0 lost carrier, 0 no carrier
input queue (curr/max packets): hardware (0/1) software (0/14)
output queue (curr/max packets): hardware (0/26) software (0/1)
Traffic Statistics for "inside":
777980 packets input, 80481496 bytes
151736 packets output, 85309705 bytes
395607 packets dropped
1 minute input rate 0 pkts/sec, 58 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 0 pkts/sec, 66 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
143
Configuring the Cisco ASA to Redirect Traffic to the Cisco
ASA FirePOWER Module
As you learned in Chapter 2, you can configure the Cisco ASA FirePOWER
module in inline mode or in monitor-only mode. Follow these steps to
configure the Cisco ASA to redirect traffic to the Cisco ASA FirePOWER
module in inline mode or monitor-only mode:
Note
Step 3. Click the Add button to add a new service policy rule. The screen
shown in Figure 3-6 appears.
144
Figure 3-6 Adding a New Service Policy
Step 5. After you click Next, the screen shown in Figure 3-7 appears.
145
Figure 3-7 Adding the New Traffic Class
Step 6. Enter the name of the new traffic class (for example, firePOWER-
class).
Step 8. Optionally specify criteria for the traffic that will be matched and
sent to the Cisco ASA FirePOWER module or use the default class (class-
default). In this example, the class will match all traffic because the Any
traffic checkbox is checked under the Traffic Match Criteria field.
Step 9. Click Next. The Rule Actions page shown in Figure 3-8 appears.
146
Figure 3-8 The Rule Actions Page
Step 10. Navigate to the ASA Firepower Inspection tab and check the
Enable ASA Firepower for this traffic flow checkbox, as shown in Figure
3-8.
Step 11. Optionally configure the Cisco ASA to pass traffic if the Cisco
ASA FirePOWER module fails (this is referred to as “fail open”) or
configure the Cisco ASA to stop all traffic (or “fail close”). In Figure 3-8,
the Cisco ASA is configured to fail open because the Permit traffic option
is selected in the If ASA Firepower Card Fails area.
Step 12. Optionally check Enable Monitor Only to send a read-only copy
of traffic to the module. This is also referred to as “inline tap mode.” (By
default, the Cisco ASA sends all traffic to the Cisco ASA FirePOWER
module in inline mode.) In Figure 3-8, the Cisco ASA is configured to send
all traffic to the Cisco ASA FirePOWER module, and the module is
configure in inline mode.
Step 13. Click Finish. The new service policy is shown on the Service
147
Policy Rules page in ASDM, as shown in Figure 3-9.
148
Figure 3-9 The New firePOWER-class Traffic Class
Example 3-10 shows the command-line interface (CLI) commands that were
applied on the Cisco ASA by ASDM.
149
sfr fail-open
!
! Applying the policy map to the service policy
service-policy global_policy global
You can register the Cisco ASA FirePOWER module to the Firepower
Management Center (FMC). Chapter 12, “Reporting and Troubleshooting
with Cisco Next-Generation IPS,” covers the FMC in detail. Complete the
following steps to register the Cisco ASA FirePOWER module to the FMC:
In this example, the IP address of the FMC is 192.168.1.89. You can also
use the DNS hostname or an IPv6 address (if IPv6 is enabled in your
network). If the FMC is not directly addressable, use the DONTRESOLVE
keyword. In this example, the registration key is thisISaRegKey. The
registration key is a unique alphanumeric registration key required to
register a Cisco ASA FirePOWER module to the FMC. You can also enter
an optional alphanumeric string (nat_id) that is used during the registration
process between the FMC and the ASA FirePOWER module. This is
required if the DONTRESOLVE keyword is used. In deployments where
Network Address Translation (NAT) is configured, you must provide a
hostname or an IP address either when you are configuring remote
management or when you are adding the managed appliance. A self-
generated alphanumeric registration key up to 37 characters in length
identifies the connection. You can configure an optional unique
alphanumeric NAT ID (nat_id) that can help the FMC establish
communications in a NAT environment. The NAT ID must be unique among
all NAT IDs used to register managed appliances.
150
Step 3. Type exit to exit the configuration mode.
You can use the ASDM to configure the Cisco ASA FirePOWER module in
only certain platforms, including the Cisco ASA 5506-X, 5506H-X,
5506W-X, 5508-X, and 5516-X appliances.
Note
To view the access control policies that are applied in the Cisco ASA
FirePOWER module, navigate to Configuration > ASA FirePOWER
Configuration > Policies > Access Control Policy, as shown in Figure 3-
10.
151
Figure 3-10 Firepower Access Control Policy
Follow these steps to create a new access control policy in the Cisco ASA
FirePOWER module:
Step 1. Click the New Policy button. The dialog shown in Figure 3-11
appears.
152
Figure 3-11 Creating a New Access Control Policy
Step 2. Enter a name for the new access policy. In this example, the name of
the new policy is myPolicy.
153
Figure 3-12 Default Action Dropdown Menu Options
You can also copy an existing policy from this ASA FirePOWER module or
import a policy from another ASA FirePOWER module.
You can more granularly control network traffic by adding rules to an access
control policy. The rules within an access control policy are organized
using a numbering scheme starting at 1. The Firepower system matches
traffic to access control rules by ascending rule number. Typically, the
Firepower system process network traffic according to the first access
control rule, where all the rule’s conditions match the traffic. These
154
conditions include the following:
Security zone
Ports
Applications
Requested URLs
Users
To add a rule, click the Add Rule button, and the screen shown in Figure 3-
13 appears.
155
Figure 3-13 Adding a New Rule
Each rule also has an action that determines whether you monitor, trust,
block, or allow matching traffic. When you allow traffic, you can specify
that the system first inspect it with intrusion or file policies to block any
exploits, malware, or prohibited files before they reach your assets or exit
your network. On the other hand, after the system trusts or blocks traffic, it
does not perform further inspection. Figure 3-14 shows the Action
dropdown menu options.
156
Figure 3-14 Action Dropdown Menu Options
To configure rules based on security zones, navigate to the Zones tab. You
can also configure rule conditions to match network or geographical
locations. Figure 3-15 shows how to configure a rule condition based on
geographical location of the source and destination networks. For instance,
you can block or allow traffic that is sourced or destined to a given
geographical location. In Figure 3-15, the source networks are based in
North America (geolocation), and the destination networks are in Asia.
157
first access control rule where all the rule’s conditions match the traffic.
Some of the filtering capabilities may rely on Layer 7 (application)
information, where the actual flow of the application may not be determined
until a few packets are analyzed in the communication between two or more
hosts. Conditions can be simple or complex; you can control traffic by
security zone, network or geographical location, port, application, requested
URL, and user.
You can also create rules based on the type and the risk of the application.
Figure 3-16 shows how to create a rule based on application conditions, on
the Applications tab.
Figure 3-17 shows how to use the Ports tab to create a rule based on given
application ports. You can select predefined ports/applications such as FTP,
Bittorrent, DNS over TCP or UDP, and so on.
158
Figure 3-17 Rules Based on Ports
You can also create rules that match known URLs to sites known to be
hosting pornography, drug content, dating sites, and many other categories.
The URL filtering license is required in order to configure and enable rules
based on URLs. Figure 3-18 shows how to use the URLs tab to configure a
rule based on URL categories.
Security Intelligence
159
latest reputation intelligence from Cisco Talos. You can configure access
control policies with whitelists and blacklists, based on Cisco Talos
Security Intelligence by navigating to the Security Intelligence tab under a
given access policy, as shown in Figure 3-19.
160
Figure 3-19 Security Intelligence Tab
HTTP Responses
You can customize a web page for blocked URLs. When the system blocks a
given HTTP web request, you can customize what the user sees in a web
browser depending on how the session is blocked. For example, you can
select Block or Block with reset to deny the connection. A blocked session
times out; the system resets Block with reset connections. On the other hand,
for both blocking actions, you can override the default browser or server
page with a custom page that explains that the connection was denied. The
Cisco ASA Firepower system calls this custom page an HTTP response
page.
You can edit the block response page by navigating to the HTTP Responses
161
tab under the access control policy, as shown in Figure 3-20.
162
Figure 3-20 Customizing Block Response Pages
If you set the Cisco ASA FirePOWER module action to Interactive Block
or Interactive Block with reset, you can configure an interactive HTTP
response page that warns users but also allows them to click a button to
continue or refresh the page to load the originally requested site. Users may
have to refresh after bypassing the response page to load page elements that
did not load. You can either display a generic system-provided response
page or enter custom HTML, as shown in Figure 3-21.
163
Figure 3-21 Customizing Interactive Block Response Pages
General Settings: You can customize the number of characters you store
in the Cisco ASA FirePOWER module database for each URL requested by
users.
Network Analysis and Intrusion Policies: You can change the access
control policy’s default intrusion policy and associated variable set, which
are used to initially inspect traffic before the system can determine exactly
how to inspect that traffic. You can also change the access control policy’s
default network analysis policy, which administers many preprocessing
options. In addition, you can use custom network analysis rules and network
analysis policies to tailor preprocessing options to specific security zones
164
and networks.
File and Malware Settings: You can set performance options for file
control, file storage, and advanced malware protection.
165
Figure 3-22 Access Control Rules Advanced Settings
166
Figure 3-23 Creating a New Intrusion Policy
You must provide a name for the new intrusion policy, specify a base policy,
and specify drop behavior.
The Drop when Inline setting defines how the Firepower module handles
drop rules (intrusion or preprocessor rules whose rule state is set to Drop
and Generate Events) and other intrusion policy configurations that affect
traffic. You should enable drop behavior in inline deployments when you
want to drop or replace malicious packets.
Note
The base policy sets the intrusion policy’s default settings. You can use
either a system-provided or custom policy as your base policy. Figure 3-23
167
shows the Base Policy dropdown menu options.
168
Figure 3-24 Editing an Intrusion Policy
To customize how rules are displayed in the intrusion policy or sort rules by
several criteria, click Manage Rules to display the screen shown in Figure
3-25.
169
Figure 3-25 Managing Rules Under an Intrusion Policy
In the page shown in Figure 3-25, you can also display the details for a
specific rule to see rule settings, rule documentation, and other rule settings.
This page has four key categories:
Filtering features
Rules listing
Rule details
Note
The column headers relate to the menus in the menu bar, where you access
those configuration items.
170
Custom Rules
You can create custom rules or edit or clone existing ones by navigating to
Configuration > ASA FirePOWER Configuration > Policies > Intrusion
Policy > Rule Editor (see Figure 3-26).
171
Figure 3-26 The Rule Editor
To modify an existing rule, click the pencil icon next to the specific rule.
You can also import rules from another system by clicking the Import Rules
button to display the screen shown in Figure 3-27.
172
Figure 3-27 Importing Rules
Tip
Rule updates are cumulative, and Cisco recommends that you always import
the latest update. You cannot import a rule update that either matches or
predates the version of the currently installed rules. Rule updates may
contain new binaries, so make sure your process for downloading and
installing them complies with your security policies. In addition, rule
updates may be large, so import rules during periods of low network use.
If you are an advanced user, you can create a new rule by clicking Create
Rule in the main rule editor page (refer to Figure 3-26). The screen shown
173
in Figure 3-28 appears.
174
Figure 3-28 Creating a Custom Rule
When creating a custom standard text rule, you set the rule header settings
and the rule keywords and arguments. After you create a custom rule, you
can search for it by using the rule number. The format of the rule number is
as follows:
GID:SID:Rev
The rule number for all standard text rules starts with 1. The second part of
the rule number, the Snort ID (SID), indicates whether the rule is a local
rule or a rule provided by Cisco. Snort IDs for custom rules start at
1,000,000, and the SID for each new local rule is incremented by 1. The last
part of the rule number is the revision number. Each time you edit a custom
rule, the revision number increments by 1.
You enter the message you want displayed with the event in the Message
field. The Classification dropdown menu allows you to select a
classification to describe the type of event. Figure 3-29 shows examples of
the options available in the Classification dropdown menu.
175
Figure 3-29 Event Type Classification
The Action list allows you to define the type of rule you are creating (alert
to create an alert or pass to create a rule that ignores traffic that triggers the
rule). You can select from the Protocol dropdown menu the traffic protocol
(tcp, udp, icmp, or ip) of packets you want the rule to inspect.
The Direction dropdown menu allows you to select the operator that
indicates which direction of traffic you want to trigger the rule.
You can also define the source and destination IP addresses and ports that
should trigger the rule. Select Directional under the Direction dropdown
menu to match traffic that moves from the source IP address to the
destination IP address. Select Bidirectional to match traffic that moves in
either direction.
You can select the detection options under the Detection Options
dropdown menu and click the Add Option button. Figure 3-30 shows
examples of the different detection options available.
176
Figure 3-30 New Rule Detection Option
177
Figure 3-31 Creating a New File Policy
Enter the name of the new file policy and a description and then click the
Store ASA FirePOWER Changes button. The screen shown in Figure 3-32
appears.
178
Figure 3-32 The New File Policy
The policy has two access control rules, both of which use the Allow action
and are associated with file policies. The policy’s default action is also to
allow traffic, but without file policy inspection. A file policy, like its parent
access control policy, contains rules that determine how the system handles
files that match the conditions of each rule. You can configure file rules to
take different actions for different file types, application protocols, or
directions of transfer. To add a new file rule, click the Add File Rule button.
The Add File Rule screen shown in Figure 3-33 appears.
179
Figure 3-33 Adding a New File Rule
Note
Each file rule has an associated action that determines how the system
handles traffic that matches the conditions of the rule.
You can set separate rules within a file policy to take different actions for
different file types, application protocols, or directions of transfer.
Detect Files: To log the detection of specific file types while still
allowing their transmission
You can select different file type categories in the File Type Categories
180
section and select or search for specific file types under the File Types
section (refer to Figure 3-33). Click the Add button to add file categories
and file types.
The Cisco ASA FirePOWER module allows you to create named objects,
which are reusable configurations that associate a name with a value so that
a named object is used instead. You can configure the following object
types:
Application filters
Ports
URLs
File lists
You can use these objects in various places in the ASA FirePOWER
module, including access control policies, network analysis policies,
intrusion policies and rules, reports, dashboards, and so on. You can
configure these objects by navigating to Configuration > ASA
FirePOWER Configuration > Object Management.
Cisco provides different types of updates for the Cisco ASA FirePOWER
module, including the following:
Major and minor updates to the module software itself (patches, feature
updates, and major updates)
181
Rule updates
Patches include a limited range of fixes and usually change the fourth digit
in the version number (for example, 5.4.2.1). Feature updates are more
comprehensive than patches and generally include new features and usually
change the third digit in the version number (for example, 5.4.3). Major
updates include new features and functionality and may involve large-scale
changes and usually change the first or second digit in the version number
(for example, 5.4 or 5.5).
182
Figure 3-34 Applying Product Updates
Tip
Rule updates may also delete rules, provide new rule categories and default
variables, and modify default variable values.
183
Figure 3-35 Applying Rule Updates
Cisco recommends that you always import the latest update. You can apply
one-time rule updates or set the interval of recurring rule update imports.
Note
Rule updates are cumulative. You cannot import a rule update that either
matches or predates the version of the currently installed rules.
184
Figure 3-36 Applying Geolocation Updates
185
Cisco ASA 5525-X
Note
If you are deploying a Cisco ASA 5506-X, Cisco ASA 5508-X, or Cisco
ASA 5516-X, you must run ROMMON version 1.1.8 or later. You can
transfer the new ROMMON image by using the copy command, as
mentioned previously in this chapter. Once you copy the ROMMON image,
you can use the upgrade rommon disk0: rommon-image command to
upgrade the ROMMON in the system. The Cisco ASA then updates the
ROMMON and reboots the system.
To install the FTD software in a supported Cisco ASA, you use the same
procedure you learned earlier: You first install the boot image in ROMMON
by pressing Esc during the boot process, and then, at the ROMMON prompt,
enter set and configure the following parameters to establish temporary
connectivity to the TFTP server:
186
SERVER: The IP address of the TFTP server.
GATEWAY: The gateway address to the TFTP server. If the TFTP server
is directly attached to Management 1/0, use the IP address of the TFTP
server. If the TFTP server and management address are on the same subnet,
do not configure the gateway, or TFTP boot will fail.
IMAGE: The boot image path and image name on the TFTP server. For
example, if you place the file on the TFTP server in
/tftpboot/images/filename, the IMAGE value is images/ftd-boot-
version.cdisk or ftd-boot-version.lfbff.
After you enter that information, use the sync command to save the settings
and issue the tftpdnld command to initiate the download and boot process.
The OS image should begin downloading through TFTP. When the OS
download is complete, the system automatically boots with the image it just
downloaded and stops at the boot CLI prompt.
After installing the boot image, use the setup command to enter the
management IP address, subnet mask, and gateway and then use the system
install [noconfirm] url command (as discussed earlier) to transfer and
install the FTD software:
After the FTD image is installed, choose Yes when the appliance reboot
option is displayed. The Cisco ASA reboots, and the system prompts you
for a username and password when the reboot is complete. At this point, the
OS and package installation is complete.
The FTD software supports routed and transparent firewall modes, just like
the legacy Cisco ASA software. The default is routed. In transparent mode
you can create up to 250 bridge groups, with 4 interfaces per bridge group.
In devices configured in transparent mode, the diagnostic interface updates
the MAC address table in the same manner as a data interface; therefore,
you should not connect both a diagnostic interface and a data interface to the
187
same switch unless you configure one of the switch ports as a routed port.
Otherwise, if traffic arrives on the diagnostic interface from the physically
connected switch, FTD updates the MAC address table to use the diagnostic
interface, instead of the data interface, to access the switch. This action
causes a temporary traffic interruption; the FTD device does not re-update
the MAC address table for packets from the switch to the data interface for
at least 30 seconds for security reasons.
To change the firewall mode in FTD, you can use the configure firewall
[routed | transparent] command, as demonstrated here:
Management interface
Diagnostic interface
The diagnostic interface only allows management traffic and does not allow
through traffic. You can configure the diagnostic logical interface along with
the rest of the data interfaces in the FMC by navigating to Devices > Device
Management > Interfaces. Using the diagnostic interface is optional. The
188
diagnostic interface and data interfaces can be used to communicate with
external LDAP or RADIUS servers for authentication.
Tip
Cisco recommends that you not configure the diagnostic interface and, in
fact, suggests that you remove the name for this interface if you do not have
an inside router. The major benefit of disabling the diagnostic interface is
that you can place the management interface on the same network as any
other data interfaces. If you leave the diagnostic interface configured, its IP
address must be on the same network as the management IP address, and it
counts as a regular interface that cannot be on the same network as any other
data interfaces. Because the management interface requires Internet access
for updates, putting the management interface on the same network as an
inside interface means you can deploy the FTD device with only a switch on
the inside and point to the inside interface as its gateway.
Each interface must be assigned to a single security zone. This is the same
principle you learned earlier, with Cisco ASA running Firepower Services.
You apply security policy based on zones. For instance, you can configure
your access control policy to enable traffic to go from inside to outside but
not from outside to inside, for example. You can create security zones in the
FMC by navigating to the Objects page.
You can also add a security zone can when you are configuring an interface.
You can only add interfaces to the correct zone type for your interface—
either Passive, Inline, Routed, or Transparent zone types.
Note
189
FTD supports static routes and the following dynamic routing protocols:
OSPF
BGP
RIP
Step 2. Select Static Route from the table of contents and click Add
Routes.
Step 4. Enter or select the Interface to which this static route applies. In
the Available Network list, enter or select the destination network. If you
are adding a default route, create an object with the address 0.0.0.0/0 and
select it there.
Step 6. Enter the number of hops to the destination network in the Metric
field. Valid values range from 1 to 255, and the default value is 1.
190
Note
OSPF, RIP, and BGP routing protocol configuration is very similar to the
legacy Cisco ASA software configuration.
The access policy, IPS, AMP, URL filtering, and other configurations in
FTD are the same as the Firepower software options you learned previously
in this chapter.
Summary
In this chapter you have learned how to configure the Cisco ASA and the
Cisco ASA FirePOWER module. You have seen step-by-step examples of
how to set up the Cisco ASA FirePOWER module in Cisco ASA 5585-X
and in Cisco ASA 5500-X appliances. You have also learned how to
configure the Cisco ASA to redirect traffic to the Cisco ASA FirePOWER
module. The Cisco ASA FirePOWER module can be managed and
configured with the FMC. In addition, you have learned how to configure
the Cisco ASA FirePOWER module for the FMC. The Cisco ASA
FirePOWER module can be configured using ASDM in certain platforms
only—the Cisco ASA 5506-X, 5506H-X, 5506W-X, 5508-X, and 5516-X
appliances. In this chapter you have learned how to configure the Cisco
ASA FirePOWER module using the ASDM in the supported platforms. You
have learned how to configure access control, intrusion and file policies,
and custom rules. In addition, you have learned how to configure reusable
objects to ease configuration tasks. You have also learned how to apply
product updates and how to import and schedule rule and geolocation
database updates. Finally, you have gotten an overview of how to install the
FTD software on a Cisco ASA as well as how to configure interfaces,
security zones, and dynamic routing.
191
Chapter 4. Troubleshooting Cisco ASA with
FirePOWER Services and Firepower Threat
Defense (FTD)
This chapter provides step-by-step guidance on how to troubleshoot
common problems you may encounter when deploying the Cisco ASA with
FirePOWER Services module and the Firepower Threat Defense software.
The following topics are covered in this chapter:
If you are running the Cisco ASA with FirePOWER Services module,
connect to the module using the session command. Alternatively, you can
connect directly to the module management interface using secure shell
(SSH). Once you are in the module, to get an overview of all the show
commands that are available, log in to the command-line interface (CLI) of
192
the Cisco ASA with FirePOWER Services module and enter the show
command as demonstrated in Example 4-1.
193
logout Logout of the current CLI session
managers Show managing Defense Centers
memory Show available memory
model Show model
netstat Show network connections
network Show configuration of management interface
network-static-routes Show static routes for management interfaces
ntp Show NTP configuration
perfstats Shoperfstats
process-tree Show processes in tree format
processes Show processes
route Show configured routes
serial-number Show serial number
show Change to Show Mode
summary Show summary
system Change to System Mode
time Show time
traffic-statistics Show traffic statistics
user Show specified users
users Show all users
version Show versions
The following sections cover some of the most useful show commands and
when to use them.
194
Click here to view code image
195
Name : Phishing (Feed)
Zone : any
! The following two main categories (admin_category and root_category)
are default
built-in rules
======[ Category: admin_category (Built-in) ]=======
=====[ Category: standard_category (Built-in) ]=====
------------------[ Rule: rule1 ]-------------------
Action : Block
Source Zones : myNewZone
Destination Zones : myNewZone
Logging Configuration
DC : Disabled
Beginning : Disabled
End : Disabled
Files : Disabled
Rule Hits :0
=======[ Category: root_category (Built-in) ]=======
===============[ Advanced Settings ]================
General Settings
Maximum URL Length : 1024
Interactive Block Bypass Timeout : 600
Network Analysis and Intrusion Policies
Initial Intrusion Policy : Balanced Severity and Connectivity
Initial Variable Set : Default Set
Default Network Analysis Policy : Balanced Security and Connectivity
Files and Malware Settings
File Type Inspect Limit : 1460
Cloud Lookup Timeout :2
Minimum File Capture Size : 6144
Maximum File Capture Size : 1048576
Min Dynamic Analysis Size : 15360
Max Dynamic Analysis Size : 2097152
Malware Detection Limit : 10485760
Transport/Network Layer Preprocessor Settings
Detection Settings
Ignore VLAN Tracking Connections : False
Maximum Active Responses : No Maximum
Minimum Response Seconds : No Minimum
Session Termination Log Threshold : 1048576
196
Detection Enhancement Settings
Adaptive Profile : Disabled
Performance Settings
Event Queue
Maximum Queued Events :5
Disable Reassembled Content Checks: False
Performance Statistics
Sample time (seconds) : 300
Minimum number of packets : 10000
Summary : False
Log Session/Protocol Distribution : False
Regular Expression Limits
Match Recursion Limit : Default
Match Limit : Default
Rule Processing Configuration
Logged Events :5
Maximum Queued Eve :8
Events Ordered By : Content Length
Latency-Based Performance Settings
Packet Handling
Threshold (microseconds) : 256
Rule Handling
Violations Before Suspending Rule : 3
Threshold (microseconds) : 512
Session Time : 10
! The following is the HTML code for the block response after a website or
web
resource is blocked.
============[ HTTP Block Response HTML ]============
HTTP/1.1 403 Forbidden
Connection: close
Content-Length: 506
Content-Type: text/html; charset=UTF-8
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<title>Access Denied</title>
<style type="text/css">body {margin:0;font-family:verdana,sans-serif;} h1
{margi
197
n:0;padding:12px 25px;background-color:#343434;color:#ddd} p
{margin:12px 25px;}
strong {color:#E0042D;}</style>
</head>
<body>
<h1>Access Denied<1>
<p>
<strong>You are attempting to access a forbidden site.</strong><br/><br/>
Consult your system administrator for details.
</p>
</body>
</html>
=============[ Interactive Block HTML ]=============
HTTP/1.1 200 OK
Connection: close
Content-Length: 869
Content-Type: text/html; charset=UTF-8
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<title>Access Denied</title>
<style type="text/css">body {margin:0;font-family:verdana,sans-serif;} h1
{margi
n:0;padding:12px 25px;background-color:#343434;color:#ddd} p
{margin:12px 25px;}
/head>g {color:#E0042D;}</style>
<body>
<h1>Access Denied</h1>
<p>
<strong>You are attempting to access a forbidden site.</strong><br/><br/>
You may continue to the site by clicking on the button below.<br/>
<em>Note:</em> You must have cookies enabled in your browser to
continue.</br><b
r/>
Consult your system administrator for details.<br/><br/>
<noscript><em>This page uses JavaScript. Your browser either doesn't
support
JavaScript or you have it turned off.<br/>
To continue to the site, please use a Javascript enabled browser.</em>
198
</noscript
>
</p>
</body>
</html>
199
===============[ Proxy Information ]================
State : Disabled
Authentication : Disabled
The show network command displays the system information, including the
module host name, configured domain name, DNS servers, management
port, and default gateway. It also provides the configured IPv4 and IPv6,
netmask, and broadcast addresses. It shows whether the management port is
enabled or disabled, as well as the interface MAC address, configured
MTU size, and other information.
To display the IPv4 and IPv6 routing table, you can use the show route
command, as shown in Example 4-4.
In Example 4-4 you can see that the IPv4 default gateway is set to
192.168.78.1, and the other two routes are the local networks assigned to
the management interface (eth0) and loopback address. In this example,
200
IPv6 is disabled, and you see only locally specific IPv6 information.
To display configured static routes, you can use the show network-static-
routes command.
The show ifconfig command provides similar output to the Linux ifconfig
command, as shown in Example 4-5.
201
The output shown in Example 4-5 is very similar to the output of the
ifconfig command in most Linux operating systems. The highlighted lines
show the network configuration of eth0, which is the management interface.
A better way to display the interface configuration is to use the show
interfaces command, as demonstrated in Example 4-6.
202
---------------------[ tunl0 ]----------------------
----------------------------------------------------
You can run out of disk space on the Firepower Management Center, the
Firepower appliances, or the Cisco ASA FirePOWER Services module for
many different reasons. When this happens, the high disk utilization may
trigger a health alert or the system may fail a software update attempt.
Storing large volumes of old backup files on the system can take excessive
space on your disk. In order to correct this, delete the old backup files using
the web management interface under System > Tools > Backup/Restore.
Note
203
As a best practice, you can configure remote storage to store large backup
files.
The system may also run out of space if you always keep the previous
software update, upgrade, and patch files. To correct this, delete the older
update and patch files that are no longer necessary under System >
Updates.
The root (/) partition is a fixed size and is not intended for personal storage.
If the root (/) partition is full, you should check for unnecessary files in the
/root, /home, and /tmp folders. Because these folders are not meant for
personal storage, you can delete any personal files in them by using the rm
command.
In ASDM, you can monitor the disk usage by navigating to Monitoring >
ASA FirePOWER Monitoring > Statistics, as shown in Figure 4-1.
204
Figure 4-1 ASDM FirePOWER Monitoring Statistics
In ASDM, you can display and analyze all running processes much the way
you display process information in Linux: just navigate to Monitoring >
ASA FirePOWER Monitoring > Statistics, as shown in Figure 4-1. You
can obtain similar output by using the show processes command in the CLI,
as shown in Example 4-8.
205
4281 root 20 0 9388 952 700 S 4 0.0 269:27.89 UEChanneld
25195 sfsnort 1 -19 1042m 402m 20m S 4 11.6 15:03.18 snort
4323 root 0 -20 0 0 0 S 2 0.0 254:39.37 kvm_ivshmem_rxt
24135 admin 20 0 17376 1364 984 R 2 0.0 0:00.01 top
25194 sfsnort 1 -19 970m 387m 13m S 2 11 17:52.33 snort
1 root 20 0 4168 640 588 S 0 0.0 0:07.31 init
2 root 20 0 0 0 0 S 0 0.0 0:00.00 kthreadd
3 root RT 0 0 0 0 S 0 0.0 0:00.06 migration/0
4 root 20 0 0 0 0 S 0 0.0 0:.54 ksoftirqd/0
5 root RT 0 0 0 0 S 0 0.0 0:00.03 migration/1
6 root 20 0 0 0 0 S 0 0.0 0:12.69 ksoftirqd/1
7 root RT 0 0 0 0 S 0 0.0 0:00.06 migration/2
8 root 20 0 0 0 0 S 0.0 0:05.53 ksoftirqd/2
9 root RT 0 0 0 0 S 0 0.0 0:09.59 migration/3
10 root 20 0 0 0 0 S 0 0.0 0:15.40 ksoftirqd/3
11 root RT 0 0 0 0 S 0 0.0 0:11.04 migration/4
12 root 20 0 0 0 0 0 0.0 0:18.08 ksoftirqd/4
13 root RT 0 0 0 0 S 0 0.0 0:12.15 migration/5
14 root 20 0 0 0 0 S 0 0.0 0:19.53 ksoftirqd/5
<output omitted for brevity>
The show process command output shown in Example 4-8 is very similar to
the output of the ps command in Linux. Understanding what processes are
running on your system and what they are doing is important. You need to
know which processes are using the most memory and which ones are using
the most CPU. You also need to know how to find a particular process. A
key process is the snort process (highlighted in Example 4-8), which is the
IPS engine of the system.
You can also use the show process-tree command to show the processes in
a tree format that indicates which processes are dependent of each other, as
shown in Example 4-9.
206
init(1)-+-agetty(4199)
|-agetty(4200)
|-agetty(4201)
|-crond(2661)
|-klogd(2651)
|-login(20653)---clish(20656)-+-sh(24269)-+-more(24271)
| | '-pstree(24270)
| '-{clish}(20659)
|-nscd(14774)-+-{nscd}(14777)
| |-{nscd}(14778)
| |-{nscd}(14779)
| |-{nscd}(14780)
| |-{nscd(14781)
| '-{nscd}(14782)
|-pm(4214)-+-ASAConfig.pl(4269)
| |-ActionQueueScra(4277)
| |-CloudAgent(4289)-+-{CloudAgent}(4316)
| | |-{CloudAgent}(4317)
| | |-{CloudAgent}(4318)
| | '-{CloudAgent}(4319)
| |-Pruner.pl(4276)
| |-SFDataCorrelato(4272)-+-{SFDataCorrelato}(4375)
| | |-{SFDataCorrelato}(4376)
| | |-{SFDataCorrelato}(4377)
| | |-{SFDataCorrelato}(4380)
| | |-{SFDataCorrelato}(4382)
| | |-{SFDataCorrelato}(4384)
| | |-{SFDataCorrelato}(4387)
| | |-{SFDataCorrelato}(4469)
| | |-{SFDataCorrelato}(4470)
<output omitted for brevity>
The output shown in Example 4-9 is very similar to the output of the pstree
command in Linux. Example 4-9 shows running processes as a tree so that
you can see what processes are related to each other.
The syslog is one of the most useful tools for troubleshooting problems you
207
might encounter in the Cisco ASA FirePOWER module. You can view the
syslog in ASDM by navigating to Monitoring > ASA FirePOWER
Monitoring > Syslog, as shown in Figure 4-2.
208
Figure 4-2 ASDM FirePOWER Syslog
You can also view real-time event information of all functions of the Cisco
ASA FirePOWER module by navigating to Monitoring > ASA
FirePOWER Monitoring > Real Time Eventing, as shown in Figure 4-3.
You can see all ASA FirePOWER events by selecting the All ASA
FirePOWER Events tab, as shown in Figure 4-3. You can also see events
related to connections passing through the module, intrusion, file inspection,
or malware file events and security intelligence events by selecting the
corresponding tabs. This screen also allows you to filter by many different
criteria.
209
Figure 4-3 ASDM FirePOWER Real Time Eventing
You can access very detailed logs by using the expert command to go into
the “expert” mode. This command brings you to a Linux prompt, as shown in
Example 4-10.
Show> expert
admin@RTP-SF:~$ cd /
admin@RTP-SF:/$ ls
DBCheck.log boot dyn-preproc-upgrade-log lib mnt sbin upgraded
Volume cisco etc lib64 proc sys usr
Bin dev home lost+found root tmp var
While in expert mode, you can access many logs by changing directories to
210
/var/log/, as shown in Example 4-11.
admin@RTP-SF:~$ cd /var/log
admin@RTP-SF:/var/log$ ls
SMART_STATUS_sda_20160119050740.txt
action_queue.log
action_queue.log.1.gz
action_queue.log.2.gz
action_queue.log.3.gz
action_queue.log.4.gz
asacx_init.log
audit
btmp
cisco
configure-model.log
configure.log
configure.log.old
cron
cron.1.gz
cron.2.gz
cron.3.gz
cron.4.gz
diskmanager.log
dmesg
eth0.down.log
eth0.down.log.old
th0.up.log.old
faillog
firesight-query.log
firesight-query.log.1.gz
firesight-query.log.2.gz
firesight-query.log.3.gz
firesight-query.log.4.gz
firstboot.S01reset_failopen_if
firstboot.S03install-math-pari.sh
211
firstboot.S04fix-httpd.sh
firstboot.S05set-mgmnt-port
firstboot.6addusers
firstboot.S07uuid-init
firstboot.S09configure_mysql
firstboot.S10database
firstboot.S10database.15vulndb-init.log
firstboot.S12install_infodb
firstboot.S15set-locale.sh
<output omitted for brevity>
You can view each log by using the cat command. For example, to view the
scheduled tasks log, you can use the cat schedule_tasks.log command, as
shown in Example 4-12.
Instead of using the cat command, you can use the tail command, which is
basically the same as the Linux tail command. To view new log lines as they
are generated, you can use the tail -f command.
212
sf/lib/perl/5.10.1/SF/ScheduleTask/UpdateSRU.pm line 47.
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]: Task 2 was validated
successfully.
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]: Executing task ..
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]: RUN UpdateSRU
task...
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]: ---------------
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]:
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]:
https://support.sourcefire.com/
auto-upde/auto-dl.cgi/72:18:8B:9D:AD:79:C0/
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]:
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]:
https://support.sourcefire.com/
auto-update/auto-dl.cgi/72:18:8B:9D:AD:79:C0/GetCurrent/sf.xml--------
----------
Jan 17 09:00:03 RTP-SF schedule_wpper.pl[2879]:
Jan 17 09:00:03 RTP-SF schedule_wrapper.pl[2879]:
Jan 17 09:00:05 RTP-SF schedule_wrapper.pl[2879]: We have
SF::System::Md5Sum
--a8ebe509a002cbe7f26a3879eb553d85 ./Sourcefire_Rule_Update-
2016-01-13-002-vrt.
sh.
Jan 17 09:00:16 RTP-SF schedule_wrapper.pl[2879]: CaughSFSystem
Exception!
Jan 17 09:00:16 RTP-SF schedule_wrapper.pl[2879]: System
(/usr/local/sf/bin/
install_rule.pl /var/sf/SRU/Sourcefire_Rule_Update-2016-01-13-002-
vrt.sh) Failed
at /usr/local/sf/lib/perl/5.10.1/SF/System/Privileged.pm line 2636.
Jan 17 09:00:16 RTP-SF schedule_wrapr.pl[2879]:
Jan 17 09:00:16 RTP-SF schedule_wrapper.pl[2879]: Request stdout!
Jan 17 09:00:16 RTP-SF schedule_wrapper.pl[2879]: The package is
/var/sf/SRU//var/
sf/SRU/Sourcefire_Rule_Update-2016-01-13-002-vrt.sh
Jan 17 09:00:16 RTP-SF schedule_wrapper.pl[2879]: Verifying archive
egrity... All
good.
<output omitted for brevity>
213
Monitoring and Troubleshooting System Tasks
214
Figure 4-4 ASDM FirePOWER Task Status
215
SNT - Snort Performance and Configuration
PER - Hardware Performance and Logs
SYS - System Configuration, Policy, and Logs
DES - Detection Configuration, Policy, and Logs
NET - Interface and Network Related Data
VDB - Discovery,wareness, VDB Data, and Logs
UPG - Upgrade Data and Logs
DBO - All Database Data
LOG - All Log Data
NMP - Network Map Information
Example 4-14 demonstrates the use of the all keyword to generate logs for
all the aforementioned options.
After the command finishes and stores all the logs, you can then transfer the
archive to your local machine or to an admin server using secure copy
(SCP), as shown in Example 4-15.
216
System> system file secure-copy omar.cisco.com omar dest_dir
/var/common/
results-01-22-2016--184950.tar.gz
The authenticity of host 'omar.cisco.com (172.18.104.139)' can't be
established.
ECDSA key fingerprint is
9b:f1:b2:62:04:65:be:29:94:af:09:9a:04:50:2c:0a.
Are you sure you want to continue connecting (yes/no)? yes
[email protected]'s password:*******************
copy successful.
217
Figure 4-5 Generating Troubleshooting Files in ASDM
Sometimes you may run into trouble when trying to determine what access
control rule is blocking or allowing traffic. The restricted shell in the
Firepower software provides a utility that can help you determine the status
of each flow as the system receives packets in real time. You can invoke this
utility by using the system support firewall-engine-debug command, which
prompts you to enter the following information:
Client IP
Client port
Server IP
Server port
218
Example 4-16 system support firewall-engine-debug Command Output
The Cisco ASA drops packets if they are not compliant with the enterprise’s
configured security policy or if something is wrong in the system. These
drops could be related to the deny statements in the ACLs, illegitimate VPN
packets, a malformed TCP segment, or a packet with invalid header
information. In some cases, you will want to get the statistical information
about the packets or connections dropped by the security appliance within
its accelerated security path (ASP). You can use the show asp drop ASA
command to view the reasons that a packet was dropped, as shown in
Example 4-17.
219
Example 4-17 show asp drop Command Output
The highlighted lines in Example 4-17 shows that the frame was dropped
because there was no route to the destination. In this case, it was because
the egress interface was down.
A few debugging commands in the Cisco ASA are useful when you’re
troubleshooting problems with the module. The following are the most
popular ones:
debug sfr error: Used to display errors related to the Cisco ASA
FirePOWER module
debug sfr event: Used to display general events related to the Cisco ASA
FirePOWER module
Example 4-18 shows the output of the debug sfr event command.
220
debug sfr event enabled at level 1
ASA-1# debug sfr event
DP SFR Event: Sending Conn Unique ID (3790083) TLV for
192.168.78.2/123 -
184.105.192.247/123
DP SFR Event: Sending Conn Unique ID (3790084) TLV for
192.168.78.138/59782 -
204.141.57.101/443
DP SFR Event: Sending Conn Unique ID (3790085) TLV for
192.168.78.132/27646 -
208.67.222.222/53
DP SFR Event: Sending Conn Unique ID (3790086) TLV for
192.168.78.132/49148 -
173.194.206.95/443
DP SFR Event: Sending Conn Unique ID (3790089) TLV for
192.168.78.132/12363 -
208.67.222.222/53
DP SFR Event: Sending Conn Unique ID (3790090) TLV for
192.168.78.132/37421 -
74.125.228.243/443
DP SFR Event: Sending Conn Unique ID (3790093) TLV for
192.168.78.135/777 -
8.8.8.8/0
<output omitted for brevity>
Summary
In this chapter, you have learned about several commands and utilities that
are useful when troubleshooting problems in the Cisco ASA FirePOWER
module. These commands are also useful when you’re troubleshooting
problem in FTD software. You have learned how to perform basic
monitoring, and you have learned how to use expert-level commands to
view and analyze detailed logs in the module. You have also learned how to
generate detailed troubleshooting files in the CLI and in ASDM. You have
also learned about the available debugging commands in the ASA for
troubleshooting problems in the module.
221
Chapter 5. Introduction to and Architecture of
Cisco AMP
This chapter covers the following topics:
In Chapter 1 you also learned about the many different types of malicious
software (malware). The AMP solution enables you to detect and block
malware, continuously analyze for malware, and get retrospective alerts. It
has the following features:
File reputation: AMP allows you to analyze files inline and block or
apply policies.
222
File sandboxing: AMP allows you to analyze unknown files to understand
true file behavior.
There are major architectural benefits to the AMP solution, which leverages
a cloud infrastructure for the heavy lifting.
The architecture of AMP can be broken down into three main components:
the AMP cloud, AMP client connectors, and intelligence sources. AMP
client connectors include AMP for Networks, AMP for Endpoints, and AMP
for Content Security.
Figure 5-1 illustrates the cloud architecture, showing how AMP receives
intelligence from many sources and a variety of client connectors.
The AMP cloud contains many different analysis tools and technologies to
detect malware in files, including the Threat Grid analysis solution. Cisco’s
research teams, including the Cisco Talos security intelligence and research
group, feed information about malware into the AMP cloud. Threat
intelligence from Cisco products, services, and third-party relationships is
223
also sent to the AMP cloud. The following are some examples:
Talos: The Cisco Talos security intelligence and research group is a team
of leading threat researchers that contributes to the threat information
ecosystem of Cisco security products. Talos team members get threat
information from a variety of sources and their own internal research
efforts. Talos maintains the official rule sets of Snort.org, ClamAV,
SenderBase.org, and SpamCop. Talos is also the primary team that
contributes to the Cisco Collective Security Intelligence (CSI) ecosystem.
You can follow Talos on Twitter @talos and subscribe to the official Talos
blog at http://blogs.cisco.com/author/talos.
The most critical item of the Cisco AMP architecture is the AMP cloud
itself. The AMP cloud has two deployment methods—public and private—
224
and regardless of the deployment chosen, the role of the cloud is the same.
The AMP cloud houses all the detection signatures. A major benefit of
storing these signatures in the cloud is that it reduces the client connector
size and reduces the processing requirements on the client, since the bulk of
the work is handled in the cloud.
The AMP cloud is also responsible for large-scale data processing, or big
data. The data comes to the AMP cloud from multiple sources, including
honeypots, threat feeds, open source communities, AV solutions such as
Immunet AV and ClamAV, and more. File samples are provided to the AMP
cloud, where they are processed. If the disposition of a sample file is
deemed to be malicious, it is stored in the cloud and reported to the client
connectors that see the same file.
Note
Advanced analytic engines, including Threat Grid, are part of the AMP
cloud and are constantly correlating the incoming data. The analytical
results are used to update the AMP signatures. In addition to the advanced
analytics, machine-learning engines are employed to further refine
signatures and reevaluate detections that have already been performed. The
cloud is not just a repository of signatures; the decision making is performed
in real time, evolving constantly based on the data received.
There is this brilliant engineer from Cisco SourceFire named Eric Howard.
Eric is one of the world’s foremost experts in AMP, and he presents
security, particularly the AMP solution, in a unique way that brings
tremendous clarity. This section of the book is designed to mirror his
presentation style.
225
Eric talks about the need to “do security differently.” He says that
companies need two security plans: Security Plan A is prevention, and
Security Plan B is retrospection.
1-to-1 Signatures
1-to-1 signatures are a traditional technology that is used all over the
security industry in various forms. With these signatures, a hash is created of
a file, and that hash is compared to a database. If a match is found, the
specific file is known, and a verdict—clean or malicious—is returned. If
the hash has not been seen before, the cloud returns a verdict of unknown.
The benefit of this method is that it can quickly identify and block malicious
files. The downside is that a simple change to a file also changes the hash,
thereby evading the signature.
AMP differentiates itself from other 1-to-1 signature solutions by storing the
signature database in the cloud instead of on the client. The database is quite
large, and many solutions cut corners by including only a subset of the
signatures in the full database. Storing the database in the cloud allows
AMP to leverage the entire database. Comparing the files to the database
226
can be quite resource intensive. AMP does the comparison in the cloud,
freeing those resources from the client connector. AMP is also able to
collect, process, and detect in near real time.
Ethos Engine
The next component of the protection framework is the Ethos engine. Ethos
is a “fuzzy fingerprinting” engine that uses static or passive heuristics. The
engine creates generic file signatures that can match polymorphic variants of
a threat. This is useful because when a threat morphs or a file is changed,
the structural properties of that file often remain the same, even though the
content has changed.
Unlike most other signature tools, Ethos uses distributed data mining to
identify suitable files. It uses in-field data for sources, which provides a
highly relevant collection from which to generate the signatures. Ethos is
completely automated and provides rapid generation of the generic
signatures that are based on in-field data instead of relying on individual
“rockstar” engineers to generate a limited number of generic signatures.
Note
Spero Engine
Indicators of Compromise
227
high confidence indicates a computer intrusion.”
IOCs are very high-confidence indicators, and they may describe numerous
specific items, including FileItem, RegistryItem, EventLogItem,
ProcessItem, and ServiceItem. You can lean the IOC language in more detail
at http://www.openioc.org.
228
Device Flow Correlation
Advanced Analytics
Cisco AMP Threat Grid is not a single tool. It is a full solution for dynamic
malware analysis and threat intelligence. It performs high-speed, automated
analysis with adjustable runtimes while not exposing any tags or other
indicators that malware could use to detect that it is being observed.
Threat Grid was architected from the ground up as a cloud solution with an
API designed to integrate with existing IT security solutions and to create
229
custom threat intelligence feeds. It can automatically receive submissions
from other solutions and pull the results into your environment.
Many think that Threat Grid is a sandboxing solution. It is much more than
just that, however; sandboxing is a piece of the solution, and Threat Grid’s
sandboxing functions are performed in a way that evades detection by
malware. Threat Grid uses an outside-in approach, with no presence in the
virtual machine. The sandboxing’s dynamic analysis includes an external
kernel monitor, dynamic disk analysis that illuminates any modifications to
the physical disk (such as the master boot record), monitoring user
interaction, video capture and playback, process information, artifacts, and
network traffic.
Quarantine containers
URLs
HTML documents
Flash
Note
At this writing, Threat Grid is a key part of the Cisco AMP cloud, but it is
not yet available as part of the private cloud (local/onsite) offering.
230
Retrospection means taking a look at what has already transpired; it
involves tracking system behavior regardless of disposition, focusing on
uncovering malicious activity. Retrospection could be viewed as the
“incident response mode,” using continuous analysis to reactively act on a
file that was assigned a clean disposition once but was later found to have a
bad disposition.
The Cloud
As you will see throughout this book, the AMP cloud is the centralized
location for all management and reporting. Figure 5-5 shows an example of
an AMP cloud dashboard. The dashboard shows indicators of compromise
and allows you to drill into them.
From the dashboard, you can provision endpoints, download agents, run
reports, and more.
231
Figure 5-5 Example of an AMP Cloud Dashboard
Private Cloud
The option to host the AMP cloud in your own data center is often selected
by organizations that reside outside the United States and have very strict
controls on where data may reside. In addition, some organizations, such as
government agencies, have requirements for data storage being on premises.
The private cloud product is shipped as a virtual machine that you can run in
your own VMware environment. The private cloud may be operated in two
ways: in cloud proxy mode and in air gap mode.
Note
At this writing, the private cloud is available only for AMP for Endpoints
232
and AMP for Networks. In addition, support of Threat Grid with the private
cloud is planned but not yet available.
Cloud proxy mode operates the private cloud within the confines of your
own data center or other cloud infrastructure. The AMP for Networks and
AMP for Endpoints connectors all communicate to the private cloud.
However, the private cloud maintains a connection to the public cloud for
certain communications:
Product updates: The AMP private cloud can be configured for automatic
or manual updates, leveraging a yum repository named
packages.amp.sourcefire.com that uses an SSL session over TCP port 443.
Support: Cisco TAC is able to remotely access the device for diagnostic
purposes and customer assistance. The remote access uses SSH over TCP
port 443.
233
Figure 5-6 Private Cloud Proxy Mode
As its name indicates, air gap mode creates a private cloud instance that is
completely isolated and has no external access to the public cloud. Updates
must be completed manually, and remote support is challenging. However,
this mode provides the highest levels of confidentiality. Figure 5-7
illustrates air gap mode.
234
Figure 5-7 Private Cloud Air Gap Mode
Installing the private cloud in air gap mode requires more resources than the
cloud proxy mode installation. These are the minimum requirements:
Air gap mode: 128 GB RAM, 8 CPUs, 1 TB minimum free disk space
After you deploy the OVA template, you connect to the console of the VM in
order to configure the private cloud, as shown in Figure 5-8. You need to
configure the network so the private cloud configuration can be completed
through its web interface.
235
Figure 5-8 DHCP or Static IP
236
Figure 5-10 Static IP Interface Configuration
You then click Yes to apply the changes to the interface, as shown in Figure
5-11. The main menu returns, with a randomized password that you use to
administer the private cloud through the web interface, as shown in Figure
5-12.
237
Figure 5-12 AMP Private Cloud Device Management
Connect to your private cloud with a web browser using HTTPS, as shown
in Figure 5-13, and log in with a random password such as the one
displayed in Figure 5-12.
Figure 5-13 Logging into the AMP Private Cloud Web Interface
Once you have successfully logged in, you are prompted to change the one-
238
time password that the system generated, as shown in Figure 5-14, and then
you have to accept the license agreement, shown in Figure 5-15. If you step
away from the browser for an extended period of time, it times out, and you
need to log in with the newly set password of your choosing instead of the
one-time system-generated password.
239
Figure 5-16 Choosing a Clean Installation or to Restore from Backup
You are now prompted to choose between air gap and cloud proxy mode, as
shown in Figure 5-17. Cloud proxy mode requires an Internet connection to
send disposition queries to the public cloud and to receive content updates
as well as software updates, as described earlier in this chapter.
240
Figure 5-17 Cloud Proxy Mode or Air Gap Mode
Next, you choose the installation type. In this case, you can choose demo
mode, which requires DHCP to be used rather than a static IP address.
Demo mode also skips some of the installation requirements, so it can be
installed on a laptop or other smaller VM host.
In order to see all the installation options, you click Next under Production,
as shown in Figure 5-18.
241
Figure 5-18 Choosing the Demo or Production Installation Type
242
Figure 5-19 Uploading the License File
Next, you are asked to create a console account, which you use to initially
log into the cloud, create additional accounts, and set up groups. Create your
console account and password and click Next, as shown in Figure 5-20.
243
Figure 5-20 Creating the Console Account
After creating the console account, you see a summary screen for your
storage capabilities. There are two main tabs: Automatic Configuration and
Manual Configuration. The automatic configuration adjusts partition sizes
based on the number of connectors that you configure the cloud for and the
number of days of history that you wish to retain. Figure 5-21 shows the
automatic configuration screen. With this mode, you simply state the number
of connectors to plan for and the number of days to store the data. The
connectors are the endpoints or network AMP devices that will be using this
private cloud. Warnings appear for any misconfigurations where not enough
storage is available.
244
Figure 5-21 Automatic Configuration of Storage
As shown in Figure 5-22, the manual configuration gives you more control,
and you can determine how much space to allocate for each of the
collections (archives, default, documents, executables, events, and DFC).
Again, warnings appear for any misconfigurations where not enough storage
is available.
245
Figure 5-22 Manual Configuration of Storage
Note
If you manually misconfigure the file system and the database grows too
large for the disk partition, you will need to do a full backup, reinstallation,
and restoration in order to change the partition sizes. Therefore, it is
recommended that you use the automatic option.
The next screen is the Network Configuration page. The top half of the
246
screen is fairly self-explanatory. Here you see the administrative portal
being hosted on the interface (eth0) and the IP address that you configured at
the command line. What is new here is that the second interface (eth1) needs
to be configured. The eth1 interface is known as the production interface
and is used to connect to the Internet for updates, communication with the
public cloud, and communication with all the connectors (endpoints and
network AMP systems).
Figure 5-23 shows the VMware configuration, where you can see two
network adapters. Both NICs can be on the same network segment, as shown
in Figure 5-23. They do not have to be in the same VLAN, but they can be.
Figure 5-24 shows the top half of the network configuration page, with both
eth0 and eth1 configurations displayed.
247
Figure 5-24 Top Portion of the Network Configuration Page
With the eth1 configuration complete, you come to a rather confusing part of
the setup. You need to enter two required fully qualified domain names
(FQDNs) and one optional one. What confuses people with this portion of
the setup is that the FireAMP Console FQDN, the Cloud Server FQDN, and
the Defense Center FQDN are all referring to exactly the same host—the
host that you are currently configuring. That’s right: You need to have two or
three entries in DNS that all point to the IP address configured for the eth1
interface, as shown for the DNS server displayed in Figure 5-25.
You need to enter these FQDNs into the corresponding fields of the
configuration screen, as shown in Figure 5-26. When you are sure that the
names exist correctly in both the DNS server and the configuration screen,
click Next (Applies Configuration) to move on.
248
Figure 5-26 Lower Portion of the Network Configuration Page
Note
The endpoints and the private cloud need the ability to resolve these DNS
names. If the endpoints cannot resolve these names, they will fail to register
to the cloud.
When the network configuration is complete, the next step is to select which
upstream cloud should be used, along with the port and security settings
related to that cloud connection, as shown in Figure 5-27.
249
Figure 5-27 Cloud Server Configuration
The upstream server selection can be either the North American cloud, the
European cloud, or a custom cloud name, as shown in Figure 5-28.
250
Note
The cloud server identity section shown in Figure 5-27 and Figure 5-29 lists
this AMP cloud server’s unique identity and the certificates that represent
this cloud server’s identity for any downstream private clouds.
Click Next to move on from the cloud server configuration and set up a
recipient or recipients of administrative email notifications, as shown in
Figure 5-30. The emails may contain notices of low disk space, backup
success or failure, failed sanity checks, and more items of this nature.
251
Figure 5-30 Setting Notifications
Date and time configuration is next. Network Time Protocol (NTP) plays a
critical role in all network security solutions, ensuring time accuracy and
synchronization. It ensures that log entries will always be accurate and
provide valid, useful reports. All events are stored in UTC time, so
selecting a time zone is not necessary. The time zone will be adjusted upon
display to the console UI, so the admin is not stuck working in UTC. Figure
5-31 shows the date and time configuration screen.
252
Figure 5-31 Setting Date and Time
Note
NTP updates occur through the public interface (eth1), allowing you to
choose an NTP source on the public Internet, if that is preferred.
The next screen is for a recovery file. A recovery file is like a backup, and
it contains all the cloud configuration and the server keys shown in Figure
5-27. You should store the recovery file in a very safe location because if
you lose the recovery key, you will never be able to restore your
configuration. In addition, every one of your FireAMP connectors will need
to be reinstalled. In other words, without the original key, you have to
reinstall the private cloud infrastructure with all new keys.
To complete this step, simply download the backup file through your
browser by clicking the blue Download button (see Figure 5-32) and save
the pre-install-backup.tgz file to your local disk. Then upload it right back to
the server by clicking the Browse button on the same page. You can click
253
Next and proceed with the installation after the file is validated.
Finally, you see the Review and Install screen, as shown in Figure 5-33.
This is your last chance to review all the configuration options before you
install. When you are certain you have selected all the correct options, click
Start Installation, and the installation proceeds, with a status screen like
the one shown in Figure 5-34.
254
Figure 5-33 Review and Install
255
Figure 5-34 Installing the Device
As the screen warns, you should leave your browser on the page and not try
to refresh it manually. As the installation finishes, it sends an email
notification like the one shown in Figure 5-35.
256
Figure 5-35 Email Notification
When the installation is complete, the Reboot button becomes active (see
Figure 5-36). Click Reboot when the process finishes to reboot the
appliance, and the server reboots and displays the message shown in Figure
5-37.
257
Figure 5-36 Successful Installation
After the appliance reboots, the web interface for the administrative
interface (eth0) that you were using to configure the appliance displays key
metrics like those shown in Figure 5-38.
258
Figure 5-38 Key Metrics
Now you can connect to the web interface for the eth1 interface by
connecting to the console FQDN that you configured, as shown in Figure 5-
39. You log in using the console account you created during the setup
process.
259
Figure 5-39 Login Screen
260
Figure 5-40 Subscription Agreement
After logging in, you are presented with a setup wizard to configure your
first policies for Windows or Mac AMP connectors. The endpoint policies
are examined in more detail in Chapter 8, “Cisco AMP for Endpoints.”
Summary
In this chapter you have learned all about the role of the AMP cloud for
performing file disposition checks. You have learned about the intelligence
that feeds the AMP cloud and the AMP view of security as including a
prevention framework and a retrospection framework. You have learned
about public and private clouds and seen how to complete an installation of
a private cloud instance.
261
Chapter 6. Cisco AMP for Networks
This chapter dives into the Advanced Malware Protection (AMP) for
Networks connector. The following topics are covered in this chapter:
The types of files and what actions are available for them
The network is the best place to see across an organization, uncover, and
discover. It provides unprecedented visibility to activity at a macro-
analytical level. However, to remediate malware, you need to be on the
host. This is why AMP has the following connectors: AMP for Networks,
AMP for Endpoints, and AMP for Content Security Appliances.
While the AMP connectors are installed differently and act in different
places in networks, they all speak to the AMP clouds. In addition, AMP for
Networks and AMP for Endpoints connectors share a common management
platform that has gone by a few different names since Cisco acquired
SourceFire. Thanks to the acquisition and the branding strategy from Cisco,
you might see the management center being referred to as SourceFire
Defense Center (SFDC), Cisco FireSIGHT Management Center (FMC), or
even Cisco Firepower Management Center (FMC). At this writing, the latest
and hopefully final name for the management system is Cisco Firepower
Management Center (FMC).
Form Factors
You can install AMP for Networks on any Cisco FirePOWER security
262
appliance right alongside the firewall and IPS; however, there are dedicated
AMP appliances as well. When it comes down to it, though, AMP
appliances and FirePOWER appliances are actually the same. They can all
run all the same services. Are you thoroughly confused? Stated a different
way, Cisco AMP for Networks is the AMP service that runs on an appliance
that is examining traffic flowing through a network. It can be installed in a
standalone form or as a service on a FirePOWER IPS or even a Cisco ASA
with FirePOWER Services.
AMP for Networks and all the AMP connectors are designed to find
malicious files and provide retrospective analysis, illustrate trajectory, and
point out how far malicious files may have spread.
The AMP for Networks connector examines, records, tracks, and sends files
to the cloud. It creates an SHA-256 hash of the file and compares it to the
local file cache. If the hash is not in the local cache, it queries the Defense
Center (DC). The DC has its own cache of all the hashes that it has seen
before, and if it hasn’t previously seen this hash, the DC queries the cloud.
Unlike with AMP for Endpoints, when a file is new, it can be analyzed
locally and doesn’t have to be sent to the cloud for all analysis, and it also
examines and stops the file in flight, as it is traversing the appliance.
Figure 6-1 illustrates the many AMP for Networks connectors sending the
file hash to the DC, which in turn sends it to the cloud if the hash is new.
The connectors could be running on dedicated AMP appliances, as a service
on a SourceFire next-generation IPS (NGIPS), on an ASA with FirePOWER
Services, or even on the newer next-generation firewall (NGFW) known as
Firepower Threat Defense (FTD).
263
Figure 6-1 AMP Connectors Talking to the DC and Then the Cloud
It’s very important to note that only the SHA-256 hash is sent unless you
configure the policy to send files for further analysis in Threat Grid.
AMP can also provide retrospective analysis. The AMP for Networks
appliance keeps data from what occurred in the past. When a file’s
disposition is changed, AMP provides a historical analysis of what
happened, tracing an incident/infection. With the help of AMP for
Endpoints, retrospection can reach out to that host and remediate the bad
file, even though that file was permitted in the past.
AMP for Networks deals with malicious files, and it also allows an
organization to implement file control—even if malware is present.
In order for the AMP policies to be used, you must have at least one
SourceFire device with an active malware license. Figure 6-2 shows an
example of the license screen located at System > Licenses. Notice that
there are two devices listed, an ASA5515-X with FirePOWER Services
264
and a virtual SourceFire NGIPS (NGIPSv), both of which have malware
licenses.
When you look at the Firepower Management Center (FMC), you don’t see
the AMP policies named the same way they’re named in other tools. They
are configured under Policies > Access Control > Malware & File, as
shown in Figure 6-3.
265
Figure 6-3 Malware & File Policies Page
Create a new file policy by clicking New File Policy in the upper-right
corner and providing a name in the New File Policy dialog box, as shown in
Figure 6-4. Remember to provide a detailed description that will help you
understand the purpose of the policy. Click Save to create the policy and
move into the configuration.
You now have a brand-new file policy with no rules, as shown in Figure 6-
5. To create your first rule in the new policy, click the Add File Rule button.
266
Figure 6-6 View File Rule Window
To create a file rule, you first select the application protocol to inspect for
files. The more specific your rule, the better the performance will be. As
shown in Figure 6-7, the choices are Any, HTTP, SMTP, IMAP, POP3, FTP,
and NetBIOS-ssn (SMB).
You must also specify the direction of the file transfer through the network
appliance. The choices are Any, Upload, and Download, as shown in Figure
6-8.
267
Figure 6-8 Direction of Transfer
The action you choose next determines what to do with files. As shown in
Figure 6-9, the actions are Detect Files, Block Files, Malware Cloud
Lookup, and Block Malware.
File Rules
The first traditional file rule action is the Detect Files rule action. Detecting
files logs the detection of the specific files but does not interfere with the
file’s traversal through the network. Think of it as a “monitor mode” or an
audit style rule. You can store the files that meet the rule for further
evaluation.
The next traditional file rule action is the Block Files rule action, which
resets the file transfer connection. Just like the detection rule action, this
blocking action has an option to store the files.
Malware Cloud Lookup is the first of AMP rule actions, and it requires a
valid malware license. This rule action is like a monitor mode or an audit
rule for AMP, where the AMP connector obtains and logs the disposition of
the file but does not stop the transmission of the files. As with the other
268
rules, you have the ability to store the triggering files, only this time the
options are to store file types: Malware, Unknown, Clean, and/or Custom.
Block Malware is the second AMP rule action, and it naturally requires a
valid malware license. This rule action works the same way as Malware
Cloud Lookup, except it adds an option to reset the connection by sending a
TCP reset.
Capacity Handling: When you use dynamic analysis and the cloud is not
reachable, the files can be stored locally.
Local Malware Analysis: This examines the file using locally installed
antivirus software (at this writing, ClamAV, an open source product owned
by Cisco SourceFire).
Malware: This disposition indicates that the AMP cloud categorized the
file as malware or local malware analysis identified malware during the
file scan, using the local antivirus software. Another possibility for this file
disposition is that the file’s threat score exceeded the malware threshold
defined in the file policy.
Clean: This disposition indicates that the AMP cloud categorized the file
as clean. It is also possible to manually add a file to the clean list, which
shows the file with the Clean disposition.
Unknown: This disposition indicates that the system queried the AMP
269
cloud, but the AMP cloud has not categorized the file.
Custom: This disposition indicates that a user added the file to the custom
detection list, possibly for data loss prevention (DLP) purposes or a static
location of the file instead of a dynamic one.
Unavailable: This disposition might mean the AMP for Networks system
could not query the AMP cloud.
The file rule must understand what file types to examine. To make it easier,
the system organizes file types into categories. You can use these categories
to help locate certain file types more easily. When you have the file types
you want in the middle column (aptly named File Types) of the View File
Rule dialog, click the Add button to select them for matching in the rule.
You do not have to add the individual file types; you can select the entire
category. Simply select the category on the left, click All types in selected
Categories in the middle, and then click Add. The chosen categories and
file types are maintained in the right column. Click Save to save the final
file rule.
Figure 6-10 shows the file rule with file types and categories mixed together
in the right column.
270
Figure 6-10 What File Types to Match
Zip and other archive files contain other files within them. The contents of
an archive file are examined, and the disposition of an archive file is
assigned based on the files inside it. If any of the files are determined to be
malware, the archive file is assigned the Malware disposition. If any of the
files are unknown, the archive file is marked as Unknown.
All the files within the archive must be found to be clean in order for the
archive to be assigned the Clean disposition.
A file policy is made up of one or more file rules. In addition to the rules,
you can set some global settings for all the file rules within a file policy. As
shown in Figure 6-11, the advanced options are broken into two different
categories:
General:
First Time File Analysis: If this option is disabled, all files detected for
the first time are marked as Unknown. When this option is enabled, the files
are analyzed based on the options selected in the file rule.
Enable Clean List: If this option is enabled and a file is on the clean list,
that file is allowed.
271
inspection of archive files, AMP creates a hash of the archive file itself and
performs the lookup for that SHA, which is not very useful.
Max Archive Depth: This option determines how many levels of archive
stacking the system should decompress and examine. Think of it as a
Russian nesting doll: Files can be in a zip that is within a tar.gz file, which
is in a 7zip compressed archive.
When you’re ready to push the policies out to the AMP for Networks–
capable systems, click Deploy, as shown in Figure 6-12. As shown in
272
Figure 6-13, you now see a list of capable devices that can use this file
policy. Select the devices to receive the new policy and then click Deploy.
273
Summary
There are different types of AMP connectors on an endpoint and throughout
a network. AMP for Networks connectors exist on FirePOWER appliances,
ASA with FirePOWER Services, and the newer Firepower Threat Defense
(FTD) appliances.
274
Chapter 7. Cisco AMP for Content Security
This chapter dives into the Advanced Malware Protection (AMP) for
Content Security connector. This chapter covers the following topics:
275
Figure 7-1 Network with AMP Connectors
AMP connectors are implemented in different ways. The AMP for Networks
connectors that you learned about in Chapter 6, “Cisco AMP for Networks,”
are managed by the Firepower Management Center (FMC) and configured
through file policies.
Figure 7-2 illustrates the file evaluation used by AMP for Content Security.
If the Web-Based Reputation Score (WBRS) is configured to scan, the
appliance simultaneously scans the file for malware and sends an SHA-256
of the file to the AMP cloud. In addition, if it is a Microsoft executable file,
it sends the Spero fingerprint of the PE header. Spero is a machine learning–
276
based technology that proactively identifies threats that were previously
unknown. If the file’s reputation and scan results are both determined to be
clean, the file is released and delivered to the end user.
Before you can configure AMP for Content Security, you must first have the
correct licensing (known as “feature keys”) on your appliances. The feature
keys enable the service on the appliance and allow you to configure the
settings for the AMP services.
Two features in the WSA correspond to AMP: file reputation and file
analysis. Figure 7-3 shows the feature keys for a WSA and points out the
file reputation and file analysis feature keys.
277
Figure 7-3 AMP Feature Keys
The WSA must have access to the AMP cloud. Remember that the naming of
each Cisco product may vary (for example, the AMP cloud is sometimes
called File Reputation and Analysis Services). You configure the AMP
cloud settings under Security Services > Anti-Malware and Reputation,
as shown in Figure 7-4.
278
Figure 7-4 Anti-Malware and Reputation Screen
To configure the AMP services, click Edit Global Settings. Figure 7-5
shows the resulting Edit Anti-Malware and Reputation Settings screen. To
enable AMP, simply select the check box next to Enable File Reputation
Filtering.
Clicking Submit takes you to the license agreement page, where you must
click Accept, as shown in Figure 7-6.
279
Figure 7-5 Edit Anti-Malware and Reputation Settings Screen
280
After you accept to the license agreement, the GUI redirects you back to the
main Anti-Malware and Reputation screen. You need to click Edit Global
Settings again to enable the file analysis service.
When you enable the file analysis service, the GUI asks you to agree to the
license for that service, and after you click Accept, you are redirected to the
main Anti-Malware and Reputation screen again. You must click Edit
Global Settings one more time if you want to change the file types that will
be analyzed.
There is also an area for more advanced configuration, such as changing the
cloud server to use for file reputation and setting the cloud (public or
private) to which to send the file for analysis. You also configure the
reputation threshold here; it defaults to whatever threshold is being
conveyed by the cloud. Normally, you leave these settings at their defaults.
Figure 7-7 shows the final file reputation and file analysis settings for the
WSA.
281
Figure 7-7 Final File Reputation and File Analysis Settings for the WSA
Just like the WSA, the ESA has two feature keys: file reputation and file
analysis. Figure 7-8 shows the feature keys for a Cisco ESA and points out
the file reputation and file analysis feature keys, as well as the menu item
for configuring AMP.
282
The ESA must have the capability to reach the AMP cloud. As you saw in
Figure 7-8, you configure the AMP cloud settings under Security Services
> File Reputation and Analysis. Initially, the service is disabled, as shown
in Figure 7-9.
Configuring file reputation and analysis requires clicking the Enable button
shown in Figure 7-9. The GUI then prompts you to accept the license
agreement, as shown in Figure 7-10.
283
Figure 7-10 Accepting the License Agreement
After you accept the license agreement, the AMP service is enabled for both
file reputation and file analysis, as shown in Figure 7-11.
To configure the enabled services, click Edit Global Settings, and all the
settings for AMP are displayed, as shown in Figure 7-12.
284
Figure 7-12 AMP Settings
There is also an area for more advanced configuration, such as changing the
cloud server to use for file reputation and setting the cloud (public or
private) to which to send the file for analysis. If AMP must go through an
upstream proxy (another proxy server between the ESA and the AMP
cloud), you configure this here as well. You also configure the reputation
threshold here; it defaults to whatever threshold is being conveyed by the
cloud. Normally, you would leave these settings at their defaults.
As with all other configuration changes with AMP for Content Security
appliances, you must click Commit Changes for the configuration to take
285
effect.
AMP Reports
286
Figure 7-13 AMP Report from ESA
Figure 7-14 shows an example of an AMP report from WSA. This report is
called the File Analysis report, and it allows you to search for a specific
file hash at the top, shows the latest analysis in the middle, and shows any
pending files at the bottom.
287
Figure 7-14 AMP Report from WSA
To determine whether a file was successfully sent to the cloud, you can use
the File Analysis report or the tail CLI command. If you use tail, you can
choose option 2 for amp_logs, as shown in Figure 7-15.
288
Figure 7-15 tail amp_logs
Summary
This chapter examines how AMP for Content Security fits into the overall
AMP architecture. You have learned the feature names and how to verify
that feature keys are installed. You have also learned how to enable the file
reputation and file analysis services on the WSA and the ESA. In addition,
289
you have seen a few of the reports that are available in AMP for Content
Security.
290
Chapter 8. Cisco AMP for Endpoints
In this chapter, you will learn the following:
Custom detections
Application control
291
Throughout this book, you have been learning about the various Cisco next-
generation security products and technologies. You have learned that
security technologies and processes should not just focus on detection but
should also provide the capability to mitigate the impact of an attack.
Organizations must maintain visibility and control across the extended
network during the full attack continuum:
File reputation: AMP allows you to analyze files inline and block or
apply policies.
Remember that the architecture of AMP can be broken down into three main
components: the AMP cloud, AMP client connectors, and intelligence
sources. This chapter focuses on the AMP for Endpoints client connector.
Figure 8-1 illustrates the cloud architecture, showing how AMP receives
intelligence from many sources and a variety of client connectors.
292
Figure 8-1 AMP Cloud Architecture
AMP for Endpoints provides more than just endpoint-level visibility into
files. It also provides cloud-based detection of malware, in which the cloud
constantly updates itself. This enables very rapid detection of known
malware because the cloud resources are used instead of endpoint
resources. This architecture has a number of benefits. With the majority of
the processing power being performed in the cloud, the endpoint software
remains very lightweight. The cloud is able to provide a historical view of
malware activity, segmented into two activity types:
With the data storage and processing in the cloud, the AMP solution is able
to provide powerful and detailed reporting, as well as provide very robust
management.
The AMP for Endpoints agent is also able to take action. For example, it can
block malicious network connections based on custom IP blacklists or
intelligent dynamic lists of malicious IP addresses.
293
AMP for Endpoints is the connector that resides on—you guessed it—
endpoints. It resides on Windows, Mac, Linux, and Android endpoints.
Unlike traditional endpoint protection software that uses a local database of
signatures to match a known bad piece of software or a bad file, AMP for
Endpoints remains lightweight, sending a hash to the cloud and allowing the
cloud to make intelligent decisions and return the verdicts Clean, Malware,
and Unknown.
AMP for Endpoints connectors must be able to reach the AMP cloud. That
means the agents may have to be able to go through firewalls and proxy
servers to reach the Internet.
294
Policy Server: policy.amp.sourcefire.com.s3.amazonaws.com (for US),
policy.eu.amp.sourcefire.com.s3.amazonaws.com (for Europe)
To allow a connector to communicate with Cisco cloud servers for file and
network disposition lookups, a firewall must allow the clients to connect to
the following server over TCP 443 by default or TCP 32137:
In order to upload files for analysis, clients must be able to access the
following server over TCP 80:
If you have TETRA enabled on any of your AMP Connectors, you must
allow access to the following server over TCP 80 for signature updates:
Outbreak Control
Outbreak Control allows you to create lists that customize AMP for
Endpoints to your organization’s needs. You can view the main lists from the
AMP cloud console by clicking the Outbreak Control menu, which offers
options in the following categories: Custom Detections, Application
Control, Network, and Endpoint IOC (indicators of compromise), as shown
295
in Figure 8-3.
Custom Detections
You can think of custom detections as a blacklist. You use them to identify
files that you want to detect and quarantine. When a custom detection is
defined, not only do endpoints quarantine matching files when they see them,
but any AMP for Endpoints agents that have seen the file before the custom
detection was created can also quarantine the file through retrospection,
also known as cloud recall.
Simple custom detection allows you to add file signatures for files, while
the advanced custom detections are more like traditional antivirus
signatures.
296
blacklist. You define one or more files that you are trying to quarantine by
building a list of SHA-256 hashes. If you already have the SHA-256 hash of
a file, you can paste that hash directly into the UI, or you can upload files
directly and allow the cloud to create the SHA-256 hash for you.
297
Figure 8-5 Detection Added and Contents on the Right Side
If you already have the SHA-256 hash of a file, simply paste it in, add a
note, and click Save; otherwise, you can upload a file, add a note, and click
Upload, as shown in Figure 8-5. Once the file is uploaded, the hash is
created and shown on the bottom-right side, as shown in Figure 8-6. You
must click Save, or the hash will not be stored as part of your simple
custom detection.
298
Figure 8-6 Saving a Simple Custom Detection
Simple custom detections just look for the SHA-256 hash of a file.
Advanced custom detections offer many more signature types to the
detection, based on ClamAV signatures, including the following:
MD5 signatures
Logical signatures
Icon signatures
299
Figure 8-7 Custom Detections—Advanced
To add a new custom detection, you must type it in the Name box and click
Save, as shown in Figure 8-7, to add it to the list, as shown in Figure 8-8.
Click Edit to display the contents of the new advanced detection object on
the right side.
300
Figure 8-9 Adding a Signature
Next, you click the Build Database From Signature Set, and a success
message is displayed, showing the successful creation of the advanced
custom detection signature set, as shown in Figure 8-10.
A View Changes link is visible with every custom detection, both simple
and advanced. The AMP cloud maintains an audit log for each of the
detection lists, and you can view it by clicking that link. Figure 8-11 shows
an example of the audit log.
301
Figure 8-11 Audit Log for an Advanced Custom Detection
Android detections are defined separately from the ones used by Windows
or Mac. These detections provide granular control over Android devices in
an environment. The detections look for specific applications, and you build
them by either uploading the app’s .apk file or selecting that file from the
AMP console’s inventory list.
You can choose to use Android custom detections for two main functions:
outbreak control and application control.
When using an Android custom detection for outbreak control, you are using
the detection to stop malware that is spreading through mobile devices in
the organization. When a malicious app is detected, the user of the device is
notified and prompted to uninstall it.
302
You don’t have to use these detections just for malware, but you can also
use them to stop applications that you don’t want installed on devices in
your organization. This is what SourceFire refers to as application control.
Simply add apps to an Android custom detection list that you don’t want
installed, and APM notifies the user of the unwanted application and
prompts the user to uninstall it, just as if it were a malicious app.
Once the new Android detection is created, you click Edit to add the
Android apps that you wish to detect as either malware or unwanted.
You can use outbreak control IP lists in conjunction with device flow
correlation (DFC) detections. DFC allows you to flag or even block
suspicious network activity. You can use policies to specify the behavior of
AMP for Endpoints when a suspicious connection is detected and also to
specify whether the connector should use addresses in the Cisco intelligence
feed, the custom IP lists you create yourself, or a combination of both.
303
You use an IP whitelist to define IPv4 addresses that should not be blocked
or flagged by DFC. AMP bypasses or ignores the intelligence feeds as they
relate to the IPv4 addresses in the whitelist.
You use IP blacklists to create DFC detections. Traffic that matches entries
in the blacklist are flagged or blocked, as the DFC rule dictates.
Here you click Create IP List to start a new IP list, and you’re brought to
the New IP List configuration screen, where you can either create an IP list
by typing the IPv4 addresses in classless interdomain routing (CIDR)
notation or by uploading a file that contains a list of IPs. You can also
specify port numbers to block or allow. After the list is created, you can edit
it only by downloading the resulting file and uploading it back to the AMP
console. Figure 8-14 shows the New IP List screen, with a mixture of
entries entered as text.
304
Figure 8-14 New IP List Screen
You name the list, choose whether it is a whitelist or a blacklist, and enter a
series of IPv4 addresses, one line at a time. Each line must contain a single
IP or CIDR. Acceptable formats include the following:
You click Create IP List to create the text file in the cloud console, and
your new IP list is shown on the screen. If you click Edit, you can change
the name of the IP list. To update the contents of the list, you must click
Download and then delete the list. Then you create a new list with the same
305
name and upload the modified file. An IP list can contain up to 100,000
lines or be a maximum of 2 MB in size.
As for custom detections, the AMP console maintains an audit trail for IP
lists that you can view by clicking View Changes.
Application Control
Once the list has been created and saved, click Edit to add any applications.
If you already have the SHA-256 hash, add it. Otherwise, you can upload
one application at a time and have the AMP cloud console calculate the hash
for you, as long as the file is not larger than the 20MB limit. You can also
306
upload an existing list. Figure 8-16 shows a blocking list with an existing
application hash shown at the bottom of the right-hand column, while
another file is being uploaded for hash calculation.
307
Figure 8-17 Outbreak Control > Application Control > Whitelisting
Once the list has been created and saved, click Edit to add any applications.
If you already have the SHA-256 hash, add it. Otherwise, you can upload
one application at a time and have the AMP cloud console calculate the hash
for you, as long as the file is not larger than the 20 MB limit. You can also
upload an existing list. Figure 8-18 shows a whitelist with an existing
application in the list (SafeGuardPDFViewer.exe).
Don’t forget to click Save after adding the hash to the list.
Exclusion Sets
There is one more object that you should try to create before you build your
policies, and that is an exclusion set. An exclusion set is a list of
directories, file extensions, or even threat names that you do not want the
AMP agent to scan and definitely not to convict as malware.
You can use an exclusion set to resolve conflicts with other security
products or mitigate performance issues by excluding directories that
contain large files that are frequently written to, like databases. If you are
308
running an antivirus product on computers with the AMP for Endpoints
connector, you should exclude the location where that product is installed.
It’s important to remember that any files stored in a location that has been
added to an exclusion set will not be subjected to application blocking,
simple custom detections, or advanced custom detections.
Wildcard: This type excludes files or paths using wildcards for filenames,
extensions, or paths.
For Windows, path exclusions may use constant special ID lists (CSIDL),
which are Microsoft given names for common file paths. For more on
CSIDL, see https://msdn.microsoft.com/en-
us/library/windows/desktop/bb762494%28v=vs.85%29.aspx.
As shown in Figure 8-19, new exclusion sets are created with some default
exclusions. Many of these exclusions are specific to the default installation
paths of antivirus products and designed to cover a large variety of
installations. Figure 8-19 shows an example of a Windows exclusion set.
Figure 8-20 shows a Mac exclusion set, and Figure 8-21 shows a Linux
exclusion set.
309
Figure 8-19 Creating a Windows Exclusion Set
310
Figure 8-21 Creating a Linux Exclusion Set
311
The following sections go through the options for each of the operating
systems shown in Figure 8-22.
256 MB RAM
512 MB RAM
Microsoft Windows 7:
1 GB RAM
312
1 GHz or faster processor
512 MB RAM
512 MB RAM
2 GB RAM
313
2 GB RAM
Windows Policies
There are many policy options for Windows. From the AMP cloud console,
navigate to Management > Policies > Windows, where you can see
existing AMP policies for Windows as well as create new ones (see Figure
8-23).
Click Create Policy and then select FireAMP Windows from the drop-
down as shown in Figure 8-24, and click Create Policy.
314
Figure 8-24 Selecting the Connector OS
In the New Policy Window, select the custom detections, app blocking,
whitelists, and exclusions created earlier, as shown in Figure 8-25. When
they are all selected, click Create Policy to save the policy.
315
Click Edit for the newly created Windows policy and scroll to the bottom.
This is where a lot of the AMP agent configuration and customization takes
place. There are three tabs for AMP connector configurations: General,
File, and Network.
General Tab
The General tab for a Windows policy has the basic settings for the AMP
for Endpoints connector, such as proxy settings and update schedules. There
are five component areas within the General tab: Administrative Features,
Connector Identity Persistence, Client User Interface, Proxy Settings, and
Product Updates. Each of these areas is explained in the sections that
follow. One very nice UI feature here is that a blue informational icon
appears whenever a default setting is changed, as shown in Figure 8-26.
316
Figure 8-26 The Windows Policy General Tab
Administrative Features
As you can see in Figure 8-26, there are nine configurable settings in the
Administrative Features section of the General tab:
Send User Name in Events: This relates to the username that has
launched the process. This setting is useful for tracking down who was on a
system that may be seeing malware.
Send Filename and Path Info: This setting enables the AMP agent to send
317
the filename and path information to the AMP cloud so that they are visible
in the Events tab, device trajectory, and file trajectory. Unchecking this
option stops this information from being sent.
Heartbeat Interval: This option sets how often the AMP agent should
call home to the AMP cloud. During the call home connection, the agent
checks whether there are any policy updates, any updates or scans to
perform, or any files to restore via cloud recall or by the administrator.
Connector Log Level and Tray Log Level: This option allows you to
change the default log level to debug, when directed by Cisco Technical
Assistance Center (TAC).
Connector Protection Password: This option sets the password for the
connection protection.
318
Figure 8-27 Connector Identity Persistence
None: Connector logs are not synchronized with new connector installs
under any circumstance. This is the default setting unless changed by
support.
By MAC Address across Business: New connectors look for the most
recent connector that has the same MAC address to synchronize with across
all policies in the business that have Identity Synchronization set to a value
other than None.
By MAC Address across Policy: New connectors look for the most
recent connector that has the same MAC address to synchronize with within
the same policy.
By Hostname across Business: New connectors look for the most recent
connector that has the same hostname to synchronize with across all policies
in the business that have Identity Synchronization set to a value other than
None.
By Host name across Policy: New connectors look for the most recent
connector that has the same hostname to synchronize with within the same
policy.
319
The Client User Interface section allows you to configure what the end user
sees on the Windows system. Many organizations prefer to show the agent
icon in the system tray, so it is obvious that the agent is running, but they
often choose to hide all notifications so that users are not bothered by the
connector. There are six different options, as shown in Figure 8-28:
Start Client User Interface: Simply put, this option hides the user
interface or shows it. The agent is running either way. This setting offers you
the option of keeping it out of the system tray. When you change this option,
it takes effect at the next agent restart.
Cloud Notifications: This option controls whether you see those fun
balloon pop-ups from the agent icon in the Windows system tray. When this
option is selected, a pop-up appears when the agent is successfully
connected to the cloud, and it displays the number of users and detections
registered to the cloud.
320
Figure 8-28 Client User Interface
It is highly recommended that you keep any interactivity with the end user to
an absolute minimum. End users often get frustrated and annoyed when
burdened by notifications that they don’t understand or don’t care to
understand.
321
Proxy Settings
322
By populating the Proxy Settings sections of the General tab, you can
configure a hard-coded proxy server for the agents that receive this policy.
As you can see in Figure 8-29, basic and NT LAN Manager (NTLM)
authentications are both supported, as are straight HTTP proxy and Secure
Sockets (SOCKS) proxy. If you use NTLM, be sure to use the
DOMAIN\USER notation for the account.
Product Updates
The policy that is applied to the AMP connector determines whether and
when to update to a newer version. You select the version from the Product
Version drop-down, choose a time window for the updates to occur, and tell
the agent how often to check for updates. Figure 8-30 shows the Product
Updates settings.
323
A reboot is required for the running AMP agent to reflect an upgrade. The
Product Updates section lets you specify whether to not reboot the system,
to ask the user if it’s okay to proceed with a reboot, or to simply reboot the
system, as shown in Figure 8-30.
File Tab
You use the File tab to configure the settings and behavior of file scanning in
the AMP for Endpoints agent. For example, you can specify which engines
to use, set up scheduled scans, and specify cache settings. There are six
component areas of the File tab: Modes, Cache Settings, Engines, Ethos,
Cloud Policy, and Scheduled Scans. Figure 8-31 shows the File tab with the
Modes component area expanded.
324
Modes
The Modes section of the File tab allows you to specify how the AMP
connector should behave during file moves or copies as well as how it
should behave when a file is executed. These are the available options in
the Modes section:
Monitor File Copies and Moves: This option is either selected or not. It
determines whether AMP should care about files when they are moved or
copied within or off the system.
Maximum Scan File Size: Any file larger than this setting will not be
scanned by AMP.
Maximum Archive Scan File Size: Any archive file (ZIP, TAR, etc.)
larger than this setting will not be scanned by AMP.
Cache Settings
As you know, the AMP connector focuses on the disposition that the AMP
cloud assigns to the SHA-256 hash of a file. The hash and the disposition
are stored in a local cache for better performance and to reduce redundant
lookups of the same hash value. The settings in the Cache Settings section of
the File tab determine how long the hashes should remain in the cache. As
Figure 8-32 shows, there are four different cache settings, all of which are
configured as the number of seconds before checking those file hashes
325
again:
Malicious Cache TTL: This setting specifies how long to hold on to the
disposition of a file hash when it has been deemed malicious. The default is
1 hour.
Clean Cache TTL: This setting specifies how long to hold on to the
information when a file has been assigned a clean disposition. The default is
7 days.
Unknown Cache TTL: This setting specifies how long to store the
disposition of files that receive an Unknown disposition. The default is 1
hour.
Engines
326
As shown in Figure 8-33, the Engines section is used to configure the use of
one or all of the three engines:
327
Figure 8-34 Optional TETRA Settings
Ethos
328
Ethos can be a bit resource intensive, and therefore it is enabled only for
file move and copy by default, as shown in Figure 8-35. When scanning on
copy or move, AMP allows the copy or move action to finish and then
queues another thread to calculate the Ethos for a file. That same passive
performance luxury is not available for the On Execute or On Scan settings.
Cloud Policy
The Cloud Policy settings refer to the Ethos and Spero engines. Because
both Ethos and Spero are classified as generic engines, you can tune how
false-positive-prone an Ethos or Spero hash is. The Cloud Policy section
provides up to three configurable thresholds, as shown in Figure 8-36.
329
Figure 8-36 Cloud Policy Settings Section
Detection Threshold per Spero Hash: This is exactly like the Detection
Threshold per Ethos Hash option, except it refers to Spero.
330
is “massively infected.” The default is 5, meaning that if 5 SHA one-to-one
detections are found in 30 seconds, the system is considered “massively
infected,” and additional Spero trees are enabled for the next 30 seconds.
Scheduled Scans
331
their associated registry settings, and all the files on the entire disk. A
custom scan is configured to look at files in a specific path. Figure 8-38
shows an example of the configuration window that pops up when you add a
scheduled scan.
Network Tab
You use the Network tab to configure device flow correlation (DFC) and, in
fact, DFC is the only configuration section in the Network tab. As described
earlier in this chapter, DFC allows you to flag or even block suspicious
network activity.
As you can see in Figure 8-39, you can enable or disable DFC from the
Network tab. In addition, you specify here whether the detection action
should be Audit or Blocking. In other words, you specify whether this
policy should dictate a monitor-only mode or actually take action on the file.
If you select Blocking, you can choose to terminate the parent process of the
network connection and quarantine the malicious file. Finally, you can set
Data Source to SourceFire, Custom, or both.
332
Figure 8-39 Network Tab
At this writing, AMP for Windows has interaction incompatibility with the
following security software:
Carbon Black
Apple OS X 10.7:
2 GB RAM
Apple OS X 10.8:
333
2 GB RAM
Apple OS X 10.9:
2 GB RAM
2 GB RAM
2 GB RAM
MAC Policies
There are many policy options for Macs. From the AMP cloud console,
navigate to Management > Policies > Mac to see existing AMP policies
for Mac and create new ones, as shown in Figure 8-40.
334
Figure 8-40 Creating a Mac Policy
Click Create Policy and then select FireAMP Mac from the drop-down, as
shown in Figure 8-40, and click Create Policy.
In the New Policy Window that appears, provide a name and select the
custom detections, app blocking, whitelists, and exclusions created earlier,
as shown in Figure 8-41. When they are all selected, click Create Policy to
save the policy.
335
Figure 8-41 Creating a Mac Policy
Click Edit for the newly created Mac policy and scroll to the bottom. This
is where a lot of the AMP agent configuration and customization takes place.
Just as with a Windows policy, the AMP connector configurations are
presented in three tabs for Mac: General, File, and Network.
General Tab
The General tab for a Mac policy provides the basic options for the AMP
for Endpoints connector, such as proxy settings and update schedules. As
shown in Figure 8-42, there are four component areas in the General tab:
Administrative Features, Client User Interface, Proxy Settings, and Product
336
Updates. These areas are explained in the following sections.
Administrative Features
As you can see in Figure 8-42, there are five configurable settings in the
Administrative Features section of the General tab:
Send Filename and Path Info: This option enables the AMP agent to send
the filename and path information to the AMP cloud so that they are visible
in the Events tab, device trajectory, and file trajectory. Unchecking this
option stops this information from being sent.
Heartbeat Interval: This option sets how often the AMP agent should
call home to the AMP cloud. During the call home connection, the agent
checks whether there are any policy updates, any updates or scans to
perform, or any files to restore via cloud recall or by the administrator.
337
when the connector calls home on its heartbeat interval. This check box
adds a required action for a system admin to confirm before recalling any
files.
Connector Log Level: This option allows you to change the default log
level to debug, when directed by Cisco TAC.
Tray Log Level: This option allows you to change the default log level to
debug, when directed by Cisco TAC.
Note
This section has no options for sending the username, connector protection
options, or crash dumps. Those are Windows-specific options.
The Client User Interface section of the General tab allows you to configure
what the end user sees on a Mac system. Many organizations prefer to show
the agent icon in the menu bar, so it is obvious that the agent is running, but
they often choose to hide all notifications so that the users are not bothered
by the agent. There are four different options, as shown in Figure 8-43:
Start Client User Interface: Simply put, this option hides the user
interface or shows it. The agent is running either way. This setting offers you
the option of keeping it out of the menu bar. When you change this option, it
takes effect at the next connector restart.
Cloud Notifications: This option controls whether you see those fun
notification pop-outs that come from the upper-left side of the screen on a
Mac (the Notification Center). When this option is selected, a pop-out
appears when the agent is successfully connected to the cloud, and it
displays the number of users and detections registered to the cloud. Your
end users will normally not thank you for these messages, which don’t make
any sense to them.
338
Hide Network Notifications: Selecting this option hides messages when
a malicious network connection is detected or blocked by AMP.
It is highly recommended that you keep any interactivity with the end user to
an absolute minimum. End users often get frustrated and annoyed when
burdened by notifications that they don’t understand or don’t care to
understand.
Proxy Settings
The options in the Proxy Settings section for Mac are exactly the same as for
the Windows connector. To do our part to save the planet and use less paper,
please see the “Proxy Settings” section for Windows, earlier in this chapter.
Product Updates
The options in the Product Updates section for Mac are exactly the same as
for the Windows connector. Please see the “Product Updates” section for
Windows, earlier in this chapter.
339
File Tab
You use the File tab to configure the settings and behavior of file scanning in
the AMP for Endpoints agent, such as which engines to use, setting up
scheduled scans, and cache settings. There are five component areas of the
file tab: Modes, Offline Engine—ClamAV, Cache Settings, Engines, and
Scheduled Scans.
Modes
The options in the Modes section for Mac are exactly the same as for the
Windows connector. Please see the “Modes” section for Windows, earlier
in this chapter.
Offline Engine—ClamAV
This section is available only when ClamAV has been selected for the
Offline Engine option in the Engines portion of the File tab.
The Windows connector uses TETRA for offline scanning. The Mac
connector uses ClamAV, which is an open source full antivirus product,
owned by Cisco SourceFire. Just like TETRA, ClamAV is signature based
and takes up more disk space and processor power on the Macs.
340
Figure 8-44 Offline Engine—ClamAV
Cache Settings
The options in the Cache Settings section for Mac are exactly the same as
for the Windows connector. Please see the “Cache Settings” section for
Windows, earlier in this chapter.
Engines
Scheduled Scans
The options in the Scheduled Scans section for Mac are exactly the same as
for the Windows connector. Please see the “Scheduled Scans” section for
Windows, earlier in this chapter.
Network Tab
Just as with the AMP for Windows connector, you use the Network tab to
configure DFC. As described earlier in this chapter, DFC allows you to flag
341
or even block suspicious network activity.
As you can see in Figure 8-45, the options here are even fewer for Mac than
they are for Windows. DFC can be enabled or disabled, and Detection
Action may be set to Audit or Blocking.
AMP for Linux gets a bit interesting. First of all, there are more flavors of
Linux than you can count, and Cisco certainly cannot be expected to support
and test every one. At this writing, only the CentOS and Red Hat Linux
variants are supported, and only the 64-bit versions of those Linux flavors
are supported. The system requirements are as follows:
CentOS 6.4/6.5/6.6:
1 GB RAM
1 GB RAM
342
Note
Linux Policies
Just as with the Windows and Mac operating systems, there are many policy
options for Linux. From the AMP cloud console, navigate to Management
> Policies > Linux, where you can see existing AMP policies for Linux and
create new ones.
Click Create Policy and then select FireAMP Linux from the drop-down
and click Create Policy.
In the New Policy window that appears, provide a name and select the
custom detections, app blocking, whitelists, and exclusions created earlier,
as shown in Figure 8-46. When they are all selected, click Create Policy to
save the policy.
343
Figure 8-46 Creating a Linux Policy
Click Edit for the newly created Linux policy and scroll to the bottom to
find the three tabs General, File, and Network.
General Tab
Just as for Windows and Mac, the General tab for a Linux policy has the
basic settings for the AMP for Endpoints connector, such as proxy settings
and update schedules.
There are only four component areas in the General tab: Administrative
Features, Client User Interface, Proxy Settings, and Product Updates. Only
344
the items that are different from the Windows and Mac policy options are
discussed here. You can look to earlier sections for descriptions of any
other options.
Administrative Features
The Client User Interface section provides two options: Hide File
Notifications and Hide Network Notifications. As always, silence seems to
be golden for the AMP connector, so hiding notifications may be wise for
your environment.
File Tab
The File tab for Linux is exactly the same as it is for the Mac connector.
ClamAV is the antivirus product for Linux that is built into the AMP
connector, and it can be enabled and configured for periodic updates, just as
the Mac connector can.
Network Tab
Just as with the Mac and Windows connectors, the Network tab for Linux is
used to enable or disable DFC. However, Linux does not have a blocking
mode for DFC; it is only capable doing audits.
The AMP for Android connector requires Android 2.1 or higher running on
ARM and Intel Atom processors with 4 MB of free space on the device.
Unlike with Windows and Mac, there are not many policy options for
Android. From the AMP cloud console, navigate to Management >
345
Policies > Android, where you can see existing AMP policies for Android
and create new ones.
Click Create Policy and then select FireAMP Android from the drop-down
and click Create Policy.
In the New Policy window that appears, provide a name and select the
custom detection created earlier, as shown in Figure 8-47. There is only one
option to configure at the bottom of the policy, Heartbeat Interval, as shown
in Figure 8-47.
You have created policies for the different endpoints. The next step is to
assign those policies to groups so you can begin to deploy the AMP
connectors to the many endpoints in your organization.
346
Groups, Groups, and More Groups
Before you move on to installing AMP for Endpoints onto hosts, we should
really discuss an important organization component: groups. The AMP
administrative console uses groups to organize and manage computers
according to function, location, or other criteria that you determine. Policies
get assigned to groups and can inherit from parent groups for greater
control.
For example, you might create a group for each department of line of
business; however, there could be additional controls required, based on the
country of origin in which the computer normally resides.
Navigate to Management > Groups, where you see a list of all the top-
level groups in your organization. You can create, edit, or delete the groups
from this screen. If a group has child groups within it, this is indicated as
shown in Figure 8-48.
To create a new group, click the Create Group button shown in Figure 8-
48. To create a new group, you provide a group name, description, and
parent group (if any) and you can assign existing known computers to it, as
shown in the upper right of Figure 8-49. At the bottom of the screen, you can
make this new group a parent by assigning other existing groups to it as
children.
347
Figure 8-49 Creating a New Group
In addition, as you can see in Figure 8-49, you can assign existing policies
to the group. This is where you select the policies you just created in this
chapter.
Download Connector
Earlier in the chapter you saw the Download Connector screen, located at
Management > Download Connector (see Figure 8-50). Here you can
download installation packages for each type of AMP for Endpoints
connector, or you can copy the URL from where those connectors can be
download. Before downloading a connector, select the appropriate group so
the correct policies will be assigned and the installed computers will
appear in the correct group.
348
Figure 8-50 Download Connector Screen
At this writing, the AMP connector is not part of the Cisco AnyConnect
Secure Mobility Client, but you can use the AMP Enabler add-on to
AnyConnect to aid in the distribution of the AMP connector to clients who
use AnyConnect for remote access VPN, secure network access, posture
assessments with Cisco’s Identity Services Engine, and more. Figure 8-51
shows the AnyConnect Secure Mobility Client with the AMP Enabler tile.
349
Figure 8-51 AnyConnect Security Mobility Client
350
Figure 8-52 Downloading AMP for Windows
There is an option to have the connector perform a flash scan during the
install process. The flash scan checks processes currently running in
memory and should be performed on each install.
If you select the Redistributable option and then click Download, you
download a much larger executable (around 30 MB) that contains the full
installation, both 32- and 64-bit versions.
You can place the executable file on a network share or push it to all the
computers in a group via a tool like Microsoft System Center Configuration
Manager (SCCM) or Active Directory Group Policies in order to install the
AMP connector on multiple computers. The bootstrapper and redistributable
installer also both contain a policy.xml file, which contains your assigned
policies and is used as a configuration file for the install. Administrative
rights are required for installing the connector interactively.
351
Figure 8-53 shows the UI displaying the URL to send to the end users.
Figure 8-54 shows an end user connecting to the installer stub through the
download URL entered into their browser. The stub installer is
downloaded, and when it’s executed, the Windows security subsystem asks
for permission to run the installer, as shown in Figure 8-55. You click Yes to
continue with the installation and download the full agent with the policies,
as shown in Figure 8-56.
352
Figure 8-55 Windows Security Prompt
When the agent is installed on a Windows endpoint and the user interface is
configured to be visible, the AMP icon is in the system tray; clicking that
system tray icon brings up the summary window. Both the system tray icon
353
and the summary window are shown in Figure 8-57.
As shown in Figure 8-57, the summary window includes the current status
of the connection to the AMP cloud, the last date the system was scanned,
and the assigned policy. If you click Settings, you see the settings that are
configured in the policy, as shown in Figure 8-58.
354
Figure 8-58 Local GUI Displaying Settings
The process of installing AMP for Mac is very similar to the installation
process for Windows. First, you select the group, but instead of
downloading a Windows executable file, you download a PKG file to
install the AMP connector. Or you can copy the URL, just as with Windows.
Also as with Windows, a Mac user must have admin privileges to install the
connector. Figure 8-59 shows the downloading of the PKG file.
355
Figure 8-59 Downloading the Mac PKG File
356
When the agent is installed, if the user interface is configured to be visible,
there is an AMP icon in the menu bar. Clicking the menu bar icon allows
you to trigger an on-demand scan, sync the policy to the cloud, or get into
the settings, as shown in Figure 8-61.
You can click Settings to bring up the main AMP for Mac GUI. As you can
see in Figure 8-62, this GUI has four sections: Events, Policy, Scan, and
About. This is quite different from the Windows agent: You cannot see or
change the policy in the Mac GUI.
357
Figure 8-62 The Events Section of the AMP for Mac GUI
The Events tab in the GUI lists all the logged activities for quarantines,
detection, update, and scans.
Figure 8-63 shows the Policy section of the GUI, which provides some
visibility into the configuration, but not any settings to change.
358
Figure 8-63 Policy Section
Figure 8-64 shows the Scan section of the GUI, which allows you to initiate
a flash, full, or custom scan. It also shows any scans scheduled from the
centralized policy.
Figure 8-65 shows the About section of the GUI, which lists the AMP
connector version.
359
Figure 8-64 Scan Section
Downloading the Linux connector provides you with an RPM (Red Hat
Package Manager, aka RPM Package Manager) file to be installed. The
installer is about 16MB and also contains the policy.xml file, which is used
as a configuration file for your settings. There is also a link to download the
GPG key, which is required for connector updates via the central policy.
Figure 8-66 shows the screen where the GPG key can be copied or
360
downloaded.
You can install the RPM via rpm or the yum toolset. To install via RPM,
you use the rpm -i command and option. For yum, use sudo yum localinstall
[install-file] -y. Figure 8-67 shows an example of using the rpm command.
361
Figure 8-67 Installing the Connector via rpm
If you plan on pushing connector updates via policy, you need to import the
GPG key into your RPM DB. Here’s how you do this:
Step 1. Verify the GPG key by clicking the GPG Public Key link on the
Download Connector page, as shown in Figure 8-66. Compare the key from
that link to the one at /opt/cisco/amp/etc/rpm-gpg/RPM-GPG-Key-cisco-
amp. Figure 8-68 shows the contents of that public key file, for comparison.
Step 2. Run the following command from a terminal to import the key:
[sudo] rpm --import /opt/cisco/amp/etc/rpm-gpg/RPM-GPG-KEY-cisco-
amp
Step 3. Verify that the key was installed by running the following command
from a terminal: rpm -q gpg-pubkey --qf ‘%{name}-%{version}-%
{release} --> %{summary}\n’
362
Step 4. Look for a GPG key from SourceFire in the output.
AMP for Android comes in the form of an app. An end user can obtain the
app if you send a link to the app, send the app directly, or allow the user to
download the app from the Google Play Store.
363
activation code is required. Activation codes are generated in the console
GUI and do not have expiration dates by default.
Click Create at the bottom of the screen to create the new activation code
and ensure that you notate the code for use in the next steps. Figure 8-71
shows the connector code being generated.
364
Figure 8-71 Generating the AMP Connector Code
AMP for Android comes in the form of an app. An end user can obtain the
app if you send a link to the app, send the app directly, or allow the user to
download the app from the Google Play Store. Using the Google Play Store
is often considered the easiest method, since it is trusted to all Android
devices by default and doesn’t require changing security settings on the
device to allow apps to be installed from other sources.
Figure 8-72 shows the app in the Google Play Store. Click Install to
download and install it. When the installation is complete, open the app.
You are prompted to accept the license agreement, as shown in Figure 8-73.
365
Figure 8-72 Downloading the AMP Connector App
366
Figure 8-73 License Agreement
Next, you are asked to enter the activation code and provide an identifying
name for the Android device, as shown in Figure 8-74. If the code is active
and valid, you see a success message and then the main AMP app window,
as shown in Figure 8-75.
367
Figure 8-74 Entering the License Code
368
Figure 8-75 AMP Main App Window
369
Figure 8-76 Settings
Proxy Complications
AMP for Endpoints needs to reach the AMP cloud through an Internet
connection, and that connection may require traversing a proxy server.
Sometimes there are complications with this process.
370
Proxy Server Autodetection
Some proxy and web security configurations are incompatible with AMP:
371
HTTPS content inspection: HTTPS content inspection breaks the AMP
endpoint agent’s communication with the cloud due to certificate pinning
and strong authentications. The currently supported workaround is either to
disable HTTPS content inspection or to set up exclusions for the AMP
connector.
When endpoints are running and reporting to the cloud, you see a populated
dashboard and can look for malware, threats, and indicators of compromise.
Figure 8-77 shows the AMP dashboard, indicating that one of the computers
with an AMP connector loaded has indicators of compromise, five counts of
malware detected on it, and even a list of the malware threats.
372
on the dashboard (see Figure 8-77), you are taken to the Events tab, but the
filters are prepopulated, as shown in Figure 8-78.
373
Figure 8-78 Drilling into the Events
Immediately, you can see that all the malware has the status Quarantine:
Success. This means AMP was able to isolate and block the malware. If you
drill into one of the pieces of malware detected, you can get more
information about the filename, the path, the parent, and more. You can also
look into the file trajectory and computer trajectory (see Figure 8-78) to
attempt to see where else the file has been and where else the infected
computer has been.
If you navigate to Analysis > Events, you get an unfiltered view of all
events. If you scroll down, you can see vulnerable applications being
reported. As you can see in Figure 8-79, the Windows client that AMP was
installed on had a vulnerable version of Java on it, and the vulnerability
CVEs are listed.
374
Figure 8-79 Bad Java
Upon recognizing systems with vulnerable applications, you can contact the
desktop team to have the system updated. Or you can have an indicator of
compromise trigger a correlation action in the Firepower Management
Center (FMC) that uses a remediation with Cisco Identity Services Engine
(ISE) to quarantine the endpoint on the network. This type of solution is
known as rapid threat defense with Firepower Management Center and ISE.
Summary
375
Chapter 9. AMP Threat Grid: Malware
Analysis and Threat Intelligence
This chapter covers the following topics:
This chapter introduces the cloud and on-premises Cisco AMP Threat Grid
deployment options. These two types of deployments present different
options, including the Cisco AMP, Email Security Appliance (ESA), and
Web Security Appliance (WSA).
Note
376
samples in order to study malware behavior in a historical context. This
helps them defend against targeted attacks and threats from advanced
malware. Cisco AMP Threat Grid also can generate detailed reports,
including important behavioral indicators and threat scores that allow
security analysts to quickly prioritize and recover from advanced attacks.
Cisco AMP Threat Grid is not a single tool. It is a malware analysis and
threat intelligence solution. It crowdsources malware from a closed
community and analyzes all samples, using highly secure proprietary
techniques including static and dynamic analysis. It performs automated
analysis with adjustable runtimes while not exposing any indicators that
malware could use to detect that it is being observed and analyzed. That
way, Cisco AMP Threat Grid can still operate and analyze malware that
changes behavior to avoid analysis in sandbox environments.
Many think that the Cisco AMP Threat Grid offering is just a sandboxing
solution, but it is much more than just that. Sandboxing is a piece of the
solution, and its sandbox functions are performed in a way that evades
detection by malware. AMP Threat Grid uses an outside-in approach and
has no presence in the virtual machine. The sandboxing’s dynamic analysis
includes an external kernel monitor, dynamic disk analysis that illuminates
any modifications to the physical disk (such as the master boot record
[MBR]), monitoring of user interaction, video capture and playback, and
monitoring of process information, artifacts, and network traffic. The
following are some of the object types Cisco AMP Threat Grid supports:
Quarantine containers
URLs
HTML documents
377
Flash
Among its outputs, Cisco AMP Threat Grid provides video playback, the
Glovebox feature for malware interaction and troubleshooting, a process
graph for visual representation of process lineage, and a threat score with
behavior indicators of malware. The Glovebox feature helps analysts
dissect and interact with the malware in real time by recording all activity
for future playback and reporting. It correlates sample malware data
elements against billions of sample artifacts historically collected and
analyzed in order to match well-known malicious behaviors. The threat
score provided for analyzed malware is based on severity and confidence.
In addition, the more than 450 behavioral indicators, sourced from around
the globe, can show an analyst if a piece of malware is malicious,
suspicious, or benign—and why—which eliminates guesswork and helps an
analyst make better decisions more quickly.
Cisco AMP Threat Grid is integrated with Cisco security technologies that
span from the network edge to the endpoint, including Cisco AMP for
Networks, Cisco ASA with FirePOWER Services, Cisco Firepower Threat
Defense, Cisco Email Security Appliance, Cisco Web Security Appliance,
and Cisco AMP for Endpoints. In combination, these tools give
organizations more visibility than ever before. Information across many
platforms can be correlated and synthesized so organizations can make
faster, better decisions to more quickly eliminate threats and reduce the
harm caused by malware.
Snort rules
378
Customized feed formats are also available for particular security products.
Using the powerful application programming interface (API), you can
import threat information into your security technologies, including security
information and event management (SIEM) solutions, graphical
visualization tools, and more to automate detection and response to even the
most sophisticated threats. Cisco AMP Threat Grid’s threat intelligence
allows administrators to look into markets and industries of interest. An
analyst can understand the relevancy of the executable sample as it pertains
to the environment and look at specific threat information for specific types
of data and take proactive, preventive action.
Among the security personnel who can benefit from Cisco AMP Threat Grid
are incident response and security operation team members and information
security executives. Incident response teams use Cisco AMP Threat Grid to
analyze malware submissions; search for malicious files, registry keys, and
URLs; and run malicious code in Glovebox. Security operation teams
generate threat scores, prioritize malware cleanup and remediation, and
submit suspicious code for analysis. Threat Grid empowers a security team
to act faster on malware, offers a more complete security solution by
integrating with existing technologies, and accelerates detection of
advanced attacks.
The rest of this chapter presents specifics of the cloud and appliance
deployment options for Cisco AMP Threat Grid and briefly presents details
on how to configure them.
379
advanced attacks. Figure 9-1 shows the Firepower Management Center
(FMC) with the AMP cloud located in U.S. and EU data centers. An AMP
private cloud option is also available for organizations that do not want
malware information shared in the cloud.
Cisco AMP Threat Grid can be accessed via a portal page. Files can be
submitted for analysis using the browser. All the results can be easily
retrieved from the web page. Malware samples can also be compared with
other samples and searched for. In addition, with Cisco AMP Threat Grid
cloud, you can define the malware runtime from 5 to 30 minutes.
Threat Grid exposes an API that integrates with existing security solutions
and can create custom threat intelligence feeds. It can automatically receive
submissions from other products and pull the results in the environment.
Cisco AMP Threat Grid’s analysis, threat intelligence correlation, and feeds
retrieval can be automated and integrated with existing security solutions
using the API. Security tools can also access and integrate with it by using
the Threat Grid API.
380
configured in the File Reputation Filtering and File Analysis page.
Even though the Cisco AMP Threat Grid cloud-based solution can serve
many organizations well, others might require no outbound connections to
the cloud transferring information externally. Organizations with such
compliance and policy restrictions can submit malware samples to the AMP
Threat Grid on-premises appliance for local analysis and ensure policy
enforcement and compliance. The appliance also has the capability to
manually update its knowledge base while complying with corporate or
regulatory policies to keep all information within logical boundaries and not
transfer it externally.
The Cisco AMP Threat Grid appliances (TG5000 and TG5500) are hosted
in a Cisco UCS C220 hardware server. They can analyze 1500 and 5000
samples per day, respectively.
Similarly to the cloud, with the Cisco AMP Threat Grid appliance, malware
samples are analyzed using static and dynamic analysis techniques, and the
results are correlated against millions of analyzed malware artifacts;
however, in the case of the on-premises appliance, information is not sent
out of an organization’s logical boundaries. Security teams can quickly
correlate a single malware sample’s activity and characteristics against
other samples to analyze its behaviors in historical and global contexts to
defend against targeted attacks or general threats from advanced malware.
381
system is configured to connect to an on-premises appliance, it can use the
default public cloud connection for public report retrieval. If the appliance
cannot generate a dynamic analysis report about a file, it queries the Cisco
AMP cloud. In an on-premises appliance deployment, public cloud reports
returned to the system by the cloud are scrubbed and returned with limited
data.
382
integrated with existing security solutions using the API. A powerful
representational state transfer (REST) API allows organizations to integrate
the appliance with existing security infrastructure, such as gateways,
proxies, and SIEM platforms. The API can also be used to automatically
consume submissions from third-party endpoint agents, deep-packet-
inspection platforms, and investigation tools. Numerous partner solution
integrations showcase that functionality. Finally, the user interface offers
customizable workflows that are designed for security operations center
(SOC) malware analysts and forensic investigators to perform their day-to-
day operations.
Default Users
Tip
It is highly recommended that you change the device password and that you
use strong passwords to increase the security posture of the device and to
reduce its attack surface.
Once the user accounts are set up, the administrators or other users can log
in and begin submitting malware samples for analysis.
As mentioned previously, the Cisco AMP Threat Grid appliance has three
required networks:
383
Administrative (admin) network: This network must be configured in
order to configure the appliance.
Tip
Summary
This chapter provides an overview of the Cisco AMP Threat Grid solution,
which offers an efficient and granular file analysis and context-rich and
accurate malware analytics. This chapter also explains how Cisco AMP
Threat Grid can be used in conjunction with Cisco AMP to offer a complete
malware protection and analysis solution that operates throughout the attack
continuum—before, during, and after a malware compromise—and helps
organizations understand what malware is attempting to do, the threats it
poses, and how to defend against it. The cloud-based AMP Threat Grid
solution offers flexibility of deployment and off-the-shelf analytics from the
Cisco AMP cloud. On-premises AMP Threat Grid deployments, on the other
hand, serve organizations that want to use Cisco AMP Threat Grid’s
granular analysis without transferring information to the cloud.
384
Chapter 10. Introduction to and Deployment of
Cisco Next-Generation IPS
The chapter covers the following topics:
NGIPS basics
NGIPS Basics
The following sections introduce the basic concepts of NGIPS and how it
compares to legacy IPS. The following sections also present Cisco NGIPS
products and their capabilities as well as peek at some basic deployment
modes and scenarios. After reading these sections, you will be familiar with
NGIPS and Cisco NGIPS and ready to move into NGIPS deployment design
concepts.
385
Legacy IPS were traditionally used in network infrastructures to protect
against known security threats. Often, two concepts were used: IPS and
intrusion detection systems (IDS). IDS mostly detect and generate alerts for
various attacks or intrusion attempts, whereas IPS can also prevent and
mitigate attacks. The remainder of this section focuses on IPS, but you
should note that there are no significant differences between the
methodologies used in IPS and IDS for attack detection.
They often look for attempts to exploit a vulnerability and not for the
existence of a vulnerability.
Legacy IPS often generate large amounts of event data that are difficult to
correlate.
Thus, legacy IPS suffer from certain shortcomings, including the following:
Their operation costs and the operating resources they need are high.
386
7 applications and can protect against Layer 7 threats.
Thus, it is clear that in the threat landscape of both today and in the future,
NGIPS functionality has an important role in protecting and providing
coverage against known attacks and new types of exploits.
387
Modern security tools need to integrate directly into the network fabric in
order to maximize performance and efficiency. Responses need to be
comprehensive and simple. Protection must be continuous. Network
controls should not be implemented disparately and individually. To abide
by these modern security requirements, Cisco follows a new security model
that looks at the actions needed before, during, and after attacks that apply to
mobile devices, virtual machines, endpoints, or more (see Figure 10-1). The
Cisco Firepower NGIPS functionality operates mostly in the during phase of
the attack continuum, but all phases are covered by the integrated
capabilities of the Cisco Firepower product portfolio.
Figure 10-1 The Attack Continuum and Where Security Functions Fall
The following are some of the key differentiators of the Cisco NGIPS
portfolio from other vendors:
388
Network and context awareness and visibility
The following are some of the most important capabilities of Cisco NGIPS:
389
Security automation: Cisco Firepower NGIPS includes automated event
impact assessment and policy tuning.
Cisco ASDM (which, at this writing, can be used only in some ASA with
FirePOWER Services models)
As shown in Figure 10-2, there are two connectivity flows between the
FMC and the NGIPS that offer device policy configuration from FMC to the
NGIPS and information collection from the NGIPS to FMC for further
intelligent analysis and reporting.
390
Figure 10-2 FMC Connection Flow with NGIPS Devices
The following are some of the features provided in the Cisco FMC:
Policy management
Custom reporting
High availability
391
By combining top-notch platforms, research, and management, Cisco offers
a complete NGIPS tool set that allows a security architect to build secure
and simple-to-operate architectures.
NGIPS Modes
As in legacy IPS, NGIPS can operate in two different modes: inline and
monitoring. Inline mode is the most common mode for a device used for
prevention. Inline NGIPS can be placed between two assets that
communicate or at a point that aggregates traffic from various sources—
between a switch and a firewall or between a router and a switch—to block
and mitigate threats. Two of the interfaces of the NGIPS are used in an
inline pair for traffic to enter and exit the device after being inspected.
Based on the configured policies, traffic can be dropped, allowed, or reset.
The caveat with inline NGIPS (Figure 10-3) is that in the event of a
software failure or a loss of power, all traffic is dropped. The fail-open
capability can be used for such situations to allow traffic to hardware
bypass the device and avoid traffic loss. Fail-open should not be used when
the security policy doesn’t allow for traffic to go unaccounted for or
uninspected.
Inline mode offers two more modes of operation: routed and switched. In
routed mode (see Figure 10-4), the device operates at Layer 3, as a router
would. In switched mode (see Figure 10-5), the NGIPS is in transparent
mode and doesn’t show in the path as a Layer 3 hop. It uses two interfaces
in a VLAN pair and bridges them together.
392
Figure 10-4 NGIPS in Router Inline Mode
Monitoring (passive) mode is the mode where the NGIPS does usually not
prevent attacks. The device uses one interface to silently inspect traffic and
identify malicious activity without interrupting traffic flow (see Figure 10-
6). It is usually connected to a switch’s span port, a mirrored port, or a
network tap interface. Even though in monitoring mode the device doesn’t
block traffic, there is an option to reset malicious connections, but that
should not be considered as a mitigation mechanism as it can’t guarantee
attack prevention.
393
the modes described. Specifically for the ASA FirePOWER Services
module, the modes and how they can be configured are presented in Chapter
2, “Introduction to and Design of Cisco ASA with FirePOWER Services.”
A demilitarized zone (DMZ) is a partly trusted area where web and other
servers reside. There is a certain risk for DMZ devices like servers, and
thus an NGIPS is often deployed to protect them.
394
An NGIPS deployed at the core of a network detects insider threats and
attacks. It also often identifies malware propagation, worms, and outbound
malicious activity. Cisco NGIPS network discovery is more accurate when
deployed closer to the core as internal network traffic is evaluated and
provides more accurate discovery results.
395
It is vital to perform a threat analysis against the security model to
determine how the NGIPS would perform against it. For the Cisco threat
model, the NGIPS should provide protection before and during an attack,
and it should offer the analysis functionality during and after. Retrospective
historical analysis is also important for a protection system to offer a
holistic approach to protection after an attack. A good understanding of the
candidate system will help in evaluating the system against the security
model and also against current and modern threats. You should perform
threat analysis before evaluating the system against the security model as
threats could significantly vary depending on the architecture.
The following are some of the features and capabilities security architects
have to think about:
Mode: You need to determine whether to use inline or passive mode and
whether to use a physical or virtual sensor when designing an NGIPS
solution.
396
Reporting: The reporting requirements of an organization should be
cross-referenced with the reporting capabilities of the system. Custom
reporting is often required by modern NGIPS to allow quick analysis and
response to security incidents.
Flow Handling
397
Figure 10-8 Asymmetric Flows in a Redundant Data Center
398
architecture.
For low latency, passive mode deployments would be more ideal, but they
are not always possible due to security requirements. For example, what
happens to a low-latency stock trading application in an overwhelmed
NGIPS? The Cisco NGIPS offers a rule latency threshold option that can be
configured to suspend the rules when processing time exceeds the
configured limit. In addition, the Cisco NGIPS appliance has a feature
called Automatic Application Bypass (AAB) that limits the time allowed to
process packets through an interface.
399
Some features include hardware and link redundancy. For link redundancy,
port channel support is widely used. For hardware redundancy, Cisco ASA
Clustering combines multiple ASA devices (with FirePOWER Services) to
provide high throughput and ensure that hardware failure can be properly
handled by the other devices. Cisco ASA Clustering also ensures that the
same flows are handled by the same device, thus eliminating asymmetric
routing. Figure 10-10 shows how flows are transported over the cluster
control link and processed by the same device. What’s more, just for device
pairs, the ASA offers the failover feature (active/standby or active/active
failover pair) that automatically fails over to the healthy device in the event
of a failure. The FirePOWER Services module state is not synced in this
scenario.
400
Figure 10-10 ASA Cluster with FirePOWER Service Sending Packets to
the Right ASA Through the Cluster Control Link
Thus, there are multiple options that can provide redundancy, performance,
and extensibility. It is up to the security architect to consider the current and
future network requirements and design for a highly scalable and failure-
resilient NGIPS deployment.
Note
401
it manages unusable. Losing visibility of the events and configuration is
acceptable, but the detection and blocking of malicious traffic should
continue, and all collected events should be transmitted when the manager is
recovered.
Authentication configuration
Device attributes
The ASDM is a standalone device management tool and thus does not
include any redundancy scenario. Practically, ASDM is launched from the
client application and connects to the ASA with FirePOWER Services or
the NGIPS module for management.
402
Although pricing is important, you should keep in mind that in today’s
complex infrastructures, standalone devices at high prices are not always
the best way to go. Today’s business is focused on generating results, and
the infrastructure should align with that goal. Thus, implementing
architectural approaches that deliver business outcomes is usually more
important than purchasing purely cost-effective devices for the network
without having a holistic architectural strategy.
Note
Licenses are installed on the FMC and not on a managed device. FMCs in a
high-availability pair do not share licenses. Therefore, each platform needs
a separate FireSIGHT license. When using high availability, all FMC
licenses must be replicated on both sides for high availability to work
successfully.
The policy definition phase dictates the product selection and deployment
plan that are chosen to satisfy it. After the selection step, the system gets
deployed in the network. The operation and continuous evaluation ensure
that the system is performing its tasks efficiently and successfully. At times,
adjustments need to be made either because of changes in the policy or
based on findings. The following sections describe all the steps in the
deployment lifecycle.
Policy Definition
The security policy is the basis for security deployments. This policy
defines what is considered important and how it will be protected in an
infrastructure. Product and implementation are chosen in order to satisfy the
404
security policy. Two organizations with exactly the same assets could have
completely different security policies because of the way they assess risk.
For example, a hospital with virtual servers in the DMZ needs to comply
with HIPAA rules and thus could have a very different policy from a car
repair shop that hosts its website in the DMZ. Thus, the deployment of an
NGIPS or other security products starts with policy definition.
During the product selection and planning phase, a security team identifies
the device that will fulfill the security policy requirements and puts in place
a plan for implementation. This phase defines the details of how the security
policy will be met. A write-up of all the requirements is created in order to
help in the product decision and the implementation. After the product
decision is made, having a detailed implementation plan in place helps
405
ensure a successful installation with reduced complexity. The security team
needs to account for predictability and risk awareness before proceeding
with the installation.
Because the product selection dictates the success of the NGIPS installation,
the requirements definition that serves as input to the decision process needs
to be as detailed as possible. Some determining factors are device type,
deployment size, cost, other security devices, scaling requirements, and
responsibilities:
Security architects start by identifying the use cases of the deployment. For
example, an NGIPS deployed to prevent malware in a school is different
than an NGIPS for preventing data exfiltration in a bank.
The location of the NGIPS also plays a role in the requirements document
as each location assumes different performance and security requirements.
Potential locations could be Internet edge, data center, branch, and core. It is
obvious that the performance and availability requirements in a data center
are not the same as those in a branch office. For example, an NGIPS in a
data center looking at only internal traffic will not identify as many threats
as when sitting at the Internet edge, looking at the wild Internet traffic.
Vendor data sheets should cover device performance for engineers to use.
406
Traditionally, the firewall industry has almost always published maximum
throughput numbers in data sheets. Engineers should ensure that performance
numbers are sufficient in the deployment environment. The IPS industry has
generally been more conservative about throughput estimates on data sheets,
partly because the performance range varies based on features used and
traffic patterns. In general, using extra features increases processing load
and decreases performance. For example, a Cisco Firepower NGIPS
running malware inspection and application control could in some cases run
below its nominal performance numbers. You should exercise caution when
investigating published performance data sheets and ensure that they match
the deployment use case in question.
A security team should revisit the design considerations when answering all
of the preceding questions in order to cover all the potential holes and
ensure a smooth implementation phase.
After you answer all these questions, you need to check the long list of
information against vendor products, product support, and licensing costs in
order to make a decision. In making a vendor decision, you should also
consider the future. Focusing purely on current requirements might lead to
407
poor choices for years to come. What is more, integrating NGIPS into the
whole network architecture in order to bring the business outcomes desired
is how product selection should be viewed. Just focusing on a cost-effective
piece of equipment with features that will solve security problems today is
not the way to go.
During the implementation and operation phase, the NGIPS is put in place in
the network and starts inspecting traffic. The operation steps follow the
initial installation and can take quite a bit of time as the process involves
configuration and fine-tuning.
408
management IP address.
The initial device configuration and operation includes the following steps:
Step 3. Tuning: Initially, many of the policies need to be tuned to the needs
of the network. Sometimes, especially in inline deployment, a minimal set of
features is deployed to avoid inadvertent outages due to misconfigurations.
Later, the configuration can be adjusted to gradually take advantage of the
whole set of NGIPS features. After the initial learning phase (specifically
for Cisco), Firepower NGIPS devices offer a number of recommendations
to make sure the policies align with the network condition.
Step 4. Operation: The final step is device operation. After finishing the
tuning of the device and after ensuring a smooth transition, the NGIPS that
was proactively put in passive mode can be converted to inline mode.
Operation is a continuous process that requires proper planning and
organization. Operating the NGIPS and using it to act appropriately or
generate useful reports requires a certain amount of planning and
organization. Operations teams need to be assigned and take their place in
the day-to-day NGIPS operation and support.
409
Specifically for Cisco Firepower NGIPS, all features that apply to the after
phase in the security model fall under evaluation and control. Some of these
features include:
Snort rule tuning: Snort signature tuning happens initially after NGIPS
implementation.
Summary
As you have seen in this chapter, if IPS was important for the security of
legacy networks, NGIPS is essential in today’s security landscape. Features
such as application and contextual awareness, file control, and intelligence
410
correlation can reduce complexity and increase the security of a modern
infrastructure.
411
Chapter 11. Configuring Cisco Next-
Generation IPS
This chapter covers the following topics:
Policy
Snort rules
Performance settings
Stack/cluster
Note
You can also use Adaptive Security Device Manager (ASDM) with
FirePOWER services and Firepower Threat Defense (FTD) to configure
NGIPS features in Cisco ASA with FirePOWER Services. ASDM is
presented in Chapter 4, “Troubleshooting Cisco ASA with FirePOWER
Services and Firepower Threat Defense (FTD).”
Policy
412
control the features available in Cisco NGIPS products. The FMC is built to
efficiently manage all the features and allow security engineers to leverage
the tools at their disposal in a simple and consistent manner. As NGIPS
features keep growing, the management interface adds extra functionality but
keeps complexity for administrators to a minimum.
Note
Policy Layers
An intrusion policy in Cisco NGIPS consists of the base policy and a set of
other policies that customize the base policy. These policies are applied to
the system in a layered order as the overall intrusion policy (see Figure 11-
1).
413
Figure 11-1 NGIPS Layered Approach
In FMC, you can see the policy layers by going into a policy and editing the
Policy Layers settings (see Figure 11-2). The base policy is the bottom
policy and contains a summary of the rules in it. The Policy Layer page has
multiple options to edit or reorder the policy layers in the IPS.
Variables
414
variable $EXTERNAL_NET. Other variables are used in more specialized
rules. For example, $HTTP_SERVERS represents the web servers and
$HTTP_PORTS the ports used by these servers.
You can manage variables can in the FMC’s Variable Set section of the
Objects tab. Here you can edit or create the default and other variable sets
to be used in an IPS policy.
If you click the Add Variable Set button shown in Figure 11-2, you get the
screen shown in Figure 11-3, where you can create new network or port
variables and assign them to the default or policy-specific (customized)
variable sets used in an IPS policy, as shown in Figure 11-4.
415
Figure 11-4 Creating New Variable Sets in FMC
When creating a network variable, you can use more than one address; just
separate addresses with commas—for example, [192.168.1.2, 10.10.10.2,
172.18.1.2]. You can also use CIDR representation—for example,
[192.168.1.2, 10.10.10.2, 172.18.1.0/24]. In addition, you can exclude
addresses from a list by using an exclamation point—for example,
[192.168.1.2, !10.10.10.2, 172.18.1.0/24].
When creating port variables, you can use ranges, such as [25-121]. The
following are some other possibilities:
For ports less than a number, you can use this format: [-1024].
For ports more than a number, you can use this format: [1024-].
To list ports, you can use this format: [25, !21, 80-].
416
When you accurately define variables, the processing of the rules using them
is optimized and the right systems are monitored for illegitimate traffic. By
leveraging variables, you can more efficiently change the variable value
without changing all the rules for which that variable is used. For example,
if multiple rules are defined to protect the web servers, you would need
only to define or update variable $HTTP_SERVERS instead of updating all
the rules.
417
Figure 11-6 Allow Action Used in an Access Policy That Will Leverage an
IPS Policy
You can click the Create Policy button to create a new policy. The next
prompt, shown in Figure 11-7, allows you to set a name, a description,
whether to drop and trigger an event when deployed inline and a rule with
an action of Drop and Generate Event is matched, and the default policy
used as a base policy.
The default intrusion policies are policies that exist in the system by default
and can be used as starting points for new configurations. These are the
available default intrusion policies:
Balanced Security and Connectivity: This policy is built for both speed
418
and detection. It serves as a good starting point for most organizations and
deployments.
No Rules Active: This policy has all rules and preprocessors disabled. It
is used when an administrator chooses to create a policy from scratch. This
is not true for FirePOWER version 5.4 and later, where all preprocessors
have been abstracted out of an IPS policy and are configured in the network
analysis policy.
After you create a policy, it appears in the Policy Information section in the
IPS Policy tab, as shown in Figure 11-9.
419
Figure 11-9 Policy Information
When using a default policy as the base policy, an administrator can edit the
base policy (using the Manage Base Policy option) and choose whether to
allow rule updates to modify the base policy. Note that rule updates change
rules, preprocessor rules, and default policy settings for rules that have not
been customized by the administrator.
The rules deployed by the default policy in use can be edited by using the
Rules option in the Policy Information section. When you’re editing a rule, it
appears in the My Changes section of the Policy Information. You’ll learn
more about editing and creating IPS rules later in this chapter.
Committing a Policy
420
that uses a disabled preprocessor would be flagged after the commit. For
version 5.4 and later, the preprocessor check does not happen.
Figure 11-10 IPS Policy Applied in the Inspection Tab of a Rule in the
Access Control Policy
The access control policy that contains the IPS policy is then applied to a
device in the Targets tab of the policy, as shown in Figure 11-11.
Snort Rules
The core of Cisco Firepower system’s IPS capability is the IPS rule base
and the detection engine, which includes preprocessors. When a Cisco
421
NGIPS is booted, the engine is initialized, the rule structures are initialized,
and then traffic is matched against the rules.
During initialization, the Firepower NGIPS engine groups rules into sets on
Snort rule headers and options properties. These sets are organized so that
the rule options for all the rules with common unique characteristics are
listed together.
A malicious packet could possibly match more than one rule and trigger
event. As rule options are matched, events are queued until all options are
processed. The final selection of the event triggered is chosen based on the
following criteria:
The events are sent from the NGIPS device to FMC, and they are stored in
the database of all intrusion events and can be queried later.
Rule Anatomy
422
Snort uses a simple and flexible description language that is powerful for
defining the indicators that the IPS policy should be matching against.
Although most Snort rules are written in a single line, you can have rules
span multiple lines by adding a backslash (\) to the end of each line, as in
this example:
A Snort rule has two sections: a header and a body. The header contains the
action, protocol, source, and destination IP addresses and netmasks, as well
as the source and destination port. The body contains keywords that define
the criteria to trigger an alert. The body keywords contain event messages,
patterns in the payload to match, and specifications of which parts of the
packet to match on. In the preceding rule, this is the header:
As you can see, the rule content is included in parentheses. The keywords
are separated by semicolons.
In the FMC, all IPS policy rules are available in a policy under Policy
Information (see Figure 11-12). Rules are grouped based on categories.
Multiple other rule classification options can be used to look through the
rules. For example, you can view the rules according to the rule
423
configuration in order to match on the rule state. Using the Rule Content
option allows you to view the rules based on the matched content. The
Platform Specific option allows you to look for rules based on the platform
of interest. Many more options are available.
The following sections provide more information of the anatomy and the
details of rules.
Rule Headers
tcp: Matches TCP traffic only. Other protocols are udp, icmp, and ip.
424
$EXTERNAL_NET: Matches traffic from any host that is not on the
internal network.
-> : Matches external traffic destined for the TLS servers on the network.
A bidirectional operator <> is also available.
You can access Snort rules in the FMC by selecting Policies > Intrusion >
Intrusion Policy > Rule Editor (shown later, in Figure 11-16). Figure 11-
13 shows how an IPS rule header is accessible and editable in the rule
editor. You can see all the header options and how they can be configured
according to the rule author’s needs.
Note
The Classification field is from the rule body and belongs in the classtype
Snort option.
Rule Body
425
The body of a rule looks like this:
Content rules contain the content keyword. More than one content
condition can exist in a rule. content can use an offset and a depth for
where and how long to match in the packet.
A flags keyword can be used to match on the TCP flags of the packet.
Another option that can be added to the rule is metadata that signifies the
service the rule is matching on. It can also affect impact_flag. metadata is
not necessarily a required match. Until the service is identified for a flow or
until there is not a service identified, the IPS falls back to ports to identify a
service. If the service is identified, the ports the traffic traverses from are
ignored.
Figure 11-14 shows the rule’s body options as they appear when editing a
rule in rule editor. You can change the option order in the rule. Also, you
can add more options to match different packet fields.
426
Figure 11-14 Editing a Snort Rule’s Body
Writing a Rule
Step 1. Clearly identify the problem that requires a rule. If the issue is a
security vulnerability, for example, then that malicious indicator of
compromise needs to be written to alert on exploit attempts.
427
Step 4. Identify unique characteristics in the traffic. For example, are you
looking for a specific pattern in the packet payload?
Step 5. After completing the analysis, write a rule in the FMC that satisfy
all the criteria defined in the previous steps.
Step 6. Push the rule to the IPS and, after generating the offending traffic,
make sure the rule operates as expected.
You can further use and edit the imported rules in the layered IPS policy.
You can configure the Rule Update function to perform periodic updates of
Cisco-authored SourceFire Rule Updates (SRU) from an external location
(feed).
You can access and manage Snort rules in an IPS policy in the FMC by
using Policies > Intrusion > Intrusion Policy > Rule Editor, as shown in
428
Figure 11-16, or in an intrusion policy found under Policy > Access
Control > Intrusion in versions 5.4 and later.
Figure 11-16 Policies > Intrusion > Intrusion Policy > Rule Editor
Figure 11-17 shows the rules as they appear in the IPS policy editor.
To view the rules in another layer of an IPS policy, you can use the Policy
dropdown, as shown in Figure 11-18.
The rule options bar, shown in Figure 11-19, allows you to set various
429
options to multiple rules at the same time. For example, you can set
comments or alerts, change the temporary state, or filter rules.
Other rule management capabilities the FMC offers are rule filtering with
the filter bar, rule grouping with the rule grouping accordion, rule querying,
setting of rule state, event filtering to limit the events triggered based on
certain criteria, setting of dynamic state to rate limit the events triggered,
alerting (SNMP), and comments.
You can see that the FMC allows for fine-grained and efficient management
of all IPS rules used in Cisco NGIPS devices.
430
attempts and for obsolete and experimental DNS record types.
FTP and Telnet: The FTP and Telnet preprocessor normalizes FTP and
Telnet streams before they are passed to the IPS engine. It requires TCP
stream preprocessing.
IMAP and POP: The IMAP and POP preprocessors monitor server-to-
client email traffic and alert on anomalies. They also extract and decode
email attachments and allow further processing by the NGIPS rules engine
and other Cisco Firepower features.
SSH: The SSH preprocessor detects SSH buffer overflow attempts and
monitors for illegal SSH versions.
431
industrial facilities. The SCADA preprocessors monitor the DNP and
Modbus protocols for anomalies and decode their messages for further rule
inspection.
Checksum verification
Inline normalization
IP defragmentation
Packet decoding
TCP stream
UDP stream
The packet decoder normalizes packet headers and payloads for further
processing. The inline normalization preprocessor normalizes traffic to
prevent evasion techniques in inline deployments. The rest of the network
preprocessors detect anomalous network or transport layer behavior.
Portscan Detection
The FMC offers a wealth of settings for each preprocessor that are
available in the IPS policy Advanced Settings view. Rules can also be
viewed based on the preprocessor they are using (see Figure 11-20). For
version 5.4 and later, the rules can be edited under Policy > Access Control
> Intrusion.
432
Figure 11-20 Rules View Categorized by Preprocessor
Firepower Recommendations
Based on the base policy rules, the system identifies the states in the policy
and proposes new states. It optionally can automatically set the rules to the
recommended settings. The rules that are disabled or that generate events
and apply to the vulnerabilities discovered are set to generate events; the
rules that drop and generate events and protect the assets are set to drop and
generate events. Finally, the rules that do not protect identified assets are
disabled. The proposed changes can be for rules and preprocessor settings
as well. You can also automate generation of recommendations by using task
schedules.
You can enable the Recommendations feature under IPS Policy Information
as shown in Figure 11-21. In versions 5.4 and later, the Recommendations
feature is set via Policy > Access Control > Intrusion Policy. There are
two options: one to generate and preview the recommendations and the
other to generate and use the recommendations. When generating
recommendations, the system displays filtered views of the rules
recommended to be set to Generate Events, Drop and Generate Events, or
433
Disable. After previewing the recommendations, you can manually set the
recommended options. Rules that have been set manually are not updated by
the Recommendations feature. After using the proposed changes, Firepower
adds a read-only Recommendations layer to the intrusion policy. Choosing
not to use recommended rule states removes the layer.
Performance Settings
434
You can improve performance of a Cisco NGIPS sensor by leveraging some
performance settings in the advanced policy configuration. In version 5.4
and later, the performance settings are in the advanced settings, under Policy
> Access Control > Intrusion:
Event Queue Configuration: You can set the Event Policy configuration
in the Advanced tab when editing an access control policy. You can set the
maximum packet states per packet and disable content checks that will be
inserted through the stream reassembly process (see Figure 11-22).
435
Figure 11-23 Latency-Based Packet Thresholding
436
expression processing can add processing load to a device. The default
regular expression match and recursion limits can be overridden in the
Regular Expression Limits setting in the advanced settings of an IPS policy.
Increasing the default limits could improve security but could also degrade
the performance of the device.
Event Logging Limits: A packet could be matched against more than one
IPS rules that generate events. When more than one events are generated by
a packet, they are placed in the event queue, and the top events are logged
by the device. The rule processing configuration can be set in the Advanced
tab when editing a policy access control and allows you to set the queue
size, the number of top events to be logged, and how the events are
prioritized in the queue, as illustrated in Figure 11-25.
The advanced settings also allow you to set a global threshold (see Figure
11-26) to manage the number of events generated by each rule over a period
of time. When you’re using the global threshold, that threshold applies to all
rules that do not have an overriding specific threshold set.
Stack/Cluster
437
for redundancy. Both options can be configured in the FMC’s Devices tab.
Clicking Add brings up cluster and stack options, as shown in Figure 11-27.
For either feature, more devices must be managed in the FMC in order to be
configured.
Figure 11-27 Stack and Cluster Dropdown in the FMC’s Devices Tab
Summary
As you have seen in this chapter, Cisco NGIPS products can be fully
managed using the FMC. You have seen how IPS policies can be configured
and customized for each network’s needs. In this chapter you also learned
about Snort rules and how to write new ones. You have also learned how
preprocessors are used for more efficient protocol processing in the system.
You have also seen the intelligent recommendations Cisco NGIPS can offer
for more efficient configuration and how to configure redundancy and
stacking.
438
Chapter 12. Reporting and Troubleshooting
with Cisco Next-Generation IPS
This chapter covers the following topics:
Analysis
The FMC provides robust reporting capabilities that can help administrators
investigate intrusions, indicators, or compromise and suspicious activity
identified by NGIPS. An intrusion policy that is tied to an access control
policy by default generates a log in the FMC at the end of every connection
that triggers an IPS event. That log is unrelated to any IPS logging actions
generated in the rule. When a possible intrusion or malicious activity is
identified, an intrusion event is triggered that records the date, the time, the
type of exploit, as well as contextual information about the source of the
attack and its target. IPS rules generate connection events according to their
configured default action. When a rule generates an event, the system does
not automatically generate a connection event at the end of the connection
that triggered the rule unless it is configured in the default action. These logs
can further be used in the analysis. Any sort of connection analysis requires
connection log collection on the FMC.
439
The FMC can help an investigator look into the NGIPS-collected data with
a variety of tools:
Time-based reports
Alerting
Incident handling
Workflows
Correlation policies
Intrusion Events
You can use the FMC to view, review, search, and analyze intrusion events
in the FMC. Overview > Summary offers an Intrusion menu that provides a
summary of the intrusion events identified by the NGIPS (see Figure 12-1).
You can adjust the time interval the events refer to by using the time range
link at the top right of the page.
440
By selecting Intrusion Event Statistics, you can see a summary of the
intrusion events triggered, as shown in Figure 12-2.
As shown in Figure 12-2, the Intrusion Event Statistics page includes the
following:
An event overview, with information about the total events in the event
database that stores the events triggered within the time interval
Event statistics, with details about the event database, such as the most
heavily triggered events, the zones that trigger most events, and the NGIPS
that generate them
441
Figure 12-3 Intrusion Event Performance
Selecting Intrusion Event Graphs brings up the Intrusion Event Graphs page,
shown on Figure 12-4. This page allows you to plot the intrusion events
generated over time. You can filter the events based on NGIPS, destination
ports, addresses, messages, and time. The end result is a graph that shows
how the events trend over time and which intrusion events were most
prevalent.
For more detailed analysis of the event information, FMC offers the
Analysis tab, which provides an Intrusions dropdown, as shown in Figure
12-5.
442
The Events default workflow, shown in Figure 12-6, shows the events
triggered by the system in a specific time frame. The time can be adjusted
using the time range link at the top right of the page. The Jump To dropdown
allows you to go to various event types. Specific buttons also allow you to
view, copy, delete, or download the packets that triggered the events. If you
are certain that an event was not malicious, you can mark it as Reviewed to
move it to the reviewed events.
You can see the reviewed events can by selecting Intrusions > Reviewed
Events (refer to Figure 12-5). From the Reviewed Events page you can
view, unreview, copy, delete, or download the packets that triggered the
event.
You can further investigate the events shown in the Events page by
associating them with logged connections, if any. To do this, you click the
link of the event message name, as shown in Figure 12-7. This way, you can
view the actual flows that generated the events.
443
Figure 12-7 Events in Relation to Connections
You can search events by selecting Analysis > Search. You can save the
search options in the Events or Reviewed Events workflows and then
revisit them later by clicking the Search button in the workflow. The custom
search page, shown in Figure 12-8, allows you to save various search
criteria so that you can rerun a particular search.
You can load a saved search from the save search panel on the left of the
Analysis > Search page, which shows all the saved searches. After you
load a particular search, you can run it and find the results at Analysis >
Events.
You can use the search results on the Events page to generate new reports.
Suppose you have one or more events in the Events page. You can copy
them by using the Copy button (refer to Figure 12-6). Those events are then
stored in the Clipboard, and you can view them by selecting Intrusions >
Events > Clipboard, as shown in Figure 12-9.
444
Figure 12-9 Intrusions > Events > Clipboard
You can use the events in the Clipboard to generate reports, as shown in
Figure 12-10. You have two available options: generate a report for only the
checked events or generate a report for all the events.
When you generate a report, the next screen is Report Templates, shown in
Figure 12-11. Here you can choose from the available report options and
generate the report. You can then run the report immediately or save it to be
run later. There are three report formats available in FMC: PDF, HTML,
and CSV.
445
Figure 12-11 Report Template
The reports can be stored and reviewed from the Overview tab. The
following section provides more information on reports.
A workflow consists of table views, detail pages, graphs, and final pages.
446
You can change the intrusion event workflow used in the Event View
Settings page with the Switch Workflow link, as shown in Figure 12-13.
You can then view events based on the pages and tables in the predefined
workflow chosen.
If the predefined workflows are not satisfactory, you can create custom
workflows by selecting Analysis > Custom > Custom Workflows (see
Figure 12-14).
447
Step 2. Define a workflow name.
Step 3. Add pages to the workflow. You can customize pages based on the
columns that should be present in the page (see Figure 12-15).
You can export a custom workflow from an NGIPS device and reuse it in
another one by clicking the Export icon in the Custom Workflows page or by
selecting System > Tools > Import/Export.
Reports
Cisco FMC can provide multilevel reports with event views and
dashboards that can help you identify potential security threats and monitor
security. It also supports custom reports. An FMC report is in PDF, HTML,
or CSV format. A default report template defines the data searches and
formats for the report sections. It also defines the sections, the source
database with the content, and the presentation format. You can build custom
report templates by using a powerful template designer. Reports can be
exported and imported so they can be reused within the FMC. Input
parameters can be imported in a report to expand its usefulness.
You can adjust the default template available in the FMC to include new or
remove existing sections. In order to create a template, you first need to go
to the Events page (see Figure 12-16) and navigate in the events so that only
interesting events are included in the viewer. Then you click Report
448
Designer, highlighted in Figure 12-16. You can also create event reports by
selecting Overview > Reporting > Report Templates and using saved
searches.
Figure 12-17 shows the first sections of the report template built from the
intrusion event workflow. You can set a report title, delete any unwanted
sections, adjust titles and formats of sections, change settings of section
fields, add page breaks and text, and add tables of contents and cover pages
through the advanced settings. Then you can save the template.
You can also export a report template, by clicking the Import button to
import a previously exported template.
When you complete the report design, you can generate it by using the
Generate button. The Generation popup page allows you to set the report
name, the global timeframe that will be applied to all sections in the report,
and the format (PDF, CMV, or HTML). If input parameters are used in the
report, then the generation process prompts for these parameters. For
example, Figure 12-18 demonstrates setting the report template in a report.
449
Figure 12-18 Report Scheduling
You can also schedule reports to run at later time from the task scheduler
available at System > Tools > Scheduling > Add Task. You can schedule
the tasks to run once or to recur at certain times. A status email can be sent
to the administrator to confirm report completion.
Finally, the Reports tab, available at Overview > Reports, includes all the
previously run reports. You can download or delete any of the stored report
files.
Incidents
450
The Cisco FMC by default supports and can alert based on the following
type of incidents:
Damage
Denial of service
Hoax
Intrusion
Theft
Unknown
Website defacement
In order to create an incident in the FMC, you go to Analysis > Intrusions >
Incidents (see Figure 12-19). If there are stored events in the Clipboard,
when creating a new Incident, the clipboard events show in clipboard table
in order to be added to the incident if necessary. As with any other report,
incident reports can be run and generated on the fly in HTML, PDF, or CSV.
451
Figure 12-19 Incident Creation
While you are at Analysis > Intrusions > Incidents, you can create new
incident types other than the predefined ones while creating a new incident
and by editing the incident type field.
You can run a report on a defined incident by using the Generate Report
button shown in Figure 12-20. You can also schedule incident reports.
452
Figure 12-20 Incident Report Generation Button
Alerts
Although the FMC can provide various types of analytics to enable you to
monitor the health of the network, you might prefer to receive alerts about
certain events so you can act quickly to remediate them. The FMC allows
you to configure email alerts, logging to a server, and SNMP traps.
The system can generate alerts when one of the following happens:
A discovery event
The email, SNMP, and syslog alert settings used in various alert
configurations in the system are configured at Policies > Actions > Alert, as
shown in Figure 12-22.
453
Figure 12-22 Alert Server Profile Configuration
SNMP Alerts
Event data
By clicking the Edit button in the policy’s advanced settings, you can set the
SNMP trap settings as shown in Figure 12-23. These include binary or
string rendering of the IP addresses, SNMP version, server address,
authentication password, encryption password, and username. The
configuration fields change depending on the SNMP version.
For SNMP traps and syslogs, the actual events are generated by the sensor
itself. The alerts configured at Policies > Actions > Alerts are generated by
the FMC and leverage the correlation engine.
Email Alerts
454
Email alerts generated by the NGIPS contain the following information:
Current time
By configuring the email fields at Policies > Intrusion > Email, you can set
the sender and receiver, the maximum events, and frequency per email;
enable summarization and coalescing of the alerts; set the time zone; and
enable alerting for specific IPS rules (see Figure 12-24).
Syslog Alerts
455
Syslog alerts generated by the NGIPS contain the following information and
more:
Event message
Event data
Revision
The FMC platform can also alert based on event impact. You set the impact
in the FMC based on the correlation between the IPS policy rules and the
network discovery. The FMC shows the relevance of the attack to the host
that is actually targeted. Higher-impact events are of more importance for
the host in question than are lower-impact events. As shown in Figure 12-
26, under Policies > Actions > Alerts, you can configure syslog, email, and
SNMP alerts based on triggered event impact.
456
Figure 12-26 Impact Alert Settings
You configure the syslog, email, and SNMP profiles on the Alerts tab (refer
to Figure 12-22). In addition, you can configure discovery event and
malware alerts on other tabs, as discussed in Chapter 6, “Cisco AMP for
Networks.”
Correlation Policies
457
Figure 12-27 Correlation Policy Rule Management
You can also define a whitelist and a profile by using the corresponding
tabs. A compliance whitelist is a list between a destination and the host
profiles discovered in the network. If traffic that violates the whitelist is
identified, a whitelist alert is generated, and the appropriate remediation
action takes place (see Figure 12-28).
The FMC can also send an alert based on the correlation policy. The Policy
Management tab has a response icon (see Figure 12-29) for each correlation
rule that brings up the available responses, as shown in Figure 12-30. As
you saw previously in Figure 12-22, the responses are set at Policies >
Actions > Alert.
458
Figure 12-29 Correlation Response Button in Correlation Policy
Troubleshooting
459
Audit
Audits are used to examine user interaction with the FMC web interface and
system logs. Audits are presented like an event view that allows for the
analysis of audit log messages. Only 100,000 logs are stored at a time in the
audit log. Beyond that limit, the older messages are removed in favor of the
new ones.
The predefined audit logs can be viewed at System > Monitoring > Audit,
as shown in Figure 12-31.
The predefined audit log view shown in Figure 12-32 displays all
interactions of the administrator using the GUI interface. It also includes the
time, the action, the address of the administrator, and the event description.
The Edit Search button in a log view allows you to do custom searches
based on different criteria, such as user, message, time, source IP address,
or change.
Health Monitoring
The health of a device is important to ensure that there are no issues with its
operation. FMC’s health monitor provides numerous ways of keeping track
460
of the health of an NGIPS. A series of tests define a health policy that can be
applied to multiple devices to monitor their health. Tests can be scheduled
and run periodically or at will. You can check the health status of a device
from FMC health charts and status tables. Figure 12-33 shows the Health
tab options:
Monitor
Policy
Events
Blacklist
Monitor Alerts
A health policy consists of health modules, which are test scripts you run to
test the health of the device. The FMC offers a variety of health modules,
such as AMP, appliance heartbeat, disk usage, disk status, CPU, and more.
As shown in Figure 12-34, the Health Policy tab has all the modules
available on the left side. You can choose a module to enable it and set
preferred values. For example, for the CPU, Memory, and Disk usage
module, there is a warning and critical CPU threshold that triggers warning
or critical syslog messages, respectively. Specifically for IPS, the IPS event
rate option configures the event thresholds that trigger warnings and critical
messages. There are many more modules that can be configured under the
health policy.
461
Figure 12-34 Health Policy Configuration
The FMC also allows you to compare a health policy against older health
policies.
On the Health tab, the Blacklist option allows you to disable health
monitoring for specific devices or health modules (see Figure 12-35). For
example, if there is a network update that will bring the network down or an
interface status is expectedly flapping, a blacklist could disable the alerts on
the segment or the interface status. You can apply blacklists to a device or a
module.
The Health Events tab, shown in Figure 12-36, displays all the health-
related events from the system. To view only the events specific to one
device, you can go to the Health Monitor and click the device name link.
When you choose the alert level, the table shows only the health alerts
462
related to that alert level.
By using the Health Monitor Alerts tab, you can configure notifications
through email, SNMP, or remote syslogs about changes in a health module
status. For example, an email can be sent when a CPU meets a warning
level. A second email can be sent for a CPU of critical level. Figure 12-37
shows how you can set up a module to alert using one of the three options
(right column) and severity (left column).
Syslogs
For troubleshooting purposes, you can view the syslogs from the FMC at
System > Monitoring > Syslog. The syslog displays each message
generated by the system. Each syslog contains the date that the message was
generated, the time it was generated, the host that generated the message,
and the message itself. System logs are not generated by the devices
themselves; they refer to the FMC appliance or VM.
There is also a search field you can use to search through the logs by using
463
grep-like regular expressions, as illustrated in Figure 12-38. You can set the
syslog filter to be case sensitive and to exclude the syslog that matches the
filter.
Summary
This chapter demonstrates how an analyst can use the FMC to analyze and
investigate information generated by an NGIPS. You have seen how to
review and look into intrusion events, create reports, analyze incidents, and
generate alerts. You have learned how to create custom workflows and
correlation policies. You have also learned about the troubleshooting
capabilities of an NGIPS. You have learned how to monitor the health of a
system, use health alerts, and audit the status of a device to ensure its
smooth operation.
464
Index
{ } (braces), xxi
AAA authentication
465
viewing, 92
adaptive scanning, 19
administrative features
alerts, 318–322
email, 320
SNMP, 319–320
syslog, 321
466
all keyword, 137
description, 183–184
467
ESA configuration, 189–191
reports, 192–193
architecture, 197
groups, 236–237
installing, 239–250
468
proxy complications, 250–251
469
installation options for, 172
470
Glovebox feature, 256–257
analysis
network, 100–101
NGIPC, 307–324
Android OS
anti-spam features, 14
471
AnyConnect ISE Agent, 23
applications
architecture
472
generating troubleshooting files in, 137–138
interface configuration, 85
methods of launching, 80
uploading, 78–79
asdm-launcher.msi utility, 80
audits, 324–325
authentication
email, 14
Kerberos/GSSAPI, 251
473
auto-MDI/MDIX feature, 85
back doors, 10
blocking
IP addresses, 205–206
botnets, 5–6
474
C
cache settings
475
password setup, 82–83
clustering, 49–55
default settings, 67
failover, 45–49
476
Firepower Threat Defense, 61–62
FMC configuration, 91
licenses, 37–42
sizing considerations, 36
troubleshooting, 119–140
updating, 111–114
477
Cisco AsyncOS operating system, 19–20
Cisco Meraki
Cisco SenderBase, 14
478
Cisco Talos, 98, 104, 143
ciscoasa> prompt, 77
479
cluster control links (CCLs), 61
commands
480
See also specific commands
concurrent connections, 36
481
CSV (comma-separated values) format, 257
advanced, 201–203
Android, 204
IP blacklist/whitelist, 205–206
simple, 199–201
cxsc keyword, 70
data center
data VLANs, 61
482
debug sfr event command, 140
detection options
483
device trajectory, 196
df command, 128
displaying
domain-name command, 83
DONTRESOLVE keyword, 91
484
downloaders, 10
downtime, 274
duplex mode, 85
east-to-west communication, 58
email authentication, 14
email encryption, 14
encryption
email, 14
password, 83
485
endpoint protection. See AMP for Endpoints
engines
events
statistics, 309
486
expert command, 133
exploits, 10
extranets, 271
stateful failover, 47
file analysis
file control, 28
487
advanced, 178–180
firewalls
personal, 11
488
flags keyword, 296
flash (disk0)
space requirement, 70
489
reports provided by, 315–316
troubleshooting, 119–140
490
fully qualified domain names (FQDNs), 161–162
geolocation-based rules, 96
hostname command, 83
491
HTTP response pages, 98, 99, 100
inline mode
NGIPS, 268–269
492
installing
interfaces
intrusion detection/prevention, 28
graphs, 309–310
performance, 309
reports, 312
searching, 311
statistics, 308–309
493
configuring, 289–291
editing, 103
IP addresses
494
Kerberos/GSSAPI authentication, 251
key loggers, 10
licenses
Linux OS
listeners, email, 15
logic bombs, 10
495
logs
audit, 324–325
syslog, 132–135
troubleshooting, 136–139
Mac OS X
mail gateways, 15
mailer worms, 9
malware
attachments containing, 13
496
types of, 9–11
Management-0 port, 67
mass-mailer worms, 9
mode options
NGIPS, 268–270
497
Modular Policy Framework (MPF), 43
monitoring
nameif command, 84
network antivirus, 14
network configuration
498
Network Time Protocol (NTP), 164, 165
alerts, 318–322
audits, 324–325
capabilities, 265–268
configuration, 285–306
incidents, 316–318
499
monitoring mode, 269–270
preprocessors, 299–301
reports, 315–316
stacking/clustering, 305
syslogs, 327–328
troubleshooting, 324–328
variables, 287–288
noconfirm option, 69
north-to-south communication, 58
500
ClamAV, 232
TETRA, 223
outbreak filters, 14
passwords
501
Cisco ASA appliance, 82–83
patches
performance
personal firewalls, 11
phishing emails, 13
platform-based defenses, 3
policies
502
AMP for Linux, 234–235
correlation, 322–324
file, 108–110
ports
503
indicators of compromise, 146
private listeners, 15
product updates
504
production interface, 160
proxy servers
ps command, 130
public listeners, 15
ransomware, 10
505
regular expression limits, 304
reports
incident, 318
rm command, 129
rootkits, 10
506
Routing Information Protocol (RIP), 5
rules
scheduled scans
507
AMP for Mac, 233
segmentation, 267
508
Sender Policy Framework (SPF), 14
SenderBase, Cisco, 14
509
show ifconfig command, 126–127
SIDF Framework, 14
centralized deployment, 20
SMTP daemons, 15
510
SMTP preprocessor, 300
explained, 292–293
tuning, 282
writing, 297
Sourcefire technology, 6
spam, 13
spammers, 10
spanned EtherChannel, 50
spear phishing, 13
511
speed configuration, Cisco ASA, 85
stateful failover, 47
statistics
performance, 304
storage
512
sw-module module sfr recover boot command, 70
syslogs
system requirements
513
T
Telnet passwords, 82
tftp command, 68
tftpdnld command, 68
threat-focused defenses, 3
514
traffic profile, 323
Trojan horse, 10
troubleshooting
NGIPS, 324–328
updates
515
URLs, access control rules for, 97–98
viruses, 9
visibility-driven defenses, 3
516
Web Proxy Auto-Discovery (WPAD), 251
whaling attacks, 13
whitelists
application, 207–209
IP address, 205–206
Windows OS
workflows
517
custom, 314
worms, 9
518
Code Snippets
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
Table of Contents
Cover Page 1
About This E-Book 2
Title Page 3
Copyright Page 4
About the Authors 8
About the Technical Reviewers 12
Dedications 13
Acknowledgments 14
Contents at a Glance 15
Contents 16
Introduction 28
Chapter 1. Fundamentals of Cisco Next-Generation
32
Security
Chapter 2. Introduction to and Design of Cisco ASA with
65
FirePOWER Services
Chapter 3. Configuring Cisco ASA with FirePOWER
114
Services
Chapter 4. Troubleshooting Cisco ASA with FirePOWER
192
Services and Firepower Threat Defense (FTD)
Chapter 5. Introduction to and Architecture of Cisco
222
AMP
Chapter 6. Cisco AMP for Networks 262
Chapter 7. Cisco AMP for Content Security 275
Chapter 8. Cisco AMP for Endpoints 291
Chapter 9. AMP Threat Grid: Malware Analysis and
376
Threat Intelligence
Chapter 10. Introduction to and Deployment of Cisco
385
Next-Generation IPS
546
Chapter 11. Configuring Cisco Next-Generation IPS 412
Chapter 12. Reporting and Troubleshooting with Cisco
439
Next-Generation IPS
Index 465
Code Snippets 519
Images 531
Images 545
547