BRKCRS-2824 (2020)
BRKCRS-2824 (2020)
BRKCRS-2824 (2020)
BRKCRS-2824
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
Cisco can help you secure the workplace in a dynamic
software-defined world
• Introduction
• What is meant by software-defined
• What is meant by ‘secure’ and why it matters
• What is Zero-Trust
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Introduction
What is Meant by Software-Defined
Management, Administration and Orchestration Abstraction
SD-Access ACI
Cisco DNA Center Cisco APIC
Cisco ISE
Campus, ACI
Data Center Faster Policy Changes
Branch,
IoT Policy
governance
AC I Simplify Compliance
S D -WAN Any whe re
D y namic
Ap p -Aware
Ro u ting
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
What is Meant by Secure
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
What is Meant by Secure Security Ecosystem
Threat Vulnerability
Cisco DNA Center ISE
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Why it Matters
RANSOMWARE
ADVANCED PERSISTENT THREATS
SUPPLY CHAIN ATTACKS
UNPATCHED SOFTWARE
WIPER ATTACKS
BOTNETS
CRYPTOMINING
DDOS
CREDENTIAL COMPROMISE
PHISHING
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
What is Cisco Zero-Trust
A zero-trust approach to securing all access across your applications
and environment, from any user, device and location.
Tetration/ACI for
Duo for Workforce SD-Access for Workplace
Workload
Establish trust level for Restrict access to Establish least privilege
users and their devices workloads based on risk, access control for all users
accessing applications and contextual policy and and devices, including IoT,
resources verified business need accessing your networks.
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
The Original Three Tenets of a Zero Trust Network
Internal
External
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Zero-Trust:
Eliminate network
trust using SD-
Access
The Original Three Tenets of a Zero Trust Network
Internal
External
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Cisco Software-Defined Access (SD-Access)
Intent-Based Networking at the Speed of Software
ISE Cisco DNA Center™
Identity-based
Policy Automation Analytics policy and segmentation
Security policy definition decoupled from
VLAN and IP address
Automated
network fabric
Single fabric for wired and wireless with
workflow-based automation
Insights
and telemetry
SD-Access
Extension User mobility Analytics and insights into user and
Policy stays with user application experience
ISE
SXP/pxGrid
ASA
FTD
WSA
Authentication
Authorization
Segmentation Policy
(SGACL)
RADIUS Accounting
AMP Cloud
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Authenticate and Authorize Using ISE
SAML iDPs Single Sign-On
Native Supplicants /
Cisco AnyConnect
Certificate based Auth
Certificate
Authorities
APIs Passwords / Tokens
SCEP / CRL
External Identity Stores
ENTERPRISE Active Directory
802.1X
NETWORK
SQL Server
SD-Access LDAP / SQL
LDAP Servers
Built-in CA
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Zero-Trust:
Segment Network
Access
The Original Three Tenets of a Zero Trust Network
Internal
External
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Why: Simplifying Security Policy
ip access-list
ip access-list
ip access-list ip access-list
ip access-list ip access-list
ip access-list
ip access-list
ip access-list ip access-list ip access-list
ip access-list
ip access-list
ip access-list ip access-list
ip access-list ip access-list
ip access-list
ip access-list
ip access-list
ip access-list
ip access-list
ip access-list
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Why: Simplifying Security Policy
Employees Guests
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Can You See the Business Intent here?
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Can You Spot the Business Intent here?
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
SD-Access Virtual Network (=VRF)
Virtual Network maintains a separate Routing & Switching instance for the
devices within it.
C
• Control Plane uses Instance ID to maintain
separate VRF topologies Known
B
Unknown
B
Networks Networks
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
SD-Access Scalable Group (SGT)
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Segmentation Operation in SD-Access Fabric
Cisco DNA
Center Cisco ISE
• Classification: Dynamic/ISE
• Propagation: SGT in VXLAN
Policy
download
• Enforcement: Egress Fabric Edge
Authc/Authz
Policy
download
Destination
Egress Policy
Employee Contractor
Source
PLC Permit All Deny All
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Static Classifications Automated
Assign IP Pool in VN,
Provisions VLAN:SGT
Classification
cts manual
policy static sgt x
Trunk
no propagate sgt
VLAN-A VLAN-D
Workstation
VLAN-B VLAN-C
Use-case Example:
Extended Node
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Enforce on the Fabric Border or Propagate Outside
Cisco DNA Center SXP ASA
Use-Case:
Automation Analytics ISE
pxGrid Inter-VN Enforcement
VN2 FMC/FTD
VN1 SXP
Inline Tagging
ACI B B (CMD)
Use-Case:
Groups/Mappings
Learned from ACI,
Enforced on Border
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
New Policy Views
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Policy Migration / Sync with ISE
Start Migration
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Policy Migration / Sync with ISE
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Policy Migration / Sync with ISE in Progress
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Policy Migration / Sync with ISE Successful
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Manage Policy in Cisco DNA Center or ISE
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
ISE: Segmentation UIs READ ONLY
(Security Groups, SGACLs, Policy)
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
ISE Read-Only Views
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Cisco DNA Center Supporting VN Agnostic SGTs
Cisco DNA Center supports VN agnostic SGTs from release
1.3.1 (Groups can now officially reside in different VNs)
x
VN:IACS VN:PLC
Same SGT,
Industrial Automation and Control Systems (IACS) SGT: IOT SGT: IOT
same policy
Programmable Logic Controller (PLC) IACS
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Policy Extended Node
Similar to provision as
‘Extended Node’ but inline B
B
tagging enabled on uplink and Fabric
policy now handled by the
Policy Extended Node itself.
Site E
E
FE1 VXLAN FE2
Initially IE3400 and IE3400H
supported Inline tagging
SGT4 Employees
Host 2
Policy Extended Node
PLC-1
SGT19 PLC
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
HTTPS Download (capability being improved)
Cisco DNA Center
ISE 2.7
TLS 1.2 Server with REST/JSON API
Used for Env-Data & SGACL Download
Automation Analytics ISE
RADIUS: TLS/REST/JSON:
Env-Data/SGACL Request Env-Data/SGACL Request
ISE-PSN3
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
3rd Party AAA
• Authentication and Authorization requests
directed to 3rd party Cisco DNA
• SGT and VN assignments must be coordinated Center
between 3rd party AAA and DNAC
3rd
Party
RADIUS ISE
Access Accept w/
server Cisco AV
cts:security-group-tag-
1 0001-01 + Vlan ID
2
Policy
Policy
Request
Download
SRC:10.1.10.220
DST: 10.1.100.52 with-3rd-party-radius-using/ta-p/3930041
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
3rd Party NAC
pxGrid
connection
3rd
Party
NAC
1
Share active
session
information
1
Passive
Monitoring
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
3rd Party NAC
pxGrid
connection
3rd
Party
NAC
2
Share endpoint
classification
RADIUS CoA 3
Passive applies SGT &
VLAN Policy
Monitoring ASA
4 Download SXP/pxGrid FTD
WSA
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Zero-Trust: Security Policy
Segment Network Across Domains
Access
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
NGFW FMC/FTD 6.5 Enhancements
• Learns IP/SGT via PxGrid, Expanded Use-Cases, Insert FTD anywhere in designs
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Intuitive Networks Built in a Completely Different Way
Maintain that segmentation across multiple domains?
Data Center
Public
Users Cloud
SaaS
SD-Access SD-WAN
Campus/Branch Cloud
Edge
Devices Internet
Fabric Fabric
Site 1 SDA
Site 2
Transit
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Multi-site with IP-Based WAN Transit
1 CONTROL PLANE
LISP MP-BGP / Other LISP
B SXP
B
B B
Fabric IP Transit
Fabric
Site 1 (traditional WAN)
Site 2
VXLAN SGT (16 bits) 802.1Q MPLS 802.1Q VXLAN SGT (16 bits)
Header VNID (24 bits) VLAN ID (12 bits) Labels VNID (24 bits) VLAN ID (12 bits) Header VNID (24 bits)
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
SDA-SDWAN Integration Future
1 CONTROL PLANE
LISP OMP LISP
B
1 BOX B
Border
Fabric B SD-WAN B
Fabric
Site 1 Site 2
Transit
VXLAN SGT (16 bits) IPSec CMD SGT MPLS VNID VXLAN SGT (16 bits)
Header VNID (24 bits) Header Header (16 bits) Labels (24 bits) Header VNID (24 bits)
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
SD-Access SGTs Provisioned in ACI
EXT- EXT-
EPG1 EPG3
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Details: SDA Scalable Groups Used in ACI Policies
SDA Policy Domain ACI Policy Domain
ISE
ISE Exchanges:
SGT Name: Auditor Contract in ACI
SGT Binding = 10.1.10.220
referencing SGT
from ISE (EEPG)
Programs the
Border Leaf
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
ACI EPGs Automatically Propagated into SD-Access
ACI
ISE
ISE dynamically learns
EPGs and VM Bindings
from ACI fabric – shared
to SXP
VM1
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Detail: ACI Groups used in SDA Domain
SDA Policy Domain ISE
ACI Policy Domain
Fusion
Firewall ACI Spine (N9K)
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Zero Trust: Gain
Network Visibility
and Analytics
The Original Three Tenets of a Zero Trust Network
Internal
External
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
SD-Access Assurance and Analytics
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Monitoring as Enforcement is Enabled
• Group-Based Policies reduce SecOps effort – but works differently
• Ops understanding needed
• Dynamic security functions are audited differently – but easier and more accurate
• Some new functions should be monitored
• SXP connection traps and syslogs
• Possibly logging group membership
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Monitoring as Enforcement is Enabled
• SGACL syslogs, NetFlow events and ASA logging all useful
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Stealthwatch: Network Visibility & Anomaly Detection
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Best Practice: Use Netflow for Visibility
172.168.134.2
10.1.8.3
Where
What
Who
When Who
More Context
Security Group
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Model Policy in Stealthwatch
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Use Case: Rapid Threat Containment
Business Data
App / Storage Stealthwatch
Flow anomaly
detected from
Mary’s device
INET
Corp Network
ISE
Employee Finance
SGT SGT
Corporate VN
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Zero Trust: Gain Group-Based
Network Visibility Policy Analytics
and Analytics
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Group-Based Policy Analytics: Discovery (EFT)
Endpoint Group-Group
Activity
Services ?
Policy
Discovery
ISE
Profiles
Alerts
Policy
Identity
& SGTs Stealthwatch
Host Groups
Streaming
?
Modeling WEB
MAC/IP Address Cameras SSH Employees
Policy
Enforcement
Guests
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Group-Based Policy Analytics: Modeling Future
Policy
Observe and fine-tune for days/weeks
Streaming
?
Modeling WEB
Cameras SSH Employees
Guests
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Group-Based Policy Analytics: Authoring Future
?
Policy made available for download
Streaming
Policy
Modeling WEB
Cameras SSH Employees
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Use-Case
Examples and
Best Practices
Typical Policy Starting Points / Use-Cases
Start Small Select 1 use-case prove value & provide operational understanding
Reducing and simplifying Firewall rules Reduce errors & human resource impact
Control Access to Crown Jewels IP protection, export controls, Prod / Dev segregation, etc
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Approaching a Segmentation Design
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Typical Deployment Approach • Authc Monitor mode (open auth)
allows SGT assignment & traffic
Cisco DNA Center
regardless of authentication
result
ISE Automation Analytics • Classified traffic traverses the
network allowing monitoring and
$ PCI Server validation
B • Initially use SGACLs with permit
HR Records and then deny logging enabled
(remove log later if not required).
Development Server SGACL Monitor Mode also
available
• Enforcement may be enabled
gradually per matrix ‘cell’
PCI User • Keep default policy as permit
Authc Monitor Mode and allow traffic ‘unknown SGT’
SRC \ DST PCI User (10) Dev Server (222) during deployment
Dev User(8) permit ip permit ip interface xx
source template DefaultWiredDot1xOpenAuth
PCI User (10) permit
deny ip
ip log permit ip
Guests (100) permit
deny ip
ip log permit ip
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Conclusions
Conclusions
Cisco can help you secure the workplace in a dynamic
software-defined world
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Additional Resources
Group- Based Access Control in Cisco DNA Center 1.3.1:
https://salesconnect.cisco.com/open.html?c=cbf45a8f-aac7-4f01-b3a7-7d134f0b339e
How to use Group-Based Policies with 3rd party RADIUS server and Cisco DNA Center 1.3.1:
https://community.cisco.com/t5/networking-documents/how-to-use-group-based-policies-
with-3rd-party-radius-using/ta-p/3930041
http://cs.co/sda-resources
SD-Access http://cs.co/sda-community http://cs.co/sda-youtube
ISE
http://cs.co/ise-resources
Identity Service Engine http://cs.co/ise-community http://cs.co/ise-videos
http://cs.co/dnac-resources
Cisco DNA Center http://cs.co/dnac-youtube
http://cs.co/dnac-community
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Continue your education
Demos in the
Walk-In Labs
Cisco Showcase
BRKCRS-2824 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Thank you