FTD
FTD
BRKSEC-2494
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKSEC-2494 © 2020 Cisco and/or its aliates. All rights reserved. Cisco Public 3
Firepower Diagonal Learning Map Thursday BRKSEC-2034 -14h45
Cloud Management of Firepower
and ASA with Cisco Defense
BRKSEC 3629 – 14h45 Orchestrator
Designing IPSec VPNs with Firepower Threat
Monday – 8h30 Defense integration for Scale and High Availability
TECSEC-2600
Next Generation Firewall Platforms and
Integrations
BRKSEC-2056 – 9h45 Friday
TECSEC-3004 Threat Centric Network
Troubleshooting Firepower Threat Security
Defense like a TAC Engineer PSOSEC-4905 - 13h30
The Future of the
Firewall BRKSEC-3035 – 8h30
Firepower Platforms Deep Dive
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Your Speaker
Sumit Bist
[email protected]
Solutions Architect
BRKSEC-2494 © 2020 Cisco and/or its aliates. All rights reserved. Cisco Public 5
Agenda
• Introduction
• Performance Testing-101
• Best Practices
• Demo
• Conclusion
• Session Takeaways
BRKSEC-2494 © 2020 Cisco and/or its aliates. All rights reserved. Cisco Public 6
Session Objectives
BRKSEC-2494 © 2020 Cisco and/or its aliates. All rights reserved. Cisco Public 7
Introduction – Key Terminology
These terms are within the context of Firepower Threat Defense.
Term Definition
Lina Underlying ASA-derived process that is integrated into the FTD product
FMC Firepower Management Center – Off-box GUI used to manage FTD devices
(Configuration, reporting, monitoring, etc.)
FXOS Firepower Extensible Operating System – System that manages the hardware
platforms for Firepower 9300, 4100, and 2100 series products
BRKSEC-2494 © 2020 Cisco and/or its aliates. All rights reserved. Cisco Public 8
Introduction – Key Terminology
These terms are within the context of Performance & Threat Efficacy Testing .
Term Definition
BRKSEC-2494 © 2020 Cisco and/or its aliates. All rights reserved. Cisco Public 9
Introduction – What is Firepower Threat
Defense?
• ASA and Firepower
functionality wrapped into a
single, unified image
ASA Firepower
(Lina) (Snort)
• All processes run within single
operating system
BRKSEC-2494 © 2020 Cisco and/or its aliates. All rights reserved. Cisco Public 10
Firepower Threat Defense - Functional Diagram
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Performance Testing-101
Performance Testing 101
• Performance Basics
• Types of Performance benchmarks
• Influencing factors
• Performance Tuning
• Best Practices
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Performance Basics
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Lina vs Snort Overview
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Types of Performance benchmarks
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
The World of Testing tools
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Performance Factors
• Elephant Flows
CPU • Load Distribution
• Connections per second
Memory
Throughput
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Performance Factors
CPU
• Number of policies/rules
Memory • Maximum active connections
Throughput
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Performance Factors
CPU
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Performance Tuning
Agenda
Increase in
Average Packet size
Average
Object size Packet size
SSL Record size
Delayed Ack Increase in
Throughput
Load/Connection Ramp-up Profile
Load-distribution
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Performance Tuning
Average Packet size
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Performance Tuning
Average Packet size
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Performance Tuning
Object size
SSL • Application data sent in response
Record to GET request
Object Size
size
Delayed Ack
• Combines several Ack responses
into one.
Average Packet size
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Performance Tuning
HTTP object size
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Performance Tuning
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Performance Tuning
Delayed Ack
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Performance Tuning
Load/Connection Ramp-up Profile
• Short connection ramp-up time may create traffic bursts when testing with
small packet size.
• It may result into interface oversubscription on DUT.
Max Sessions
Data Rate
Sessions Per Second
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Performance Tuning
Load/Connection Ramp-up Profile
Data Rate
Sessions Per Second
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Performance Tuning
Load-distribution on CPU cores
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Performance Tuning
Load-distribution on Cluster Units
Unit Total Conns (/sec) Reg Conns (/sec) Dir Conns (/sec) Fwd Conns
(/sec)
unit-1-1 12448 6218 6230 0
Even
Distribution
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Performance
Troubleshooting
Performance Troubleshooting
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Best Practices
Baselining Your Test
Always baseline your test back to back before connecting your DUT
Wired back
to back for
baseline
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Default MSS Settings
• Ixia Breaking point does not
dynamically adjust MSS. You will
need to manually set it from 1460
to 1380 bytes
Best Practices • Cyberflood will dynamically adjust
Testing Tools MSS.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
There is no MAX All test, break it
down into separate test cases.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Best Practices
• Tune sub-optimal logging
• Especially applicable to Maximum new connections per second test
Disable
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Best Practices
• Small average size packets with high input rate (micro-bursts) may lead to interface
oversubscription (overrun, no buffer drops)
• Tune average packet size and connection ramp-up rate.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Create Trust/Prefilter/IAB rules for:
Best Practices
Elephant flows – e.g. Database
sync operations
VoIP protocols
East-West traffic
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Smart Inspection
Tune AMP/File policy’s direction of file
transfer
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Demo: Recreating Data Sheet Numbers
Recreating Data Sheet Numbers – FPR4115
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Recreating Maximum TLS Throughput
Preconditions to Test
• SSL version: TLS 1.2, RSA key: 2048 bit, Cipher suite: TLS_RSA_AES256_SHA
• Traffic Profile: 50% TLS, 50% HTTP Any-Any
Allow rule
• Access-Policy
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Inaccurate Host Profile
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
IXIA Strike Testing Overview
• Strikes are usually based off common vulnerabilities (CVE’s) and exploits
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
IXIA Strike Testing Overview
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Best Practices
Application Protocol fixup (lina)
Application inspection on lina side
might lead to traffic drops, thus
hampering test results.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Always use latest SRU/VDB
packages installed for the
most recent Snort IPS Rules
Set and Vulnerability Database
Best Practices
As older rules become
irrelevant, they can be
FMC Security Updates disabled in a more recent SRU
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
For efficacy/strike testing with Ixia
Breaking point, always use :
• HOME_NET ANY
• EXTERNAL_NET ANY
Best Practices
FMC Variable Sets
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Some of the Ixia strike lists might
contain malware content, in addition
to exploits
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Demo: Efficacy Testing
Efficacy testing using IXIA Breaking point
Preconditions to Test
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Conclusion
What did we learn?
Higher Throughput
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Session Takeaways
Session Takeaways
Data points to collect before starting a sizing estimation
• Traffic mix
• Average packet size
• Average CPS numbers
• Enabled features
• An estimate of the average number of rules
• Amount of logging on rules
• Amount of SSL Traffic needing decryption
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Session Takeaways
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Session Takeaways
Existing Firepower customers can leverage FMC Dashboard Reporting to
understand the Applications and traffic profile in their network.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Session Takeaways
• Use Netflow to figure out Traffic profile
• Sample from Stealthwatch as a Netflow collector:
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
We can help you
BRKSEC-3328 BRKSEC-3093
Making Firepower Management ARM yourself using NGFWv
Center (FMC) Do More in AZUR
Thursday BRKSEC-3300
Advanced IPS Deployment
BRKSEC 2348
with Firepower NGFW
Deploying AC with FP
Friday BRKSEC-2140
2 birds with 1 stone: DUO
BRKSEC 2020 Wednesday integration with Cisco ISE and
Deploying FP Tips and Tricks Firewall solutions
BRKSEC-3455
Dissecting Firepower NGFW:
Architecture and Troubleshooting
Tuesday
BRKSEC 2494 BRKSEC-3032
Maximizing Threat Efficacy & Perf Firepower NGFW Clustering
Deep Dive
BRKSEC-2663
BRKSEC 3036 DDoS Mitigation: Introducing Radware Deployment
Decrypting the Internet with Firepower!
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Continue your education
Demos in the
Walk-In Labs
Cisco Showcase
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Thank you
Appendix
NIC Performance Considerations
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Firepower Recommendations
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Better filter for Firepower Recommendations
Excerpt 1: Filter all “Drop and Generate Events” rules which will be enabled after using
recommendations.
Under Intrusion Policy:
• First click on “Disabled” under Rule State
• Then click on ”Drop and Generate Events” under Recommendation
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Better filter for Firepower Recommendations
Excerpt 2: Filter all “Drop and Generate Events” rules which will be disabled after using
recommendations.
Under Intrusion Policy:
• First click on “Drop and Generate Events” under Rule State
• Then click on ”Disabled” under Recommendation
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Snort - Intelligent Application Bypass
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Types of Intrusion Policies
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Trust Rules
• Within the Access Control Policy, defined traffic can be exempted from
File and IPS inspection, which accelerates it through the appliance.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
PreFilter Policy
• PreFilter rules are processed prior to Intrusion Prevention or Access Control
Policies.
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
SSL/TLS Session Reuse
BRKSEC-2494 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83