7.2 Feature Lab - Combined Labs 1 2
7.2 Feature Lab - Combined Labs 1 2
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 90
Cisco dCloud
Topology
dCloud: The Cisco Demo Cloud
This content includes preconfigured users and components to illustrate the scripted scenarios and features of the solution. Most components
are fully configurable with predefined administrative user accounts. You can see the IP address and user account credentials to use to access a
component by clicking the component icon in the Topology menu of your active dCloud session and in the scenario steps that require their
use.
NOTE: For simplicity, not all IP addresses and VLANs are shown.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 90
Cisco dCloud
Credentials
All logins are built-in automatically in the “Cisco Secure Firewall Quick Launch,” as shown below
This Quick Launch panel loads automatically when initiating the dCloud infrastructure. It is also available on the Jumpstation desktop, look for
the Quick Launch shortcut.
Admin credentials across the environment are similar, the username is “admin” unless otherwise specified in a lab and the password will be
C1sco12345.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 90
Cisco dCloud
Time Synchronization
Before you start, it’s important that the time on the Jumpbox is properly synchronized. After connecting to the Jumpbox via Remote Desktop,
verify that the workstation time in the lower right corner is correct. It should show the correct time in the U.S. Eastern timezone. If this time
is correct you can continue with the lab exercises.
If this dCloud:
time is The
notCisco
correct,
Demoresynchronize
Cloud the clock using the following procedure:
Right-click on the time and select Adjust date/time from the menu.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 90
Cisco dCloud
TaskdCloud:
1 – The
Prepare the Environment
Cisco Demo Cloud
Maximize Policies --> Access Control --> Access Control policy --> Modify Access Control policy and uncheck Override Access Control
Policy Lock and Save.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 90
Cisco dCloud
Select Save.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 90
Cisco dCloud
Navigate to Policies --> Access Control create a copy of NGFW1 and name it NGFW1 Copy
Logout of FMC and login using the credentials of user1, username: user1 password C1sco12345
NOTE: user1 who doesn’t have role to Override Access Control Policy Lock cannot make any changes to this policy, user is also notified that
the access control policy is locked by admin user.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 90
Cisco dCloud
NOTE: user2 is notified that policy is locked by admin user, however there is a lock on this access control policy, which user1 didn’t have.
This unlocks the policy and user2 can make changes to the access control policy.
NOTE: Users with the role of override ss control policy lock can unlock policies locked by other users, however, users without role override
access control policy lock cannot unlock other users' policies
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 90
Cisco dCloud
Introduction
Cisco Secure Dynamic Attributes Connector (CSDAC) is an add-on or a feature of the Cisco Firewall Management Center that enables firewall
policy to adapt in real-time to the changes in public and private cloud workload hosted in AWS, Azure, GCP, or VMware. The Firewall
Management Center and CSDAC tandem automates the firewall policy in increasingly dynamic cloud environments, keeping the rules up-to-
date without the need for tedious manual updates and policy deployment. CSDAC maps IP addresses of cloud VMs to Dynamic Objects, which
are then used in the Access Control Policy rules. Any changes in the cloud detected by CSDAC are cascaded in real-time to the management
center, and in turn, to the managed firewalls without any administrator action. CSDAC makes firewall policy dynamic, more secure, and much
easier to manage.
A new software release, version 2.0, of Cisco Secure Dynamic Attributes Connector (CSDAC) was published along with Firepower version 7.2.
The latest release introduces support for Google Cloud Platform private cloud connector. The interface allows on-demand testing of the
connectors and adapters and fetching the provider’s certificate for trust directly from the CSDAC interface.
CSDAC 2.0 is provided as an on-prem and cloud delivered form factor. On-prem runs on the most popular Ubuntu, RHEL, and CentOS
distributions with the install and upgrade process automated with Ansible Galaxy. The cloud delivered CSDAC is runs within Cisco Defense
Orchestrator and can provide dynamic updates to both on-prem and cloud delivered Firewall Management Center deployments.
Below are the major components of the CSDAC and management center integration solution that will be used throughout this lab:
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 90
Cisco dCloud
• Object Providers – the public or private cloud service hosting resources to be tracked. CSDAC 2.0 supports the import of mappings from
the following Providers:
Prerequisites
The CSDAC 2.0 feature requires the following prerequisites:
Objectives
• Review the pre-configured AWS and Azure connectors in the CSDAC
• Configure Office 365 public feed Provider
• Configure management center as an Adapter in the CSDAC
• Set up and test firewall rules with Dynamic Objects
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 90
Cisco dCloud
This opens up a connection to https://198.19.10.103/ where the Cisco Secure Dynamic Attributes Connector (CSDAC) service is
hosted. Use following credentials to log in to the system: admin/Dcl0ud#132 (where 0 equals to zero).
dCloud: The Cisco Demo Cloud
NOTE: The Azure and Azure Service Tags connectors may experience temporary connectivity issues due to Azure Resource Manager’s
throttling mechanism. In such instance, the status of the connector will display the an error message containing the reason returned
by Azure along with limits and measured request count. The dCloud laboratory pods share the same Azure API credentials. When
many instances of this laboratory are active in parallel, the cumulative rate of requests may temporarily exceed the read operations
limit.
Step 3. Find AWS connector and click on the three dots menu in the Action column. Select Edit.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 90
Cisco dCloud
Step 4. Observe the ASW connector’s configuration. Review the mandatory attributes to set up a connector, denoted by the red dot
symbol (*).
Step 5. Note the Test button in the bottom left part of the connector window. You can run an on-demand test to confirm the
configuration is correct.
NOTE: You can configure multiple connectors of each type AWS, Azure, GCP, and vCenter, should you have multiple public or private
cloud instances of the same flavor.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 90
Cisco dCloud
Step 4. (optional) Update the Pull interval to the desired value in seconds.
Step 5. Leave the Microsoft Base API URL https://endpoints.office.com unchanged.
Step 6. Specify the Instance name using the dropdown.
Microsoft cloud services are available in three separate national clouds: US Government, Germany and China. These regional cloud
instances are physically isolated instances of Microsoft cloud services localized within the geographic borders of specific countries
and operated by local personnel.
Step 7. (optional) If you wish, you can Disable optional IPs import with the toggle button.
According to Microsoft documentation, the optional IP addresses represent third-party services used only for integration
functionality. Disabling optional IP addresses retains the core functionality of the services. The prefixes in Microsoft’s public feeds are
denoted with a required attribute set to either false or true. An optional prefix set will have the required attribute set to false and
the description of the missing functionality in the notes attribute as per the example below.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 90
Cisco dCloud
"id": 5,
"serviceArea": "Exchange",
"serviceAreaDisplayName": "Exchange Online",
[...]
],
"ips": [
"13.107.6.152/31",
[...]
"2a01:111:f400::/48"
dCloud: The Cisco Demo Cloud
],
[...]
"required": false,
"notes": "Exchange Online IMAP4 migration"
},
Step 8. In the last step, click on the Test button in the bottom left side of the window to confirm CSDAC can reach out to Microsoft public
feed and download the latest version of the Office 365 service address space.
Step 9. Click Save and confirm “OK” result in the status column for the newly configured connector.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 90
Cisco dCloud
Step 7. The FMC Server Certificate is required to ensure CSDAC connects to the trusted FMC server. CSDAC allows you to fetch and
validate the FMCs certificate chain, directly from the UI. Click the Fetch button and review the contents of the certificates presented by
fmc.dcloud.local.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 90
Cisco dCloud
NOTE: For the Fetch to work correctly, the FMC’s HTTPS certificate CommonName (CN) must be set with the hostname resolvable by
CSDAC (fmc.dcloud.local in our setup). The FMC must also present the entire certificate trust chain in the TLS handshake. Hence it is
required to attach all Root and Intermediate CA certificates when installing FMC’s HTTPS server certificate (under System >
Configuration > HTTPS Certificate).
Step 9. Click the Test button in the bottom left side of the window to confirm correct configuration of the FMC.
Step 10. Click Save and confirm “OK” result in the status column for the newly configured FMC Adapter.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 90
Cisco dCloud
1. CSDAC pulls the list of VMs with provider-specific meta-data, which is then provided to the administrator as Key/Value pairs.
2. The Key/Value pairs are attributes such as user-defined tags in AWS/Azure, or network, power status, or VM name on vCenter.
dCloud: The Cisco Demo Cloud
3. The administrator creates a set of AND/OR conditions to match specific attributes of VMs, to add their IP addresses to individual
Dynamic Objects.
4. CSDAC pushes the Dynamic Objects with resulting IP addresses in real-time to the FMC, distributing them to the managed firewalls.
5. CSDAC pulls the clould providers periodically and when a change to VM or assigned attributes is detected, the update is pushed to
the FMC and managed firewalls. This way the firewall policy remains up-to-date without any action from administrator.
In the task below you will configure a three Dynamic Attributes Filters matching tags of VMs in AWS and Azure clouds. The IP addresses of the
VMs maching the criteria will be dynamically assigned to Dynamic Objects pushed to the FMC. Table below provides a summary of conditions
used to match VMs in this scenario.
(Department eq ‘dCloud_Engineering’)
2 Azure-Engineering Azure AND
(Environment eq ‘UAT’)
(Department eq ‘dCloud_HR)
3 Azure-HR Azure AND
(Environment eq ‘Production’)
Step 15. In the Query section click on the “+” sign button to add matching criteria. Note that CSDAC downloads and allows you to use the
keys and values specific for the selected connector.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 90
Cisco dCloud
In the screenshot below, observe the summary of an engineering VM running in AWS we are going to match on CSDAC. Note the Public and
Private IP addresses as well as the assigned Tag Key/Value pairs.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 90
Cisco dCloud
Step 20. Click on the Show Preview to confirm list of IP addresses of VMs matched by the specified filter.
NOTE: the IP addresses of the VMs in AWS and Azure may change and differ from the ones displayed in the screenshots. IP address
changes are expected and are one of the scenarios CSDAC addresses elegantly, providing the up-to-date IP to Dynamic Object
mappings.
Step 21. Click Save and confirm the new dynamic attribute is available in the Dynamic Attributes Filters section.
Step 22. Click on “+” sign button to add a new Dynamic Object.
Step 23. Set the Name to “Azure-Engineering”
Step 24. Select “Azure” in the Connector drop down menu.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 90
Cisco dCloud
Step 25. In the Query section click on the “+” sign button to add matching criteria. Note that CSDAC downloads and allows you to use the
keys and values specific for the selected connector.
In the screenshot below, observe the summary of an engineering VM running in Azure we are going to match on CSDAC. Note the Public and
Private IP addresses as well as the assigned Tags Key:Value pairs.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 90
Cisco dCloud
NOTE: You can toggle between all & any matching operators, simply click an operator joining two or more conditions.
Step 36. Click on the Show Preview to confirm list of IP addresses of VMs matched by the filter. Notice both “dCloud_Engineering” and
“UAT” Azure tags are matched.
Step 37. Click Save and confirm the new dynamic attribute is available in the Dynamic Attributes Filters section.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 90
Cisco dCloud
Step 38. Repeat Step 22 through Step 34 and create another Azure dynamic object with following details:
• Name: Azure-HR
• Connector: Azure
• Condition: (“Department” eq “dCloud_HR”) AND (“Environment” eq “Production”)
Step 39. Click Save and confirm the new dynamic attribute is available in the Dynamic Attributes Filters section.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 90
Cisco dCloud
Step 1. Login to Firepower Management Center (https://fmc.dcloud.local) from the Jumpbox using Chrome browser or by clicking FMC
Web button in the Quick Launch app.
Step 2. Navigate to Objects > Object Management > External Attributes > Dynamic Objects.
Step 3.dCloud: The number
As the Cisco Demo
of Cloud
the attributes is significant, click on the Filter form in the top right corner and type in “Germany” to display
Azure Service Tags specific to the Germany region.
Step 4. Click on the IP icon ( ) next to one of the dynamic objects to display the host and subnet IP addresses assigned. Note that the
dynamic objects support both IPv4 and IPv6 addresses.
NOTE: The above example displays the contents of the “AzureServiceTag_Sql_GermanyNorth” dynamic object provided by CSDAC
when writing this guide. The list of IP addresses assigned to this object may differ, reflecting the current list published by Microsoft.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 90
Cisco dCloud
Step 5. Now review the dynamic objects provided with Office 365 public feeds connector. Click on the Filter form in the top right corner
and type in “o365”.
Step 6. Click on the IP icon ( ) next to one of the dynamic objects to display the host and subnet IP addresses assigned.
Step 7. Review IP address assignment of the AWS dynamic object configured in the previous secition in Dynamic Attributes Filters. Click on
the Filter form in the top right corner and type in “AWS”.
Step 8. Click on the IP icon ( ) next to to “AWS-Engineering” to display the host and subnet IP addresses assigned.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 90
Cisco dCloud
Step 9. Repeat Step 7 through Step 8 and review IP addresses assigned by CSDAC to “Azure-Engineering” and “Azure-HR” Dynamic
Objects.
Step 1. Login to Firepower Management Center (https://fmc.dcloud.local) from the Jumpbox using Chrome browser or by clicking FMC
Web button in the Quick Launch app.
Step 2. Navigate to Policies > Access Control and edit the NGFW1 Acces Control Policy.
Step 3. Switch the policy view to the New UI layout.
Step 4. Toggle to Grid View by clicking on the matrix button ( ) until. The Grid View switches the policy display to source and
destination focus. Each source and destination criteria are collapsed into single columns and marked with colored object type
indicators.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 90
Cisco dCloud
Step 5. The New UI provides an easy way to add a new firewall rule. Hover mouse cursor over the junction between “Block Selected
Applications” and “Allow DNS – no logging” and click on the + Add Rule button to insert new rule in between.
Step 6. Set the basic settings of the new firewall rule as follows:
• Name: Engineering Access
• Action: Allow
• Logging: Log at the end of connection
• Send Connection Events to: Firewall Management Center
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 90
Cisco dCloud
Step 7. Click on (+) button in either Sources or Destinations and Applications sections in order to specify the objects matching criteria in
the rule.
Step 8. Click on the DYN tab to select from “Dynamic Attribute” object set. Type in “Engineering” in the search bar to narrow down the
display to Dynamic Objects we configured for engineering in the previous sections.
Step 9. Select the AWS_Engineering and Azure_Engineering Dynamic Objects and add them to destination criteria by clicking on Add
Destination Dynamic Attribute.
Step 10. Confirm the objects were added to the destination and click Return to Rule Summary review your rule setup.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 90
Cisco dCloud
Step 11. Confirm the rule is configured like the screenshot below & click Apply to add the rule to the Access Control Policy.
Step 12. The new rule should be now visible between “Block Selected Applications” and “Allow DNS – no logging”.
Step 13. Now let’s configure the rule for HR access. Repeat Step 5 through Step 12 and set a rule with following values:
• Name: HR Access
• Insert: Below Rule “Engineering Access”
• Action: Allow
• Logging: Log at the end of connection
• Send Connection Events to: Firewall Management Center
• Destinations and Applications: Azure_HR, o365_SharePoint, o365_Skype
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 90
Cisco dCloud
Step 14. You should have now two new rules Engineering Access and HR Access between “Block Selected Applications” and “Allow DNS –
no logging”.
Step 15. Click Save at the top right corner of the screen to save changes made to the NGFW1 policy.
Step 16. Click Deploy and push the new policy to NGFW1 with the deploy button ( ).
Step 2. Open Command Prompt and ping the IP addresses dynamically assigned by CSDAC to objects in the firewall policy.
NOTE: Prior to running the following ping tests, please confirm the up-to-date IP addresses assigned to each of the tested dynamic
objects. In management center navigate to Objects > External Attributes > Dynamic Objects. IP addresses
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 90
Cisco dCloud
A randomly chosen IP address from Office365 SharePoint object may not respond, however the ICMP traffic will still match the
o365_SharePoint dynamic object in the firewall rule and produce a log.
Step 3. Login into FMC using the quick launch FMC Access > FMC Web as admin using the password C1sco12345 .
Step 4. Navigate to Analysis > Unified Events. Filter the view to display ICMP connections passed by the firewall. In the search bar type
“Source IP” and specify “198.19.10.21” condition matching traffic from WKST1. Click Apply.
Step 5. Search for the ICMP connections and confirm your pings were matched by HR Access and Engineering Access firewall rules in the
Access Control Rule column.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 90
Cisco dCloud
The default NGFW1 Access Control policy in the dCloud environment should already have connection logging enabled for all traffic except DNS
requests. Also, the NGFW1 device should already be running the Snort 3 engine. To verify follow the steps below.
1. Navigate to Devices > Device Management, verify that NGFW1 is using the Snort 3 detection engine.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 90
Cisco dCloud
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 90
Cisco dCloud
NOTE: The deployment from the previous task must be complete before proceeding.
dCloud: The Cisco Demo Cloud
From the FMC, navigate to Policies > Access Control. Edit the NGFW1 policy and click the Advanced tab.
In the Elephant Flow Settings dialog, note that detection is enabled, and the default threshold is 1024MB and 10 seconds. Change the
detection threshold to 2MB and 2 seconds.
We can go further by defining parameters for flow throttling and bypass. Click the switch to enable the Elephant flow Remediation
section. Here you can adjust the Snort CPU utilization, time window and packet drop thresholds. When a flow exceeds these thresholds,
it will be bypassed or throttled. The default is to bypass all flows exceeding the thresholds.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 90
Cisco dCloud
If you do not want to bypass all flows, you can continue by clicking the Select Applications/Filters link. This allows selection of specific
applications to bypass. Click the link and select the applications with High and Very High Business Relevance. Click All apps matching the
filter then click the Add to Rule button.
Save the selection. This will bypass flows only for applications matching the selected parameters.
Click the switch at the bottom of the dialog to allow throttling of the remaining flows.
The effect of these settings will be to generate connection events for flows exceeding 2 MB and lasting at least 2 seconds, if a flow also
exceeds the Snort CPU and packet drop thresholds it will either be bypassed or throttled depending on whether it matches the selected
application filter. Applications which are highly business relevant will be allowed to bypass without inspection while other flows will be
throttled but continue to be inspected by Snort. Flows which are bypassed or throttled will also generate elephant flow events indicating
the elephant flows were throttled or trusted.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 34 of 90
Cisco dCloud
Click the deploy icon to initiate the deployment & wait for the deployment to complete before proceeding.
dCloud: The Cisco Demo Cloud
Use the Quick Launch to open an SSH session to Kali Inside Linux (198.19.10.200).
The wget command below will download a file which should trigger the elephant flow threshold on NGFW1
wget pov.developmentserver.com/files/QuickTimeInstaller.exe
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 35 of 90
Cisco dCloud
From the Search drop-down in the upper right, select the Predefined search for Elephant Flows (This will limit the events to just connections
with elephant flows)
6. You should now see the connections which exceeded the elephant flow threshold we configured on NGFW1
NOTE: that the events for the executable file also show File Monitor in the Reason column. This is because these connections matched a rule
in the Malware & File policy.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 36 of 90
Cisco dCloud
Click the Advanced tab, scroll to the bottom and ensure the Encrypted Visibility Engine feature is enabled.
Click on the Encrypted Visibility Engine tab and you will be presented with two built-in dashboards:
• Top Encrypted Visibility Engine Discovered Processes - this dashboard represents the top 10 discovered process names with the most
associated network connections
• Connections by Encrypted Visibility Engine Threat Confidence - this dashboard view represents the threat confidence levels and
associated total connections
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 37 of 90
Cisco dCloud
In the upper left corner click the filter icon at the top of the first column ( )
dCloud: The Cisco Demo Cloud
In the filter columns search bar type “client”, check the Client Application checkbox
Click Apply - this adds the five columns to the right of the existing columns.
Click the search bar at the top of the page and search for the following values:
Application Protocol: HTTPS
Source IP: 198.19.10.21 (this is WKST1)
In the upper right corner, change your time window from fixed to a Sliding Time Range of 1 hour.
Click Apply (At this point you should not see any events).
Using the Quick Launch icon on the jumpbox desktop, open a remote access session to the WKST1 desktop.
On WKST1 load the https://rit.edu website from Firefox and also from the Chrome browser.
Refresh your Unified events view on the FMC. You should now see connections.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 38 of 90
Cisco dCloud
Scroll to the right and view the values for the EVE fields. These are described below.
Encrypted Visibility Threat Confidence Score Raw confidence value 0-100 that the detected process is a threat
dCloud: The Cisco Demo Cloud
Encrypted Visibility Process Confidence Score Percentage confidence value in the accuracy of detected process
Note that the detected application and process name is being identified within TLS flows and, most importantly, without decryption.
While Client Application is not specifically an EVE field, this value is updated by EVE for certain TLS processes. This is the field that would
be used in Access Control rules.
Locate the Start Tor Browser shortcut on the WKST1 desktop and start the TOR browser
Click to connect to the TOR network, then navigate to https://rit.edu and refresh to observe the new connection events on the Jump
Box.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 39 of 90
Cisco dCloud
In the left column click in the search bar and type “encrypted”
Notice there are 159 entries listed under Available Applications. These are all client applications that have been mapped to EVE
processes. While EVE can identify 5,000+ processes only a subset are mapped to client applications.
Create an application filter named Blocked-Applications and select the TOR application.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 40 of 90
Cisco dCloud
Navigate to Policies > Access Control and edit the NGFW1 Access Control policy
Add a Block with reset rule and on the Applications tab use your Blocked-Applications filter. Enable Log at Beginning of Connection on
the Logging tab. Place the rule in the Mandatory category along with the other block rules.
Save and Deploy your policy. Wait for the deployment to complete before proceeding.
Return to WKST1 and try browsing from Chrome, Firefox and the TOR browser. Review the FMC connection events and confirm that your
TOR activity is blocked.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 41 of 90
Cisco dCloud
Introduction
The TLS 1.3 is the latest release of the Transport Layer Security (TLS) providing significant security and efficiency improvements over its
predecessor TLS 1.2. Since officially released in August 2018, the TLS 1.3 protocol has been widely adopted by the Internet community
reaching over 60% of the 1 million top web sites by the end of 2021.
The Diagrams above depict TLS 1.2 and 1.3 handshake message exchange. The TLS 1.3 encrypts more attributes during the handshake phase
(most notably Server Certificate), shortens the exchange by 1 round trip and requires use of Ephermeral Diffie-Hellman instead of static RSA
handshake.
Prerequisites
TLS 1.3 decryption services require the following:
Objectives
• Download Malware Test File with and without TLS 1.3 decryption
• Enable TLS 1.3 support on the Threat Defence firewall and configure a decryption rule
• Review IPS, File and connection logs and confirm TLS 1.3 session was properly decrypted
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 42 of 90
Cisco dCloud
Step 3. Once the page loads, open Chrome’s Developer Tools by pressing CTRL+SHIFT+I or navigating Chrome Settings > More Tools >
Developer Tools. Switch to Security tab in the tools.
Step 4. Review the connection details and observe the connection is encrypted with TLS 1.3.
Step 5. Click on View certificate button above the connection details to display the server certificate of eicar.org. Click on Certification
Path to confirm the connection is secured by a publicly trusted certificate authority.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 43 of 90
Cisco dCloud
Step 6. Close the Developer Tools. Scroll down the web page and download a test malware file by clicking on eicar_com.zip hyperlink.
Step 7. Observe the file is downloaded and instantly quarantined locally on the endpoint by the Microsoft Defender Antivirus software.
The download status is marked as Failed – Virus detected.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 44 of 90
Cisco dCloud
Step 4. Configure a new rule to decrypt TLS traffic towards eicar.org. Switch to Rules tab and click Add Rule.
• Name the rule as Decrypt eicar.org
• Set the action to Decrypt – Resign with TLS_Decrypt_SubCA
• Select insert above rule 2
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 45 of 90
Cisco dCloud
The wildcard DN set in this task equal to CN=*.eicar.org matches secure.eicar.com and www.eicar.com. Note, it will not match
eicar.com nor super.secure.eicar.com. If you wanted to match the latter ones you would have to add following DNs to the rule
condition: CN=eicar.com and CN=*.*.eicar.com (respectively).
• Lastly,
dCloud:click
The on theDemo
Cisco Logging
Cloudtab and select Log at End of Connection and send connection events to Firewall Management Center.
• Click Add.
Step 5. Click Save to write the changes to the Demo SSL Policy.
Step 6. Navigate to Policies > Access Control and edit the NGFW1 Acces Control Policy.
Step 7. Click on the None hyperlink next to SSL Policy and select the Demo SSL Policy.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 46 of 90
Cisco dCloud
Step 8. Click Deploy and push the new policy to NGFW1 with the deploy button ( ).
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 47 of 90
Cisco dCloud
Task 3: Blocking Malware Test File Over a TLS 1.3 Encrypted Connection
Step 1. Open a remote desktop session to the WKST1 PC from the jumpbox by using the Quick Launch page (look for Quick Launch on the
Jumpbox desktop). Click on the WKST1 button under Remote Access.
Step 3. Select All Time in the time range and select all items. Click Clear data.
Step 5. Once the page loads, open Chrome’s Developer Tools by pressing CTRL+SHIFT+I or navigating Chrome Settings > More Tools >
Developer Tools. Switch to Security tab in the tools.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 48 of 90
Cisco dCloud
Step 6. Review the connection details and observe the connection is encrypted with TLS 1.3 and secured with a certificate issued by
decrypt.dcloud.local.
Step 7. Click on View certificate button above the connection details to display the server certificate of eicar.org. Click on Certification
Path to confirm the connection is secured by an internal certificate authority ad1.dcloud.local.
Note: Navigating to https://eicar.org/download-anti-malware-testfile will produce unexpected results. The Snort engine will block
any downloadable files based on the ‘EICAR’ string on the webpage noted in the screenshot below, preventing the webpage from
loading properly.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 49 of 90
Cisco dCloud
The transfer of the EICAR Anti Malware Test file will be blocked. After a few failed attempts Chrome displays information the connection was
reset.
If the file is not blocked, ensure you cleared Chrome’s browser cache prior to downloading the EICAR test file.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 50 of 90
Cisco dCloud
Step 2. Navigate to Analysis > Unified Events. Filter the view to display all connections that were not allowed by the firewall. In the search
bar type “Action” and specify “!Allowed” condition. Click Apply.
dCloud: The Cisco Demo Cloud
Step 3. Search for a Connection event log of blocked connection from 198.19.10.21 to 89.238.73.97 (Eicar site’s IP address at the time of
writing this lab guide).
Confirm the connection was blocked and observe the recorded SSL flow messages indicating TLS 1.3 handshake.
Observe the SSL status is Decrypted (Resign) and the SSL version TLSv1.3. Confirm the name of the SSL rule that matched the traffic as well as
the URL.
Step 4. Now, try to find a Malware event triggered by the EICAR file download. As the file was intercepted while being downloaded from
Eicar site, look for a flow from 89.238.73.97 (Eicar site’s IP address at the time of writing this lab guide) to the IP of the WKST1
198.19.10.21.
Confirm the action is Malware Block and the event was triggered by a Network File Transfer. Observe the rich meta data associated with this
event including the File Name, SHA-256, URL, Threat Score and the Detection Name.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 51 of 90
Cisco dCloud
Step 5. Lastly, have a look at the Intrusion event matching EICAR file string in the decrypted traffic flow. Similarly to the Malware event,
the EICAR file was intercepted by Snort while being downloaded from Eicar site. For that reason look for a flow from 89.238.73.97
(Eicar site’s IP address at the time of writing this lab guide) to the IP of the WKST1 198.19.10.21.
Confirm the action is Dropped by Snort engine. Review the details of the Snort’s rule and the content matching EICAR’s file string in the
dCloud: The Cisco Demo Cloud
connection.
Scroll down to the Packet Bytes and observe the EICAR’s file string in the packet dump.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 52 of 90
Cisco dCloud
Prerequisites
The SAML support for external browser requires the following prerequisites to be met:
The feature is supported for the following operating systems and the browsers:
Objectives
• Review the Firepower Threat Defense and Duo Settings
• Using Firepower Management Center, configure Remote Access VPN Certificate and w/SAML as an Authentication method
• Enable External Browser Package
• Allowing Traffic Through the NGFW (Optional)
• Verify the VPN Connection and test the SAML authentication
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 53 of 90
Cisco dCloud
NOTE: The DUO and the Azure AD Accounts used for this lab are being shared by all the Lab users - the login to the DUO and Azure account
has not been shared. These accounts will be available for the duration of the SEVT Labs.
More information on how DUO SSO works and integrates with Azure AD as the SAML IDP is available here.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 54 of 90
Cisco dCloud
3. Locate the file under downloads, right click the file and Open in notepad++ and copy the certificate content.
4. Open FMC, using the FMC shortcut from the bookmark toolbar and navigate to Devices > Certificates and select Add Certificates
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 55 of 90
Cisco dCloud
5. Select Device as NGFW1, For Cert Enrollment click on the + icon, Name as CACert, Change Enrollment Type to Manual, Check CA Only and
paste the certificate contents copied in Step 3 and select Save
Task 2. Create the Secure Firewall Management Center Single Sign-on Server Object
Navigate to Objects > Object Management > AAA Server.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 56 of 90
Cisco dCloud
2. Copy and paste the following information from the SSO_Server.txt file into the Sign-On-Server page in the FMC.
a. Name: DUO_SSO_Azure_AD
b. Identity Provider Entity ID: https://sso-e536f2c9.sso.duosecurity.com/saml2/sp/DIJVXBZTQQNVKQRXK5BA/metadata
c. SSO URL: https://sso-e536f2c9.sso.duosecurity.com/saml2/sp/DIJVXBZTQQNVKQRXK5BA/sso
d. Logout URL: https://sso-e536f2c9.sso.duosecurity.com/saml2/sp/DIJVXBZTQQNVKQRXK5BA/slo
e. Base URL: https://ngfw1-outside.dcloud.local
3. The Identity Provider Certificate is the certificate FTD uses to verify the messages signed by the IDP – DUO SSO in this case.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 57 of 90
Cisco dCloud
NOTE: Since the DUO account has already been provisioned, this certificate has been pre-generated for this lab exercise. If you wish, you can
download and inspect the certificate DUO_Single_SignOn.crt from the same folder as the SSO_Server.txt file. This certificate is also included in
the SSO_Server.txt file.
4. Click the + icon next to Identity Provider Certificate. Now add the Cert Enrollment for this certificate.
• Name :The
dCloud: DUO_Single_SignOn
Cisco Demo Cloud
• Under CA Information, select Enrollment Type as Manual.
• In the textbox named CA Certificate, copy and paste the contents of the certificate from SSO_Server.txt.
• Click Save and then select this certificate from the dropdown.
5. The service provider certificate is used by FTD to sign the requests and build a circle of trust with IdP. Click +
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 58 of 90
Cisco dCloud
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 59 of 90
Cisco dCloud
3. For Authentication Server, select the SSO object created earlier – DUO_SSO_Azure_AD.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 60 of 90
Cisco dCloud
5. Under Client Address Assignment, create and assign the IPv4 Address Pool to be assigned to the Remote Access VPN users. Click on the
Pencil icon. Click on the + icon to the right of the IPv4 Address Pools field. Enter the details as below:
6. From the Address Pools window, select VPNPool, then click Add to add it to the Selected IPv4 Pools column. Click OK.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 61 of 90
Cisco dCloud
7. Under the Group Policy, verify that the group policy is set to DfltGrpPolicy. Click on Edit Group Policy. Under General > VPN Protocols
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 62 of 90
Cisco dCloud
• Select Tunnel networks specified below from the IPv4 Split Tunneling drop-down list.
• For the Standard Access List drop-down list, click +.
• Create a standard access list called Split_Tunnel with the ACE that allows LAN_Network.
• Search for LAN_Network in the Available Network and then click Add.
• Click Add at the bottom right.
dCloud: The Cisco Demo Cloud
• Click Save to save the access list.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 63 of 90
Cisco dCloud
• Click Browse and select AnyConnectProfile.xml (the extension .xml may not be visible) from the RA VPN folder on the Jumpbox
desktop. The remaining fields will auto-populate.
• Click Save.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 64 of 90
Cisco dCloud
2. Click Browse and select the AnyConnect-win-4.10.04065-webdeploy-k9.pkg from the RA VPN folder on the Jumpbox desktop. Click Open.
The remaining fields will auto-populate.
dCloud:
3. Click Save.The Cisco Demo Cloud
4. Enable the AnyConnect File Object Name checkbox and click Next
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 65 of 90
Cisco dCloud
1. For Interface group/Security Zone, select OutZone from the drop-down menu.
NOTE: Do not check the option Bypass Access Control policy for decrypted traffic (sysopt permit-vpn). If you select this option, you do not
need to create specific rules in the Access Control Policy to allow the decrypted VPN traffic.
3. Click Next.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 66 of 90
Cisco dCloud
The default package is available at Objects > Object Management > VPN > Anyconnect File as shown below:
To update External Browser Package, you can either click Add AnyConnect File or follow the steps below:
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 67 of 90
Cisco dCloud
7. Navigate Back to Devices > VPN > RemoteAccess > RAVPN > Advanced, Click on dropdown menu for Package File and select the latest
external browser package.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 68 of 90
Cisco dCloud
NOTE: The access control policy configuration needs to be added if you did not Check the option Bypass Access Control policy for decrypted
traffic (sysopt permit-vpn).
dCloud: The Cisco Demo Cloud
1. In FMC, navigate to Policies > Access Control > Access Control.
2. Select and edit the access control policy NGFW1. Click Add Rule.
NOTE: The direction of the flow of the VPN traffic is from OutZone to InZone1 as the VPN is terminating on the outside interface, which is
assigned zone OutZone
• Select dCloud Balanced Intrusion from the Intrusion Policy drop-down list.
• Select Block Malware from the File Policy drop-down list.
• Click Add to add the rule.
5. Click Save to confirm the changes to the access control policy changes.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 69 of 90
Cisco dCloud
• Select and edit the existing NAT policy called NGFW1 NAT. Click Add Rule.
• The Interface Objects tab should be selected.
• Select InZone1 and click Add to Source.
• Select OutZone
dCloud: The Cisco and
Democlick Add to Destination.
Cloud
3. Select the Advanced tab and select Do not proxy ARP on Destination Interface.
NOTE: Enabling Do not proxy ARP on Destination Interface is critical in this lab exercise. If you miss this step, your pod may have access issues
since all devices are managed in band.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 70 of 90
Cisco dCloud
Deployment
Perform policy deployment changes to push the RA-VPN down to the Firepower / NGFW1 device:
1. Click Deploy and Select the Deploy Icon for NGFW1, Click on Validation Warnings and Select Proceed with Deploy
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 71 of 90
Cisco dCloud
1. Connect to Wkst2 by one of the methods below. You will automatically be logged in as the administrator. You can connect using one of two
methods.
dCloud: The Cisco Demo Cloud
2. From the main dCloud webpage, click the Remote Desktop hyperlink next to Wkst2 machine. Click on the Wkst2 (Outside PC) shortcut in
the Remote Desktops folder on the Jumpbox desktop. However, if you do this, you must allow local LAN access in the AnyConnect client.
NOTE: If you are connected to the pod via VPN, use an RDP client on your laptop to connect to 198.18.133.23. Log in as Administrator using
password C1sco12345.
3. From the desktop of Wkst2, open AnyConnect from the Start Menu. The Connect To field should have NGFW1 selected. If not, click on
dropdown menu and select NGFW1.Click on Connect.
4. Click on the gear icon and uncheck Block connection to untrusted servers
NOTE: This is an optional step, if Block connections to untrusted servers is already unchecked you can ignore this step.
4. This brings up the Microsoft login prompt within the external browser for the operating system (Firefox in this case)
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 72 of 90
Cisco dCloud
NOTE: If you see a warning for an untrusted certificate, ignore it by clicking Advanced and Accept the Risk and Continue.
In a production setup, it is suggested to use trusted certificates for VPN deployments.
NOTE: If you use another username, the username might already be in use, and the VPN authentication might fail. If you face any issues with
the VPN username, such as a login failure or non-existing user error, please reach out to the lab admins in the Webex Teams room.
• Password: C1sco12345!
• You will be asked to update your password upon the first successful login.
• Enter Current Password, New Password and confirm the New Password again.
6. Upon successful login, you will be presented with the DUO setup screen since this is a new login account.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 73 of 90
Cisco dCloud
At this point, the VPN user account was successfully authenticated by Azure AD & redirected to DUO for MFA. Since this VPN user is’nt
associated with DUO SSO, & there is no MFA device associated with it, you’ll be prompted to set up the account.
NOTE: Before proceeding with the next step, please make a note that your mobile number will be mapped to the vpn user you used to login to
AnyConnect and will be saved in the DUO Admin Account used for this Single Sign-On. No other lab users have access to that account – only
the author of this lab guide has access to this account. Please reach out to the Lab Administrators if you are having any issues setting up your
number or wish to remove your number after testing.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 74 of 90
Cisco dCloud
3. You will be prompted to enter your mobile number along with the country code. Enter your number and country code. Check the check box
to verify the number. Click Continue.
5. Now, you will be prompted to Install Duo Mobile. If you already have the Duo App installed, click on I have Duo Mobile installed. If not
already installed, install the App from the App Store.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 75 of 90
Cisco dCloud
6. Now, you will be prompted to Activate Duo Mobile. Follow the on-screen instructions.
7. Click Continue – the button will be enabled once this account has been added to the Duo App.
8. Duo MFA will prompt you to choose the authentication method preference. Click Continue to Login.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 76 of 90
Cisco dCloud
9. Now, you will be prompted to send a Push or a Passcode for completing the successful AnyConnect Login MFA.
10. Approve the push notification from the phone, and the AnyConnect login will succeed.
11 Once the VPN connection is successful, you can close the browser tab.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 77 of 90
Cisco dCloud
To verify the AnyConnect external browser package is installed, type command: show webvpn anyconnect. To determine if the it’s
enabled on the connection profile, type command: show running-config tunnel-group <tunnel-group name>
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 78 of 90
Cisco dCloud
On the outside network of the Cisco Secure Firewall, there is a Cisco Cloud Services Router (CSR60). This router already has an EIGRP
configuration. In Cisco
dCloud: The this exercise you will peer NGFW1 with CSR60.
Demo Cloud
NOTE: In this lab, you will configure a minimal EIGRP configuration. The student can go beyond the enumerated tasks if other specific EIGRP
features are of interest.
• Run show running-config router eigrp to confirm that there is no EIGRP configuration on NGFW1.
• Run show eigrp ? to see the available EIGRP commands. Run show eigrp neighbors to confirm that there are no EIGRP peers.
• Run show route eigrp to confirm that there are no EIGRP learned routes.
NOTE: You do not have to access NGFW1 to run EIGRP commands. You can run these commands from the FMC UI be navigating to Devices >
Threat Defense CLI.
• Run show run | section eigrp to confirm the EIGRP configuration. Confirm that the autonomous system (AS) number is 10.
• Run show ip eigrp nei to confirm that there are no EIGRP peers.
• Run show ip route eigrp to confirm that there are no EIGRP learned routes.
Using Quicklaunch, open a CLI session to the Kali Inside Linux server. This device lies inside the corporate VLAN.
• Run ping 198.18.133.60 to confirm that you can reach CSR60. This traffic is going through NGFW1.
• Run ping 204.44.14.1 to confirm that you cannot reach the loopback interface on CSR60.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 79 of 90
Cisco dCloud
Edit the NGFW1 device and select the Routing sub-tab. Select EIGRP from the left-hand navigation pane.
Check the Enable EIGRP checkbox and set the AS Number to 10. The AS number must match the AS number on CSR60 to form a neighbor
adjacency. Select Lab_Networks from the Available Networks/Hosts list and add it to the Selected Networks/Hosts list.
Browse the remaining sub-tabs: Neighbors, Filter Rules, Redistribution, Summary Address, Interfaces, Advanced
Based on your knowledge of EIGRP, interpret options exposed in these tabs.
(Optional) make additional configuration changes. In Step 1 of Task 3, you will see these options impact the NGFW1 data plane
configuration.
Deploy the NGFW1 device configuration changes and wait for the deployment to complete.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 80 of 90
Cisco dCloud
• Run show eigrp neighbors to confirm that CSR60 is an EIGRP peer of NGFW1.
• Run show route eigrp to confirm that there are EIGRP learned routes.
• (Optional) Why are their so many EIGRP learned routes on NGFW1? Change this behavior by slightly modifying the EIGRP configuration
on CSR60. Use show route eigrp on the NGFW1 CLI to confirm that NGFW1 is now only learning two routes from CSR60:
204.44.14.0/24 and 210.1.55.0/24.
Run show ip eigrp nei on CSR60 to confirm that NGFW1 is an EIGRP peer.
On the Kali Inside Linux server, run ping 204.44.14.1 to confirm that you can now reach the loopback interface on CSR60.
(Optional) Run show ip route eigrp on CSR60. Observe that CSR60 has learned routes to the four internal corporate networks
198.19.10.0/24, 198.19.20.0/24, 198.19.30.0/24, 198.19.40.0/24.
• Stop the advertisement of the corporate LAN (198.19.10.0/24) by configuring an EIGRP outbound filter on NGFW1. Allow the
advertisement of the remaining three networks. For example, the ACL for the filter could be the following.
Note that the Kali Inside Linux server will still be able to ping 204.44.14.1 because of source NAT on NGFW1.
• Stop the advertisements of all four of these networks without any EIGRP filters on NGFW1 or CSR60, but still allow NGFW1 to learn
EIGRP routes from CSR60. Hint: run show eigrp interfaces on the NGFW1 CLI before and after your change.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 81 of 90
Cisco dCloud
NOTES:
® Extended access lists with application matching criteria can only be used in PBR configuration. A dynamic feed provided the
IP to application mapping so that the first packet in the connection could be routed correctly.
® PBR can only be configured in the global VRF.
® For ASAv version 9.18.1, PBR path monitoring is now available using the ASDM 7.18.1 or CSM 4.25.
If you are interested in configuring the DIA feature should consult the Cisco Secure Firewall 7.1 Features lab guide. In that exercise the student
configures the following PBR:
The key limitation to the 7.1 DIA feature was a lack of path monitoring. Therefore, the path routing choice for each application is static. In 7.2
path monitoring was added to dynamically chose the best path based on performance. In this exercise you will configure routing so:
The two metrics do not correspond to best practice for these applications. However, they have the advantage of almost always returning
distinct values for different interfaces. Therefore, they demonstrate feature functionality without stress testing.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 82 of 90
Cisco dCloud
• Select the Interfaces tab. Note that there are three outside interfaces: outside, outside2, and outside3.
• Select the Routing tab. Select ECMP in the left navigation pane. Confirm that outside and outside2 are in the same ECMP zone.
• Select Static Route in the left navigation pane. Confirm that there is no PBR configuration. Confirm the two ECMP default routes and the
third low priority default route.
• Select Policy Based Routing in the left navigation pane. Confirm that there is no PBR configuration.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 83 of 90
Cisco dCloud
You should still be editing the NGFWBR1 device. Select the Interfaces tab.
• Edit interface GigabitEthernet0/0 interface. Scroll down and you will see the Priority of the interface is set to 10. Leave this setting
alone. The Cisco Demo Cloud
dCloud:
• Click OK.
Repeat the previous step for GigabitEthernet0/3 and GigabitEthernet0/4. Note that the priorities are 10 and 20, respectively. This
reflects the ECMP configuration.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 84 of 90
Cisco dCloud
You should still be editing the NGFWBR1 device. Select the Routing tab. Select Policy Based Routing in the left navigation pane.
dCloud:
Click The Cisco
Configure Demo Cloud
Interface Priority. Note that here is another place in the FMC UI where you can configure these priorities. Leave these
priorities alone. Click Cancel.
Click Add. For Ingress Interface, select inside. To the right of Match Criteria and Engress Interface, click Save
• To the right of the Match ACL drop-down list, click the plus sign.
• Create an extended ACL called YouTube that matches the YouTube application. After creation, this ACL will automatically be selected.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 85 of 90
Cisco dCloud
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 86 of 90
Cisco dCloud
• To the right of the Match ACL drop-down list, click the plus sign.
• Create an extended ACL called Outlook that matches the Outlook application. After creation, this ACL will automatically be selected.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 87 of 90
Cisco dCloud
Deploy the NGFWBR1 device configuration changes and wait for the deployment to complete.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 88 of 90
Cisco dCloud
• Run show policy-route to confirm that a route-map has been created and assigned to GigabitEthernet0/1.
dCloud: The Cisco Demo Cloud
You can also confirm this by running show running-config interface GigabitEthernet 0/1.
Note that this route-map does not appear in the FMC UI under Objects > Object Management.
• Run show access-list YouTube and show access-list Outlook to see the details of the extended ACLs including the hit
count.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 89 of 90
Cisco dCloud
• Using the Quicklaunch, open a remote desktop session to WKST BR. You can also launch this from the remote desktop icon labelled
Wkstbr1 in the Remote Desktops folder on the Jumpbox desktop.
• Open a browser and generate some YouTube traffic.
• Observe that PBR decides the interface for the YouTube traffic. You will also see traffic that is not subject to PBR.
You should not let debugging run indefinitely. Disable debugging by typing no debug all.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 90 of 90