Cisco FTD Policy Management Common Practices
Cisco FTD Policy Management Common Practices
1. Access Policies
• Rationalizing
• Connection Logging
• Defining Flows
• Blocking Bad Traffic
• Determining What Needs Encryption
2. IPS Policies
Cisco Firepower Threat Defense •
•
Testing Policies
Leveraging Firepower Recommendations
(FTD) policies help you flag specific • Deploying Strict Controls
• Leverage X-Forwarding
network traffic patterns, create • Fine-Tuning Rules
alerts and better control your 3. Malware Policies
network. Consider these common
4. SSL Policies
practices and recommendations
when deploying Cisco FTD policies. 5. Identity Policies
6. Network Analysis Policies
Access Policies
Rationalizing
Whether migrating from an existing firewall platform or building a
net-new configuration, it’s a good idea to rationalize rule sets and
streamline or optimize where appropriate. For example, determine
whether you can eliminate any of the following:
Also, not all traffic needs a higher level of inspection. Use pre-filter
policies to exclude traffic that doesn’t need additional scrutiny, such
as backups or highly critical flows that require low latency (think
trading applications). Define these flows within the Cisco Firepower
Management Center (FMC) pre-filter policy.
Access Policies
Connection Logging
While Connection Logging is a handy feature, it requires a lot of additional overhead and your security
intelligence, Intrusion Prevention System (IPS), and malware events are already generated in threat data logging.
You can always turn on Connection Logging as needed for troubleshooting later.
Defining Flows
You can also simplify the critical and non-critical hosts
within the environment and deploy strict controls for
critical assets. Start by defining which flows require
malware inspection. Then, optimize malware policies
for the specific flow required. For example, if the
flow requires you to inspect FTP traffic that contains
document type files, then your malware policy should
reflect the proper protocol and file type. This may
include IPS and file/malware policies. Malware and IPS
Policies will also reiterate this statement.
Access Policies
Additionally, make sure that you set your default action in correspondence with your security posture.
Review the available settings under Advanced > Access Control Policy and select the value that is best suited for
your environment. You can see detailed information about each setting from the Help > Online utility.
IPS Policies
Start with the proper default policy and ensure that the network analysis policy uses
the same approach. For example, if you build an IPS policy with balanced connectivity
and security, then your Network Analysis policy should use the same approach.
The most common approach used by customers is to start with Balanced and tweak from there.
Testing Policies
Consider testing IPS policies before deploying. This ensures that the policy is further optimized prior to moving
the rule set into production. This can include passive or inline tap modes or inline mode with the “drop when
inline” option unchecked.
IPS Policies
Leverage X-Forwarding
If you have a proxy server deployed, leverage x-forwarding. This needs to be enabled on both the proxy and
Firepower Device.
IPS Policies
Fine-Tuning Rules
When enabling pre-processors, you’ll also need to enable the corresponding IPS signatures of interest (see
screenshots from X-Forwarding). It’s recommended that you do not enable all the intrusion rules within an
intrusion policy, as this will degrade performance and may increase false positives. Tuning is key, and Firepower
Recommendations further help streamline this process.
You should leverage the default value under You’ll also want to define which flows require malware
“Advanced” unless your environment dictates inspection and optimize malware policies for the specific
otherwise. flow required. For example, if the flow requires that you
inspect FTP traffic that contains document type files,
then your malware policy should reflect the proper
protocol and file type. This may include IPS and file/
malware policies. Malware and IPS Policies will also
reiterate this statement.
Lastly, enable the reset connection option for Block Files and/or Block Malware. This terminates the connection.
SSL Policies
If using passive authentication with the Cisco Firepower User Agent, make sure that all domain servers are
targeted. Only include groups in realm that are needed for policy enforcement. This will limit the number of users
and groups that have to be downloaded and post-processed form AD.
Consider leveraging Cisco ISE or Cisco ISE Passive Identity Connector with integrated user- or device-based
policies. This allows synergy across multiple Cisco security platforms.
Network Analysis Policies
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/
trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)