Securing Your WAN Infrastructure: Enabling The Hybrid WAN Webinar Series
Securing Your WAN Infrastructure: Enabling The Hybrid WAN Webinar Series
Direct Public
Direct Internet
Internet Cloud
Access
Access
• Secure WAN transport for private • Transport Independent Design • Comprehensive Threat Defense
and virtual private cloud access ensures consistent VPN Overlay with IOS Firewall/IPS
• across transition • Cloud Web Security (CWS)
Leverage local Internet path for
public cloud and Internet access • Certified strong encryption for scalable secure direct
Internet access
© 2014 Cisco and/or its affiliates. All rights reserved. 6
Trends in the Threat Defense Market
• Data loss
Why enterprise security? • Compliance (economy)
• Disruption (0.5% to 2.5% revenue loss)
• Appliance to Integrated
Changing consumption models
• On premise to SaaS
Internet
Public Enterprise Public Enterprise Public
10
Internet
ASR 1000
WAN
ISR
MPLS
ASR 1000 11
• Secure
DMVPN DMVPN
• Industry Certified IPsec and Firewall Purple Blue
• NG Strong Encryption: AES-GCM-256 (Suite B) Internet MPLS
• IKE Version 2
• IEEE 802.1AR Secure unique device identifier
Active/Standby Active/Active
WAN Paths WAN Paths
Primary With Backup
Data Center Data Center
Two IPsec Technologies ASR 1000 ASR 1000 ASR 1000 ASR 1000
GETVPN/MPLS SP V ISP A SP V
One IPsec Overlay
ISP A
DMVPN/Internet DMVPN
13
ASR 1000 ASR 1000 ASR 1000 ASR 1000 ASR 1000 ASR 1000
14
• Packets Encapsulated in GRE, then Encrypted • NHRP signals IPsec to tear down tunnel
with IPsec • IPsec can signal NHRP if encryption is cleared or
lost
• Both IKEv1 (ISAKMP) and IKEv2 supported
• IKEv1/IKEv2 Keepalives monitor state of
• NHRP controls the tunnels, IPsec does
spoke-spoke and spoke-hub tunnels
encryption
• FIPS-140 certified and Suite-B strong
• Bringing up a tunnel
encryption support
• NHRP signals IPsec to setup encryption
• IKEv1 and IKEv2 authenticates peer, generates
SAs
• IPsec responds to NHRP and the tunnel is activated
• All NHRP and data traffic is Encrypted
16
192.168.1.0/24
192.168.0.0/24
Branch
.1
Internet
Physical: 172.17.0.1
Tunnel0: 10.0.0.1
Physical: dynamic
Tunnel0: 10.0.0.11
Spoke A
.1
192.168.1.0/24
192.168.0.0/24
Branch
.1
Internet
Physical: 172.17.0.1
Tunnel0: 10.0.0.1
Physical: dynamic
Tunnel0: 10.0.0.12
Spoke B
.1 18
Physical: dynamic
Tunnel0: 10.0.0.11
Spoke A
.1
192.168.1.0/24
192.168.0.0/24
Branch
.1
Internet
Physical: 172.17.0.1
Tunnel0: 10.0.0.1
Physical: dynamic
Tunnel0: 10.0.0.12
Spoke B
.1 19
Embedded
Embedded Trust
Trust
Devices
Devices Deploy,
Search,
Retrieve,
AX Revoke
AX
Metro-E Configuration
Configuration
Orchestration
Orchestration
Enterprise
Dynamic VPN Establishment APIC
Large WAN Core Key
Key and
and
Large Site
Site
MPLS Automatic Session Key Refresh
Certificate
Certificate
Controller
Controller
(IKEv2)
Resilient WAN POP
AX
Trust Revocation DC
Branch
ISP
Branch
Intelligent
Branch Optional
Optional External
External
Certificate
Certificate Authority
Authority
20
22
IPS
IPsec VPN Corporate
Network
Firewall
Internet
Branch
Public
Direct Internet
Access
Internet
Public
Guest Network Direct Internet
Access
24
• Detect and contain threats from compromised devices in the branch network
using Cisco ISR platforms
• Zone Based Firewall is the starting point
• Industry leading threat defense using Snort and Cloud Web Security
• Distributed threat defense with centralized management
• Make every branch detect threats on its own network, with central management and
monitoring
• Safer guest access
• Guest network and devices on it are better protected now
25
26
27
28
Internet
DMZ WAN
Guestnet
Trusted Self
Voice BYOD
29
30
31
WAN2
(Internet)
Secure
Secure Public
Public Cloud
Cloud
Branch
and
and Internet Access
Internet Access
Public
Cloud
ISR
ISR Connector
Connector toto
CWS
CWS Firewall towers
Firewall towers
CWS
Internet
Web
Web Filtering,
Filtering, Access
Access
Policy,
Policy, Malware
Malware Detect
Detect 32
Retrospection
FileRetrospection
Reputation
Analytics
Reputation
WebReputation
ThreatAnalytics
FileReputation
Behavior
FileBehavior
Signature
Malware
Signature
Malware
Threat
File
Web
File
File
Cloud Application
Application Visibility
Visibility &
& Control
Control
Web
Web Filtering
Filtering
Roaming Users 33
Headquarters Branch Office
© 2014 Cisco and/or its affiliates. All rights reserved.
Cloud Web Security (CWS)
Web Filtering and Application Visibility and Control (AVC)
• Identification and
classification of Reduce Disruptions From
applications (1000+
apps) e.g. iTunes, • Distracted Users
Facebook
• Legal Liabilities
• URL database covering
• Granular policies to • Data Loss via Web Traffic and Web
over 50M sites worldwide
control micro-applications Applications
• Real-time dynamic categorization for (75K+) e.g. Farmville on
unknown URLs FB or Videos on FB
• Cisco Web Reputation is integrated
with CWS and protects against a
• Control user interaction
broad range of URL-based threats
with the application
34
Cost
Cost effective
effective IDS/IPS
IDS/IPS for
for the
the Branch
Branch
35
Branch Threat Defense with Central Internet Threat Defense for Local Direct Internet Access
• Snort is inspecting all traffic either on inside or • Snort is inspecting all traffic on ether inside or
outside interface; ZBFW enforces access outside interfaces. We can apply different policies
control and is applied first (guest users, corporate users, etc.)
• Snort is protecting the branch against internal • Snort and CWS are positioned to secure Internet
and external threats access within the branch
36
APIC - Enterprise
APIC for datacenter
Module
37
• IPS/IDS functionality
38
39
40
• SNORT
• Cost-effective light-weight threat defense
• PCI compliance at the branch
41
42