TechTalk 170920 Architecture Deployment Management
TechTalk 170920 Architecture Deployment Management
Tech Talk
Architecture and Deployment
Abhishek Singh, Technical Marketing Engineer
Anant Mathur, Technical Marketing Engineer Manager
Eric Kostlan, Technical Marketing Engineer
Nanda Kumar, Technical Marketing Engineer Manager
FTD
Zero-copy packet inspection
Unified management (FMC/FDM)
Sftunnel between
FMC/FTD is
terminated on ‘show network’
br1
Mandatory Yes, since it is used for FTD/FMC communication No and it is actually not recommended to configure it. The
(sftunnel terminates on it) recommendation is to use a data interface instead*
1. A packet enters the ingress interface and it is handled by the ASA engine
2. If the policy dictates so the packet is inspected by the Snort engine
3. Snort engine returns a verdict (whitelist or blacklist) for the packet
4. The ASA engine drops or forwards the packet based on Snort’s verdict
• Snort engine runs 6.x code
• ASA engine runs 9.X.x code
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 12
High Level Packet Processing on FTD
Trust
? Yes
No
R1 S1 D1 Trust
R2 S2 D2 Deny Log
R3 S3 D3 App=Google+ Permit IPS-1, File-1
R4 S4 D4 URL=Games Warn File-2
R5 S5 D5 Permit IPS-2
• In case route lookup is taking place the ‘in’ entries of the ASP routing table will be checked to
determine the egress interface:
firepower# show asp table routing
route table timestamp: 449
in 192.168.75.0 255.255.255.0 inside
in 192.168.76.0 255.255.255.0 dmz
in 192.168.77.0 255.255.255.0 outside
in 5.5.5.5 255.255.255.255 via 192.168.77.1, outside
out 255.255.255.255 255.255.255.255 outside
out 5.5.5.5 255.255.255.255 via 192.168.77.1, outside
out 10.1.1.0 255.255.255.0 via 192.168.77.1, outside
• Navigate to Policies > Access Control > Prefilter and create a Prefilter Policy
• Add one or more Tunnel or/and Prefilter (Early Access Control) rules and attach the Policy to ACP
• Prefilter Rules are deployed to ASA as L3/L4 ACEs and are placed above the normal L3/L4 ACEs
firepower# show access-list
}
access-list CSM_FW_ACL_; 7 elements; name hash: 0x4a69e3f3
access-list CSM_FW_ACL_ line 1 remark rule-id 268434457: PREFILTER POLICY: FTD_Prefilter_Policy
access-list CSM_FW_ACL_ line 2 remark rule-id 268434457: RULE: Fastpath_Rule1
EAC Prefilter
access-list CSM_FW_ACL_ line 3 advanced trust ip host 192.168.75.16 any rule-id 268434457 event-log both (hitcnt=0) Rules
access-list CSM_FW_ACL_ line 4 remark rule-id 268434456: PREFILTER POLICY: FTD_Prefilter_Policy
}
access-list CSM_FW_ACL_ line 5 remark rule-id 268434456: RULE: DEFAULT TUNNEL ACTION RULE
access-list CSM_FW_ACL_ line 6 advanced permit ipinip any any rule-id 268434456 (hitcnt=0) 0xf5b597d6 Tunnel Prefilter
access-list CSM_FW_ACL_ line 7 advanced permit 41 any any rule-id 268434456 (hitcnt=0) 0x06095aba
Rules
access-list CSM_FW_ACL_ line 8 advanced permit gre any any rule-id 268434456 (hitcnt=2) 0x52c7a066
}
access-list CSM_FW_ACL_ line 9 advanced permit udp any any eq 3544 rule-id 268434456 (hitcnt=0) 0xcf6309bc
access-list CSM_FW_ACL_ line 10 remark rule-id 268434445: ACCESS POLICY: FTD5506-1 - Mandatory/1
access-list CSM_FW_ACL_ line 11 remark rule-id 268434445: L4 RULE: Block ICMP
access-list CSM_FW_ACL_ line 12 advanced deny ip host 10.1.1.1 any rule-id 268434445 event-log flow-start (hitcnt=0) L3/L4
0x8bf72c63 ACEs
access-list CSM_FW_ACL_ line 13 remark rule-id 268434434: ACCESS POLICY: FTD5506-1 - Default/1
access-list CSM_FW_ACL_ line 14 remark rule-id 268434434: L4 RULE: DEFAULT ACTION RULE © 2017-2018 Cisco and/or its affiliates. All rights reserved, 27
access-list CSM_FW_ACL_ line 15 advanced permit ip any any rule-id 268434434 (hitcnt=410) 0xa1d3780e
FTD Packet Processing: L3/L4 ACL
• Advanced L3/L4 ASA ACL is an Access Control Policy (ACP) that is configured on FMC.
• Pushed as a global ACL (CSM_FW_ACL_) to ASA engine and as AC rules in
/var/sf/detection_engines/UUID/ngfw.rules file in Snort engine
firepower# show run access-list
access-list CSM_FW_ACL_ advanced deny ip host 10.1.1.1 any rule-id 268434445 event-log flow-start
firepower# show run access-group
access-group CSM_FW_ACL_ global
• Allow Rule will be pushed to ASA engine as permit action and to Snort engine as allow action. The
rule ID correlates the ASA rules with the Snort rules
firepower# show access-list
access-list CSM_FW_ACL_ line 8 remark rule-id 268435456: L7 RULE: ACP_Rule1_Allow_ICMP_App
access-list CSM_FW_ACL_ line 9 advanced permit ip host 1.1.1.1 host 2.2.2.2 rule-id 268435456
access-list CSM_FW_ACL_ line 11 remark rule-id 268435457: L4 RULE: ACP_Rule2_Allow_ICMP_Type
access-list CSM_FW_ACL_ line 12 advanced permit icmp host 2.2.2.2 host 3.3.3.3 echo rule-id
268435457
root@FTD5506-1:/home/admin# cat /var/sf/detection_engines/27306154-256d-11e6-9fc9-180edde177c5/ngfw.rules
268435456 allow any 1.1.1.1 32 any any 2.2.2.2 32 any any any (appid 3501:1)
268435457 allow any 2.2.2.2 32 8 any 3.3.3.3 32 any any 1 © 2017-2018 Cisco and/or its affiliates. All rights reserved, 29
FTD Packet Processing: L3/L4 ACL - Allow
• packet-tracer shows that ASA engine will send the packet to Snort engine for a Verdict
> packet-tracer input inside icmp 1.1.1.1 8 0 2.2.2.2
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip host 1.1.1.1 host 2.2.2.2 rule-id 268435456
access-list CSM_FW_ACL_ remark rule-id 268435456: ACCESS POLICY: FTD5506-1 - Mandatory/1
access-list CSM_FW_ACL_ remark rule-id 268435456: L7 RULE: ACP_Rule1_Allow_ICMP_App
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be reached
Phase: 14
Type: SNORT
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 31
...
Snort Verdict: (pass-packet) allow this packet
FTD Packet Processing: L3/L4 ACL - Allow
Packet Counters:
Passed Packets 5
Blocked Packets 0
Injected Packets 0
Flow Counters:
Fast-Forwarded Flows 0
Blacklisted Flows 0
Flows bypassed (Snort Down) 0
Flows bypassed (Snort Busy) 0
• Trust Rule will be pushed to ASA engine as trust action and to Snort engine as fastpath action
firepower# show access-list
access-list CSM_FW_ACL_ line 17 remark rule-id 268435477: L4 RULE: ACP_Rule4_Trust_DNS_Port
access-list CSM_FW_ACL_ line 18 advanced trust udp host 4.4.4.4 host 5.5.5.5 eq domain rule-id 268435477
Packet-tracer shows that ASA engine will not send any packets to Snort engine
> packet-tracer input inside udp 4.4.4.4 1111 5.5.5.5 53
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced trust udp host 4.4.4.4 host 5.5.5.5 eq domain rule-id
No Additional Information means
268435477 event-log flow-end
access-list CSM_FW_ACL_ remark rule-id 268435477: ACCESS POLICY: FTD5506-1 - Mandatory/4
the packet is not going to be
access-list CSM_FW_ACL_ remark rule-id 268435477: L4 RULE: ACP_Rule4_Trust_DNS_Port redirected to Snort engine
Additional Information:
• Tracing real packets shows that no packets are going to be sent to Snort
> show capture CAPI packet-number 1 trace > show snort statistics
1: 19:46:23.626386 192.168.75.14.50152 > 192.168.76.14.53: udp 34
Packet Counters:
Phase: 4 Passed Packets 0
Type: ACCESS-LIST Blocked Packets 0
Subtype: log Injected Packets 0
Result: ALLOW
Config: Flow Counters:
access-group CSM_FW_ACL_ global Fast-Forwarded Flows 0
access-list CSM_FW_ACL_ advanced trust udp host 192.168.75.14 host 192.168.76.14 eq Blacklisted Flows 0
domain Flows bypassed (Snort Down) 0
access-list CSM_FW_ACL_ remark rule-id 268435477: ACCESS POLICY: FTD5506-1 - Mandatory/4 Flows bypassed (Snort Busy) 0
access-list CSM_FW_ACL_ remark rule-id 268435477: L4 RULE: ACP_Rule4_Trust_DNS_Port
Additional Information: Miscellaneous Counters:
Start-of-Flow events 23
End-of-Flow events 49
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 35
FTD Packet Processing: L3/L4 ACL - Trust
In case one or more of the following is true the Trust Rule will be pushed to ASA engine as permit action:
• Application is used as a condition and/or SI, QoS, Identity Policy, SSL Policy
firepower# show access-list
access-list CSM_FW_ACL_ line 14 remark rule-id 268435458: L7 RULE: ACP_Rule3_Trust_DNS_App
access-list CSM_FW_ACL_ line 15 advanced permit ip host 3.3.3.3 host 4.4.4.4 rule-id 268435458
In that case packet-tracer shows that ASA engine will send the packet to Snort engine for a Verdict
> packet-tracer input inside udp 3.3.3.3 1111 4.4.4.4 53
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit ip host 3.3.3.3 host 4.4.4.4 rule-id 268435458
access-list CSM_FW_ACL_ remark rule-id 268435458: ACCESS POLICY: FTD5506-1 - Mandatory/3
access-list CSM_FW_ACL_ remark rule-id 268435458: L7 RULE: ACP_Rule3_Trust_DNS_App
Additional Information:
This packet will be sent to snort for additional processing where a verdict will be reached
• Tracing real packets shows that the first few packets of the flow are being sent to Snort, but the
remaining bypass the Snort engine. Snort statistics also reflect this.
> show capture CAPI packet-number 1 trace > show snort statistics
Phase: 4
Few packets to
Type: EXTERNAL-INSPECT Packet Counters:
Application: 'SNORT Inspect' Snort engine Passed Packets 2
Phase: 5 Blocked Packets 0
Type: SNORT Injected Packets 0
Snort Verdict: (pass-packet) allow this packet
Flow Counters:
> show capture CAPI packet-number 10 trace Fast-Forwarded Flows 7
Phase: 3 Blacklisted Flows 0
Type: FLOW-LOOKUP Flows bypassed (Snort Down) 0
Found flow with id 23429, using existing flow Flows bypassed (Snort Busy) 0
Phase: 4
Type: SNORT The remaining packets
Snort Verdict: (fast-forward) fast forward this flow bypass the Snort engine © 2017-2018 Cisco and/or its affiliates. All rights reserved, 38
FTD Packet Processing: L3/L4 ACL - Monitor
• Monitor Rule will be pushed to ASA engine as a permit action and to Snort engine as an audit action
firepower# show access-list
access-list CSM_FW_ACL_ line 17 remark rule-id 268435459: L7 RULE: ACP_Rule4_Monitor_HTTP
access-list CSM_FW_ACL_ line 18 advanced permit ip host 4.4.4.4 host 5.5.5.5 rule-id 268435459
• Monitor Rule doesn’t drop or permit traffic, but it generates a Connection Event. The packet is
checked against subsequent rules and it is either allowed or dropped
• FMC Connection Events show that the packet matched 2 rules including the Monitor Rule
• CLISH Snort debug shows that the packet matches 2 rules (audit + block in this case)
> system support firewall-engine-debug
• Block Rule will be pushed to ASA engine as a permit or deny action depending on the rule conditions
and to Snort engine as deny rule. If both applied, Application takes precedence over Dest Ports.
firepower# show access-list Packet matching this rule
access-list CSM_FW_ACL_ line 20 remark rule-id 268435460: L7 RULE: ACP_Rule5_Block_Telnet_App will be dropped by Snort
access-list CSM_FW_ACL_ line 21 advanced permit ip host 5.5.5.5 host 6.6.6.6 rule-id 268435460 engine
access-list CSM_FW_ACL_ line 23 remark rule-id 268435464: L4 RULE: ACP_Rule6_Block_Telnet_Port
access-list CSM_FW_ACL_ line 24 advanced deny tcp host 6.6.6.6 host 7.7.7.7 eq telnet rule-id Packet matching this
268435464 rule will be dropped
root@FTD5506-1:/home/admin# cat /var/sf/detection_engines/27306154-256d-11e6-9fc9-180edde177c5/ngfw.rules by ASA engine
268435460 deny any 5.5.5.5 32 any any 6.6.6.6 32 any any any (appid 861:1)
268435464 deny any 6.6.6.6 32 any any 7.7.7.7 32 23 any 6 © 2017-2018 Cisco and/or its affiliates. All rights reserved, 42
FTD Packet Processing: L3/L4 ACL - Block
• In case traffic matches an ASA deny rule tracing of a real packet shows that the packet is dropped by
ASA engine and it is not being forwarded to Snort
firepower# show capture CAPI packet-number 1 trace
1: 12:29:00.844438 6.6.6.6.18791 > 7.7.7.7.23: S 2574076177:2574076177(0) win 4128 <mss 536>
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: DROP
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced deny tcp host 6.6.6.6 host 7.7.7.7 eq telnet rule-id 268435464 event-log flow-start
access-list CSM_FW_ACL_ remark rule-id 268435464: ACCESS POLICY: FTD5506-1 - Mandatory/6
access-list CSM_FW_ACL_ remark rule-id 268435464: L4 RULE: ACP_Rule6_Block_Telnet_Port
Additional Information:
• For Block Rule that uses Application the tracing of a real packet shows that the packet is dropped by
ASA due to Snort engine verdict
firepower# show capture CAPI packet-number 7 trace
7: 13:42:53.655971 192.168.75.14.36775 > 192.168.76.14.23: P 4147441466:4147441487(21) ack 884051486 win 16695
Type: SNORT
Subtype: Snort needs to process few packets before
Result: DROP
determines the Application type
Additional Information:
Snort Verdict: (black-list) black list this flow
• Block Rule will be pushed to ASA engine as a permit or deny action depending on the rule conditions
and to Snort engine as reset rule
firepower# show access-list
access-list CSM_FW_ACL_ line 26 remark rule-id 268435461: L7 RULE: ACP_Rule7_Block_RST_Youtube
access-list CSM_FW_ACL_ line 27 advanced permit ip host 7.7.7.7 host 8.8.8.8 rule-id 268435461
• When matching Block with Reset rule FTD sends a TCP Reset packet or an ICMP Type 3 Code 13
Destination Unreachable (Administratively filtered) message
• Snort engine debug shows the Reset action
> system support firewall-engine-debug
7.7.7.7-36778 > 8.8.8.8-80 6 AS 1 I 0 match rule order 7, 'ACP_Rule7_Block_RST_Youtube', action Reset
7.7.7.7-36778 > 8.8.8.8-80 6 AS 1 I 0 reset action
• Interactive Block Rule will be pushed to ASA engine as a permit or deny action depending on the rule
conditions and to Snort engine as bypass rule
firepower# show access-list
access-list CSM_FW_ACL_ line 29 remark rule-id 268435462: L7 RULE: ACP_Rule8_Interactive_Block
access-list CSM_FW_ACL_ line 30 advanced permit ip host 8.8.8.8 host 9.9.9.9 rule-id 268435462
• Interactive Block Rule will prompt the user that the destination is forbidden
• Snort debug shows that the rule was matched and an interactive response was sent
> system support firewall-engine-debug
8.8.8.8-36793 > 9.9.9.9-80 6 AS 1 I 0 match rule order 8, 'ACP_Rule8_Interactive_Block', action Interactive
8.8.8.8-36793 > 9.9.9.9-80 6 AS 1 I 0 bypass action sending interactive response of 1093 bytes
• The user can click on Continue button or Refresh the brower page to bypass and continue
• If the user clicks on Continue button the Snort debug shows that the traffic is allowed by the same rule
> system support firewall-engine-debug
8.8.8.8-36794 > 9.9.9.9-80 6 AS 1 I 0 New session
8.8.8.8-36794 > 9.9.9.9-80 6 AS 1 I 0 match rule order 8, 'ACP_Rule8_Interactive_Block', action
Interactive The rule mimics
8.8.8.8-36794 > 9.9.9.9-80 6 AS 1 I 0 bypass action interactive bypass © 2017-2018 Cisco and/or itsan Allow
affiliates. action
All rights reserved, 49
8.8.8.8-36794 > 9.9.9.9-80 6 AS 1 I 0 allow action
FTD Packet Processing: L3/L4 ACL - IB
w/RST
• Interactive Block Rule will be pushed to ASA engine as a permit action depending on the rule
conditions and to Snort engine as intreset rule
firepower# show access-list
access-list CSM_FW_ACL_ line 32 remark rule-id 268435463: L7 RULE: ACL_Rule9_Interactive_Blck_RST
access-list CSM_FW_ACL_ line 33 advanced permit ip host 9.9.9.9 host 10.10.10.10 rule-id 268435463
• Similar to Block with Reset, the user can click on Continue button
• Data Acquisition Library (DAQ) is the interface between ASA engine and Snort engine
• DAQ communicates with ASA Datapath processes through Packet Data Transport System (PDTS)
1. A packet is placed into DMA Memory
2. Datapath processes the packet
3. If requires Snort inspection a pointer to the packet is added
to PDTS TX Queue of a specific Snort instance
4. Snort instances periodically read the TX Rings and process the
packets in the DMA Memory
5. When a Snort instance finishes the processing puts to PDTS RX
queue a PDTS Notification (Verdict or SSL Decrypted packet)
6. Datapath processes reads the Verdict or copies the Decrypted
packet to DMA memory
• To see the queue utilization and the utilization of PDTS queues from CLISH
> show asp inspect-dp snort queues > show asp inspect-dp snort
SNORT Inspect Instance Queue Configuration SNORT Inspect Instance Status Info
• Security Intelligence (SI) can Blacklist (drop) or Whitelist (allow) IP addresses early in the packet
processing lifetime within the Snort engine
• Whitelist overwrites the Blacklist
• The Blacklist can be populated in 2 ways:
1. Manually by the FMC administrator
2. Automatically by Intelligence Feed (Talos or custom) or List
• Snort returns to ASA a verdict about a packet being blacklisted
• The files containing the IPs from Talos SI Feed are in /ngfw/var/sf/iprep_download directory
root@FTD5506-1:/ngfw/var/sf/iprep_download# ls -alt | grep blf
-rw-r--r-- 1 root root 1252278 Jun 12 16:06 3e2af68e-5fc8-4b1c-b5bc-b4e7cab598ba.blf
-rw-r--r-- 1 root root 227696 Jun 12 16:05 032ba433-c295-11e4-a919-d4ae5275a468.blf
• If a packet is being dropped by Snort SI the ASA capture trace shows the Verdict
> show capture CAPI packet-number 1 trace
1: 16:07:45.147743 192.168.75.14 > 38.229.186.248: icmp: echo request
Phase: 14
Type: SNORT
Subtype:
Result: DROP
Additional Information:
Snort Verdict: (black-list) black list this flow
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 55
FTD Packet Processing: SSL Decryption
• SSL Inspection Policy controls which traffic will be decrypted by FTD so that other policies (ACP, File,
Snort) can inspect the traffic.
• Can be configured in the Firepower Management Center, under Policies > SSL.
• FTD provides 2 Decryption modes:
1. Decrypt - Know Key - SSL/TLS server owned by us
2. Decrypt - Resign - 3rd party SSL/TLS server. The FTD does man-in-the-middle and for that
reason requires Internal CA
• SSL Policy is attached to Access Control Policy (ACP)
• Client Hello features (enabled by default) allows FTD to modify (TLS ver, Ciphers) the Client Hello
message (Required for Safe Search and YouTube EDU)
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 56
FTD Packet Processing: SI (DNS/URL)
• In case Talos URL Feed is used part of the db is stored locally and updated daily
• For non-cached URLs a Cloud lookup is done
Identity Policy enables user-based authentication. The user info can be obtain in various ways:
1. Passive Authentication
• Integration with LDAP Requires User Agent
SafeSearch
Interfaces are defined by Destination Interface Objects - The interface facing the Responder
usage of Security Zones
or Interface Groups
Download - Rate limit of traffic flowing to the devices connected to the source interfaces
and from the devices connected to the destination interfaces
Upload - Rate limit of traffic leaving devices connected to the source interfaces
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 61
FTD Packet Processing: Network Discovery
Malware Cloud Lookup = Sends the SHA-256 hash of a file to the cloud for analysis
and depending on the answer generates a log if the file is bad. Optionally, Local
Analysis can analyze the file and Dynamic Analysis Capable files can be sent to cloud
for Dynamic Analysis and/or SPERO analysis
Block Malware = Sends the SHA-256 hash of a file to the cloud for analysis and
depending on the answer blocks it if the file is bad. Optionally, Local Analysis can
block the file and/or Dynamic Analysis Capable files can be sent to cloud for Dynamic
Analysis and/or SPERO analysis. © 2017-2018 Cisco and/or its affiliates. All rights reserved, 63
FTD Packet Processing: Intrusion Policy
• Tracing a real packet shows the Snort engine verdict when a Snort Rule is being matched
firepower# show capture CAPO packet-number 2 trace
2: 12:16:09.232776 192.168.77.40 > 192.168.75.39: icmp: echo reply
Phase: 5
Type: SNORT
Subtype:
Result: DROP
Config:
Additional Information:
Snort Verdict: (black-list) black list this flow
..
Result:
input-interface: outside
input-status: up
input-line-status: up
Action: drop
Drop-reason: (snort-drop) Snort requested to drop the frame
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 64
FTD Packet Processing: ALG Checks
• ASA Application Layer Gateway (ALG) are the classic Modular Policy Framework (MPF) rules applied
on ASA engine
• Currently on FTD the configuration MPF is not tunable (With 6.2 you can tune using Flexconfig)
• You can use classic ASA MPF commands to verify the existing MPF configuration
firepower# show run class-map
firepower# show run policy-map
firepower# show run service-policy
!
firepower# show service-policy flow tcp host 192.168.75.14 host 192.168.77.40 eq 80
• The remaining checks on ASA engine are the same as on classic ASA
• NAT IP header
• VPN Encrypt
• L3 Route
• L2 Resolution of next hop
}
• Passive
• Passive (ERSPAN)
Interface Modes inherited from FirePOWER
• Inline pair
• Inline pair with tap
• Note - interface modes can be mixed on a single FTD device
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 68
Deployment Mode: Routed
• Traditional L3 firewall deployment
• Allows configuring all interface modes apart from Switched (BVI) (6.2
onwards Switched interfaces are allowed too)
• You can specify the firewall mode (Routed or Transparent) during the FTD
setup process:
Configure firewall mode? (routed/transparent) [routed]: routed
• You can later change the FTD mode from CLISH CLI:
> configure firewall routed
This will destroy the current interface configurations, are you sure that you want to
proceed? [y/N] y
The firewall mode was changed successfully.
>
•
Deployment Mode: Transparent
• Traditional L2 firewall deployment
• Allows configuring all interface modes apart from Routed, Passive
ERSPAN
• You can specify the firewall mode (Routed or Transparent) during the FTD
setup process:
Configure firewall mode? (routed/transparent) [routed]: transparent
• You can change the FTD mode from firewall to transparent from CLISH:
> configure firewall transparent
This will destroy the current interface configurations, are you sure that you want to
proceed? [y/N] y
The firewall mode was changed successfully.
>
•
Interface Mode: Routed
• Available only in Routed Deployment
• Traditional L3 firewall deployment
• One or more physical or logical (VLAN) routable interfaces
• Allows features like NAT or Dynamic Routing protocols to be configured
• Packets are being forwarded based on Route Lookup
• Full ASA engine checks are applied along with full Snort engine checks
• Actual traffic can be dropped
S witc h S witc h
FTD
4 P a ir Inline -S e t 2 P a ir Inline - S e t
E1 E3 E5 E7 E9 E11
E2 E4 E6 E8 E10 E12
S witc h S witc h
Hos t
• b flag - FTD Inline Pair mode handles a TCP connection in a TCP state-bypass mode
and doesn’t drop TCP packets that don’t belong to existing connections. A classic ASA
will drop an unsolicited SYN/ACK packet unless TCP state-bypass is enabled.
• N flag - The packet will be inspected by Snort engine
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 75
Interface Mode: Inline Pair
Configure a Name on 2 physical interfaces, enable them and assign to an
Inline Set. It is also recommended to enable Link State Propagation:
> show inline-set
Inline-set Set1
Mtu is 1500 bytes
Failsafe mode is off
Failsecure mode is off
Tap mode is off
Propagate-link-state option is on
hardware-bypass mode is disabled
Interface-Pair[1]:
Interface: GigabitEthernet1/2 "inside"
Current-Status: UP
Interface: GigabitEthernet1/3 "outside"
Current-Status: UP
Bridge Group ID: 501
>
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 76
Interface Mode: Inline Pair with Tap
• 2 Physical interfaces internally bridged
• Available in Routed or Transparent Deployment modes
• Most of ASA features (NAT, Routing, L3/L4 ACL etc) are not available for
flows going through an Inline Pair
• Few ASA engine checks are applied along with full Snort engine checks to
a copy of the actual traffic
• Actual traffic cannot be dropped
• Few ASA engine and Full Snort engine checks a copy of the actual traffic
• Actual traffic cannot be dropped
TECSEC-2652
Fail to Wire Network Modules for Firepower
4100 and 9300 Appliances
• Fixed interfaces, no removable SFP support
• Firepower 4100 only • Firepower 4100 and 9300 • Firepower 4100 and 9300
• Single width • Single width • Single width
• 1GE fiber SX • 10GE SR or LR • 40GE SR4
• No 10GE breakout support
TECSEC-2652
FTD Failover
• A pair of identical FTD devices can use Failover for High Availability
• Data interface connections must be mirrored between the units with L2 adjacency
• Primary and Secondary designations are statically assigned
• Unit in Active role is processing all transit traffic, Standby takes over when needed
• Virtual IP and MAC addresses on data interfaces move with the active unit
• Centralized management from the active unit
• Optional Stateful failover “mirrors” stateful conn table between peers
• Most connections survive a switchover seamlessly to the endpoints
• Short-lived ICMP and HTTP connections are not replicated by default
TECSEC-2652
Failover Types
Primary
• Active/Standby Failover
• Single- or multiple-context mode
Inside Outside
• Device-level switchover on failure
• One unit is always “idling”
Secondary
• Ideal plain and simple design for single tenant
TECSEC-2652
FTD Clustering
• Up to 6 identical Firepower appliances/SMs combine in one traffic processing system
TECSEC-2652
Spanned Etherchannel Data Interface Mode
• Create transparent and routed firewalls on per-context basis
E0/7 E0/9
.1 .1
E0/6 E0/8
E0/7 E0/9
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 87
TECSEC-2652
Platform Overview
ASA 5506-X
ASA 5508-X
ASA 5516-X
ASA 5516-X
ASA 5516-X
ASA 5516-X
ASA 5516-X
FTDv
FTDv
ASAv
FW in Cluster
Solution
Security Application: Firepower NGFW appliances
with Firepower Management Center Access
Caveats Layer App
Servers Database
App
Servers
WWW Database
WWW
Multi Context support, please see Multi Context Option Tenant A Tenant B
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 99
Use Case: Multi-Site Data Center
Requirements
Connectivity and Availability Requirements: LISP
• High Availability (Redundancy)
• Scalability (Throughput, Connections) Data Center
• High Bandwidth, Low Latency Requirement Edge Dark Fiber
• 40G/100G ports
• Inter-site cluster at tenant edge (North-South insertion)
• Inter-site cluster as first-hop router
• LISP support FW in Cluster
Security Requirements: FW in Cluster
OTV L3 OTV
• Dynamic NAT/PAT and Static NAT Data Center
• NGIPS and Advance Malware Protection Aggregation L2
• Role Based Access
Solution VM VM VM
VM VM VM
Security Application: Firepower NGFW appliances VM VM VM
VM
with Firepower Management Center
Access Extended VLAN and CCL Link VLAN
Caveats Layer
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 100
Multi Context support, please see Multi Context Option
Use Case: Branch Office
Requirements
Main
Office
Connectivity and Availability Requirements:
• High Availability (Redundancy)
• Site to Site VPN
• Authentication IPsec VPN
• Remote Management
Security Requirements: ISP
• Dynamic NAT/PAT and Static NAT
• Advance Application Control and URL filtering
• NGIPS and Advance Malware Protection
• Role Based Access/ SSL decryption Edge Router
Solution
Failover
Security Application: Firepower NGFW appliances
with Firepower Management Center,
Caveats
FMC scalability and remote Management:
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 101
Securing Public Cloud Workloads
Requirements for AWS and Azure
• Access Control, Visibility, and Intrusion Prevention
• Edge N/S & E/S Firewall
• Route-based VPNs (VTI) to Branch/DC DB APP WEB
• Secure Inter-VPC/vNET connectivity
• High Availability
• Inside VPC and across Availability Zones User Defined
Routes
• Scale Out (FW, S2S and RA-VPN) Route-based N/S & E/W
VPNs (VTI) Firewall
Solution
Security Application: Firepower NGFWv and ASAv ASAv NGFWv
Caveats
Internet
AWS less flexible with LB & user routes further limits our ASA ASAv
1
2
Security Modules
Embedded packet/flow classifier (Smart NIC) and crypto hardware
CPUs with a total of 24 , 36 or 44 physical cores (48, 72 or 88 with hyperthreading)
Standalone or clustered within (up to 240Gbps) and across (1Tbps+) chassis
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 104
Supervisor Simplified Hardware Diagram
System Bus
Security Security Security
Module 1 Module 2 Module 3
RAM
On-board NM NM
8x10GE Slot 1 Slot 2
interfaces
System Bus
RAM
x86 CPU 1 x86 CPU 2
24, 36 or 44 24, 36 or 44
Ethernet
cores cores
2x100Gbps
2x40Gbps
Backplane Supervisor Connection
1RU
Network Modules
• 10GE/40GE interchangeable with 9300
• Partially overlapping fail-to-wire controller options
Higher
Firepower Port Density in 1 Rack Unit
FPR 2130 12x-1G 12x 10G Port 2100
Firepower
FPR 2110 16x 1G Port 2100
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 108
Hardware Architecture Overview
Dual CPU
Advance Inspection X86 CPU for Advanced Inspections
(x86 CPU) NPU for Stateful Firewall
Stateful Inspection
(NPU)
SSD
SSD
SSD
Fabric
Fabric
USB MGMT 12
12 Port
Port 4 Port
CON Console 4
4 port
port 10GE
10GE -8
-8 Port
Port
GE RJ45 GE RJ45
GE RJ45 SFP+
NM Slot
110
Firepower Tech Talk
20th September
Agenda NAT
Migration
S2S VPN
RA VPN
Flex-Config
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113
Troubleshooting Tools
• Packet Tracer
• Capture Trace
• Packet Tracer
• Capture Trace
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116
Prefilter: Tunnel & Prefilter
• Tunnel Rule
• Prefilter Rule
• Tunnel Rule
• Prefilter Rule
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 119
NAT
• Manual Before
• Auto
• Manual After
• Manual Before
• Auto
• Manual After
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123
ASA Policy
• Unsupported Policy
ACE with Time-range, FQDN, Local/Group user, SGT, Nested Service
Group
ACE with are not part of Interface or Global ACL
Access
Prefilter
Control
ACE
Permit Block Permit Block
Migration
Report
Apply Migrated
ASA .cfg Register Policy
or .txr file
Firepower
2100
ASA
© 2017 Cisco and/or its affiliates. All rights reserved. 126
126
Migration Process Overview Import as Access Control
Policy or Prefilter policy
FMC .sfo
file FMC
Migration ( Managing
Tool FTD
Device )
Migration
Report
Apply Migrated
ASA .cfg Register Policy
or .txr file
Firepower
2100
ASA
© 2017 Cisco and/or its affiliates. All rights reserved. 127
Site to Site VPN
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128
S2S VPN Capabilities
IKE Protocol •IKEv1 & IKEv2
•Point to Point
Topology •Hub & Spoke
•Full mesh
© 2017 Cisco and/or its affiliates. All rights reserved. 129
AnyConnect VPN
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130
Remote Access VPN support on FTD 6.2.1
VPN
Encrypt
VPN
Decrypt
1
RA VPN Identity Integration and Monitoring
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 140
FlexConfig
• To configure ASA features that cannot be configured from FMC
• Provides a work-around to configure features not exposed directly by FMC
• Examples
• Policy Based Routing (PBR)
• EIGRP
• Ethertype ACLs
• Application Layer Gateways (ALGs)
• Virtual Extensible LAN (VxLAN)
• Web Cache Communication Protocol (WCCP)
• Platform sysopt commands
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 144
FTD – Mode Differences
NGFW
FTD NGIPS
Routed Transparent
VPN
Encrypt
VPN
Decrypt
1
Firepower Threat Defense
Tech Talk
Management
Abhishek Singh, Technical Marketing Engineer
Anant Mathur, Technical Marketing Engineer Manager
Eric Kostlan, Technical Marketing Engineer
Nanda Kumar, Technical Marketing Engineer
Manage across many sites Control access and set policies Investigate incidents Prioritize response
Set up easily Control access and set policies Investigate incidents Prioritize response
Device Onboarding
• Import From Offline
• Discover Direct From
Object & Policy Application, URL, Change Security Device
Analysis Malware & Threat Impact Templates
Policy Modeling
Management
Notifications Reports
Simplify security policy management in the cloud with Cisco Defense Orchestrator Security
Plan and model security policy changes Deploy changes across virtual Receive notifications about any unplanned
before deploying them across the cloud environments in real time or offline changes to security policies and objects
Report
Software
Services
Devices
ASA
ASA FTD
FTD DDoS
DDoS
1
2 HTTP/HTTPS Cisco Smart
Supervisor
Supervisor Proxy Licensing
3
165
Smart Licensing Workflow
Obtain Product
Instance Register Apply/Remov
Register FTD
Registration FMC to the e Smart
Token from to FMC
CSSM Licenses
CSSM
Authorized Backend
168
FMC: Settings
• Registering FMC with CSSM
• 1: Click “Register”
• 2: Copy & Past “Token” which was generated in CSSM (cisco.com)
• 3: Click “Apply Changes”
1 2
3
© 2017-2018 Cisco and/or its affiliates. All rights reserved, 169
FMC: Verification
• Verify Registration
• Success message indicating successful registration
• Smart License Status
• Assigned Virtual Account:
• Export-Controlled Features:
If Out of Compliance, for 90 days FMC, everything works normal. After 90 days, Admin
can not Create or Edit policies . Existing policies and its traffic will continue to work as
normal.
Domain Overview
Global
Global Policies
Policies
Global
Global Objects
Objects
Global
GlobalAnalytics
Analytics
2
2
3
3
Policies
Policies Policies
Policies Policies
Policies
UK/London UK/Oxford
Objects
Objects Objects
Objects Objects
Objects
Analytics
Analytics Analytics
Analytics Analytics
Analytics
USA INDIA UK
TECSEC-2652
Access Control Policy Hierarchy
Global Policy [Mandatory] Allow SSH to All devices
TECSEC-2652
Object Override Support
Global\IND
Inherited from Global
Acme_IT_Syslog Server
Global
10.1.1.1
Global\USA
Overridden at Device
Acme_IT_Syslog Server
172.186.2.10
187