Secure Access
Customer ValueLeader
Email Security
Growth Leader -Email Radar 2024
Secure Firewall
Leader in Enterprise Firewall Solutions
Secure Access
SSE Strong Performer
Duo
Best 2FA App
Firewall
Best Security Performance
& Effectiveness
Secure Firewall
Global InfoSec Award
Secure Firewall
Cybersecurity
Excellence Award
Secure
Firewall
2024 Best Next
Gen Firewall
Secure
Access
Best SME Security
Solution for
Umbrella
Email
Security
Recognized as
Marketing
champion
Duo
Best in KLAS:
Software &
Services
Secure
Access
Leader in DNS
Duo
Authentication
Winner
WAVE
LEADER 2024
Multicloud Defense
Finalist
Endpoint
Named a Visionary
Secure Access
Honorable Mention XDR
Honorable Mention
Duo
Passwordless
CISCO
Secure Workload
Leader in Microsegmentation
Duo
Best Robust Security Features
5.
Cisco Security |5
“Cisco’s vision aligns well with its networking strengths,
leveraging them to craft a security strategy that envisions the
seamless integration of AI and security in the networking fabric.
The vendor refined its Secure Firewall offering with persistent
innovation including a shared and consistent UX/UI and
enhanced IDS/IPS using a SnortML engine...Cisco distinguishes
itself with a multi-layered approach to traffic inspection and
decryption…Reference customers praise Cisco’s support,
especially during migrations from legacy appliances.”
- Forrester Research, Inc.
Forrester names Cisco
a Leader in Enterprise
Firewall Solutions
The Forrester Wave : Enterprise Firewall Solutions, Q4 2024
Cisco is the only leader
in both firewall and
microsegmentation solutions
6.
Cisco Security |6
Our customers tell us that they need…
Complete
visibility
of diverse attack surfaces and
security compliance state
Comprehensive threat
protection
that scales with their increasing
network traffic and business needs
Easy deployment,
management
and operations for their hybrid
cloud and on-prem networks
7.
Cisco Security |7
of firewall breaches will
be caused by firewall
misconfigurations1
99%
of web traffic is
encrypted2
95%
of organizations lack
sufficient visibility into
threats and are struggling
to implement zero trust3
73%
And attackers leverage the gaps
1 Gartner Technology Insight for Network Security Policy Management; 2Google Transparency Report; 3Cybersecurity Insiders, 2022 Application Security Report;
8.
Cisco Security |8
2023 Product of the Year by
CRN, Tech Leader by PeerSpot
Facilitates over 85% of
world’s internet traffic
Analyzes >550B
security events/day
Generates > $3.4B in
security business
Secures >300K
customers
Cisco Secure Firewall
By the company that builds the most networks across the globe
Industry’s leading
intrusion prevention, Snort3
Industry's first
Encrypted Visibility Engine
Best Next Generation
Firewall by SE Labs
9.
Cisco Security |9
Complete attack surface visibility
Comprehensive
threat protection
Easy deployment &
management
Branch
offices
Remote
employees
Clouds
Data
centers
Cloud
applications
Vendors &
contractors
Personal
devices
Campus
Cisco Secure Firewall - A Robust and Reliable Line of Defense
▪ Devices
▪ Clouds
▪ Malware
▪ Known exploits
▪ Malicious URLs
▪ DNS
▪ Web-based attacks
▪ Cloud/on-prem/on-box
management options
▪ Low-touch provisioning
▪ Flexible consumption models
▪ Apps
▪ Users
10.
Cisco Security |10
Talos is the threat intelligence group at Cisco. We are here to fight the
good fight — we work to keep our customers, and users at large, safe
from malicious actors.
What is Talos?
Engineering
and Development
Global Outreach
Community
Vulnerability
Research and Discovery
Detection Research
Threat Intelligence
and Interdiction
11.
Cisco Security |11
Unmatched
visibility across the
threat landscape
~2,000 new samples/minute
~2,000 domains blocked/second
~9M emails blocked/hour
800B security events/day
Intelligence requires rich dataset
Threat intelligence, updated automatically every hour
Cisco Security |13
9300 Series
Cisco Secure Firewall Hardware Portfolio
1010
1100 Series
Small and Medium
Business (SMB)/OT
Branch
Office
Midsize
Enterprise
Service
Provider
Large Enterprise
Datacenter
ISA 3000
1200 Series
3100 Series
4200 Series
NEW
14.
Cisco Security |14
Cisco Secure Firewall 4200 Series
• Grow your security infrastructure as
your business grows with clustering
capability of up to 16 firewall devices.
• Ensure business uptime with hot-
swappable network modules, including
fail-to-wire interfaces.
• Achieve High Performance Packet
Processing with powerful hardware, a
wide range of high performing network
interfaces with a 1 RU footprint.
• Gain visibility into encrypted traffic with
crypto-accelerated architecture,
speeding up TLS and IPsec decryption.
Superior Performance Outstanding ROI
1RU, 16x Clustering, 200G/400G Interface Support, 2x Interface Module Slots, Dual SSD’s, Dual
Management interface
15.
Cisco Security |15
Five appliance models:
3105, 3130, 3120, 3130, 3140
up to 45 Gbps Firewall throughput*
* 1024B FW+AVC+IPS
• High performance mid-range appliance
• Threat-focused security architecture
• Flexible deployment options:
• Firewall
• Dedicated Intrusion Protection System
• Multi-Instance Support
• Cluster up to 16 x appliances
Enterprise and data center security with
exceptional price/performance
3100 Series Data Sheet
Cisco Secure Firewall 3100 Series
16.
Cisco Security |16
Secure Firewall 3100 and 4200 Series
Crypto Acceleration
A specially built circuit to provide
encryption/decryption acceleration
Crypto-acceleration using an FPGA (Field-programmable gate array)
Interface Flexibility
Support for 1G,10G,25G,40G,100G,200G,
400G* interfaces across 2 Network
Modules
Flow Offload
Flow offload engine processes packets in
hardware up through layer 4
FIPS Compliance
Supports all FIPS 140-3 requirements
Hardware Highlights
17.
Cisco Security |17
Secure Firewall 1200 Series Compact
• Three Desktop models – 1210CE, 1210CP, & 1220CX
• SoC ARM design
• 16GB of RAM
• 480GB NVMe Storage
• Fixed 8x1GE:
• 1210CP – 4x1GE with UPoE+ Support (120W
total, max 90W per port)
• 1220CX – 2x1/10G SFP+
• Multiple SoC-embedded Accelerators
• Encryption/decryption
• Traffic processing
• Up to 9 Gbps Firewall throughput*
At a Glance
* 1024B FW+AVC+IPS
18.
Cisco Security |18
Secure Firewall 1200 Series Compact
Accelerate cryptographic operations solely
with the SoC* and Lookaside Crypto
Cryptographic Accelerator Unit
Deploy SD-WAN at multiple branch
locations faster with Zero-Touch
Deployment and Bulk Preprovisioning using
Device Templates
SD-WAN Capable
Support for 1G or 10G (SFP+)
interfaces, in addition to increased PoE
delivery on select models
Interface Flexibility
Compact, desktop form factor with optional
rack or wall mount
Form Factor
*SoC – System on Chip
Hardware Highlights
19.
Cisco Security |19
Secure Firewalls
for the IT domain
Secure Firewall
ISA3000
for the OT domain
Common
Management
Thermal resilience: -40C to +60C
High availability hardware bypass,
dual-power, QoS, latency mitigation
Environmental hardening: Vibration, shock,
surge, electrical noise
Hazloc with nA protection
Communication protocols: GOOSE, COSEM,
CIP, Modbus, IEC 104, OPC-UA, GSE,
BacNet, ISO MMS, and DNP3
Secure Firewall Hardware Built for OT
Robust coverage for OT, IoT, & IIoT crafted for the harshest industrial environments.
20.
Cisco Security |20
Cisco Secure Firewall Virtual Portfolio
Private Cloud Public Cloud Gov/IC Cloud
Virtual firewall performance-based licensing from 100Mbps up to 16Gbps
Cloud Leadership
Dynamic Policy
Clustering & Auto Scaling
Quickstarts, Infrastructure as
Code and Automation
Integration with cloud native
services & infrastructure
Gateway Load balancer integration
Accelerated Networking
Snapshots
Smart & Tiered Licensing
21.
Cisco Security |21
Secure Firewall Release 7.6
Threat AI/ML Simplify Operations SD-WAN Platform Investment
SnortML – Machine-
Learning based exploit
protection
QUIC Decryption
MITRE security tagging
Encrypted Visibility Engine
enhancements
Cisco Firewall AI
Assistant
AI/ML-based threat
enhancements
(SnortML, Encrypted
Visibility Engine)
Policy Analyzer & Optimizer
SAML-based identity firewalling
Upgrade Workflow Simplification
Change Management Workflows
Decryption Policy Wizard
SD-WAN
Deployment
Wizard
Firewall Templates
for simplified fleet
deployment
1200 Series Branch firewall
4200 Multi-Instance
16-node clustering
for 3100 & 4200
80% RA-VPN performance
improvement over DTLS for
3100/4200 Series
400GE Network Module
Support
ASAv Unlimited for Private
Cloud
ASAv standalone container
Cisco Security |25
What is Firewall Management Center (FMC)?
On-premise, or Cloud-Delivered centralized management for multi-site deployments
• Key Benefits
• Manage across many sites
• Control access and set policies
• Investigate incidents
• Prioritize response
• Available in physical and virtual options
• Features
• Multi-domain management
• Role-based access control
• High availability
• APIs and pxGrid integration
• Policy & device management
• Endpoint
• Security intelligence
24.
Cisco Security |26
Firewall Management Center & Cloud-delivered Firewall Management Center
Familiar User Experience
Cloud-Delivered
Firewall Management
Center
Firewall Management
Center
25.
Cisco Security |27
SaaS
On-prem Hybrid
Config Analytics
Event
Storage
Analytics
Event
Storage
Config Config Analytics
Event
Storage
Versatile, flexible, and simplified firewall management
Cloud
On-prem
Driven by security concerns
or regulatory compliance
Sensitivities around
customer data
Lower operational costs and
eliminate maintenance overhead
On-prem and cloud versions offer the same look and feel with easy migration options
26.
Cisco Security |28
20+ Product Consoles Platform Experiences are emerging…
defenseorchestrator.com
xdr.cisco.com
SSE.cisco.com
CDO
XDR
Security Cloud
Control
Historically Today Security
Cloud Control
SSE
How do we make this
final leap?
security.cisco.com
Unified management
Security Cloud Control: Common Management
27.
Cisco Security |29
Cloud Management
Unified coordination of
security solutions
Support for hybrid
environments including
on-prem FMC
Consistent policy
enforcement and object
sharing
Physical Firewall (ASA and FTD)
Virtual Firewall
Multicloud Defense
Hypershield
Users
Devices
Applications
Simplify operations
Streamline policy and device control
28.
Cisco Security |30
Simplify operations
Gain end-to-end visibility from a single screen
Access comprehensive insights
across all firewall and security
deployments
Enable prompt issue resolution
through a live view of network
traffic and security events
Empower informed decisions
with operational insights from
network data
Cisco Security |32
What is Cisco dCloud?
Cisco dCloud Data Centers
US (East & West), London,
Sydney, & Singapore
dCloud.cisco.com
Cisco dCloud
A cloud-based virtual demonstration offering
Demonstrations
Focused on Cisco products and solutions that are
Packaged, pre-configured, and scripted.
Customizable
Full administrative control of your demo
Availability
24x7 Access with Cisco.com credentials
Any Use Case
See only or get hands-on
Supported
All demos are completely tested & validated
User feedback encouraged
31.
Cisco Security |33
Understanding the Lab Topology
• Jumpbox
• Outside
• Faux Internet
• Branch office
• Edge – NGFW1 and other NGFWs for
HA, etc.
• CSR routers for enhancement
• Inside
• Linux and Windows Test system
• AD servers, CSDAC, FMC, Splunk
32.
Cisco Security |34
Understanding the Lab Topology
• Jumpbox
• Outside
• Faux Internet
• Branch office
• Edge – NGFW1 and other NGFWs for
HA, etc.
• CSR routers for enhancement
• Inside
• Linux and Windows Test system
• AD servers, CSDAC, FMC, Splunk
33.
Cisco Security |35
Understanding the Lab Topology
• Jumpbox
• Outside
• Faux Internet
• Branch office
• Edge – NGFW1 and other NGFWs for
HA, etc.
• CSR routers for enhancement
• Inside
• Linux and Windows Test system
• AD servers, CSDAC, FMC, Splunk
34.
Cisco Security |36
Understanding the Lab Topology
• Jumpbox
• Outside
• Faux Internet
• Branch office
• Edge – NGFW1 and other NGFWs for
HA, etc.
• CSR routers for enhancement
• Inside
• Linux and Windows Test system
• AD servers, CSDAC, FMC, Splunk
35.
Cisco Security |37
Understanding the Lab Topology
• Jumpbox
• Outside
• Faux Internet
• Branch office
• Edge – NGFW1 and other NGFWs for HA,
etc.
• CSR routers for enhancement
• Inside
• Linux and Windows test systems
• AD servers, CSDAC, FMC, Splunk, traffic
generatort (with FTD)
Cisco Security |40
• Assumes no previous experience with
Cisco Secure Firewall
• Includes Scenario 0:
Familiarization with dCloud Environment
• Covers onboarding
• Basic FMC configuration
• Basic object configuration
• Device registration
• Device network configuration
• Covers basic policy configuration
• Introduces main types of policies
• Enough information to create a functional firewall policy
Foundation Lab Exercises
39.
Cisco Security |41
Scenario 1 – FMC Configuration
Day-0 FMC Configuration | Configure Syslog | Review Email Notification Settings
What
Deeper Understanding of FMC Configuration | Increase Event Storage | Receive Alerts for Various Events
Why
Via the FMC Web Interface
How
40.
Cisco Security |42
Scenario 2 – Objects
Create Network Objects | Create a new Variable Set
What
Required for Access Control Policy configuration | Required for Intrusion Policy configuration
Why
Via the FMC Web Interface - Object Management Page
How
41.
Cisco Security |43
Scenario 3 – Security Zones
Create Routed Security Zones
What
Consistent Traffic Processing across Managed Devices
Why
Via the FMC Web Interface - Object Management Page
How
42.
Cisco Security |44
Scenario 4 – Basic Access Control
Create a new Parent Access Control Policy | Create a new Child Access Control Policy
What
Requirement for adding a Managed Device
Why
Via the FMC Web Interface - Access Control Policy Page
How
43.
Cisco Security |45
Scenario 5 – Device Registration
Deregister Virtual Firewall Threat Defense | Register Virtual Firewall Threat Defense to New FMC
What
Managed Device Requirement for upcoming Lab Tasks
Why
Via the FMC Web Interface – Device Management Page
How
44.
Cisco Security |46
Scenario 6 – Platform Settings
Configure a new Platform Settings Policy | Review Performance Profile options | Deploy Changes
What
Define Device Specific Configurations | Skew CPU Performance | Apply Changes to the Device
Why
Via the FMC Web Interface – Platform Settings Page
How
45.
Cisco Security |47
Scenario 7 – Device Interfaces
Configure Interfaces & Routes | Configure NAT | Create an Allow Rule for Outbound Traffic
What
Establish Network connectivity | Allow Corp-LAN to have Internet connectivity | Permit Outbound Traffic
Why
Via the FMC Web Interface – Device Management, NAT Policy, and Access Control Policy pages
How
Cisco Security |50
Scenario 8 – Network Discovery
Enable Passive Analysis with Network Discovery | Observe Newly Detected Hosts
What
Discover/Observe hosts, users, and applications for RFC-1918, Corp-LAN, and Branch-LAN networks
Why
Via Discovery Rules | Via FMC’s Network Map
How
49.
Cisco Security |51
Provides the right data, at the right time, in the right format
Network Discovery
• Discovers applications, users, and
hosts through passive analysis of
network traffic
• Provides context and helps determine
the impact of attacks
• Tune IPS signature sets to devices
discovered on the network
• Update host profiles with 3rd party
vulnerability management integration
50.
Cisco Security |52
Scenario 9 – Malware & File Policy
Enable Blocking of Malicious file downloaded via HTTP
What
Enable Firewall Threat Defense to detect, capture, and analyze files
Why
Via File Rules
How
51.
Cisco Security |54
Scenario 10 – Decryption Policy
Generate an internal CA for Decrypted Traffic | Create & Configure a new Decryption Policy
What
Used to Resign Outbound Decrypted Traffic | Block Insecure Protocols & Exempt Sensitive Data
Why
Via the FMC Web Interface – Object Management & Decryption Policy Pages
How
Cisco Security |56
Scenario 11 – Intrusion Policy
Create a new Intrusion Policy | Modify default Settings | Create a new Network Analysis Policy
What
Enable Deep Packet Inspection | Modify Security Level & Rule(s) | Enable advanced options
Why
Balanced Security and Connectivity | Via Group Overrides | Balanced Security and Connectivity
How
54.
Cisco Security |57
Pig vs. Pig
Snort 2 Snort 3
Multi-Threaded Architecture
Capable of running multiple Snort Processes
Port Independent Protocol Inspection
IPS Accelerators / Hyperscan Support
Modularity – Easier TALOS contributions
Scalable Memory Allocation
Next Gen TALOS Rules – e.g., Regex/Rule Options/Sticky Buffers
New and Improved HTTP Inspector – e.g., HTTP/2 support
Lightweight content updates from TALOS
55.
Cisco Security |58
Reduce the noise/volume of events and prioritize administration
Secure IPS
Powered by Snort 3 – Best of breed, open source IPS
Firewall brings the power of context to IPS
Rule recommendation can tune IPS
Impact of IPS events can be deduced.
Impact flag Administrator Action Why
1
Act immediately,
Vulnerable
Event
Corresponds
to vulnerability
mapped to host
2
Investigate, Potentially
Vulnerable
Relevant port
open or protocol
in use but
no vuln mapped
3
Good to know,
Currently Not available
Relevant port not
open or protocol
not in use
4
Good to know,
Unknown Target
Monitored network
but unknown host
0
Good to know,
Unknown Network
Unmonitored
network
56.
Cisco Security |59
Drive impact analysis and rule recommendations
Correlate Host Profile and IPS
57.
Cisco Security |60
Scenario 12 – Access Control Policy Settings
Modify the Parent Policy Settings | Enable Security Intelligence | Modify the Child Policy Settings
What
Apply Settings to all Child Policies | Block all Talos Threat Feeds | Enable Portscan Detection
Why
Via the Access Control Policy Editor | Via Network and URL Block Lists | Via Advanced Settings
How
58.
Cisco Security |61
Scenario 13 – Access Control Rules
Block Destination Geos | Block Risky/Low Relevance Applications | Add additional Inspections
What
Restrict specific Geolocations | Control Usage of specific Apps & URLs | Utilize IPS & File Policies
Why
Via a Geolocation Block Rule | Via a URL & Application Block Rule | Through the Rule Editor Page
How
59.
Cisco Security |62
Control traffic based on IP, User, URL, FQDN, or application
Firewall Policy Powered by Talos and OpenAppID
Security Intelligence:
Block latest malicious
IPs, URLs and FQDNs
AVC with OpenAppID:
Identify and control over
6,000+ pre-defined apps
AVC with OpenAppID:
Easily create custom
application detectors
URL Categories:
Classify 280M+ URLs
using 80+ categories
Category-based
Policy Creation Admin
Allow Block
DNS Sinkhole
0100
0010
Security feeds
URL | IP |DNS
Allow Warn Block
Firewall
Cloudlock's Cloud Application
Security Insights (CASI)
merging with Secure Firewall
OpenAppID for SaaS App detection
Cisco Security |64
Scenario 14 – Encrypted Visibility Engine (EVE)
Visibility into Encrypted Sessions without Decrypting | Block Malware based on Threat Score
What
Increased Visibility into Client Applications & Processes | Less Traffic needs to be Decrypted
Why
Modify EVE Configuration | Utilize Unified Event Viewer for Connection & Block Events
How
62.
Cisco Security |65
Encrypted Visibility Engine
• Increased visibility into client
applications, processes & other
details of hosts.
• Block connections by malware
processes
• Decreased burden on security
devices as less traffic needs to be
decrypted.
• Support for TLS 1.3 and QUIC
63.
Cisco Security |66
Encrypted Visibility Engine Benefits
66
Can be used for APP control in the firewall policy
Detects and blocks malware in encrypted flows
Minimal performance impact
Triggers Indications of Compromise
Enriches Endpoint DB with Application and OS
Encrypted Visibility Engine
64.
Cisco Security |67
Optimized for an encrypted world
Encrypted Visibility Engine
Data set
Talos Threat
Intelligence
Data from 80K
endpoints/day
1B TLS
fingerprints/day
10K samples
sandboxed/day
Incoming
encrypted
traffic flow
Malware
threat score
analysis
Packet threat score
greater than threshold
Packet is blocked
Packet threat score
less than threshold
Packet is allowed
AI/ML
Cisco Security |71
• Assumes basic experience with Cisco Secure
Firewall configuration
• Includes Scenario 0:
Familiarization with dCloud Environment
• Unlike Foundation lab, includes section on lab
capabilities to expand beyond lab exercises
• Selected advanced topics
• The lab supports many features not covered in these
exercises.
• Focus is on newer features.
• Majority of exercises focus on SD-WAN and Threat-
related features.
Advanced Lab Exercises
67.
Cisco Security |72
Scenario 1 – CSDAC
Observe CSDAC in FMC | Configure Connectors | Configure Dynamic Objects
What
Instantaneous adaption to changes | Accelerated Integration | Prevent build-up of outdated rules
Why
Via the FMC Web Interface | Access Control Policy | Azure Connector
How
68.
Cisco Security |73
Cisco Secure Dynamic Attribute Connector
Problem: In a dynamic and multicloud
world, admins struggle to keep up with
ever changing object IPs as workloads
are spun up, down and change.
Solution: Cisco provides a programmatic
way to create, deploy and maintain
dynamic objects.
Benefits: Dramatically reduces the admin
overhead to keep security policies up to
date, provides on demand updates
without a deploy. Gain confident control
of cloud services and other dynamic
environments.
NEW
69.
Cisco Security |74
Cisco Secure Dynamic Attribute Connector
Office365 GitHub
Webex Zoom
Generic
Text
Azure
Azure Service
Tags
VMWare
GCP
AWS
Security
Groups
Service
Tags
Cyber
Vision
Cloud Connectors Public Feeds and External
Connectors
70.
Cisco Security |75
Cisco Secure Dynamic Attributes Connector
Azure
Finance
App
HR
App
AWS
IT
App
HR
App
vCenter Private Cloud
HR
DB
FMC
{REST}
Azure
Connector
AWS
Connector
vCenter
Connector
FMC
Adapter
Connectors
Dynamic
Object
Mappings
Linux-Servers
172.16.0.1
172.16.0.3
Windows-
Servers
10.0.1.11
10.0.1.14
10.0.1.20
Powered-On 10.0.1.14
FMC
(Consumer)
Dynamic Attributes Filters
Adapters
Name Connector Query
Linux-
Servers
vCenter
os = 'RHEL 7 (64-bit)’
OR
os = 'CentOS 7 (64-bit)’
Windows-
Servers
vCenter
os = 'MS Windows Server 2016 (64-bit)’
AND
network=‘PROD_NETW’
AND
Power=‘running’
Powered-
On
vCenter
Power=‘running’
AND
(network=‘PROD_NETW’ OR host=‘SplunkVM’)
CSDAC
Benefits:
• Sensors immediately see
dynamic object changes
• Change without policy
deploy
At-a-Glance
71.
Cisco Security |76
Scenario 2 – Zero Trust Access (ZTA)
Observe the ZTA feature-set | Provide Clientless Application Access
What
Enables Application Access without additional software | Provides SAML-based Authentication
Why
Pre-downloaded Certificates | ZTA Policy | SAML-tracer
How
Cisco Security |78
Zero Trust Application Policy
• New Policy Type
• Create Applications or Application Groups
• Object-Based. Share objects such as:
• Certificates
• IPS and Malware Policies
• Security Zone
• Applications in a group inherit the SAML SSO
information.
1
2
74.
Cisco Security |79
Scenarios 3 to 7 – Secure Firewall with SD-WAN
Capabilities
Policy Based Routing with User Identity | SD-WAN Wizard | Review Dashboards
What
High Availability with near-Zero Down-time | Simplifying SD-WAN deployments & Management
Why
Configure ISE | SD-WAN Wizard | SD-WAN Summary & Site-to-Site Dashboards
How
Cisco Security |82
Direct Internet
Access
Umbrella
Connector
Firewall
Secure Network
Visibility
WAN
Monitoring
Routing
Application Aware
Routing
• Firewall capabilities
extending to WAN
• Visibility of WAN
infrastructure through
a Dashboard
• Extended routing
capabilities
• Monitoring of WAN
links
• Routing SaaS
applications to
leverage Internet
Access
SD-WAN for managing WAN and Security
Your journey to SASE
77.
Cisco Security |83
SD-WAN Wizard - Simplification & Automation
1. Hub 2. Spoke 3. Authentication 4. SD-WAN Settings
Steps
User
Input
Automated
• Single / Dual Hub
CSF device
• DVTI Interface
• IP Pool for Spoke
Tunnels
• Auto population
of dVTI Interface
parameters
• BGP Overlay
Configuration
• CSF Devices
• VPN Interface
Selection
• Auto generate sVTI
interface for each
Hub
• FMC assigns IP to
sVTI interfaces
• Bulk spoke addition
• Auto generate
Unique Local
Tunnel ID for each
spokes
• No input required
• Can modify if
required
• Auto generation
of Pre-shared
Key
• Auto selection of
IKE and IPsec
policies
• Security Zone for
spoke tunnel
interface
• Overlay routing using
BGP
• Automatic addition of
generated sVTI to
Security Zone for
easy AC policy rule
update
• Generate BGP
neighbor and route
map configuration for
overlay interface and
networks
78.
Cisco Security |84
SD-WAN Deployments
Secure Elastic
Connectivity
• Configure Route-based
VPN VTI tunnels
between branches
(Spokes) to
headquarters (Hubs)
• IPv6 VTI with BGP
• BGPv6 over VTI
• EIGRP and OSPF over
VTI
• DVTI Support DHCP
High availability with
near-Zero Network
Down time / SD-WAN
Optimization
• Dual ISP configuration
• Active-Standby Backup
VTI tunnel configuration
with SLA Monitoring
• Optimal Path Selection
based on interface
monitoring
Increased Usable
Bandwidth
• ECMP Support for
load-balancing across
multiple ISPs
• ECMP Support for VTI
• Application based load
balancing using PBR
Direct Internet Access
for Public Cloud and
Guest Traffic
• SaaS Application
detection (First Packet
using AVC)
• DNS Snooping using
trusted DNS servers
• Policy Based Routing
using Application as
matching criteria
• Local tunnel ID Support
for Umbrella
SD-WAN
Management
• Data Interface
Management
• Auto Config Rollback
• SASE: Umbrella Auto-
tunnel deployment
• SD-WAN Wizard:
Deployment
Simplification
79.
Cisco Security |85
Scenario 8 – Packet-Tracer in Firewall Threat
Defense
Packet Tracer Tool & Command-set | Provides Information on each step of Packet Processing
What
Troubleshooting | Enables verification of policy configuration & other Firewall settings
Why
Via NGFW1 Command-line Interface
How
80.
Cisco Security |86
Scenario 9 – Remote Access VPN Dashboard
Verify Connectivity to NGFW1 Inside Network | Explore the RAVPN Dashboard
What
Ability to filter, search, and export data | Historical reporting of RAVPN Sessions & Usage Patterns
Why
AnyConnect Secure Mobility Client | RAVPN Dashboard via the FMC Web Interface
How
Cisco Security |88
Scenario 10 – Threat Protection & AttackIQ
Request AttackIQ Tenant | Review & Update Firewall Policies | Run AttackIQ Package
What
Simulate Attacks | Provide Visibility into Threat Efficacy on the Firewall
Why
Breach and Attack Simulation Platform that provides visibility into Security Performance with clear
data-driven analysis and Mitigation Guidance
How
83.
Cisco Security |89
What is AttackIQ?
AttackIQ provides a platform for continuous
security validation.
• Allow organizations to test security defenses against real-
world attack scenarios.
• Help identify weaknesses and improve their overall security
posture.
• Simulates cyber attacks and assessing their ability to detect
and respond to them.
Product Offerings:
• Flex – “Easy button”
❑ Click-and-Go Packages
❑ Agentless
• Enterprise – “Full Offering”
❑ Customizable
❑ Agent-based
Cisco Security |91
wkst1
NGFW1
Cisco dCloud – Threat Efficacy with AttackIQ
Advanced Lab Guide: Scenario 11
jumpbox
fmc.dcloud.local
Request Attack IQ Tenant
Update SI Configuration
Refine Malware & File Policy
Configure a Decryption Policy
Enhance Access Control Policy
Run AttackIQ
Review Events
86.
Cisco Security |92
Scenario 11 – Threat Features in 7.6
QUIC Decryption | SnortML | EVE Exception List | Security Content Tagging
What
Evolving transport complexity | Zero-day Detections | Bypassing EVE’s Verdict | Enriched MITRE TTP Data
Why
Via Decryption Policy Editor | Intrusion Policy Editor | Access Control Policy Editor | Unified Event Viewer
How
87.
Cisco Security |93
What is QUIC?
• AKA, "Quick UDP Internet Connections”
• Gaining traction…
• Live and historical sites count ~16 million
• Used by 8.7% of all the websites
• Advantages of QUIC:
• Connection establishment latency
• Improved congestion feedback
• Multiplexing without head-of-line blocking
• Connection migration
• Optional unreliable or partially reliable delivery
TCP Session Establishment
TLS Key Exchange
Client Server
Connection establishment
and key exchange
Client Server
QUIC
TLS over TCP
The only vendor providing visibility by decrypting QUIC traffic.
88.
Cisco Security |94
• QUIC is a secure transport protocol over
UDP.
• Support for inspection of HTTP/3 over QUIC
• Enhanced Security: Protects against
malware and malicious activities in
encrypted QUIC communications.
• Policy Enforcement: Allows for granular
control and filtering of QUIC connections
based on specific criteria.
QUIC Inspection & Decryption
NEW
89.
Cisco Security |95
SnortML: A machine Learning
based detection engine
Capable of detecting novel attacks
fitting known vulnerability types:
Identifies
variations in
attack
SnortML identifies
when payloads
match a particular
vulnerability class,
even if there are
variations (which
previously would
have classified it as
a zero-day attack).
Proactive Defense
With SnortML, if a zero-day
pops up at 3 o’clock in the
morning and fits a common
vulnerability type, the system
will block it automatically.
SnortML: Getting in front of the fight
Each day security analysts wake to new
vulnerabilities and new signatures to write.
Security vendors across the world release these
new signatures, most only capable of detecting a
single vulnerability.
What if there was a better way?
Command
Injection
Code
Injection
SQL
Injection
90.
Cisco Security |96
• Prerequisites:
1. Enable EVE by Toggling on Encrypted
Visibility Engine (EVE)
2. Toggle on the Block Traffic Based on EVE
Score option.
• Click on Add Exception Rule to create
exception rules based on destination
network and/or EVE Process Name.
• Bypass EVE verdict for blocking EVE-based
threat connections
• Create bypass list based on EVE process
names or destination networks
• Add exemptions from EVE configuration
page or Unified Events page
EVE Exception List
Enable EVE
Enable blocking
of traffic based
on EVE Score
Click Add Exception Rule
91.
Cisco Security |97
ATT&CK is Like a Periodic Table
The Table lists the atomic building blocks of Adversaries (Molecules)
• Tactics (base on similar adversarial goals)
• Techniques and their Sub-Techniques
• Mitigations
• Adversaries
• Groups (based on similar behavior/valence
band)
• Elements and their Isotopes
• MSDS Sheets
• Molecules
Cisco Security |99
Scenario 12 – AI Assistant & Policy Analyzer & Optimizer
AI Assistant | Policy Analyzer & Optimizer
What
Evolving transport complexity | Zero-day Detections | Bypassing EVE’s Verdict | Enriched MITRE TTP Data
Why
Via Decryption Policy Editor | Intrusion Policy Editor | Access Control Policy Editor | Unified Event Viewer
How
94.
Cisco Security |100
Cisco AI Assistant for Security now on FMC
Troubleshooting and detection
Amalgamate all user guides for
expedited resolution
Augment
Policy lifecycle management
Find and fix firewall rule misconfigurations
for improved security and performance
Automate
Policy and reporting
Find and report information on policies for
faster queries, auditing, and reporting
Assist
95.
Cisco Security |101
The Road to Policy Analyzer & Optimizer (PAO)
pre-7.0.0:
Per Device Hit Count,
Duplicate Rules
(Shadowed)
7.2.0:
Duplicate Rules
(Redundant)
7.4.0:
Object Overlap
Detection
7.6.0:
Policy Analyzer and
Optimizer
(Cloud Service)
The Policy Analyzer and
Optimizer (PAO) provides:
• Expiry Rule Detection
• Mergeable Rule Detection
• Hit Count Insights
• Remediation
• And is Version Agnostic
Cisco Security |104
Youtube - Cisco Secure Firewall
The Firewall channel provides product
deep dives, integrations, and release
overview & highlights. In the past year, the
channel has generated:
• 1.25M+ impressions
• 136K views
• 7,300+ hours of watch time.
• Added 1,100+ subscribers
Public Information
99.
Cisco Security |105
Cisco Secure Firewall Essentials
Best Practice - How to – One pagers
The Secure Firewall Essentials Hub is
where users will find comprehensive
guides, documentation, videos, and more
on Cisco Secure Firewall Solutions.
• 22,000+ views
• 9,300+ active users on the site
Public Information
100.
Cisco Security |106
Secure Firewall Developer
The Secure Firewall Developer Hub offers
Cloud templates to help users deploy
firewalls in their preferred cloud provider
environment, and Automation APIs which
allow the exchange of security events, data
and host information. As of last quarter we
have:
• FMC Terraform provider to version 1.2.0 -
https://registry.terraform.io/providers/CiscoDevNet/f
mc/latest
• FMC Ansible Collection to 0.9.0 -
https://galaxy.ansible.com/cisco/fmcansible
• Newly Validated Templates for Cloud Providers -
https://github.com/CiscoDevNet/secure-firewall
Public Information