Sei sulla pagina 1di 267

#CiscoLiveLA

Firepower NGFW in
the DC and Enterprise
Deployment Tips and New Features

Steven Chimes, Consulting Systems Engineer


BRKSEC-2020

#CiscoLiveLA
Your Speaker
• Security Architect focused on global life
sciences and finance customers
• Supported those same customers through their
Firepower adoption over the last 5 years
• 15 years in industry including higher ed,
manufacturing and now Cisco

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• Deploy L3 Firewalls at the Edge
• Interfaces, Routing & NAT
• NGFW Policy Tips & SSL/TLS Hardware Acceleration
• High Availability
• Deploy L2 Firewalls in the DC
• Clustering Overview
• Deploy Multi-Instance
• Overview
• Configuration Walkthrough
• Alternative Designs

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Cisco Firepower Sessions: Building Blocks
Tuesday Wednesday Thursday
BRKSEC-2020 BRKSEC-2112

10:45 10:45 08:30


9:00
Firepower NGFW in Firepower Internet
DC and Enterprise Edge Best Practices
Steven Chimes Jeff Fanelli

BRKSEC-2034 BRKSEC-3300

11:15
Cloud Management Adv. Firepower IPS
of Firepower & ASA Deployment
Divya Nair Gary Halleen

BRKSEC-2890 BRKSEC-3328
11:20 11:15
AMP and Making FMC do
ThreatGrid Cloud more
Bill Yazji Will Young

BRKSEC-2433
Threat Hunting and
Incident Response
Ben Greenbaum
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session SPEAKER 1

How SPEAKER 2

1 Find this session in the Cisco Live Mobile App WEBEX TEAMS

2 Click “Join the Discussion”


3 Install Webex Teams or go directly to the team space
DOCUMENT S

4 Enter messages/questions in the team space

Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2020


by the speaker until November 1st , 2019.
Or email me: schimes@cisco.com

#CiscoLiveLA © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
In
Depth

After the Session


Whisper Suites
or MTE

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Reference

CLINET (clinet.com)
Cisco LIVE Information Networking Company
• CLINET (clinet.com) is a fictional company created for
understanding use cases in FTD firewall deployment.
• CLINET has embarked on a network/security deployment project entitled
“The Security 20/20 Project” which serves as the basis for the use case.
• Company requirements and configuration examples are based upon
Therecustomer
real-life are ~100 slides we
conversations will not cover today
and deployments.

They are included for additional detail


and reference back at home
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Cisco Firepower NGFW
Reference

Firepower Threat Defense (FTD) Software

Firepower (L7) Firepower Threat Defense


• Threat-Centric NGIPS
• AVC, URL Filtering for NGFW Full Feature Set Single Converged OS
• Advanced Malware Protection

ASA (L2-L4)
• L2-L4 Stateful Firewall
• Scalable CGNAT, ACL, routing Continuous Feature Firewall URL Visibility Threats

• Application inspection Migration

Firepower Management
Center (FMC)*

* Also manages Firepower Appliances and FirePOWER Services (not ASA Software)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Cisco NGFW portfolio
Running Firepower Threat Defense (FTD)

Firepower 9300
SM-24
SM-36
Firepower 4110
SM-44
Performance

Firepower 4120
NEW
Firepower 4140
SM-40
Firepower 2110 Firepower 4150 NEW
SM-48
Firepower 2120 SM-56
NEW
Firepower 1120 Firepower 2130 Firepower 4115
Firepower 1140 Firepower 2140 Firepower 4125 NEW
Firepower 1150 Firepower 4145

FPR 1010
ASA 5506 (up to 6.2.3) Clustering &
ASA 5508
ASA 5516
Multi-Instance

SOHO Branch Mid-size Large Data Service


SMB Office Enterprise Enterprise Center Provider

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Firepower 1010 Overview

Integrated Security Appliance with ASA or FTD


• Embedded x86 CPU with QuickAssist Crypto Acceleration
• Fixed non-modular configuration

Desktop

Copper Data Interfaces


• 8x1GE Ethernet
• Built-in Layer 2 switch new
• Power over Ethernet (PoE) on ports 7 and 8new

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Firepower 1100 Overview

Integrated Security Appliance with ASA or FTD SFP Data Interfaces


• Embedded x86 CPU with QuickAssist Crypto Acceleration • 4x1GE on 1120 and 1140
• Fixed non-modular configurations (1120, 1140, 1150 new ) • 2x1GE, 2x10GE on 1150new

1RU

Copper Data Interfaces Field Replaceable SSD


• 8x1GE Ethernet

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Cisco NGFW Management Options

Firepower Device Manager Firepower Management Center

• On-box management • Centralized cloud manager • Management appliance


• Manages single deployment • Manages FTD, ASA, Meraki, • Supports full FTD feature set
Umbrella and AWS
• Simplified management /
feature set • Rapidly evolving feature set
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Session Focus – Firepower Management Center
Firepower Management Center

Multi-Instance Clustering
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
FTD Initial Setup
Reference
New in 6.2.3!
Installing Firepower Threat Defense Single hop upgrade

Management Center Smart License FTD on FPR4100/FPR9300

Firepower Firepower FTD 6.1


1. Management
2. Management 3.
Center 6.1 Center 6.2.3 FXOS 2.2.1.x

Single Hop Single Hop


Upgrade or Register Upgrade or
Install Reimage

Firepower FTD 6.2.3


Cisco Smart
Management
Software Manager
Center 6.2.3 FXOS 2.3.1.x
FXOS 2.2.1.x

FMC Installation Guide: http://www.cisco.com/c/en/us/td/docs/security/firepower/hw/firepower_management_center/management_center/installation.html


FTD Quick Start Guides: http://www.cisco.com/c/en/us/support/security/firepower-ngfw/products-installation-guides-list.html

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Management Connections
ASA 5506 – 5555 / FPR1000 / FPR2100 (1 Management)
FTD Management Inside

Outside
Management interfaces can be placed
on the same subnets as data interfaces

FPR4100 / FPR9300 (2 Management)


Chassis Management Inside

Outside FTD Management

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Reference

Management Connections
• FTD is managed by FMC through a management interface.
• Management interface is used only for management and eventing.
• Can be on the same subnet as a data interface or on separate subnet.
• Usually is placed on the same subnet as the inside interface.
• Management interfaces are not shown on diagrams, but are present.
Firepower Management
Center (FMC)

Layer-2 Switch FTD Inside


Outside
FTD Management
Chassis Management
(FPR4100/FPR9300)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Generally Suggested Version: FTD 6.4.0.4
Software Download Page on cisco.com Has Latest Recommendation

Additional details
Look for the star on recommendation

+
Latest Compatible FXOS Version (now 2.6.1.174)

Cisco FXOS Compatibility: https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/compatibility/fxos-compatibility.html


#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
New Software Lifecycle Policy

New Recommended
Release: 6.4.0.4

• Even-numbered long-
term releases
• Certification every 2
years (6.4, 6.8)
• Predictable cadence

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
FTD Licensing Tips
• All licensing for FTD are installed and
enforced on the Firepower
Management Center via Smart
Licensing
• Licenses are transferrable between
firewalls of the same model
• Licensing is enforced when the policy
is pushed
• 90 day “Evaluation Mode” applies to
all FTD devices managed by that FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Reference

Deploying Changes
Changes don’t take affect until you deploy the policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Reference

Deploying Changes
Changes don’t take affect until you deploy the policy

Enable to add column to


show if traffic interruption will
occur during policy deploy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Reference
FTD Initial Setup –
FTD Console on Firepower 2100
• Initial setup through console interface is prompted. Default
username/password is admin/Admin123
Cisco Firepower 2140 Threat Defense v6.2.1 (build 10223)
firepower login: admin
Password: Admin123

• Connect to the Firepower Threat Defense Application


firepower #: connect ftd

• Prompts to configure admin password, management (IPv4 and/or IPv6),


etc.
You must change the password for 'admin' to continue.
<snip>
You must configure the network to continue.
<snip>

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Reference

FTD Initial Setup – FTD Console


• 5506 – 5555 and FPR2100 include an easy to use/simplistic local manager.
• Local manager only manages local appliance (not HA pair).
• For the use case, CLINET is using FMC for central management.
Manage the device locally? (yes/no) [yes]: no

• Firewall mode is one of the few features configured locally. We will cover modes in
more detail later on.
Configure firewall mode? (routed/transparent) [routed]:

• Connection to FMC must be preconfigured on FTD, single line command.


• Registration key can be any string you want – just remember it!
configure manager add [hostname | ip address ] [registration key ]

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Reference

FTD Initial Setup – Adding a Device to FMC

Either hostname
or IP address

Registration key
we used in CLI Add device
drop down

Select based upon Previously configured


subscriptions Access Control Policy
purchased or create a new one

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Firewall Deployment Mode & Interfaces
Firewall Design: Modes of Operation
• Routed Mode is the traditional mode of the firewall. Two or more 10.1.1.0/24
interfaces that separate L3 domains – Firewall is the Router and 10.1.1.1
Gateway for local hosts.
NAT
DRP
192.168.1.1

192.168.1.0/24

IP:192.168.1.100
GW: 192.168.1.1

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Firewall Design: Modes of Operation 192.168.1.1

• Routed Mode is the traditional mode of the firewall. Two or more


interfaces that separate L3 domains – Firewall is the Router and VLAN192
Gateway for local hosts.
• Transparent Mode is where the firewall acts as a bridge
functioning at L2.
• Transparent mode firewall offers some unique benefits in the DC. VLAN1920
• Transparent deployment is tightly integrated with our ‘best practice’
data center designs. 192.168.1.0/24

• Integrated Routing and Bridging (IRB) allows a firewall to both


route and bridge for the same subnet. IP:192.168.1.100
GW: 192.168.1.1
• Available in Routed Mode when standalone or HA pair
• Not currently supported with Clustering
• Useful for micro-segmentation and switching between interfaces
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
FTD Security Zones
• True zone based firewall

• Security Zones are collections of interfaces or sub-interfaces

• Policy rules can apply to source and/or destination security zones

• Security levels are not used

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Routed/Transparent Interface Types
Standalone Interface Redundant Interface EtherChannel Interface

#3 #2 #1
Choice Choice Choice

• All platforms • 5506 – 5555 only • All platforms


• No redundancy • One active, one passive • Up to 16 active links
• Simple • No special switch • Requires stack, VSS or
requirements vPC when connected to
multiple switches

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Reference

Basic Interface Configuration


Just an example – Final config will be different once redundancy is added

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Reference

Basic Interface Configuration


Interface in RED
Just an example – final config will be different
once redundancy is added
ISP-A ISP-B

Edge
Aggregation

DMZ Network(2)
(Public Web/DB)

G1/1

VPC VPC

Edge Aggregation
VDC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Reference

Deploying the Redundant Outside Interfaces


Edge Use Case Supported on the
5506 – 555 only

outside
ISP-A ISP-B

Edge
Aggregation

DMZ Network(2)
(Public Web/DB)

G1/1 G1/2

VPC VPC

Edge Aggregation
VDC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Reference

Deploying the Redundant DMZ Interfaces


Will use sub-interfaces to accommodate the 2 VLANs

ISP-A ISP-B
No security
Edge
zone this time Aggregation

DMZ Network(2)
(Public Web/DB)

GigabitEthernet1/3

GigabitEthernet1/4 G1/3 VLAN


VLAN 150
150
VLAN
trunk
trunk
VLAN 151
G1/4 151

VPC VPC

No IP either Edge Aggregation


VDC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Reference

Deploying the Redundant DMZ Interfaces


Will use sub-interfaces to accommodate the 2 VLANs

ISP-A ISP-B

Edge
Aggregation

DMZ Network(2)
(Public Web/DB)

G1/3 VLAN
150
VLAN
trunk
G1/4 151

VPC VPC

Edge Aggregation
VDC

Repeat 1x for VLAN 151

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Reference

Deploying the Redundant DMZ Interfaces


Will use sub-interfaces to accommodate the 2 VLANs

ISP-A ISP-B

Edge
Aggregation

DMZ Network(2)
(Public Web/DB)

G1/3 VLAN
150
VLAN
trunk
G1/4 151

VPC VPC

Edge Aggregation
VDC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Reference

What is an EtherChannel?
• EtherChannel LAG (IEEE standard is 802.3ad) allows up
to 16 physical Ethernet links to be combined into one
logical link. 16 links can be active and forwarding data.
• Ports must be of same capabilities: duplex, speed, type, etc.
• Benefits of EtherChannel are increasing scale, load-
balancing and HA
• Load balancing is performed via a load-balancing hashing
algorithm (src-dst-ip, src-dst-ip-port, etc.) LACP Load Balance
• EtherChannel uses LACP (Link Aggregation Control
src-dst-IP (hash)

Protocol) to allow dynamic bundling and dynamic


recovery in case of failure
• Static LAG can be used on non-FXOS platforms, but should
be aware of potential traffic black holes this may cause

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Reference

What is a vPC EtherChannel?


• vPC (like VSS) is known as Multi-Chassis EtherChannel

• Virtual Port Channels (vPC) are common EtherChannel


deployments, especially in the data center, and allow
multiple devices to share multiple interfaces 20G

• All links are active – no STP blocked ports

• A vPC Peer Link is used on Nexus devices to instantiate 10G


the vPC domain and allow sharing 10G

• Peer Link synchronizes state between vPC peers

• vPC can maximize throughput since each port channel is treated LACP Load Balance
src-dst-IP (hash)
as a single link for spanning-tree purposes
• Spanning Tree is not disabled, but does not affect the network

• vPC White paper:


http://www.cisco.com/c/dam/en/us/td/docs/switches/datacenter VPC PEER LINK
/sw/design/vpc_design/vpc_best_practices_design_guide.pdf

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
EtherChannel on FTD
• Supports 802.3ad and LACP standards
Single • Direct support for vPC/VSS
• FPR2100/FPR4100/FPR9300 require LACP w/ 6.2.3
or • FPR4100/9300 support Etherchannel “On” mode w/ 6.3
Stack
• Up to 16 active links
• 100Mb, 1Gb, 10Gb, 40Gb are all supported – must match

• Supported in all modes (transparent and routed)


• Redundant interface and LAG on FTD are mutually
VSS exclusive
or • FXOS EtherChannels have the LACP rate set to
vPC normal by default.
• Recommended to change to fast when clustering
• https://www.cisco.com/c/en/us/td/docs/security/firepow
er/fxos/clustering/ftd-cluster-solution.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Reference

Deploying the Inside Interfaces with EtherChannel


We will use sub-interfaces to accommodate the 3 internal VLANs
Call it bob if
you want

No security zone on
the port-channel
because we are using
sub-interfaces

No IP

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Reference

Deploying the Inside Interfaces with EtherChannel


We will use sub-interfaces to accommodate the 3 internal VLANs

Same security zone can


be assigned to multiple
different firewalls

VLAN 120
Repeat 2x for VLAN 2 and VLAN 1299

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Reference

Deploying the Inside Interfaces with EtherChannel


We will use sub-interfaces to accommodate the 3 internal VLANs

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Reference

Deploying the Inside Interfaces with EtherChannel


We will use sub-interfaces to accommodate the 3 internal VLANs

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Routing on FTD
Reference

FTD Packet Processing Flow

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Routing on FTD
• FTD performs L3 route lookup as part of its normal packet processing flow Outside Network

• FTD is optimized as a flow-based inspection device


FHRP 128.107.1.1
• For smaller deployments, FTD is perfectly acceptable as the router
• For larger deployments, a dedicated router (ISR, ASR, Nexus) is a much better
option. G1/1 DMZ Network
• FTD may originate routes depending on the network design Static Default
G1/3
• FTD Supports static routing and most IGP routing protocols:
• BGP-4 with IPv4 & IPv6 (aka BGPv4 & BGPv6)
RIP?
Static or IGP
G1/2
• OSPFv2 & OSPFv3 (IPv6)
• RIP v1/v2
Seriously?
Inside 10.120.1.0/24

• Multicast
• EIGRP (via FlexConfig)
• Complete IP Routing config:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configura Inside Network
tion/guide/fpmc-config-guide-
v64/routing_overview_for_firepower_threat_defense.pdf

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Reference

BGP
• FTD supports BGPv4 with IPv4 and IPv6 for dynamic routing across all platforms
• Standard communities / all path attributes, route redistribution; up to 100K prefixes and 2K neighbors
• Null0 and Remotely-Triggered Black Hole (RTBH) support
• Confederations, route reflectors, tagging, neighbor source-interface, and BFD are not supported

• BGP RIB is replicated in failover along with other protocols

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Reference

Non Stop Forwarding (NSF)


• Routing Information Base is replicated in failover mode
• Active unit or master establish dynamic routing adjacencies and keep standby up-to-date
• When the active unit fails, the failover pair continue traffic forwarding based on RIB
• New active unit re-establish the dynamic routing adjacencies and update the RIB
• Adjacent routers flush routes upon adjacency re-establishment and cause momentary traffic blackholing

• Non Stop Forwarding (NSF) and Graceful Restart (GR) support in FTD:
• Cisco or IETF compatible for OSPFv2, OSPF3; RFC 4724 for BGPv4
• FTD notifies compatible peer routers after a switchover in failover
• FTD acts as a helper to support a graceful or unexpected restart of a peer router in all modes
1. Active FTD fails over to standby; newly active 2. Router re-establishes OSPF adjacency with the
unit initiates OSPF adjacency with the router OSPF FTD while retaining the stale routes; these routes
indicating that traffic forwarding should continue. are refreshed when the adjacency reestablishes.

4. FTD continues normal traffic forwarding until the 3. Primary Route Processor undergoes a restart,
primary RP restarts or the backup takes over or the OSPF signals the peer FTD to continue forwarding while
timeout expires. Forwarding Plane the backup re-establishes adjacencies.

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Reference

FTD Routing – Static Use Case


Equivalent to
route outside 0.0.0.0 0.0.0.0 128.107.1.1

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Reference

FTD Routing – Dynamic Use Case


Step 1 – Enable the OSPF Process

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Reference

FTD Routing – Dynamic Use Case


Step 2 – Add an Area

Next slide is from


redistribution tab

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Reference

FTD Routing – Dynamic Use Case


Step 3 – Add Redistribution

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
NAT on FTD
Reference

FTD Packet Processing Flow

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
NAT on FTD
• NAT on FTD is built around objects, with two types of NAT:

• Auto NAT – Only source is used as a match criteria


• Only used for static or dynamic NAT
• When configuring, it is configured within a network object (internally)
• Device automatically orders the rules for processing:
• Static over dynamic
• Quantity of real IP addresses – from smallest to largest
• IP address – from lowest to highest
• Name of network object – in alphabetical order

• Manual NAT – Source (and possibly destination) is used as a match criteria


• More flexibility in NAT rules (one-to-one, one-to-many, many-to-many, many-to-one)
• Supports NAT of the source and destination in a single rule
• Only the order matters for processing

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
NAT on FTD Processing
• Single NAT rule table (matching on a first match basis).
• Uses a simplified “Original Packet” to “Translated Packet” approach:

Manual NAT

• NAT is ordered within 3 sections.


• Section 1 – NAT Rules Before (Manual NAT)
• Section 2 – Auto NAT Rules (Object NAT)
• Section 3 – NAT Rules After (Manual NAT – Not Typically Used)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Reference

Auto NAT Use Case


Dynamic NAT translation of 10.120.1.0/24 to the using Interface PAT

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Reference

Auto NAT Use Case


Static NAT translation of 172.16.25.200 to a public IP of 128.107.1.200

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Reference

Auto NAT Use Case


Dynamic NAT translation of 10.120.1.0/24 to 128.107.1.10-128.107.1.20

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Manual NAT Use Case
Static NAT 192.168.1.10 → 192.168.1.155 to 128.107.1.242 → 128.107.1.155

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Reference

Sample NAT Policy

Easy to understand
NAT logic
Manual NAT Rules

Auto NAT Rules

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
FTD NGFW Policy Tips
Reference

FTD Packet Processing Flow

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Reference

NGFW Policy Types in FTD


Policy Type Function
Access Control Specify, inspect and log network traffic
Intrusion Inspect traffic for security violations (including block or alter)
Malware & File Detect and inspect files for malware (including block)
SSL Inspect encrypted traffic (including decrypt and block)
DNS Controls whitelisting or blacklisting of traffic based on domain
Identity Collect identity information via captive portal
Prefilter Early handling of traffic based L1-L4 criteria

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Reference

Access Control Policy Overview


• Controls what and how traffic is allowed, blocked, inspected and logged
• Simplest policy contains only default action:
• Block All Traffic
• Trust All Traffic – Does not pass through Intrusion and Malware & File inspection
• Network Discovery – Discovery applications, users and devices on the network only
• Intrusion Prevention – Using a specific intrusion policy

• Criteria can includes zones, networks, VLAN tags, applications, ports, URLs and
SGT/ISE attributes
• The same Access Control Policy can be applied to one or more device
• Complex policies can contain multiple rules, inherit settings from other access
control policies and specify other policy types that should be used for inspection

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Reference

Access Control Policy Use Case #1


Allow MS SQL from inside to pubdmz

Disables further inspection /


pushes rules to hardware on
FPR4100/9300 if Security
Intelligence is disabled.

Rules below are


still processed

Displays block
page over HTTP

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Reference

Access Control Policy Use Case #1


Allow MS SQL from inside to pubdmz

Determines if rule can be


overridden by child policy

Use zones rather than IPs


whenever possible to make
your policy more flexible

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Reference
Access Control Policy Use Case #1 –
Applications
Allow MS SQL from inside to pubdmz

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Access Control Policy Use Case #1 – Logging Tab
Allow MS SQL from inside to pubdmz

Logging will increase the number


of events the FMC must handle.
Be sure to consider your logging
requirements before logging
connection events to the FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Logging Considerations for Large Deployments
Americas – DC #1

Americas – DC #2
1 FP4150 = 200K CPS
EMEA – DC #1
Policy With Full Logging:
EMEA – DC #2 10x FP4150s = 2M EPS 1x FMC4600
Rated for 20K EPS
APJC – DC #1

Total = 10x FP4150s

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
6.2.3
Logging Design for Large Deployments Example

FTD FMC
Security Events Security Events SIEM
Syslog or eStreamer

Connection Events
Syslog

Uncheck - Security events SIEM

are always sent to FMC siem.clinet.com

SIEM

Check to enable syslog directly from FTD

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
6.3+
Logging Design for Large Deployments Example

FTD FMC
Security Events Security Events SIEM
Syslog or eStreamer
6.3: Connection / Intrusion Events
6.4: Connection / Intrusion / File / File Malware Events
Syslog

Uncheck – Even when unchecked, security


events and security related connection
events are always sent to FMC

Check to enable syslog directly from FTD

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
FTD 6.3+ – Logging Tab in Access Control Policy
Allows more global control of syslog and more flexible syslog settings

Applies to all devices. Syslog connection


log format will change after FTD (not
FMC) is upgraded from pre-6.2.3 to 6.3+

Allows you to have different syslog


servers per region (NAM, EU,
APJC) but still use the same policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Reference

Access Control Policy Use Case #2 – Introduction


CLINET requirements:
• Allow all outbound HTTP/HTTPS traffic, regardless of port
• Perform IDS inspection of the traffic (with all Chrome rules enabled)
• Block any malware
• Block any HTTPS connections that use a self-signed certificate

• Policies we’ll need to create:


1. Intrusion Policy
2. Malware & File Policy
3. SSL Policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Reference
For more, check out :

Intrusion Policy Overview


BRKSEC-3300
Advanced IPS Deployment

• Controls how IDS or IPS inspection is performed on network traffic


• Simple policy inherits settings from 1 of 5 Cisco Talos maintained base policies:
• Balanced Security and Connectivity – Default and recommended
• Connectivity Over Security – Fewer rules enabled, only most critical rules block
• Maximum Detection – Favors detection over rated throughput
• No Rules Active
• Security Over Connectivity – More rules enabled, deeper inspection

• Individual rules can be set to generate events, drop and generate events, or disabled
• Layers allow for grouping of settings/rules for easier management
• Complex policies can contain multiple layers and multiple levels of inheritance

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Reference

Intrusion Policy for Use Case #2


Detection Only (No Inline Blocking) + Alert on Chrome Attacks

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Reference

Intrusion Policy for Use Case #2


Detection Only (No Inline Blocking) + Alert on Chrome Attacks

IDS → Drop when Inline unchecked


IPS → Drop when Inline checked

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Reference

Intrusion Policy for Use Case #2 – Rules Menu


Detection Only (No Inline Blocking) + Alert on Chrome Attacks

Freeform search

Selecting browser-chrome
populates the appropriate
filter in the filter bar

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Reference

Intrusion Policy for Use Case #2 – Rules Menu


Detection Only (No Inline Blocking) + Alert on Chrome Attacks

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Reference

Intrusion Policy for Use Case #2 – Rules Menu


Detection Only (No Inline Blocking) + Alert on Chrome Attacks

The rules are


now enabled

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Reference

Malware & File Policy Overview


• Controls what and how files are allowed, blocked and inspected
• Simple policy applies the same action (e.g. Block Malware) to all files
• Actions are:
• Detect Files – Detect and log the file transfer, perform no inspection
• Block Files – Block and log the file transfer, perform no inspection
• Malware Cloud Lookup – Inspect the file to determine disposition (Malware, Unknown or
Clean) and log
• Block Malware – Inspect the file to determine disposition, log and block if Malware

• Inspection includes static analysis of the file (via Spero), dynamic analysis (via AMP
Threat Grid) and local analysis (via ClamAV)
• Complex policies can include different actions and levels of inspections for different
application protocols, directions and file types.
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Reference

Malware & File Policy Overview


Blocks all files matching Stores files on
policy file type(s) sensor for further
investigation by
analyst

Detection only
(no blocking)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Reference

Malware & File Policy for Use Case #2


Block malicious Office, Executable and PDF files transferred over HTTP

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Reference

Malware & File Policy for Use Case #2


Block malicious Office, Executable and PDF files transferred over HTTP

Blocks all files matching


policy file type(s)

Detection only
(no blocking)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Reference

Malware & File Policy for Use Case #2


Block malicious Office, Executable and PDF files transferred over HTTP
Stores files on
sensor for further
investigation by
analyst

Spero = Static Analysis via ML

Dynamic Analysis = Upload of


the file to the cloud for analysis

Capacity Handling = Store file


and resubmit if file submission
limit exceeded

Local Malware Analysis = Local


ClamAV signature scanning
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Reference

Malware & File Policy for Use Case #2


Block malicious Office, Executable and PDF files transferred over HTTP

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Reference

Malware & File Policy for Use Case #2 – Rule Added


Block malicious Office, Executable and PDF files transferred over HTTP

Add more rules


as needed

Rule we just
created

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Reference

SSL Policy Overview


• Controls how and what encrypted traffic is inspected and decrypted
• Simple policy blocks all encrypted traffic that uses a self-signed certificate
• Actions are:
• Decrypt - Resign – Used for SSL decryption of public services (Google, Facebook, etc.)
• Decrypt - Known Key – Used when you have the certificate’s private key
• Do not decrypt
• Block
• Block with reset
• Monitor

• Many actions can be taken on encrypted traffic without decryption by inspecting the
certificate, distinguished name (DN), certificate status, cipher suite and version (all
supported by FTD)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
SSL/TLS Hardware Acceleration
Technically always TLS, but is called SSL in pre-6.4 versions
• TLS hardware acceleration consists of
three components (simplistically):
• TLS Proxy Session Setup Application Data
Encrypt/Decrypt Encrypt/Decrypt
• Session Setup Encrypt/Decrypt
(Asymmetric Key) (Symmetric Key)
• Application Data Encrypt/Decrypt
• TLS Proxy is always done in software TLS Proxy
(Software Only)
• Encrypt/Decrypt can be done in
hardware on:
• ASA 5525-X, 5545-X, 5555-X (6.2.3+) Network Data
• Firepower 4100/9300 series (6.2.3+)
• Firepower 1000 (6.4+) & 2100 series (6.3+)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Enabling SSL/TLS Hardware Acceleration
Enabled via CLI in 6.2.3, by default in 6.3+ and during upgrade in 6.4+.
• If not in the FTD console on a FPR4100/FPR9300, connect to FTD:
Firepower-module1> connect ftd

• At the FTD CLI prompt:


> system support ssl-hw-offload enable
IMPORTANT!
If you enable SSL hardware acceleration, you cannot:
1. Decrypt passive or inline tap traffic.
2. Decrypt GRE or IP-in-IP tunnel traffic.
3. Decrypt traffic using SEED or Camellia ciphers.
4. Preserve Do Not Decrypt connections when the inspection engine restarts.
Continue? (y/n) [n]: y

Enabling or disabling SSL hardware acceleration reboots the system. Continue? (y/n) [n]: y

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Reference

Setting Up an SSL Policy


Step #1 – Import Root or Certificates (If Doing Decryption)

Internal CA certs w/ private key that can be used to spoof


resign public certificates. Used for “Decrypt – Resign”.

CAs that are trusted. SSL policy can specify clients


can only connect to sites signed by these CAs
Certs that are trusted. SSL policy can specify
clients can only connect to sites with these certs

Internal certs w/ private key that can be used for decryption


without resigning. Used for “Decrypt – Known Key”.

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Reference

Setting Up an SSL Policy


Step #2 – Create the SSL Policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Reference

Setting Up an SSL Policy


Step #3 – Create the SSL Rule

For public servers (you don’t control)

For servers you control

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Reference

Setting Up an SSL Policy


Step #3 – Create the SSL Rule

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Reference

Setting Up an SSL Policy


Step #3 – Specify the Criteria

None of these require


decryption of traffic

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Reference

Setting Up an SSL Policy


Step #4 – Assign the SSL Policy to the Access Control Policy

This tab contains advanced settings


for the entire access control policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Reference

Access Control Policy – Revisited


The glue that ties everything together

Access Control Policy

Prefilter SSL Identity


DNS Policy
Policy Policy Policy

Inspection Options

Access Control Criteria Action


Rule (to match) Intrusion Malware & File
Policy Policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Reference

Access Control Policy Use Case #2 – Recap


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)
• CLINET requirements:
• Allow all outbound HTTP/HTTPS traffic, regardless of port
• Perform IDS inspection of the traffic (with all Chrome rules enabled)
• Block any malware
• Block any HTTPS connections that use a self-signed certificate

• Policies we just created:


1. Edge Intrusion Policy We now need to apply them
2. Edge Malware & File Policy
by creating a rule in the
3. Edge SSL Policy
Edge Access Control Policy

Note: We will do this with a single rule for time/demonstration purposes.


There are multiple ways the same result could be achieved depending on the overall policy required.

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Reference

Access Control Policy Use Case #2 – Graphically


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)

Edge Access Control Policy

Edge SSL
Policy

Inspection Options
Criteria Action
Access Control
Rule All HTTP Allow Edge Intrusion Edge Malware &
Traffic Policy File Policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Reference

Access Control Policy Use Case #2


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Reference

Access Control Policy Use Case #2 – Applications


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Reference

Access Control Policy Use Case #2 – Inspections


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)

Intrusion policy we
created previously

Malware & file policy


we created previously

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Reference

Access Control Policy Use Case #2 – Logging


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)

Log Files automatically


enabled with File
policy present

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Reference

Access Control Policy Use Case #2 – Rule Added


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)

SSL Policy applies to the


entire access control
policy, not just one rule

Rule we just
created

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Reference

Access Control Policy Use Case #2 – SSL Policy


Inspect Outbound HTTP/HTTPS Connections (IDS, Malware and SSL)

This tab contains advanced settings


for the entire access control policy

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
NTP Config #1 - FXOS
A leading cause of “no events are showing up in my FMC”…

FXOS does not sync time


from FMC. Use the same
NTP servers as FMC

Ensure the Server Status is


Synchronized

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
NTP Config #2 – FMC for Non-FXOS Devices
A leading cause of “no events are showing up in my FMC”…

For FTD, defined in a Threat Defense policy


For legacy Firepower, defined in a Firepower policy

Ensure all the necessary/new


devices are added

Using “Via NTP from the


Management Center” is the default
and general best practice for non-
FXOS devices (e.g. FPR2100)

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
NTP Config #3 – FMC Itself
A leading cause of “no events are showing up in my FMC”…

Use the same NTP servers as


used for the FXOS devices

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Organizing Access Control Rules
Policy Management – Categories
• All access control policies contain two categories - Mandatory and Default
• Customer categories can be created to further organize rules
• Note - After you create a category, you cannot move it. You can delete it, rename it,
and move rules into, out of, within, and around it

Present by default, can’t be deleted

User created categories

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Policy Management – Inheritance
• Allows an access control policy to Global Domain

inherit the access control rules from


another policy. 2nd Level Domain

• Two types of sections in an policy: 3rd Level Domain


/ Leaf Domain
• Mandatory – Processed before any rules in a
child policy
• Default – Processed after all mandatory rules
and after any default rules from child policies
Example of what the Europe Data
Center Policy will look like in the
Access Control Policy Editor

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Policy Management – Multi-Domain Management
• Multitenancy for the Firepower management console
• Maximum of 50 (6.0+), 100 (6.5+) or 1024 domains (via expert mode in 6.5+)
• Maximum of 3 levels deep (2 child domains)
• Segments user access to devices, configurations and events
• Users can administer devices in that domain and below
• Devices are assigned to a domain
Global Domain
• Primarily for MSPs
EMEA
Americas Domain
• Uses in the Enterprise: Domain
• Force a policy to apply to all firewalls in a domain
Edge DC
• Limit user visibility to only select devices and events Domain Domain
• Delegate admin control while maintaining global visibility/control
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Policy Management – Object Overrides
• Allows an object to be reused on multiple firewalls, but with different meanings
• Networks, Ports, VLAN Tags and URLs all support overrides

Example use cases:


• Selectively override an object
on the few devices that need a Default value, can
different value be left empty

• Create an empty object, so


Enable overrides
that an override is required for
every firewall
Overridden values
• Create a default value in the
global domain, but allow
subdomain administrators to
override the default value
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Designing Your Access Control Policy
Prefilter Policy (no AVC/IPS/AMP) • Prefilter rules are the fastest
Layer 1-4 block rules • Any rules that are layer 1–4
and/or based and traffic that does not
Layer 1–4 allow rules for medium/long* lived flows (e.g. allow backups) need security inspection (e.g.
backup traffic) should be placed
in the prefilter policy for best
Access Control Policy performance
Layer 1-4 block rules
and/or • Rule order in Access Control
Layer 1-4 allow rules for short lived** flows (e.g. allow Umbrella DNS) Policy is not strictly required
Layer 5 block rules (e.g. block servers with self signed certificates) • Leads to the fastest blocking
and/or with the fewest number of
Layer 7 URL block rules (e.g. block URL category Adult) transmitted packets

Layer 7 application block rules (e.g. block Office 365) *length of flow does not matter on
ASA/FPR1000/FPR2100
Targeted layer 7 allow rules (e.g. allow HTTP with tailored AMP policy)
**length of flow only matters on
Generic layer 7 allow rules (e.g. allow all traffic with generic IPS policy) FPR4100/FPR9300

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Best Practices Docs

https://explore.cisco.com/ngfw_ftd_common-practices/ngfw-ftd-policy-mgmt
https://www.cisco.com/c/dam/en/us/td/docs/security/firepower/Self-Help/Basic_Policy_Creation_on_Cisco_Firepower_Devices.pdf
https://www.cisco.com/c/dam/en/us/td/docs/security/firepower/Self-Help/NGFW_Policy_Order_of_Operations.pdf
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
FTD High Availability
Firepower Threat Defense High Availability
• Supported on all physical models and ESXi
• Stateful Active/Standby failover only
• All features are supported with failover

• Both NGFWs in pair must be identical in Primary Failover Backup


software, memory, interfaces and mode NGFW NGFW
(active) (standby)
• On FPR9300, failover is only supported
State

• Across blades in different chassis


• In non-cluster mode

• Long distance LAN failover is supported if


latency is less than 250 ms
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Firepower Threat Defense High Availability (Part 2)
• Two nodes connected by one or two
dedicated connections called “failover links”
• Failover and state
• Can use the same link for both
• Best practice is to use a dedicated link for each
if possible (cross-over or VLAN) Primary Failover Backup
NGFW NGFW
(active) State (standby)
• When first configured, Primary’s policies are
synchronized to Secondary
• Configuration/policy updates are sent to
current active node by FMC
• Active unit replicates policies to standby

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
How Failover Works
Failover link passes hellos between active
and standby units every 15 seconds
(tunable from 200msec - 15 seconds)

HELLO HELLO

Primary Failover Secondary


FTD FTD
(active) State (standby)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
How Failover Works

HELLO

Primary Failover Secondary


FTD HELLO
FTD
(active) State (standby)

HELLO

After three missed hellos, local unit sends If no response…


hellos over all interfaces to check health of its
peer – whether a failover occurs depends on
the responses received

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
How Failover Works

Failover Secondary
FTD
State (active)

Local unit If no response…


becomes active

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Reference

Stateful Failover Supported Features


• NAT translation table • URL With Notes:
• TCP connection states • Geolocation • Dynamic Routing Protocols
• UDP connection states • URL Filtering • AVC
• Snort connection states • TLS sessions not decrypted
• IPS Detection state
• Strict TCP enforcement • TLS URL • File malware blocking
• The ARP table • User Agent • File type detection
• The Layer 2 bridge table • ISE Session Directory • Identity/Captive Portal
• SIP signaling sessions • IP Reputation • Signature Lookup
• Snort Inspection • URL Reputation • File Storage
• Static Routes • DNS Sinkhole • File Pre-class (Local
• DHCP Server • Fragment settings Analysis)
• ARP Inspection • File Dynamic Analysis
• Archive File Support
See Chapter: Firepower Threat Defense High Availability for full details: • Custom Blacklisting
http://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-
guide-v601/fpmc-config-guide-v601_chapter_01100110.html

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Reference
Easier Way:
Stateful Failover Unsupported Features
• Every feature is supported, except:
• Sessions inside plaintext tunnels
• Inspection after decryption
• TLS Decryption State
• The HTTP connection table
• DHCP client
• DHCP server address leases
• Multicast routing

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
HA with Interface Redundancy
Before… After with redundant interfaces

Primary Failover Backup Primary Failover Backup


FTD FTD FTD FTD
(active) State (standby) (active) State (standby)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
HA with Interface Redundancy
Before… After with redundant interfaces
Failures 11 - 7,
4 still

no FAILOVER

1 1

Any Causes
1
1
FAILOVER 2

Primary Failover Backup Primary Failover Backup


FTD FTD FTD FTD
(active) State (standby) (active) State (standby)
1 3

1 4

Port Channel feature makes this concept somewhat obsolete if switches support VSS/vPC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Reference

Deploying Active/Standby Failover


With both devices added to FMC, use “Add High Availability” dropdown

The policy that is


applied to this device
will become active

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Reference

Deploying Active/Standby Failover


Whoops! Good to go!
• Fix the error and try again.
• In the example below,
policies had been changed,
but not yet deployed

Best practice - separate


interfaces/VLANs

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Deploying Active/Standby Failover – Secondary IPs
Required to send hellos between data interfaces

Edit interfaces to
add standby IP
addresses for better
interface monitoring

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Deploying Active/Standby Failover – MAC Address
For stability, set virtual MAC address

Why? Traffic disruption due to MAC


address changes:
• If the secondary unit boots without
detecting the primary unit, the
secondary unit becomes the active
unit and uses its own MAC
addresses. When the primary unit
becomes available, the secondary
(active) unit changes the MAC
Not required addresses to those of the primary.
functionally, but
best set for stability • If the primary unit is replaced with
new hardware, the MAC addresses
from the new primary are used.

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
FTD Clustering Overview
FTD Clustering Basics
• Designed to solve two critical issues with firewall HA:
• Aggregates firewall capacities for DC environments (bandwidth,
connections/sec, etc.)
• Provides dynamic N+1 stateful redundancy with zero packet loss

• Two types of clustering:


• Intra-chassis clustering – Supported (9300 only)
• Inter-chassis clustering – Supported (4100 or 9300)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
FTD Clustering Types with FPR9300
FTD Inter-Chassis Cluster
• Cluster of up to 6 modules (across 2 – 6 chassis)
• Off-chassis flow backup for complete redundancy

Switch 1 Switch 2
Nexus vPC

FPR9300 Chassis 1 FPR9300 Chassis 2

Supervisor Supervisor
FTD FTD FTD FTD
Cluster
FTD Cluster FTD

FTD Intra-Chassis Cluster


• Modules can be clustered within chassis
• Bootstrap configuration is applied by Supervisor
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Inter-Chassis Clustering
• All NGFWs in cluster must be identical:
• 9300 – modules must be the same type
• 4100 – chassis must be the same model

• Only Spanned EtherChannel mode (L2) is


supported
• Equal-Cost Multi-Path (ECMP) mode (L3) is
not supported
• Requires at least FXOS 2.1.1 and FTD 6.2
• Not yet supported with Multi-Instance For practical purposes, use
FXOS 2.6.x and FTD 6.4.0.x

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Cluster Scalability – FTD 6.2.3 Example
54G 226G
30M 108M
Sessions Sessions
200K cps 2 6 600K cps

100% with no
Bandwidth 70% Avg.
Asymmetry*
Example 2 Firepower 9300s w/ 6 Total SM-44 Modules at 54 Gbps → 226 Gbps of throughput

Concurrent Sessions 60%


Example 2 Firepower 9300s w/ 6 Total SM-44 Modules at 30M → 108M concurrent sessions

New Connection Rate 50%


Example 2 Firepower 9300s w/ 6 Total SM-44 Modules at 300K → 900K connections/sec

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Correct Use of EtherChannels When Clustering
with VPCs 1 2 3 4

CL MASTER CL SLAVE CL SLAVE CL SLAVE FTD x Node Cluster

▪ Data Plane of Cluster MUST use FTD Port-Channel 32


cLACP (Spanned Port-Channel)
VPC Identifier on N7K must be the
cLACP – Spanned Port Channel
same for channel consistency

N7K VPC 32
Cluster Data Plane
Cluster Control Plane VPC PEER LINK
▪ Control Plane [Cluster Control Link]
of Cluster MUST use standard LACP
(Local Port-Channel)
▪ Each VPC Identifier on Nexus 7K is N7K VPC 42
unique N7K VPC 40
N7K VPC 41
N7K VPC 43

▪ Port Channel Identifier on FTD LACP – Local Port Channels


defaults to 48
1 2 3 4 FTD Port-Channel 48

CL MASTER CL SLAVE CL SLAVE CL SLAVE FTD x Node Cluster

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Reference

Clustering Roles
• Flow Owner
• The unit that receives the connection, registers with Director

• Flow Director
• Backup to the Owner and responds to lookup requests from the Forwarders.
• Maintains a copy of state for individual Owner’s flow

• Forwarder
• Receives a connection but does not own it, queries Director for Owner
• Forwarders can derive Owner from SYN cookie if present (SYN-ACK) in asymmetric scenarios
or may query the Director via Multicast on CCL
Owner Forwarder Forwarder Director
Flow A

Flow B Forwarder Owner Director Forwarder


cLACP / PBR

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Reference

Switch Requirements (Cisco and non-Cisco)


Requirements (must support): Recommendations (should support):
• 802.3ad compliant (LACP) • Uniform traffic distribution over the
EtherChannels individual links
• Under 45 second bundling time
• EtherChannel load-balancing algorithm
• On the cluster control link: that provides traffic symmetry
• Full unimpeded unicast and broadcast
connectivity at Layer 2 • Configurable hash using the 5-tuple,
• No limitations on IP addressing or the 4-tuple, or 2-tuple
packet format above Layer 2
• Must support an MTU above 1600
Note #1: Cisco does not support the resolution of bugs found in non-verified switches.

Note #2: Some switches, such as the Nexus series, do not support LACP rate fast when performing in-service
software upgrades (ISSUs). Cisco does not recommend using ISSUs with clustering.
FXOS Compatibility Guide: https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/compatibility/fxos-compatibility.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Cisco Verified Switches for Clustering
Supported and Recommended: Supported but not recommended for spanned
EtherChannel mode:
• Nexus 7000 (M1, M2, F2 and F3)
• Cisco Nexus 7000 (F1)
• Cisco ASR 9000 with RSP 440
• Cisco Nexus 3000
• Cisco Nexus 9500, 9300, 6000, 5000
• Catalyst 4500-X
• Catalyst 6800 with Supervisor 2T
• Catalyst 3850
• Catalyst 6500 with Supervisor 2T, 32, 720,
and 720-10GE Reason – Asymmetric load-balancing can
cause performance degradation for data
• Catalyst 4500 with Supervisor 8-E throughput on the cluster
• Catalyst 3750-X

Note: Switches must run as a stack, vPC or VSS pair if cluster EtherChannel spans multiple switches

FXOS Compatibility Guide: https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/compatibility/fxos-compatibility.html

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Data Center - Cluster Connectivity Preferences
Firewall on a Stick Same Model Switches Different Model Switches

#1 #2 #3
Choice Choice Choice

• Single EtherChannel for • Two EtherChannels to • Two EtherChannels to


the inside and outside different switch pairs different switch pairs
• Same model switch • Different model switches

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Data Center - Using 2 Different Switches
Switch Port Numbers Matter
Ascending
EtherChannel RBH values are sequentially allocated Order
in ascending order starting from the lowest 1/1 1/2 1/3 1/4
numeric line card and port ID.
0,4 1,5 2,6 3,7
For best cluster performance, keep traffic
symmetric and off the CCL:
• Use a symmetric hashing algorithm
• Use fixed RBH allocation for EtherChannels 0,4 1,5 2,6 3,7
e.g. port-channel hash-distribution fixed on
Nexus 7K and Catalyst 6500 1/7 2/1 5/7 6/1
• Links should be connected in matching Also
ascending order on each switch Ascending
Configuring Load Balancing Using Port Channels in Nexus 7000 Series NX-OS Interfaces Configuration Guide:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/nx-os/interfaces/configuration/guide/b-Cisco-Nexus-7000-Series-NX-
OS-Interfaces-Configuration-Guide-Book/configuring-port-channels.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
PAT in Clustering for Internet Egress
PAT pool is uniformly distributed to all cluster members at IP level
Multiple app connections load-
PAT Pool: 192.168.1.200-201
balance to different cluster members
High Security
with symmetric etherchannel hashes
TCP:192.168.1.200/31401 Web App

TCP:192.168.1.201/24109
ERROR: multiple app connections come
FTD Cluster from different source IP addresses

Use src-ip hashing on client side switch to keep NAT IPs consistent
Multiple app connections load-
PAT Pool: 192.168.1.200-201
balance to same cluster member
TCP:192.168.1.200/10001 High Security
with src-ip etherchannel hashing
TCP:192.168.1.200/10002 Web App

TCP:192.168.1.201/10001

FTD Cluster

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Other PAT with Cluster Best Practices
• Ensure there are as many or more IPs in the PAT pool as there are cluster
members or required for translations
• 4 cluster members = 4+ IPs in PAT pool, 8+ is ideal
• 250k translations = 4+ IPs in PAT pool, 8+ is deal
• Use flat port range option
• Stops FTD from prematurely moving to next
PAT IP due to high low port range usage
• Helps keep PAT IP pool IP distribution even
across the cluster members (each unit owns Cluster-PAT-Pool

one or more IP)


Original Src Port Translated Src Port Translated Src Port
(flat)
1-511 1-511 1024-65535

512-1023 512-1023 1024-65535


These ranges can fill up quickly if
1024-65535 1024-65535 1024-65535
NTP, NETBIOS, etc. is allowed
NAT Details: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/network_address_translation__nat__for_firepower_threat_defense.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
FMC Clustering Improvements with FTD 6.3
Discovery of cluster nodes is now automatic in FMC
FTD 6.2.3 - 6 Node Cluster Setup FTD 6.3+ - 6 Node Cluster Setup

Add Device #1 Add Device #5 Add Device #1


in FMC in FMC in FMC

Add Device #2 Add Device #6 Devices #2 - #6 Automatically


in FMC in FMC Added to Cluster in FMC

Add Device #3 Add Devices to


Done!
in FMC Cluster in FMC

Add Device #4 Automatic discovery of nodes applies


Done
in FMC to both initial setup and additions

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Set Cluster Control Link (CCL) MTU
Avoids fragmentation after encapsulation on CCL

Set MTU at 100


bytes above
highest data MTU

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Pro-Tip – Set Virtual MAC Addresses
For stability, set Active Mac address, especially if using non-interface NAT
IPs
Why? Traffic disruption due to
MAC address changes:
• On boot, the MAC addresses of
the master unit are used across
the cluster. If the master unit
becomes unavailable, the MAC
addresses of the new master unit
Not required, but more
are used across the cluster.
stable if set. For clustering, • Gratuitous ARP for interface IPs
only Active Mac Address
needs to be set. partially mitigates this, but has no
effect on NAT IPs.

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Reference

New TCP Connection (Symmetric Flow)


inside FTD Cluster outside
1. Attempt new
connection with 2. Become Owner, add
TCP SYN TCP SYN Cookie and
deliver to Server
Flow Owner
5. Update
3. Respond with
Director
TCP SYN ACK
through another unit
4. Deliver TCP SYN
ACK to Client
Client Server
Flow Director

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Reference

New TCP Connection (Asymmetric Flow)


inside FTD Cluster outside
1. Attempt new
connection with 2. Become Owner, add
TCP SYN TCP SYN Cookie and
deliver to Server
Flow Owner
6. Update
4. Redirect to
Director
Owner based on
TCP SYN Cookie,
become Forwarder
5. Deliver TCP SYN
ACK to Client
Client Server
Flow Director

3. Respond with TCP SYN


ACK through another unit
Flow Forwarder

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Reference

New UDP-Like Connection (Asymmetric Flow)


FTD Cluster
inside outside
Flow Owner
1. Attempt new UDP
or another pseudo- 4. Become Owner,
stateful connection deliver to Server
2. Query 3. Not 5. Update
Director found Director
9. Redirect to
Owner, become
10. Deliver 7. Query Forwarder
response to Client Director
Client Flow Director Server
8. Return
Owner

6. Respond through
Flow Forwarder another unit

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Reference

Flow Owner Failure


FTD Cluster
inside outside
Flow Owner
3. Next packet
load-balanced to
6. Become Owner,
another member
deliver to Server
4. Query 5. Assign 7. Update
Director Owner Director

Client Server
Flow Director

1. Connection is established
through the cluster
Flow Owner
2. Owner fails
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Reference

FTD Clustering Configuration


Reference

Clustering Setup – Firepower Chassis Manager

• FPR4100 and FPR9300


platforms only
• Used for:
• Managing the device hardware
• Configuring boot images
• Configuring physical (up/down)
and EtherChannel interfaces
• Cluster hardware setup

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Reference

Steps Involved in Bringing up a FTD Cluster

Configure Add Create


Configure
Cluster Members Cluster
Interfaces
Members to FMC in FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
Reference

Clustering Setup – Firepower Chassis Manager


Interface #1 – Management Interface for FTD

Type Mgmt - Used for


Firepower Management
Center connections and
other management
connections (e.g. SSH)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Reference

Clustering Setup – Firepower Chassis Manager


Interface #2 – Cluster Control Link

Type Cluster - Used


for the Cluster Control
Link and exchange
data between cluster
members

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Reference

Clustering Setup – Firepower Chassis Manager


Interface #3 – Data Link
SVI VLAN200 172.16.25.253 SVI VLAN200 172.16.25.254
FHRP – 172.16.25.1 FHRP – 172.16.25.1

North Zone
VLAN 200

None

VPC
VLAN 200
Outside

VLAN 201
Inside
VPC BVI 172.16.25.86/24

Trunk Allowed 1,201 South Zone


VLAN 201

Server in
VLAN 201

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Reference

Clustering Setup – Firepower Chassis Manager


Interfaces All Configured

Type Cluster - Used for the


Cluster Control Link and
exchange data between
cluster members
Type Mgmt - Used for
Firepower Management
Center connections and other
management connections
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #1

Name of the
individual device,
not the cluster a.k.a. “Image Type”
- ASA or FTD
Images uploaded by the
user into the Firepower
Chassis Manager, make
sure they match across
cluster members

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #1

Be sure the data and cluster


interfaces are selected, interface for
management will not show up here

Port-channel48 is
automatically selected as the
cluster interface if configured

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #1

Chassis ID of the
unit in the cluster
(must be unique)

Key to authenticate
units joining the
Name of the cluster cluster, must be the
to join, must be the same on all devices
same on all devices
Dedicated out-of-band
management port

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #1

Key to authenticate
the management
connection from FMC

Admin password to
login to FTD locally
Needed for dc-fw.clinet.com

uploading files to
AMP, etc. Routed or
Transparent

FQDN of cluster, not


the cluster member

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #1

FTD management
IP, this must work
for communications
to the FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #1

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #1

This is the cluster


configuration. Copy
this to the clipboard,
as it helps to avoid a
lot of retyping when
setting up other units

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #2

Name of the
individual device,
not the cluster

If this isn’t checked, you


will need to enter each
cluster detail manually
in the next step

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #2

Paste the config you


copied from the first
cluster member here

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #2

Must be different
than other units

Cluster Key – Enter


the same as before
Populated from the
pasted config

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #2

Key to authenticate
the management
connection from FMC

Admin password to
login to FTD
dc-fw.clinet.com

Populated from the


pasted config
Same across all units
in the cluster

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #2

Change to be
unique
Populated from the
pasted config

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Reference

Clustering Setup – Firepower Chassis Manager


Creating Cluster Member #2

Wait for device to


show in-cluster before
adding to FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
Reference

Clustering Setup – Firepower Management Center


Creating the Cluster

Each cluster member


must be individually
added to FMC before Display name of entire
you can create a cluster cluster within FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Reference

Cluster Successfully Added

Not a big deal,


clustering isn’t
technically live yet

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Reference

Deploying FTD in Transparent Mode


Reference

Review: Modes of Operation 192.168.1.1

• Routed Mode is the traditional mode of the firewall.


Two or more interfaces that separate L3 domains – VLAN192

Firewall is the Router and Gateway for local hosts


• Transparent Mode is where the firewall acts as a
bridge functioning at L2
VLAN1920
• Transparent mode firewall offers some unique
benefits in the DC 192.168.1.0/24

• Transparent deployment is tightly integrated with IP:192.168.1.100


our ‘best practice’ data center designs GW: 192.168.1.1

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
Reference

Why Deploy Transparent Mode?


• Very popular architecture in data center environments
• Existing Nexus/DC network fabric does not need to be modified to employ L2
Firewall!
• It is as simple as changing host(s) VLAN ID

• Firewall does not need to run routing protocols / become a segment gateway
• Firewalls are more suited to security inspection (not packet forwarding like a router)
• Routing protocols can establish adjacencies through the firewall
• Protocols such as HSRP, VRRP, GLBP can cross the firewall
• Multicast streams can traverse the firewall
• Non-IP traffic can be allowed (IPX, MPLS, BPDUs)

• Much faster deployment time for brown field (months vs. years)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
Reference

Firewall – Transparent Mode


• Firewall functions like a bridge
• “Bump in the wire” at L2
• Only ARP packets pass without an
explicit ACL
• Full policy functionality is included –
NAT, AVC, NGIPS, AMP, etc.
• Same subnet exists on all interfaces
in the bridge-group
• Different VLANs on inside and
outside interfaces

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
Reference

Transparent Mode Configuration in the DC (2 interfaces)


Step 1 – Create Sub Interfaces (1 for each VLAN)
SVI VLAN200 172.16.25.253 SVI VLAN200 172.16.25.254
FHRP – 172.16.25.1 FHRP – 172.16.25.1

North Zone
VLAN 200

VPC
VLAN 200
Outside

VLAN 201
Inside
VPC BVI 172.16.25.86/24

Trunk Allowed 1,201 South Zone


VLAN 201

Server in
VLAN 201

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
Reference

Transparent Mode Configuration in the DC (2 interfaces)


Step 2 – Stitch everything together with a Bridge Group Interface
SVI VLAN200 172.16.25.253 SVI VLAN200 172.16.25.254
FHRP – 172.16.25.1 FHRP – 172.16.25.1

North Zone
VLAN 200

VPC
VLAN 200
Outside

Up to 250 bridge VLAN 201


Inside

groups and 64 VPC BVI 172.16.25.86/24

interfaces per
bridge group
Trunk Allowed 1,201 South Zone
VLAN 201

IP on the local subnet of


the servers, remember the Server in
correct subnet mask! VLAN 201

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
Reference

Now Cluster is Complete!

After deploying
changes, cluster
should turn green

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
Reference

FTD L2 Mode: Local Packet


10.10.44.100

Destination 1
1

SVI VLAN200 172.16.25.253 SVI VLAN200 172.16.25.254


FHRP – 172.16.25.1 FHRP – 172.16.25.1

1 Session Request to server 172.16.25.200 from North Zone


2 4
source 10.10.44.100
2 4 VLAN 200
2 ARP request (or Lookup) for 172.16.25.200 on
VLAN 200– ARP Reply from FTD containing
local MAC (outside) on VLAN tag 200. ARP
request packet actually passes through FTD
and on return trip to the Nexus the FTD
updates its MAC table with the server MAC on
VLAN 201 (Inside). It forwards a reply to the VPC
Nexus with its server MAC and a VLAN 200 tag VLAN 200
(rewritten). This is how the Nexus knows to Outside
direct traffic thru the FTD to reach server.

3 FTD receives packet with Server destination


3
3 VLAN 201
Inside
172.16.25.200 and processes the access VPC BVI 172.16.25.86/24
control policy. If allowed, it forwards the
packet back to the Nexus with a VLAN tag of
201.

4 Since Nexus does not have an SVI for VLAN


201, it forwards packets across it local trunk
which allows VLAN 201 tag – southbound Trunk Allowed 1,201 South Zone
towards the 5K. Source MAC address is the VLAN 201
FTD
55
5 Request is delivered to Server 172.16.25.200 in Server in VLAN 201
VLAN 201 172.16.25.200

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
Reference

FTD L2 Mode: Remote Packet


10.10.44.100

Destination 5

SVI VLAN200 172.16.25.253 SVI VLAN200 172.16.25.254


FHRP – 172.16.25.1 FHRP – 172.16.25.1

1 Return path from server 172.16.25.200 in VLAN North Zone


201 to remote destination 10.10.44.100
4 2 VLAN 200

2 Packet received on Nexus from Server on


VLAN 201. MAC in table that processes these
packets is FTD inside interface (from
southbound example) Traffic is redirected to
FTD (inside) VLAN tag 201
VPC
3 FTD receives packet with destination VLAN 200
Outside
10.10.44.100 and processes the access control
policy. If FTD does not have MAC Address in
table, it sends an ICMP-Echo packet to
10.10.44.100 (sourced from its BVI IP Address) 3 VLAN 201
Inside
with TTL=1. FHRP on Nexus will respond with
Time Exceeded, MAC address = FHRP MAC VPC BVI 172.16.25.86/24
VLAN 200 (Outside) which will update FTD
MAC table with the MAC-IP Mapping of Nexus
on VLAN 200 (outside)

4 FTD forwards packet to Nexus SVI (FHRP)


address 172.16.25.1 on VLAN 200 for delivery Trunk Allowed 1,201 South Zone
to destination 10.10.44.100 VLAN 201
1
5 Nexus executes ARP request (if necessary) per
standard routing function. Request is Server in VLAN 201
forwarded towards destination 10.10.44.100 172.16.25.200

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 183
FTD Multi-Instance Overview
FTD Multi-Instance Intro
• Next generation replacement for ASA Multiple Context Mode
• Create multiple logical devices on a single module or appliance
• Instances are truly virtual (unlike ASA contexts), leveraging Docker containers
• Dedicated resources allows for traffic processing and management isolation
• Each container instance runs its own FTD software version
• Physical, logical and VLAN separation provided by chassis supervisor

Internet Firewall DMZ Firewall DC Firewall


FTD 6.4 FTD 6.3.0.3 FTD 6.3.0.3
6 CPU 6 CPU 10 CPU

Firepower 4100 or Firepower 9300

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
FTD Multi-Instance Key Details
• Requires FTD 6.3+
• Supported on Firepower 4100 and 9300 hardware only
• Supports inter-chassis HA for high availability only
• Supports hardware crypto:
• 1 instance/module (FTD 6.4+)
• 16 instances/modules (FTD 6.5+)

• Maximum of 54 instances per chassis

• Not yet supported, but planned:


• Clustering
• Flow Offload
• Overlapping IP addresses across instances managed by a single FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
Instance Counts by Platform
Max Cores Max Instances NEW Max Cores Max Instances
Model Model
Per Instance Per Chassis Per Instance Per Chassis

4110 22 3 4115 46 7

4120 46 3 4125 62 10

4140 70 7 4145 78 13

4150 86 7

9300 w/ 1 x SM-24 46 7 9300 w/ 1 x SM-40 78 13

9300 w/ 1 x SM-36 70 11 9300 w/ 1 x SM-48 94 15

9300 w/ 1 x SM-44 86 14 9300 w/ 1 x SM-56 110 18

9300 w/ 3 x SM-24 46 21 9300 w/ 3 x SM-40 78 39

9300 w/ 3 x SM-36 70 33 9300 w/ 3 x SM-48 94 45

9300 w/ 3 x SM-44 86 42 9300 w/ 3 x SM-56 110 54

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 187
Network Interfaces
• Supervisor assigns physical, EtherChannel, and VLAN subinterfaces
• FXOS supports up to 500 total VLAN subinterfaces
• FTD can create VLAN subinterfaces on physical/Etherchannel interfaces
• Each instance can have a combination of different interface types

Data (Dedicated) Data-Sharing (Shared) Mgmt/Firepower-Eventing


FTD Instance A FTD Instance B FTD Instance A FTD Instance B FTD Instance A FTD Instance B

Supported Firewall Modes: Supported Firewall Modes: Supported Firewall Modes:


Routed, Transparent Routed Routed, Transparent
Supported Usage: Supported Interface Usage: Supported Interface Usage:
Routed, Transparent, Inline, Passive, HA Routed (no BVI members), HA Management, Eventing

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
Network Interface Scalability
If you only read one section of FXOS docs, read the interface section:
https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos261/cli-guide/b_CLI_ConfigGuide_FXOS_261/interface_management.html

• Ingress VLAN Group Entry Count defines maximum VLAN ID count


• Up to 250 to 500 VLAN subinterfaces or total entries across the chassis
• Re-using same VLAN ID consumes 2 entries → 250 max VLAN subinterfaces
• All unique VLAN IDs → 500 VLAN subinterfaces

• Switch Forwarding Path Entry Count limits shared interfaces


• Up to 1021 TCAM entries for ingress/egress path programming across the chassis
• Each dedicated data interface consumes 3 - 4 entries, depending on usage
• Entries for shared data interfaces grow exponentially with instance count

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
Interface Scalability Best Practices
In order of preference:
• Use non-shared interfaces or subinterfaces
• Share subinterfaces under a single
physical/port-channel interface
• e.g. Share Po4.100, Po4.200, Po4.300
instead of Po1, Po2 and Po3

• Share subinterfaces instead of


physical/port-channel interfaces
• e.g. Po1.100, Po2.200, Po3.300
instead of Po1, Po2 and Po3

• Share physical ports or port-channels

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
Interface Combinations That Work
Documented in FXOS docs under “Shared Interface Usage Examples”

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 191
Alternatives to
Multi-Instance
Use Cases for Multi-Tenancy

Routing Table Resource


Separation Sharing

Independent and/or Oversubscription of


overlapping IP spaces firewall resources

Traffic Processing Policy Management Management


Isolation Simplification Separation

Compliance separation Smaller policy views that Independent


and tenant resource are managed by a single management of firewall
overflow protection administrator partitions

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
Multi-Tenancy Use Case Mapping to FTD
Policy Routing Independent Traffic Processing
Resource Sharing
Simplification Only Separation Only Management Isolation

Less Than
No 54 Tenants?

Yes

FMC Zones Future FTD Multi-


FTDv
& Categories Release Instance Mode

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance

Multi-Context Mode ASA

Po5.301 Inside Context A Outside Po5.302

Po5.303 Inside Context B Outside Po5.304

Po5.305 Inside Context C Outside Po5.306

Po5.307 Inside Context D Outside Po5.308

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance

Po5.301 Inside Context A Outside Po5.302

Define the context


interfaces as zone objects

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance

Po5.301 Inside Context A Outside Po5.302

Define the context


interfaces as zone objects
Group the rules that
were in an ASA
context in a category

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance

Po5.301 Inside Context A Outside Po5.302

Define the context


interfaces as zone objects
Group the rules that
were in an ASA
context in a category

Use the previously defined zones


as a source/destination in each rule
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
Multi-Instance Configuration Walkthrough
Demo Scenario Logical Design
Edge DMZ Firewall

Outside DMZ

Internet Firewall DMZ Firewall

Inside

DC Firewall DC Servers

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
Demo Scenario Logical Design
Edge DMZ Firewall
(Physical – L3)

Outside DMZ

Internet Firewall DMZ Firewall


(Instance – L3) (Instance – L3)
Inside

DC Firewall DC Servers
(Instance – L2)

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 201
Demo Scenario Logical Design
Edge DMZ Firewall
(Physical – L3)

Outside DMZ
Po3 Po4

Internet Firewall Inside DMZ Firewall


(Instance – L3) Po5.100 (Instance – L3)

Inside
Po5.301,Po5.302

DC Firewall DC Servers
(Instance – L2) Po5.303,Po5.304

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 202
Demo Scenario Multi-Instance Design
Po5.301 Po5.301
Po5.302 Po5.302
Po5.303 Po5.303
Po3 Po5.100 Po4 Po5.304 Po3 Po5.100 Po4 Po5.304

Internet Firewall DMZ Firewall DC Firewall Internet Firewall DMZ Firewall DC Firewall
FPR4K08-1-A FPR4K08-2-A FPR4K08-3-A FPR4K09-1-B FPR4K09-2-B FPR4K09-3-B
(Primary) (Primary) (Primary) (Secondary) (Secondary) (Secondary)

FPR4K08 FPR4K09

HA Link 1: Eth1/8.1001
HA Link 2: Eth1/8.1002
HA Link 3: Eth1/8.1003

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 203
Steps Involved in Bringing up a Multi-Instance

Reinitialize Create Add


Upgrade FXOS Module in Instances in Instances to
FXOS FXOS FMC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 204
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+

The file is big (~1 GB) with no


status bar. If you can, upload
from a local machine.
FXOS file on local machine
previously downloaded
from Cisco website
Pressing Close and staying
on the page does not stop
the upload. It will continue in
the background.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 205
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+

If you uploaded via the CLI, use


Refresh to repoll for images

Message will always appear when


upload is complete, even if you
pressed Close on the upload dialog

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 206
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+

Upgrade/downgrade FXOS button

Verify image integrity button

After pressing Yes the upgrade process takes a while


(~15 min). Be patient and leave this page open.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+ - If you are impatient

Expected version if you


refresh the page before
the upgrade restart occurs

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+ - If you are impatient

Expected message if you


refresh the page before
the upgrade is complete

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+
Upgrade is complete
when you are prompted to
log in again.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
Multi-Instance Setup – Module Reinitialization
Required to support Container instances

Reinitialization required after FXOS


upgrade to support Multi-Instance.

Module is Multi-Instance ready when


Reinitialization typically takes ~5 minutes
you Service State returns to Online

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
Multi-Instance Setup – Configuring Interfaces
Adding Data-Sharing Interface for FPR4K08-1-A and FPR4K08-2-A

Data interfaces can be


used by a single instance

Data-Sharing interfaces
can be shared across
interfaces. Physical
interfaces, port-channels New in 6.3 is the option to
and subinterfaces can all add subinterfaces
be set to Data-Sharing

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 212
Multi-Instance Setup – Configuring Interfaces
Adding Data-Sharing Interface for FPR4K08-1-A and FPR4K08-2-A

Physical interface for the


subinterface

Subinterface ID used by
FXOS and FMC

External VLAN. Does not


need to match
Subinterface ID.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
Multi-Instance Setup – Configuring Interfaces
Completed Interface Configuration

Dedicated port-channel to
be used on FPR4K08-1-A

Dedicated port-channel to
be used on FPR4K08-2-A

Shared subinterface to be
used on FPR4K08-1-A and
FPR4K08-2-A

Dedicated subinterfaces to
be used on FPR4K08-3-A

Semi-shared interface for


management of all instances

Dedicated subinterfaces for


HA link for each instance
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 214
Reference

MAC Address Restrictions


• Virtual MAC addresses are auto-generated for all instance interfaces
• All container instance interfaces use A2XX.XXYY.YYYY format
• XX.XXXX is a default prefix derived from a chassis MAC or user-defined
• YY.YYYY is a counter that increments for every interface
• Manual MAC address configuration within FTD is still available
• Must be unique across all instances on a shared interface
• Must be unique for all chassis manager defined subinterfaces under a physical
interface or port-channel interface
• e.g. Po5.100, Po5.301, Po.302, etc. must all have unique mac addresses
• e.g. Po4 and Po5.100 could have overlapping mac addresses
• Supervisor faults are raised for all MAC address conflicts

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 215
Multi-Instance Setup – First Instance Creation

Device name used locally


within FXOS. Does not have
to match FMC.

Native for standalone

Containers for Multi-Instance

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 216
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A

Interfaces assigned to instance


Dark grey text indicates the
by clicking
interface is assigned

These are the untagged (no


VLAN tag) interfaces. Light
grey indicates the interface is
not assigned to the instance.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 217
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A

Controls the number of CPUs


assigned to the instance.
Default-Small is 6 CPUs.

Semi-shared management
interface. If empty, check that
interfaces of type Management
are defined under Interfaces.

Unique management IP for the


instance. Must be reachable
from the FMC.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A
Registration key used only
once when pairing with FMC.
Doesn’t need to be complex.
Admin password for FTD, not
the password for FMC
Controls whether entering
expert mode (Linux shell) is
allowed via SSH.
Transparent or Routed
Alphanumeric string to assist
setup w/ NAT. Must be unique
across all devices in FMC.

If a dedicated event interface is


desired

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A

If the Status is install-failed, the


module was not reinitialized. Fix
is to reinitialize the module.

Assuming everything is okay,


Status should move to installing
within ~1 min

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
Reference

Multi-Instance Setup – Second Instance Creation


FPR4K08-2-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 221
Reference

Multi-Instance Setup – Second Instance Creation


FPR4K08-2-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 222
Reference

Multi-Instance Setup – Second Instance Creation


FPR4K08-2-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
Reference

Multi-Instance Setup – Second Instance Creation


FPR4K08-2-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
Reference

Multi-Instance Setup – Third Instance Creation


FPR4K08-3-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 225
Reference

Multi-Instance Setup – Third Instance Creation


FPR4K08-3-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 226
Reference

Multi-Instance Setup – Third Instance Creation


FPR4K08-3-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 227
Reference

Multi-Instance Setup – Third Instance Creation


FPR4K08-3-A

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 228
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A

In some cases, the Default-Small


profile may not consume all the cores

Additional instances configured.


Steps in the hidden slides. Setup still running

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 229
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A

Default profile
of 6 CPUs

New profile to unused


CPU capacity

Multiples of 2,
excluding 8.
(e.g. 6, 10, 12, 14, 16)

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A

If previously created,
the profile could have
been selected during
setup. It can be
changed after setup.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 231
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A

With HA and increasing


resources, stateful
failover is supported.

With HA and
decreasing resource,
stateful failover is not
guaranteed.

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 232
Multi-Instance Setup – Completed FXOS Setup

100% of CPU resources


now consumed

New Resource Profile


Restart complete
assigned

Complete the same steps for FPR4K09, using different names/IPs

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 233
Reference

Multi-Instance Management
• Each instance is managed as a separate firewall in FMC
• Each instance has its own management IP address
• Each instance must be added to FMC separately
• Separate software upgrades, restarts and policies

• Name for the Instance is not pulled from FXOS, is defined in FMC
• Name for the Chassis is pulled from FXOS, is defined in FXOS

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 234
Multi-Instance Setup – FMC Setup
Adding devices

Adding an Instance to
FMC is no different than
adding a physical firewall

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 235
Multi-Instance Setup – FMC Setup
Adding devices

Separate versions, upgrades,


policies per instance

6.5.0

6.5.0

Each Instance must be Chassis name defined in


added individually. Device FXOS
name defined in FMC. #CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 236
Reference

Licensing with Multi-Instance


• No additional feature license required to enable multi-instance
• When instances are managed by a single FMC:
• Additional subscription licenses (Threat, URL) are NOT required
• Instances on a security module share a single license.
• 42 instances on FPR9300 w/ 3 x SM-44 modules → 3 licenses

• When instances are managed by separate FMCs:


• Additional subscription licenses (Threat, URL, XXX) CAN be required per FMC
• 42 instances on FPR9300 w/ 3 x SM-44 modules by 2 FMCs → 3 - 6 licenses
• 42 instances on FPR9300 w/ 3 x SM-44 modules by 42 FMCs → 42 licenses
• Consider multi-domain management on a single FMC instead

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
Multi-Instance Licensing

No new feature license for


Multi-Instance features

URL Filtering license #1

URL Filtering license #2

Instances on the same


module share a feature
license when managed by
the same FMC.

6 instances on 2 modules
requires only 2 licenses
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 238
Multi-Instance High Availability
• Container instances only support inter-chassis HA
• Configured exactly as you would physical appliances
• Multiple instances can share one HA Link, using one VLAN per instance
• An HA pair allows differently sized instances for seamless resizing
• Stateful HA is supported but not guaranteed when downsizing

Internet Firewall DMZ Firewall DC Firewall Internet Firewall DMZ Firewall DC Firewall
(Primary) (Primary) (Primary) (Secondary) (Secondary) (Secondary)

FPR4K08 FPR4K09

HA Link 1: Eth1/8.1001
HA Link 2: Eth1/8.1002
HA Link 3: Eth1/8.1003
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 239
Multi-Instance Hardware Crypto Acceleration
• Applies to VPN (IPSec/SSL)
and TLS HW decryption
• In FP 6.4, only one instance
could use crypto hardware
• Manually enabled via CLI
• In FP 6.5, up to 16 instances
can share crypto hardware
• Enabled by default for new
instances
• Must be manually enabled for
existing instance after upgrade
• Can be disabled by editing the
instance – will cause instance New instance
Existing instance
reboot
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 240
Managed Just Like A Physical Firewall
HA, Policies, Eventing, etc.

Subinterfaces are
managed within FXOS

Everything else, except for


subinterfaces, is managed
just like a physical firewall

#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 241
Alternative Designs
Interfaces Revisited: Optional Interface Modes
• By default, all interfaces are firewall interfaces (routed or transparent)
• Optionally, specific interfaces can be configured for use as IDS or IPS
• IDS Mode
• Inline Tap
• Passive
• ERSPAN
• IPS Mode
• Inline Pair

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
Optional FTD Interface Modes

A Routed or Transparent
F Interfaces
Passive Policy Tables
B G

Inline Pair 1
C H
Inline Set
Inline Pair 2
D I

Inline Tap
E J

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 244
Inline NGFW
Firewall without Routing or Bridging Interfaces
• Although not a “Firewall” interface,
L3/L4/L7 rules can be enforced when
using “IPS” interface types
• Useful when Routed or Transparent aren’t
possible/feasible
Inline Pair
• No subinterfaces required for trunks, use
“VLAN Tags” in ACP instead:

• Caveats:
• No NAT / No Routing
• No strict TCP state tracking

Configuration: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepower-threat-defense-int.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 245
Out-of-Band IDS - Multichassis SPAN
When a single Firepower appliance is not enough
• Each device configured as a standalone device

• On switch, SPAN destination configured as


EtherChannel
• EtherChannel set to mode of “On”
FW: Passive
• On firewall, each port configured as Passive Interfaces
interface:
SW: EtherChannel
without LACP
• EtherChannel load balancing distributes traffic
to different Firepower chassis

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
Inline IPS – Passthrough EtherChannel w/o HA
LACP EtherChannel through FTD
• Useful for scaling IPS without Clustering VSS
or VPC
or scaling IPS with total fault isolation
SW Only: Port Channel 1
• LACP EtherChannel formed between Not HA or
switches on either side of FTD Clustered
• FTD has no knowledge of EtherChannel
• Interfaces configured as Inline Pair on FW

• Each FTD appliance configured as


standalone device in FMC
• Failover of FTD handled by LACP on SW SW Only: Port Channel 1
VSS
• EtherChannel MUST deliver symmetric or VPC
traffic for effective security

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 247
Inline IPS – Passthrough EtherChannel w/ HA
LACP EtherChannel through FTD w/o Symmetric Traffic
• Useful for IPS HA without Clustering VSS
or VPC
X X
• Same interface configuration as SW Only: Port Channel 1
Passthrough EtherChannel w/o HA Disabled
by LACP
• Traffic is automatically symmetric through FTD,
since only 1 unit is ever active

• Inline pair interfaces on Standby HA unit HA Pair


are forced down when not active Active Standby

• On failure of Active unit, LACP on SW: Disabled


SW Only: Port Channel 1 by LACP
X X VSS
or VPC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 248
Inline IPS – Passthrough EtherChannel w/ HA
LACP EtherChannel through FTD w/o Symmetric Traffic
• Useful for IPS HA without Clustering VSS
or VPC
X X
• Same interface configuration as SW Only: Port Channel 1
Passthrough EtherChannel w/o HA Disabled
by LACP
• Traffic is automatically symmetric through FTD,
since only 1 unit is ever active

• Inline pair interfaces on Standby HA unit HA Pair


are forced down when not active Standby Active

• On failure of Active unit, LACP on SW: Disabled


• Detects links on old Active unit are down and SW Only: Port Channel 1 by LACP
removes those ports from use in EtherChannel X X VSS
• Detects links to new Active unit are now up or VPC
and starts sending traffic across those links

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 249
Inline IPS – EtherChannel Termination w/ Cluster
LACP EtherChannel to FTD
• Preferred method of scaling IPS w/ FTD VSS
or VPC
• Unlike previous designs, LACP
EtherChannel terminates on FTD SW+FW: Port Channel 1
• Traffic is automatically symmetric through FTD,
since Cluster handles any asymmetry

• Physical ports for both PC1and PC2 Cluster


configured in FXOS FCM
• PC1 and PC2 configured as Inline Pair
SW+FW: Port Channel 2
within FMC
VSS
or VPC

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 250
Reference

FTD Flow Bypass


Reference

FTD Flow Offload


• Trusted flow processing with limited security visibility
• Maximize single-flow throughput and packet rate, minimize latency
• High performance compute, frequency trading, demanding data center applications
• Static hardware-based offload in Smart NIC for FTD
• Automatically enabled when rule in Prefilter Policy uses the Fastpath action

• 20+ Gbps per single flow (TCP/UDP) and 2.9us of 64-byte UDP latency
• Unicast IPv4 TCP/UDP/GRE and VLAN encapsulation only, no CMD/SGT
• FXOS 2.2(1) supports 4 million unidirectional or 2 million bidirectional flows
per security module
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 252
Reference

FTD Flow Offload Operation


Full Inspection Extended Offload Path (Future)
• Dynamically program Offload engine after flow establishment • Dedicated x86 cores for advanced processing
• Ability to switch between Offload and full inspection on the fly • Packet capture and extended statistics

Firepower 4100 or 9300


x86 CPU Complex
Full FTD Engine Lightweight Data Path

New and fully Offload Flow Advanced


inspected flows instructions updates Processing

Incoming Established
Flow Classifier Rewrite Engine
traffic trusted flows
Smart NIC

Flow Offload
• Limited state tracking, NAT/PAT, TCP Sequence Randomization
• 20+ Gbps per single TCP/UDP flow, 2.5us UDP latency, 4M unidirectional/2M bidirectional (6.2.2)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 253
Reference

FTD Virtual Firewall Deployment


Reference

Cisco Virtual FTD and FMC

VMware KVM
OVF for vSphere and ESXi Cisco FTDv qcow2 image
VMware ESXi 5.x, 6.x
Public Cloud
KVM 1.0 Virtio driver
E1000, VMXNET3
Amazon Web Services
AMI in the marketplace

Microsoft Azure

Same Feature Set As Physical Appliances

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 255
Reference

Virtual FTD Installation steps (vSphere)

Deploy OVF Template

Enter the details asked


for by the Setup Wizard

Add FTD to Firepower


Management Center

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 256
Reference

Cisco FTDv for VMware


High Availability
FTDv FTDv
VM (Active) FTDv FTDv (Standby)

VM VM VM VM

VM Port-Group Failover VM VM

Port-Group A
VM VM VM VM
Port-Group B
Distributed Virtual Switch
ESXi-1 ESXi-2

• Supports Active/Standby HA for Stateful Failover. No caveats.


• A dedicated segment and failover interface is recommended. The loss of the failover
link and keep-alive messages may introduce loops (both units become Active)
• No Live Migration and other VMware High Availability tools are supported

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 257
Reference

FTDv Deployment Scenario – Passive


• Monitoring traffic between ESXi Host
Server A and Server B Management

• Dedicated FTDv per ESXi host Sensing


FTDv
• Promiscuous mode enabled in vSwitch2

ESXi for FTDv Sensing port Virtual


Server A

group Virtual
Server B

vSwitch3 | P Port Group

NIC2 NIC3

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 258
Reference

FTDv Deployment Scenario – Routed


• L3 NGFW gateway for servers ESXi Host

• Configure 2 vSwitches: Management

• One with external interface Outside Inside


FTDv
(Outside)
vSwitch2
• One with without (Inside) Virtual
Server A

• Servers connect to Inside Virtual


vSwitch Server B

• Port groups used for the vSwitch4 vSwitch3 | P Port Group

Outside interface must have NIC2 NIC4


Protected vSwitch

only 1 active uplink


#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 259
Reference

FTDv Deployment Scenario – Transparent


• NGFW segmentation between hosts ESXi Host

• Bridge up to 4 segments per BVI Management

• Configure 2 vSwitches: Outside Inside


FTDv
• One with external interface (Outside) vSwitch2
• One with without (Inside) Virtual
Server A

• Servers connect to Inside vSwitch Virtual


Server B
• Promiscuous mode enabled in ESXi
for FTDv Inside port group vSwitch4 vSwitch3 | P Port Group

Protected vSwitch
• Use port channels to avoid loops – NIC2 NIC4

disable any NIC teaming

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 260
Reference

A Familiar Platform With Advanced Functionality


Output of show running-config on FTD

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 261
Continuing the Discussion – It’s All About You

1 hour for questions Ask question in the


after the session WebEx Teams Room

Email me at
schimes@cisco.com

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 262
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• All surveys can be taken:
– Cisco Live Mobile App
– Logging in to the Session Catalog:
BRKSEC-2020
was https://reg.rainfocus.com/flow/cisco/cllatam19/adash/
excellent! page/dashboard

Cisco Live sessions will be available for viewing


on demand after the event at ciscolive.cisco.com.

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 263
Q&A
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• All surveys can be taken:
– Cisco Live Mobile App
– Logging in to the Session Catalog:
BRKSEC-2020
was https://reg.rainfocus.com/flow/cisco/cllatam19/adash/
excellent! page/dashboard

Cisco Live sessions will be available for viewing


on demand after the event at ciscolive.cisco.com.

#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 265
Thank you

#CiscoLiveLA
#CiscoLiveLA

Potrebbero piacerti anche