DGTL BRKRST 2377
DGTL BRKRST 2377
DGTL BRKRST 2377
SD-WAN Security
Kureli Sankar - Manager, Technical Marketing
CCIE Security #35505
@jmckg
DGTL-BRKRST-2377
#CiscoLive
About Kureli Sankar
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• Introduction
• Secure Infrastructure
• Device Identity
• Secure Control Plane
• Secure Data Plane
• Secure Branch
• Multi-layer Security
• Ent Firewall App Aware
• Intrusion Prevention
• URL - Filtering
• DNS/Web-layer Security
• Advanced Malware Protection + Threat Grid
• What is new in 17.2.1r?
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Introduction
It’s a Multicloud World
Devices & Things
IaaS
WAN SaaS
DC/Private Cloud
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Internet Connectivity Becomes Business Critical
DC/Private Cloud
Campus
X2-5
Increasing complexity
IaaS
Mobile
Users
X1000s
Internet • Unauthorized
Exposed access
ingress points as traffic is
no longer backhauled to the data
• Denial of service attacks
center
NO SECURITY
CLOUD EDGE • Ransomware
Remote
Corporate Inside-out threats
Software
• Malwareandinfection
BASIC/NO
Users devices request access
EXISTING
Users Devices
Critical
• Command
to & control
infrastructure and applications
WAN SECURITY
WAN EDGE
• Phishing attacks
Infrastructure Branch • Untrusted users/devices
SD-WAN Fabric
EDGE
SECURITY
(guests) devices
Internal threats
Data Center
Data Center
&
& Campus • Untrusted
Traffic mustaccess
be encrypted and
Campus • access
Lateralmust be segmented end to
movement
• end
Compliance
• Man-in-the-Middle
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Comprehensive SD-WAN security
SIMPLIFIED
SECURE
ENTERPRISE-GRADE
INTERNAL
CLOUD CONNECTIONS
SECURITY
SECURITY EMBEDDED
SaaS IaaS
Full edge
Outside-in
Inside-out
Internal
Internet security stack
SD-WAN security
• Mitigate external security risks
SECURE CLOUD EDGE • with
End tointegrated
Umbrella’s
Firewall end threat
andsegmentation
Secure
intrusion defense
Internet
prevention
to stop
from
breach
Gatewaythe
embedded WAN
plustoURL
propagation,
protects cloud
users edge
filtering
enforce
and and
Remote regulatory
devices
malware and
sandboxing
compliance,
protects data
forand
inside-out
Corporate promote
sent to andnetwork
from the(andcloud
• Single console to manage routing
Software application) layer security
• Duo’s
and security
Multi-Factor Authentication
Thin, rich or users
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
What is SD-WAN
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Secure Infrastructure
Cisco SD-WAN Architecture
Orchestration Plane Management Plane
vManage
• First point of authentication • Single pane of glass for Day0, Day1 and
• Distributes list of vSmarts/ Day2 operations
vManage to all vEdge routers APIs • Multitenant or single-tenant
• Facilitates NAT traversal 3rd Party • Centralized provisioning,
vBond troubleshooting and monitoring
Automation
• RBAC and APIs
vAnalytics
Data Plane Control Plane
• Physical or virtual vSmart Controllers • Dissimilates control plane information
• Zero Touch Provisioning between vEdges
• Establishes secure fabric 4G • Distributes data plane policies
MPLS
• Implements data plane policies • Implements control plane policies
INET
• Exports performance statistics WAN Edge Routers
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
High level view of ordering and on-boarding
vManage
Smart Account
Automation PnP Cloud
Service vBond
Cisco Commerce
Workspace Add a vBond Controller Profile and
Associate with Org-Name
WAN Edge
Customer
Service Provider
End Customer
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Device Identity and Integrity
Key Trustworthy Technologies
Secure Boot of Signed Images Trust Anchor module (TAm) Runtime Defenses (RTD)
▪ Prevents malicious code from booting ▪ Tamper-resistant chip with X.509 cert ▪ Protects against injection of malicious
on a Cisco platform installed at manufacturing code into running software
▪ Automated integrity checks ▪ Provides unique device identity and anti- ▪ Makes it harder for attackers to exploit
counterfeit protections vulnerabilities in running software
▪ Monitors startup process and shuts
down if compromised ▪ Secure, non-volatile on-board storage and ▪ Runtime technologies include ASLR,
RNG/crypto services BOSC, and X-Space
▪ Faster identification of threats
▪ Enables zero-touch provisioning and
minimizes deployment costs
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
History of Malware Found on Cisco IOS Devices
Incident 0 Incident 1 Incident 2 Incident 3 Incident 4 Incident 5
“SYNful Knock”
Date Discovered 2011 2012 2013 2013 2014 2015
Device(s) Affected Cisco 2800 and Cisco 2800 and Cisco Cisco Cisco 1800,3800, Cisco 1841, 2811,
3800 Families 3800 Families 7600 IOS & line 7600 IOS & line 7200 IOS & 3825
cards cards ROMMON
Infection Method Modifications to Modifications to Modification of in- Modification of in- Modification to Modifications to IOS
IOS binary IOS binary memory IOS memory IOS both ROMMON, binary
and in-memory
code
Remote Via crypto analysis Via crypto analysis C2 protocol C2 protocol Not Directly Yes
Detectability
Preventions To Be Trust Anchor Trust Anchor Strong admin Strong admin Secure Boot, Trust Strong admin
Taken Technology, Secure Technology, Secure credentials & credentials & Anchor credentials, Secure
Boot, & Image Boot, & Image authorization authorization Technologies + Boot, Image Signing
Signing Signing Image Signing
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Secure (UDI) = SUDI
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Secure Unique Device Identification (Secure – UDI)
• Tamperproof ID for the device
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Image Signing: Integrity & Non Repudiation
Validation Check at Customer Site
Software
1 5
Image
SHA-512 =
Cisco’s public key stored
Image is hashed to a on the router is used to
unique 64 byte object decrypt digital signature
SHA512
(Cisco’s PUBLIC key )
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Cisco Secure Boot
Software and Hardware Integrity Checks
Hardware authenticity check
Step 5 Step 6
Software authenticity checks
FPGA
First instructions run on CPU stored in tamper-resistant hardware TAm = Trust Anchor module
TPM Device
Certificate
• Router is identified by the chassis ID and certificate
Chip
serial number
In Software
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Cloud Router Identity - Virtual
Signed by vManage
(If cluster, each member signs)
Root Chain
In Software
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Establishing Control Elements Identity
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Establishing Control Elements Identity – Cisco PKI
1. Private and public keys are generated on the control
1 2 3 element
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
DDoS Protection for Controllers
vBond
vSmart vManage
Authenticated
Sources
Control Plane Policing
▪ 300pps per flow
▪ 20,000pps
vManage
vSmart
Unknown Note: vBond control plane policing is the same
Sources as WAN Edge
Other
Default Permit:
DHCP, DNS, ICMP, NETCONF
Optional Permit:
SSH, NTP, STUN, HTTPS (vManage)
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
DDoS Protection for WAN Edge Routers
vBond
Authenticated
Sources
vSmart vManage
Implicitly • Control Plane Policing
Trusted ▪ 300pps per flow
Sources SD-WAN IPSec ▪ 20,000pps
WAN Edge
• Applies to all WAN Edges
Explicitly
Defined
Sources Cloud Security Default Permit:
1. Return packets matching flow entry (DIA enabled)
2. Response pkts of DHCP, DNS
Unknown 3. ICMP
Sources Optional Permit:
Other SSH, NETCONF, NTP, OSPF, BGP, STUN
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Secure Control Plane
Transport Locators (TLOCs)
vSmarts advertise TLOCs to all
vSmart WAN Edges*
(Default)
Full Mesh
SD-WAN Fabric TLOCs advertised to vSmarts
(Default)
WAN Edge
Local TLOCs
WAN Edge (System IP, Color, Encap)
WAN Edge
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Secure Data Plane
SD-WAN Fabric Operation Walk-Through
OMP Update:
vSmart ▪ Reachability – IP Subnets, TLOCs
▪ Security – Encryption Keys
OMP
▪ Policy – Data/App-route Policies
DTLS/TLS Tunnel
OMP OMP
IPSec Tunnel Update Update
BFD OMP Policies OMP
Update Update
Transport1
WAN Edge WAN Edge
TLOCs TLOCs
VPN1 VPN2 Transport2 VPN1 VPN2
BGP, OSPF, BGP, OSPF,
Connected, Connected,
Static A B C D Static
Subnets Subnets
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Data Plane Privacy vSmart
Controllers
▪ Each WAN Edge advertises its local IPsec ▪ Can be rapidly rotated
encryption keys as OMP TLOC attributes
▪ Symmetric encryption keys used
▪ Encryption keys are per-transport asymmetrically
Encr-Key3 Encr-Key1
OMP OMP
Encr-Key4
Local (generated) Update Update
Encr-Key2
Local (generated)
Transport1
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Pairwise IPSec Keys for SA
vSmart Edge-B
Internet
Edge-A
Edge-C
LAN IPSec/GRE DTLS A’s Encryption Key for B A’s Encryption Key for C
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Data Plane Integrity
▪ vBond discovers WAN Edge public IP vSmart ▪ WAN Edge computes AH value based on
Controllers
address, even if traverses NAT the post NAT public IP
▪ vBond communicates public IP to the ▪ Packet integrity (+IP headers) is
WAN Edge preserved across NAT
OMP OMP
Update Update
Transport1
URL-Filtering
Cisco Web reputation score using 82+ web categories
Security Adv. Malware Protection
With File Reputation and Sandboxing (TG)
TLS Proxy
Cisco SD-WAN Detect Threats in Encrypted Traffic
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Secure Branch – Multi-layer security
Multi-layer Security
• DNS/Web content
filtering
• Application Control
• IP Reputation • Business Email
• Access Control Lists • File Reputation Compromise
• Stateful Firewall • Anti-malware • Ransomware
• CASB (Cloud Access • Malware
• Application Control
Security Broker) • Phishing
• IPS • Sandboxing
• Spam
• TLS decryption
• Domain Protection
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Why SD-WAN Branch Security?
1. Avoid Backhauling
Benefit: Better use of WAN bandwidth
SaaS/IaaS/
Private Cloud/Internet
3. Enable DIA
Benefit: Improves user experience
Data Center Branch
4. Centralized Policy/Monitoring
Cloud Branch
Firewall/IPS Benefit: Consistent Security Policy & monitoring
Security Security
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Security Deployment models
Flexible Security based on customer needs
Internet Internet
Internet
Cloud Security
Co-Location
Internet
VPN1 Data Center
Applications
Security Tools
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Use Case 2: Guest Access
SD-WAN
Internet
VPN1 VPN2 Data Center
Applications
Security Tools
HQ Destined Traffic
Employee Guest
Employee Internet Traffic
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Use Case 3: Direct Cloud Access
SD-WAN
Internet
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Use Case 4: Direct Internet Access
SD-WAN
Internet
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
TLS Decryption (MiTM Proxy)– Solution Overview
• More Apps/Data-cloud hosted
• Internet going dark
• >80% Internet traffic
encrypted Why do you need it ?
• Lack of security control
Data Centre • Malware hides itself in
encrypted traffic
Applications
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Manage in Edge
Full Edge Branch
Cloud or On- Router
Security Edge
Prem Flexibility
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
SD-WAN Security: vManage Provisioning Wizard
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Enterprise App Aware
Firewall
Enterprise App Firewall SaaS
DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Access Control Lists
IP Protocol Port Source IP Destination IP
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Stateful Firewall
Application Port IP Protocol Source IP Destination IP
Firewall
• Directional Control
• Stricter Layer 4 Control
SMTP Server
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Firewall vs Next-Gen Firewall - What’s the difference?
Next-Gen Firewall
Next-Gen Firewall
Data URL Application IP Protocol Port Source IP Destination IP
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Ent. Firewall App Aware: Intra-Zone Security
WAN Edge 1 WAN Edge 2
SD-WAN
Fabric
Zone1 Zone1
VPN 1 Action: D I P VPN 1
D - Drop
I – Inspect
Host A Server A
P – Pass Host B Server B
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Ent. Firewall App Aware: Inter -Zone Security
WAN Edge 1 WAN Edge 2
SD-WAN
Fabric
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Ent. Firewall App Aware: Self-Zone Security
WAN Edge 1 WAN Edge 2
Zone3 Zone3
VPN 0 VPN 0
SD-WAN
Fabric
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
vManage - Ent FW App Aware Configuration
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Intrusion Prevention
Intrusion Prevention
On-site Services
• PCI compliance
DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Intrusion Detection/Prevention System (IDS/IPS)
100101000101000111010011000101100011100011001111001 IPS
drop tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent known malicious user agent - SAH Agent"; flow:to_server,established; content:"User-Agent|3A| SAH
Agent"; fast_pattern:only; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service http; classtype:misc-activity; sid:5808; rev:10;)
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
IPS, URL-F and AMP&TG Architecture
ISR 4431
Control Plane
Virtual Ethernet
IPS/URL-F/AMP&TG
IOSd
Data Plane
Traffic Path
Data Plane
• IPS, URL-Filtering and AMP&TG services run on a Linux Container (LXC), using control plane resources
• Traffic is punted to container using Virtual Port Group (VPG) interface
• Reserved CPU and memory for Container process enables deterministic performance
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
vManage - Intrusion Prevention Configuration
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Intrusion Prevention – CLI rendered
Step 1 Configure virtual service
app-hosting install appid utd package bootflash:utd.tar Step 4 Configuring UTD (service plane)
utd multi-tenancy
utd engine standard multi-tenancy
Step 2 Configure Port Groups
threat-inspection whitelist profile Allow-list
interface VirtualPortGroup0
generator id 3 signature id 22089
description Management interface
generator id 3 signature id 36208
vrf forwarding 65529
threat-inspection profile IPS-POLICY
ip address 192.168.1.1 255.255.255.252
threat [protection | detection]
Interface VirtualPortGroup1
policy [security | connectivity | balanced]
description Data interface
whitelist profile Allow-list
ip address 192.0.2.1 255.255.255.252
logging level [alert | info | ….. ]
Step 3 Activate virtual service and configure Step 5 Enabling UTD (data plane)
iox policy utd-policy-vrf-1
app-hosting appid utd vrf 1
app-vnic gateway0 virtualportgroup 0 guest-interface 0 all-interfaces
guest-ipaddress 192.168.1.2 netmask 255.255.255.252 fail [close]
app-vnic gateway1 virtualportgroup 1 guest-interface 1 threat-inspection profile IPS-POLICY
guest-ipaddress 192.0.2.2 netmask 255.255.255.252
app-resource package-profile cloud-low
start
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
URL-Filtering
URL-Filtering Requests for “risky” domain requests
Block/Allow lists of
• Block based on Web Reputation score
custom URL patterns
DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
URL-Filtering Solution Overview
3
Allow List Category
Block Page
Block List Reputation
Cloud Lookup
URL-F Engine
Snort
HQ Destined Traffic
4
Allowed Internet Traffic
Blocked Internet Traffic
Webroot Cloud Lookup
WAN Edge
User-2
Internet
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
vManage – URL-Filtering
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
URL-Filtering – CLI rendered
Step 1 Configure virtual service Step 4 Configure (optional) Good and Bad list
app-hosting install appid utd package bootflash:utd.tar
parameter-map type regex Allowlist
pattern www.google.com
Step 2 Configure Port Groups pattern www.cisco.com
interface VirtualPortGroup0 parameter-map type regex Blocklist
description Management interface pattern www.exmaplehoo.com
vrf forwarding 65529 pattern www.bing.com
ip address 192.168.1.1 255.255.255.252
Interface VirtualPortGroup1
description Data interface Step 5 Configure block page
ip address 192.0.2.1 255.255.255.252 web-filter block page profile block-URL-FILTER-POLICY
text WHAT ARE YOU DOING??!!!
Step 3 Activate virtual service and configure
iox
app-hosting appid utd
app-vnic gateway0 virtualportgroup 0 guest-interface 0
guest-ipaddress 192.168.1.2 netmask 255.255.255.252
app-vnic gateway1 virtualportgroup 1 guest-interface 1
guest-ipaddress 192.0.2.2 netmask 255.255.255.252
app-resource package-profile cloud-low
start
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
URL-Filtering – CLI rendered
Step 6 Configure web-filter profile Step 7 Enabling UTD (data plane)
utd multi-tenancy policy utd-policy-vrf-1
utd engine standard multi-tenancy vrf 1
web-filter url profile URL-FILTER-POLICY all-interfaces
blacklist fail [close]
parameter-map regex Blocklist web-filter url profile URL-FILTER-POLICY
whitelist
parameter-map regex Allowlist
categories block
abortion
abused-drugs
adult-and-pornography
bot-nets
cheating
confirmed-spam-sources
cult-and-occult
alert all
block page-profile block-URL-FILTER-POLICY
reputation
block-threshold moderate-risk
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
DNS/Web-layer Security
DNS/web-layer security Cisco Umbrella
• Supports DNScrypt
• VPN-aware policies
WAN Edge
• Local Domain-bypass
Users Users
• TLS decryption
• Intelligent Proxy
Service-VPN 1 Service-VPN 2
DNS DNS
DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
DNS-Filtering Solution Overview
Blocked
request
Umbrella
User-1
WAN Edge Blocked Content (5)
User-2
Internet
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Cloud Access Security Broker (CASB) – Solution Overview
How does it work?
• Forward Proxy
• Reverse Proxy
• API Node
MPLS INET
CASB
What does it do?
• Visibility
• Policy Compliance
Branch • Security
WAN • Authentication
Edge • Authorization
• Device Profiling
User 1 • Encryption
• Data Loss
Prevention
• Malware
Prevention
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Umbrella Data centers co-located at major IXPs
>31
data centers
worldwide
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
vManage – DNS/web-layer Security
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
DNS/web-layer security – CLI rendered
Step 1: Configure local domain bypass (optional)
parameter-map type regex dns_wl
pattern www.cisco.com
pattern .*eisg.cisco.*
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Advanced Malware
Protection and Threat
Grid
Advanced Malware
Protection + ThreatGrid
AMP
• Integration with AMP
File reputation
File retrospection Internet Check signature
• Integration with ThreatGrid
File analysis
• Inspects traffic in VPNs of interest
Check file
• Leverages Snort engine to identify file
transfers Malware sandbox
ThreatGrid
DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
File Reputation & Retrospection Service – Solution Overview
Good Files
f11c3d6770b6…
91f59420a752…
Bad Files
8e8ca2642a6e…
8e8f460c74b0…
How does it work?
File Verify (4)
Cache
File Reputation • File download intercepted
Service • File sha calculate
FRS Engine
• Reputation lookup
• File released or blocked
(5)Verdict • Local or Cloud Database
File Sha(3)
File Request (1) File Download (2)
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
File Analysis (Sandbox) – Solution Overview
Good Files Bad Files
f11c3d6770b6… 8e8ca2642a6e…
91f59420a752… 8e8f460c74b0…
FRS Engine
How it works?
• File sha lookup
(7)Allow
File Sha(3) • Unknown Reputation
File Request (1) File Download (2) • File Transfer to FAS
• File Runs in a virtual
environment
File Allowed (7)
• Bad files blocked
Martha Internet
WAN Edge
What it does?
• Execute file in a VM
Web Servers • Analyze file execution
• Analyze file content
• Detect Malicious behavior
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
vManage – AMP + ThreatGrid
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
AMP + ThreatGrid – CLI rendered
Step1: Configure global variables Step 2: Define file analysis file types
utd multi-tenancy file-analysis profile AdvanceMalwareProtection-fa-profile
utd engine standard multi-tenancy file-types
utd global pdf
file-reputation ms-exe
cloud-server cloud-isr-asn.amp.cisco.com new-office
est-server cloud-isr-est.amp.cisco.com rtf
! mdb
file-analysis mscab
cloud-server isr.api.threatgrid.com msole2
apikey 0 <API Key> wri
xlw
flv
swf
!
alert level critical
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
AMP + ThreatGrid – CLI rendered
Step 3: Associate file analysis and reputation to file inspection Step 4: Enable UTD (Data Plane)
file-reputation profile AdvanceMalwareProtection-fr-profile policy utd-policy-vrf-1
alert level critical all-interfaces
! fail [close]
file-inspection profile AdvanceMalwareProtection-fi-profile file-inspection profile AdvanceMalwareProtection-fi-profile
analysis profile AdvanceMalwareProtection-fa-profile vrf 1
reputation profile AdvanceMalwareProtection-fr-profile threat-inspection profile IPS
! web-filter url profile URLFiltering
exit
policy utd-policy-vrf-2
all-interfaces
fail [close]
file-inspection profile AdvanceMalwareProtection-fi-profile
vrf 2
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Security App Hosting Profile & Resources
4461 / 4451 / 4431 4351 / 4331 4321 / 4221 / 1K
Control Plane Control Plane
(4 cores) (4 cores) PPE IOS
PPE1 PPE2 PPE3 PPE4 PPE5 IOS SVC1 PPE1 PPE2 IOS SVC1
I/O SVC
Crypto
PPE3 I/O
SVC2 SVC3
PPE6 PPE7 PPE8 PPE9 BQS SVC2 SVC3 Crypto
Linux
CPP Code Linux
Linux
Control Plane
(2 cores)
4321/4221/1K 2 2 1
DP = Data Plane
4331 4 4 2 CP = Control Plane
4351 4 4 2 SVC = Services
4431 6 4 2
4451 10 4 2
4461 16 4 2
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
SD-WAN Security Support
URL DNS/web-
Ent FW App IPS/IDS AMP&TG
Platforms/Features Ent FW Filtering layer security
Awareness **** ****
**** monitoring *
Viptela - (100, 1000, 2000, 5000 and 1100-
Y N ** N/A N/A N/A N
4G/6G)
Cisco - CSR Y Y Y Y Y Y
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Security App Hosting Profile & Resources
ISR1K/4221X/4321
IPS + URLF (Cloud Lookup only) + AMP 8GB Bootflash & 8GB Memory 4331/4351/44xx
Default (File hashing) 1 / 2 service plane cores 4/8vCPU CSR / ISRv
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
XE SD-WAN: From LAN to WAN
TCP
TCP IPSEC
UTD MPLS /TLS Encrypt
/TLS + Tunnel Pre- Layer 2 DNS FNF
FW UTD
Label
Encap Route FW UTD
Policy
+ NAT (Transp
Encap Crypt
ACL LAST
TX
Policy Add UTD ort
Divert
Divert mode)
UTD: IPS->URL-F->AMP/TG Color Coding: LAN Interface Tunnel Interface WAN Interface
SDWAN Lookup
IP Dest SDWAN SDWAN IPSEC Go to
interface NAT Process &
lookup WAN Filter For-us Decrypt Output
ACL OCE walk
UTD TCP/TLS +
UTD Divert FW L2 Encap ACL FNF Last TX
Policy
UTD: IPS->URL-F->AMP/TG Color Coding: LAN Interface Tunnel Interface WAN Interface
Ingress G0/0
DNS CEF
VFR NAT
Security
Ingress G0/1
WAN to LAN
TCP/T AMP&
FW IPS URL-F TG NBAR
LS
Egress G0/0
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
What’s New in
20.1/17.2.1r
20.1/17.2.1r – What is new with SD-WAN Security
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Auto Registration for
Umbrella Cloud
Services
Auto Registration for Umbrella Cloud Services
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Auto-Registration to Cisco Umbrella
Based on Smart Account credentials on both
Umbrella and vManage
CCW to •CCW provides SA, VA mapping and order information to PnP and CSSM (Cisco Smart Software Manager)
PnP and
CSSM
•CSSM uses SA, VA mapping with location ID in the SKU and calls Umbrella Portal to create an account
Umbrella
•Using SA, VA vManage gets a token from CSSM that it uses to get org ID, Registration Key and Secret from Umbrella
Get Keys
#CiscoLive DGTL-BRKRST-2377
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
How to configure – Auto Registration for DNS/Web Layer Security
Step 1: Configure Smart Account Credentials in vManage Step 2: Configure Umbrella Registration
vManage > Administration > Settings vManage > Configuration > Security > Custom Options
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
How to configure – Auto Registration for SIG
Step 1: Configure Smart Account Credentials in vManage Step 2: Configure SIG Credentials Template
vManage > Administration > Settings vManage > Templates > Feature > SIG Credentials
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Auto Tunnel Support for
Umbrella SIG
Auto Registration for Umbrella Cloud Services
• Lean Branch – no on-prem • Leverage Cloud Hosted • Only IPv4 tunnel support
security Security with SIG • No data policy action-based
• Cloud applications are support for traffic steering
vulnerable to attacks • User traffic redirected to SIG • No loopback interface support
• Internet bound traffic must be via Transport side IPsec tunnel for SIG tunnel source
subjected to policy • No ECMP support for load
enforcement sharing
• Enforce secure web usage & • No Manual override of tunnel
control destination IP address
• Tunnel registration & setup is a • Recommended to send DNS
tedious process separate for DNS/Web Layer
security
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
SIG - Umbrella Auto Tunnel Support
Auto
Registration SIG Management
SIG Security Services
• Tunnel destination uses a global
SIG DNS Resolver
FQDN
Branch Office
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Steps to configure Umbrella SIG – Auto Tunnel
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
How to configure: Umbrella SIG – Auto Tunnel
Step 1a: Configure SIG Feature Template Step 1b: Configure a Primary & Secondary tunnel (optional)
vManage > Configuration > Templates > Feature > Add Template > Select Device > Cisco
Secure Internet Gateway
Step 1c: Configure an Active & Backup in the High Availability section
Auto
Tunnel
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
How to configure: Umbrella SIG – Auto Tunnel [contd]
Step 2a: Configure Smart Account Credentials in vManage (optional) Step 2c: Configure SIG Credentials Template
vManage > Administration > Settings
Step 2b: Select SIG Credentials Template
Auto
Registration
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
How to configure: Umbrella SIG – Auto Tunnel [contd]
Step 3: Configure Traffic redirection to SIG
Modify Service VPN template to include a “Service Route” to SIG for 0.0.0.0/0
Step 4a: Attach SIG Template to the Device Template Step 4b: Attach SIG Credentials Template to the Device Template
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Auto Tunnel vs Manual Tunnel Difference
• Manual registration
• Auto Registration • Location registration
• Location based DC selection
• Static Destination IP
• Dynamic Destination IP • Static Primary/Secondary
• Automatic tunnel failover Config
• Default recommended tunnel • Static tunnel parameters
parameters • Manual provisioning is
• Auto Selects nearest error prone
Data Center • Failover is limited to
• Automatic Failover configured DC
with Anycast IP • Limited template re-
• Template re-use use
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Umbrella SIG – Traffic Redirection
Coming soon
* Cannot use the “Set Next Hop” as tunnel source address is set to “unnumbered”
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Umbrella SIG - High Availability vs Load Sharing
Coming soon
High Availability Tunnels Load Sharing Tunnels
Internet Internet
VPN VPN
0 0
• Single active tunnel for all traffic • Multiple active tunnels for traffic
• Equal-Cost Multi-path (ECMP)
• Traffic switch to backup when • Active tunnel carries traffic when
primary fails link fails
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Manual Tunnel Support
for SIG
IPsec/GRE Manual Tunnel Support for SIG
• Lean Branch – no on-prem • Leverage Cloud Hosted • Only IPv4 tunnel support
security Security with SIG • No data policy action-based
• Any application hosted on the support for traffic steering
internet is vulnerable to attacks • User traffic redirected to SIG • No loopback interface support
and spoofing via Transport side IPsec tunnel for SIG tunnel source
• Internet bound traffic must be • No ECMP support for load
subjected to policy enforcement sharing
• Enforce secure web usage &
control
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
IPsec/GRE Manual Tunnel Support for SIG (VPN0)
SIG Provider
SIG Management
SIG Security Services
Branch Office
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
How to configure: SIG – Manual IPsec/GRE Tunnel
Create an IPsec VPN Interface Template
1. Configure IPsec source/destination IP address 2. Configure IKE & IPsec Parameters
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
How to configure: SIG – Manual IPsec/GRE Tunnel
Modify Service VPN & Device Templates
3. Configure an IPsec route in the desired Service VPN Template
4. Edit your device template to include an IPsec interface under Transport VPN and attach to device
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
SIG - Transport VPN vs Service VPN Tunnel
Internet Internet
Transport VPN Tunnel IPsec/GRE Tunnel Service VPN Tunnel IPsec Tunnel
VPN VPN
0 0
Routing Policy
Data Policy
* Can use the “Set Next Hop” with the fictitious tunnel destination address
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
SIG - High Availability vs Load Sharing Tunnels
Not
Supported
High Availability Tunnels Load Sharing Tunnels Internet
Internet
VPN VPN
0 0
• Single active tunnel for all traffic • Multiple active tunnels for traffic
• Equal-Cost Multi-path (ECMP)
• Traffic switch to backup when • Active tunnel carries traffic when
primary fails link fails
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Layer 7 Healthcheck to
Zscaler
Layer 7 Healthcheck to Zscaler
• IPsec tunnel IKE DPD method is inadequate • Implement Application Layer • Only ZScaler is supported for
(Layer 7) Ping (HPing) to verify healthcheck
• Network Ping (ICMP) only tests up to the reachability & liveness to the
Network Layer liveness Proxy Server Application Layer • URL: http://gateway.<Zscaler
Cloud>.net/vpntest
• Application layer issues are not detected, • Measure latency
causing traffic blackholing • E.g.
• Check for liveliness http://gateway.zscalerthree.ne
t/vpntest
• IPSLA Programmable API is used
Application Layer
HTTP Ping Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
ICMP Echo Network Layer
Datalink Layer
Physical Layer
IPsec Tunnel
IKE DPD
Zscaler Internal
Network
Internet
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Layer 7 Healthcheck to Zscaler
Zen Node 1 Zen Node 2
WAN Edge vManage
(DC A) (DC B)
1. Enter IPSLA HTTP and ICMP Echo
parameters on vManage. Specify
threshold, frequency and timeout for
a device
2. Push config. to the WAN Edge
3a. Send HTTP RAW request to the ZEN primary IP address [type of tunnel: IPSec or GRE](+
optional, send ICMP Echo, too)
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
How to configure: Layer 7 Healthcheck to Zscaler
Step 1: Modify your system template to include a URL tracker: Step 2: Configure the tracker component in IPsec
interface
[vManage] Configuration -> Templates -> Feature -> Add Template
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
FQDN Support for
Firewall Policy
FQDN Based Firewall Policy
• Large number of IP based rules • FQDN based policy based on • Multiple domains resolving to
is cumbersome domain/sub-domain names same IP will result in applying
matching rule to all domains
• Policy using IP address that may • Easy to troubleshoot names
change frequently • DNS traffic must traverse the
• FQDN policy allows wildcard firewall
• Difficult to troubleshoot character to include domains and
all sub-domains • CDNs with different domain
• Logs are difficult to parse names may not be matched
through • Supports regex based pattern correctly
matching
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
vManage – Firewall FQDN Policy [contd.]
Option 2: Configure a Data Prefix list and use it under FQDN List when creating a rule
vManage > Configuration > Security > Custom Options > Lists
vManage > Configuration > Security > Firewall Policy > Add Rule
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
TLS Proxy Integration
TLS Proxy & SD-WAN Security Integration
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
TLS Proxy IPS, URL-F and AMP&TG Architecture
ISR 4431
Service Plane
Control Plane
IPS/URL-F/AMP&TG
IOSd
HTX - TCP/TLS Proxy
CPU Cores
Linux OS Allocated
Management VPG0
Data Plane
Traffic VPG1
Traffic Path
Data Plane
• IPS, URL-F and AMP&TG services run on a Linux Container (LXC), using Service plane resources
• HTX (High-Throughput Transfer) contains TCP Proxy, TLS proxy & Service chain manager to direct traffic between
services
• Traffic is punted to container using Virtual Port Group (VPG) interface
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
TLS Proxy Traffic Flow
Flows continues to be TCP proxied even if the URL based verdict is to not decrypt
6
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
How decryption works
◆ Client Hello
Client
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
How decryption works
◆ The server responds to the hello and sends its certificate.
Client Hello
Client Client Hello
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
How decryption works
◆ TLS proxy verifies the server certificate
◆ Handshake between the TLS proxy and server
Client Hello
Client Client Hello Server
Server Hello and
Certificate
Server Certificate
Issuer: Public CA
Handshake
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
How decryption works
◆ TLS proxy sends its own server hello and certificate to the client
Client Hello
Client Client Hello Server
Server Hello and
Server Hello, Cert Certificate
Handshake
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
How decryption works
◆ Handshake between the client and TLS proxy
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
How decryption works
◆ Encrypted data flows between the client and the proxy
◆ TLS proxy decrypts the flow, UTD inspects it and applies policy
WAN Edge running TLS Proxy
Client Hello
Client Hello
Client Server
Server Hello and
Server Hello, Cert Certificate
Encrypted Data
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
How decryption works
◆ Encrypted data flows between the TLS proxy and server
Client Hello
Client Hello
Client Server Hello and
Server
Server Hello, Cert Certificate
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
HTTPS Traffic - Packet Capture
Handshake
Post handshake a blocked page can be issued
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
TLS Proxy & SD-WAN Security Integration
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Importance of CA Selection for Proxy
vManage as Root CA vManage as Intermediate CA
• •
• •
Cons • Cons
•
• •
#CiscoLive DGTL-BRKRST-2377
• Certificates revoked/tracked from Ent CA
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
TLS Decrypt Policy – Network and URL Policy
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Client side Trust store and Browser Complexities
Client Trust Store Browser Variations HSTS/HPKP
1 2 3
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
Client - NTP, Cert Authentication and Proxy Block
SDA
NTP ACI
Client Cert Auth
Cloud Proxy Block
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Certificate Revocation Checks - CRL vs OCSP
Certificate Revocation Reasons
CRL (Certificate • Key compromise OS CP (On lin e
Ce r t if icate
Revocation List) • CA compromise
Stat u s P ro to co l
• Policy compliance
requirements
• Certs on hold
• Privilege withdrawn etc.
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
OCSP Stapling and its impact on proxy
Improves security and performance for clients
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
TLS 1.3 and Decryption
TLS 1.3
Large web service providers are switching to TLS 1.3 (e.g. Google, Facebook)
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
How to configure – TLS Proxy
Configure Root Certificate Authority that can issue signing certificate to TLS
Proxy (WAN Edge router)
1
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
How to configure – TLS Proxy [contd.]
Step 1: Configure Root Certificate Authority that can issue signing certificate to TLS Proxy (WAN Edge router)
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
How to configure – TLS Proxy [contd.]
Step 2a: Configure TLS Decryption policy (Network Rule)
vManage > Configuration > Security > Add Security Policy
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
How to configure – TLS Proxy [contd.]
Step 2b: Configure TLS Decryption policy (URL Rule)
vManage > Configuration > Security > Add Security Policy
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Advanced Settings and Tweaks
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Secure Management
vManage Authentication methods
• Local Database / RADIUS / TACACS
• Single-Sign ON
Redirect Resource Challenge Auth
to SSO Supplied Credentials Response
2 8 4 6
Identity
vManage Provider
Admin
1 7 3 5
Auth Contact Credentials
Access
Response SSO Supplied
Resource
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
RBAC – Role Based Access Control
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
RBAC by VPN Feature
Admin user:
• Create VPN dashboards:
• Create/discover VPN segments in a network
• Create VPN groups
• New VPN dashboard for each VPN group
• Create users with VPN group access:
• Link user group to VPN group
• Create users with access to VPN group
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
vManage Admin Dashboard
(full access)
VPN Dashboard
(Restricted access)
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Cisco DNA SD-WAN Licensing
Capability Based Packaging
Enterprise firewall with Talos- Cisco AMP with TLS proxy Now with
powered IPS and app controls Cisco Basic URL filtering Cisco Umbrella SIG Essentials®
Umbrella DNS Monitoring Cisco Umbrella app discovery (Full URL Filtering | Granular App
Control | File-type Controls | AMP |
Application-based SLA Cloud OnRamp for IaaS, SaaS, and Colo ThreatGrid | L3 – L4 Cloud Firewall |
Basic WAN & path optimizations AppQoE & WAAS RTU Roaming User Protection With
AnyConnect)
Single centralized management Integrated border plus orchestration
console in the cloud or on-prem for campus, branch & DC
Additional SIG
Forward Error Correction (FEC) Seats optional
Integrated voice/UC gateways
Packet duplication
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
Cisco DNA SD-WAN Licensing
Detail Cisco DNA Premier
Cisco DNA Advantage Security
• Basic Path optimization with FEC and • Additional Cisco Threat Grid licenses can be
• Web Caching, DRE (incl. TLS proxy)
Packet Duplication purchased separately.
• Voice Module and SRST Integration
• TCP Optimization Up to 50
Device
• Multicast Cisco DNA Advantage
overlay
Cisco DNA Essentials Cisco DNA Essentials
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Demo
SD-WAN Security - Demo in a Box
Internet
Management
Network
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
FC
Topology
Internet
192.168.1.1 1.1.1.1
10.118.34.9
admin/admin
1.1.1.2
Mgmt
N/W 1.1.1.3
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Recap - Cisco SD-WAN Controllers
Orchestration Management Data Plane
Control Plane
Plane Plane Physical/Virtual
Cisco vSmart WAN Edge
Cisco vBond Cisco vManage
• Orchestrates control • Facilitates fabric • Single pane of glass • Provides secure data plane
and management plane discovery • Multitenant with scale • Establishes secure control
• First point of • Disseminates control • Centralized provisioning plane with vSmart
authentication plane information • Policies and Templates controllers
• Distributes list of between WAN Edges • Troubleshooting and • Implements data plane and
vSmarts/ vManage to • Distributes data plane Monitoring application aware routing
all WAN Edge routers and app-aware routing policies
• Software upgrades
• Facilitates NAT traversal policies to the WAN • Exports performance
Edge routers • GUI with RBAC and per
• Requires public IP statistics
VPN visibility
Address [or 1:1 NAT] • Implements control • Leverages protocols OSPF,
• Programmatic interfaces
• Highly resilient plane policies BGP, EIGRP and VRRP
• Reduces control plane (REST, NETCONF)
• Zero Touch Provisioning
complexity • Highly resilient
• Highly resilient
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Recap - SD-WAN Security Capabilities TLS
Proxy
New
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Release Notes and Image Download Links
17.2.1r Software Download Link for CSR, ISRv, ISR 1K/4K and ASR:
CSR 1Kv: https://software.cisco.com/download/home/286323714/type/282046477/release/Amsterdam-17.2.1r
ISRv: https://software.cisco.com/download/home/286308649/type/286309323/release/17.01.01
ISR 1K: https://software.cisco.com/download/home/286321996/type/282046477/release/Amsterdam-17.2.1r
ISR 4K: https://software.cisco.com/download/home/286321991/type/282046477/release/Amsterdam-17.2.1r
ASR1K: https://software.cisco.com/download/home/286321999/type/282046477/release/Amsterdam-17.2.1r
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
SD-WAN Security – External Resources
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
SD-WAN Security – External Resources
Cisco SD-WAN - http://www.cisco.com/go/sdwan
WSJ - https://tinyurl.com/yb75loxn
Lightreading - https://tinyurl.com/yba9zb4s
FB: https://tinyurl.com/y9u375hk
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
SD-WAN Security – Cisco Validated Design Guides
Security Policy Design Guide:
https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-security-policy-design-
guide.html
#CiscoLive DGTL-BRKRST-2377 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
Thank you
#CiscoLive
#CiscoLive