SASE For Dummies Cisco
SASE For Dummies Cisco
SASE For Dummies Cisco
by Lawrence Miller
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Secure Access Service Edge (SASE) For Dummies®,
2nd Cisco Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2023 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of
John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may
not be used without written permission. Cisco and the Cisco logo are trademarks or registered
trademarks of Cisco Systems, Inc. All other trademarks are the property of their respective owners.
John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For
Dummies book for your business or organization, please contact our Business Development
Department in the U.S. at 877-409-4177, contact info@dummies.biz, or visit www.wiley.com/
go/custompub. For information about licensing the For Dummies brand for products or services,
contact BrandedRights&Licenses@Wiley.com.
ISBN 978-1-394-19353-0 (pbk); ISBN 978-1-394-19354-7 (ebk)
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
Project Manager: Jen Bingham Sales Manager: Molly Daugherty
Acquisitions Editor: Traci Martin Content Refinement Specialist:
Editorial Manager: Rev Mengle Saikarthick Kumarasamy
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
T
oday’s IT teams face a common challenge: how to securely
connect and enable the growing universe of roaming users,
devices, and software as a service (SaaS) apps without add-
ing complexity or degrading end-user performance. Likewise,
users in remote and branch offices expect the same user experi-
ence and level of network performance and security as users in
central locations. IT must develop strategies to connect and pro-
tect users — wherever they work and on any device they use —
from a variety of threats, including malware infections,
command-and-control callbacks, phishing attacks, unauthorized
access, and unacceptable use, among others.
Introduction 1
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» How a multifunction, cloud-native security service comple-
ments SD-WAN security components and addresses today’s
security challenges (Chapter 4)
»» The Cisco approach to SASE (Chapter 5)
»» Key SD-WAN and cloud security takeaways (Chapter 6)
Each chapter is written to stand on its own, so if a topic piques
your interest, feel free to jump ahead to that chapter. You can read
this ebook in any order that suits you (though we don’t recom-
mend upside down or backwards).
These alerts point out the stuff your mother warned you about
(well, probably not), but they do offer practical advice to help you
avoid potentially costly or frustrating mistakes.
2 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Considering how networking and
security have changed
Chapter 1
Networking and
Security: Evolution
and Challenges
T
he enterprise network underwent a huge transformation
over the past decade. As a result, security products are
evolving, too. The market is moving from single-purpose,
point products to multifunction security solutions tightly inte-
grated in a cloud service offering. The goal is simple: to deploy
security services how and where you choose with the capability to
control and secure direct-to-Internet access, cloud applications,
Internet of Things (IoT), and central, remote, and roaming users
alike — without the need for additional hardware.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Cloud adoption
The transition to cloud and software as a service (SaaS) continues
to accelerate as organizations seek to be more agile and resilient
in the face of heightened disruption and uncertainty.
Remote offices
The days of employees working together in the same place —
company headquarters — are long gone. As organizations expand
into new markets, acquiring smaller companies and their office
footprints, the number of remote and branch offices grows, too.
Remote office employees need to be protected as well as their
counterparts at main office locations, even if their network traffic
is going directly to the Internet instead of backhauling it to the
corporate data center.
4 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
As companies become more decentralized, the growing popula-
tion of remote workers and branch offices needs a new approach
to networking and security.
Roaming users
Laptop computers have supplanted desktop computers to become
the primary endpoint for many business users. Similarly, mobile
computing has untethered workers as mobile devices have become
more powerful than many desktop computers and their use has
proliferated. Because of these technology trends, many forms
of work can now be performed from practically anywhere, and
organizations increasingly recognize that work is an activity, not
a place. According to IDC’s Hybrid Work Maturity Study conducted
with Cisco, 45 percent of business and technology leaders view
remote and hybrid work models as an embedded part of accepted
work practices, with 93 percent planning to maintain or increase
spending in this area. However, The Cybersecurity Insiders 2022
Security Visibility Report warns that the shift to remote work (and
the associated risks) is the second-biggest security challenge
cited by respondents (47 percent), surpassed only by ransomware
(53 percent).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Understanding Networking
and Security Challenges
This past decade has also presented many new networking and
security challenges requiring innovative solutions to address
them effectively.
6 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
this approach just isn’t efficient. As businesses increasingly adopt
SaaS applications, as well as platform as a service (PaaS) and IaaS
resources and workloads delivered from multiple clouds, the user
application experience has suffered. Backhauling Internet-bound
traffic to apply security policies at the data center can be slow and
isn’t an efficient or effective way to handle the unprecedented
explosion of Internet traffic that cloud adoption brings.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Modern SaaS applications are often built on a microservices archi-
tecture that can be comprised of hundreds, or even thousands, of
microservices spanning multiple cloud locations. Each of these
microservices has the potential to add latency as data travels back
and forth between them and the application.
8 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
branch locations do include security tools, there are usually no IT
personnel in these locations to maintain them. To improve secu-
rity of these dynamic environments, security measures will need
to be shifted to the cloud where they can be applied and managed
centrally.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Using MPLS where needed
Chapter 2
The Evolution of
Networking and
Security Solutions
T
he networking and security landscape is evolving from
numerous, disparate point solutions to fully integrated,
multifunction, cloud-delivered networking and security
platforms. This shift is happening because businesses increas-
ingly need the flexibility and power to deploy networking and
security services how and where they choose. They need to control
and secure Internet access, manage the use of cloud applications,
and provide protection for roaming users while reducing strain on
resources and eliminating the need for hardware.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Looking at Traditional WAN Technologies
For nearly two decades, the go-to WAN technology for IT, voice,
and data networking infrastructure has been multiprotocol label
switching (MPLS) network architectures. MPLS networks provide
a resilient network backbone for connecting enterprise headquar-
ters and remote branch locations. MPLS provides the capability to
prioritize voice, video, and data traffic on your network to meet
unique business requirements, and packets can be sent over a pri-
vate MPLS network.
However, MPLS circuits come with a higher cost than other trans-
ports, and enterprises today need to evaluate where these more
expensive circuits should be utilized when needed. MPLS net-
works are typically provided by Internet service providers (ISPs)
and other service providers — both the well-known telecoms and
the not so well-known smaller companies. For many companies,
lower cost Internet circuits will be sufficient for the majority of
network traffic.
12 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 2-1: Challenges with current WAN architectures include complexity,
cost, delays, and disruptions.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
configurations, and policies across all users, transports, devices,
applications, clouds, and data centers in multiple locations from
a centralized dashboard. In addition, it empowers networking and
security teams with advanced intelligence and analytics that help
resolve or prevent issues before they impact the user experience.
14 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In addition to its routing capabilities, SD-WAN also provides sev-
eral other benefits such as improved security, reduced costs, and
greater flexibility.
Source: Cisco.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Tackling Internet Security Threats
For most of the past 25 years, network security has focused on
detecting and preventing malware threats (such as viruses, ran-
somware, spam, and phishing), identifying and blocking unau-
thorized Internet use (such as browsing inappropriate content
and downloading pirated content), and assuring network per-
formance (with caching proxy and anti-distributed denial-of-
service (DDoS) products).
16 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 2-2: SD-WAN is a critical networking element in SASE solutions that
can direct traffic for the protection of cloud, data center, and branch edge
networks.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Looking at secure connectivity
challenges in the cloud era
Chapter 3
SASE: Combining
Networking and
Security Functionality
T
his chapter covers the challenges created in the new net-
work architecture model, what functionality you need for
secure connectivity, what issues you need to consider when
deploying your solution, and how a secure access service edge
(SASE) solution can help.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Today, the wide-scale use of cloud applications has become fun-
damental to business operations at all locations. Gartner predicted
worldwide end-user spending on public cloud services would near
the $600 billion mark in 2023. The centralized security approach
has become impractical because of the high cost of backhauling
traffic and the resulting performance issues for branch locations.
20 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
TABLE 3-1 SASE Combines Core Capabilities Provided by
SD-WAN and Cloud Security
SD-WAN Cloud Security
Cloud network extension and middle- Secure web gateway (SWG). A gateway
mile optimization. Extensive cloud that logs and inspects web traffic to
on-ramp integrations to enable seamless, provide full visibility, URL filtering, and
automated connectivity with any site-to- application control and protection
cloud and site-to-site configuration. Includes against malware.
optimized middle-mile connectivity through
software-defined cloud interconnect (SDCI)
and colocation integrations.
(continued)
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
TABLE 3-1 (continued)
22 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Improve security with consistent policy
»» Update threat protection and policies without hardware and
software upgrades
With Cisco Umbrella, the Avril Group was able to reduce ransomware
by 100 percent, secure mobile users working off-network, and reduce
security management time over previous solutions.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Restrict access based on user, device, and application
identity
»» Increase network and security staff effectiveness with
centralized policy management
»» Deliver a consistently seamless user experience anywhere
These benefits are critical for organizations that need to address
the modern networking and security challenges of an increasingly
cloud-first, distributed, mobile, and global workforce.
Source: Cisco
24 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Networking first step
Begin by looking at the many benefits of software-defined wide
area networking (SD-WAN) and start a trial to show the impact
it could have on your networking service costs, performance,
and management tasks. As you develop a plan for SD-WAN, you
should also decide the best way to secure the new traffic flows,
especially from the increasing number of remote branches and
roaming users. Look for a vendor with a strong portfolio of
network technology that will deliver a broad range of network
as-a-service capabilities in the future.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Exploring key components in the security
service edge (SSE)
Chapter 4
Knowing What to Look
for in a SASE Solution
T
his chapter explores the two sides of the SASE coin: the
security service edge (SSE) and software-defined wide-area
network (SD-WAN).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
intelligence, Secure Sockets Layer (SSL) decryption, applica-
tion and content filtering, and data loss prevention (DLP).
»» Cloud access security broker (CASB): A CASB helps control
and secure the use of cloud-based, software as-a-service
(SaaS) applications, enabling organizations to enforce their
security policies and compliance regulations. CASBs provide
insight into cloud application use across cloud platforms and
identify unsanctioned use within an organization. CASBs use
auto-discovery to detect the cloud applications in use and
identify high-risk applications and users, as well as other key
risk factors. CASBs typically include DLP functionality and the
capability to detect and provide alerts when abnormal user
activity occurs, to help stop both internal and external
threats.
»» Firewall as a service (FWaaS): FWaaS is the cloud-based
delivery of firewall functionality to protect non-web Internet
traffic. This typically includes Layer 3 and Layer 4 (IP, port,
and protocol) visibility and control, along with Layer 7
(application control) rules and IP anonymization.
»» Zero trust network access (ZTNA): The zero-trust security
framework takes a “never trust, always verify” approach to
security. ZTNA verifies user identities and establishes device
trust before granting access to authorized applications,
helping organizations prevent unauthorized access, contain
breaches, and limit an attacker’s lateral movement on your
network. ZTNA requires a strong, cloud-based, multifactor
authentication (MFA) approach to security.
»» Domain name system (DNS) layer security: Domain name
system (DNS) resolution is the first step when a user
attempts to access a website or other service on the Internet.
Thus, enforcing security at the DNS and Internet Protocol (IP)
layers is the first line of defense against threats and is a great
way to stop attacks before users connect to bad destina-
tions. DNS layer security is often, but not always, referenced
when analysts discuss an SSE solution. However, because it’s
a highly effective first layer of security, it’s wise to consider it
as part of your overall SASE solution.
28 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Software-Defined Wide Area Network
An SD-WAN is a virtual WAN that allows companies to use any
combination of transport services, including multiprotocol label
switching (MPLS), cellular Long-Term Evolution (LTE) and 5G,
and broadband, to securely connect users to network locations. It
can select the most efficient routing method while reducing costs
and simplifying management.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Getting a turnkey experience with Cisco+
Secure Connect
Chapter 5
Exploring How Cisco
Delivers SASE
U
nderstanding that customers will be at different stages of
their SASE journey, Cisco provides a variety of options.
Cisco offers a unified SASE solution for a simplified expe-
rience, as well as an integrated solution — a converged security
service edge (SSE) solution and separate SASE components — for
those organizations that prefer greater customization flexibility.
In this chapter, you discover how Cisco delivers secure access ser-
vice edge (SASE) solutions.
Cisco+
+ Secure Connect: A Turnkey
Experience in a Unified SASE Solution
Cisco+ Secure Connect is a unified, turnkey solution with a blue-
print for SASE made easy. It helps organizations build greater
network resiliency, enables secure hybrid work, delivers a unified
IT management experience, and provides an easy and seamless
path to SASE that extends across premises to the cloud. Cisco+
Secure Connect is ideal for organizations looking to simplify net-
working and security operations while moving toward a cloud-
first approach.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Powered within a single platform, Cisco+ Secure Connect securely
connects users anywhere to any application with a single sub-
scription. The solution integrates client-based and clientless
remote worker access, native Cisco SD-WAN connectivity through
either Cisco Meraki or Viptela technology, and comprehensive
cloud-based security capabilities with Zero Trust Network Access
(ZTNA).
32 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• Real-time inspection of inbound files for malware and
other threats using Cisco Secure Endpoint (formerly Cisco
Advanced Malware Protection (AMP) for Endpoints) and
third-party resources
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• Logs and categorizes DNS activity by type of security
threat or web content and the action taken, whether it
was blocked or allowed
34 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 5-1: Cisco Umbrella delivers SASE security capabilities and more.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
security services. This integrated approach efficiently protects
your branch users, connected devices, and application usage from
all DIA breakouts.
36 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Cisco SD-WAN solution contains the following four key com-
ponents that work together to form the Cisco SD-WAN fabric (see
Figure 5-3):
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Cisco WAN Edge routers (network fabric). Cisco IOS XE
SD-WAN and Cisco vEdge Devices sit at the perimeter of a
site (such as remote offices, branches, campuses, and data
centers) and provide connectivity among the sites. They are
either hardware devices or software (cloud router) that runs
as a virtual machine. The edge routers handle the transmis-
sion of data traffic.
38 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 5-4: Cisco SecureX simplifies security with better visibility and
automation.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Recognizing the changing nature of work
and networking
Chapter 6
Ten Key Takeaways
H
ere are ten key takeaways about software-defined wide
area networking (SD-WAN) and cloud security to keep in
mind.
Similarly, mobile and roaming users often don’t think twice about
connecting to a public Wi-Fi hotspot. Cybercriminals take every
opportunity to exploit Wi-Fi vulnerabilities and the inherent trust
that a coffee shop patron or hotel guest places in a “secure” Wi-Fi
connection.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
DIA Is the New Normal
With the advent of the cloud era, network architectures designed
to provide robust connectivity to a corporate data center are now
obsolete and must evolve. The majority of network traffic today
occurs either within the data center itself (east-west traffic) or
from an organization’s various locations to the cloud via the
Internet (north-south traffic). As a result, backhauling network
traffic from remote or branch locations over multiprotocol label
switching (MPLS) wide-area network (WAN) links, or roaming
user traffic over virtual private network (VPN) connections, is no
longer an efficient or viable option. Organizations are increas-
ingly providing direct Internet access (DIA) broadband links for
their remote, branch, and roaming users to access their software
as a service (SaaS) applications without the slow performance and
latency associated with backhauling traffic to a corporate office
with a single security stack.
42 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
When you’re considering SASE solutions, it’s important to eval-
uate not only solutions that are just delivered by the cloud, but
also solutions that were “born” in the clou (that is, cloud native).
SD-WAN Is a Foundational
Component of SASE
A SASE architecture can only be achieved through the combina-
tion of SD-WAN with cloud security. In other words, you can’t
have SASE without SD-WAN!
SD-WAN provides:
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
the business is ready to go — with or without security. And if the
SD-WAN solution doesn’t have built-in security capabilities, the
security team may need to ship a separate firewall and/or other
security appliances to the remote office. Plugging in one appliance
is fine but two or three — well, that’s just asking for too much!
44 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
selection. Ultimately, the user experience is what drives successful
adoption of digital transformation initiatives in an organization.
Poor network performance guarantees a poor user experience and
drives frustrated employees to turn to potentially risky shadow IT
apps and solutions.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In a SASE architecture, the SD-WAN collects and transports vital
telemetry (such as data about user, device, application, cloud,
security, and so on) to apply and enforce cohesive, real-time,
intelligent networking and security policies across all domains.
46 Secure Access Service Edge (SASE) For Dummies, 2nd Cisco Special Edition
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.