2020
2020
2020
Firepower NGFW in
the DC and Enterprise
Deployment Tips and New Features
#CiscoLiveLA
Your Speaker
• Security Architect focused on global life
sciences and finance customers
• Supported those same customers through their
Firepower adoption over the last 5 years
• 15 years in industry including higher ed,
manufacturing and now Cisco
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• Deploy L3 Firewalls at the Edge
• Interfaces, Routing & NAT
• NGFW Policy Tips & SSL/TLS Hardware Acceleration
• High Availability
• Deploy L2 Firewalls in the DC
• Clustering Overview
• Deploy Multi-Instance
• Overview
• Configuration Walkthrough
• Alternative Designs
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Cisco Firepower Sessions: Building Blocks
Tuesday Wednesday Thursday
BRKSEC-2020 BRKSEC-2112
BRKSEC-2034 BRKSEC-3300
11:15
Cloud Management Adv. Firepower IPS
of Firepower & ASA Deployment
Divya Nair Gary Halleen
BRKSEC-2890 BRKSEC-3328
11:20 11:15
AMP and Making FMC do
ThreatGrid Cloud more
Bill Yazji Will Young
BRKSEC-2433
Threat Hunting and
Incident Response
Ben Greenbaum
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session SPEAKER 1
How SPEAKER 2
1 Find this session in the Cisco Live Mobile App WEBEX TEAMS
#CiscoLiveLA © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
In
Depth
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Reference
CLINET (clinet.com)
Cisco LIVE Information Networking Company
• CLINET (clinet.com) is a fictional company created for
understanding use cases in FTD firewall deployment.
• CLINET has embarked on a network/security deployment project entitled
“The Security 20/20 Project” which serves as the basis for the use case.
• Company requirements and configuration examples are based upon
Therecustomer
real-life are ~100 slides we
conversations will not cover today
and deployments.
ASA (L2-L4)
• L2-L4 Stateful Firewall
• Scalable CGNAT, ACL, routing Continuous Feature Firewall URL Visibility Threats
Firepower Management
Center (FMC)*
* Also manages Firepower Appliances and FirePOWER Services (not ASA Software)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Cisco NGFW portfolio
Running Firepower Threat Defense (FTD)
Firepower 9300
SM-24
SM-36
Firepower 4110
SM-44
Performance
Firepower 4120
NEW
Firepower 4140
SM-40
Firepower 2110 Firepower 4150 NEW
SM-48
Firepower 2120 SM-56
NEW
Firepower 1120 Firepower 2130 Firepower 4115
Firepower 1140 Firepower 2140 Firepower 4125 NEW
Firepower 1150 Firepower 4145
FPR 1010
ASA 5506 (up to 6.2.3) Clustering &
ASA 5508
ASA 5516
Multi-Instance
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Firepower 1010 Overview
Desktop
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Firepower 1100 Overview
1RU
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Cisco NGFW Management Options
Multi-Instance Clustering
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
FTD Initial Setup
Reference
New in 6.2.3!
Installing Firepower Threat Defense Single hop upgrade
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Management Connections
ASA 5506 – 5555 / FPR1000 / FPR2100 (1 Management)
FTD Management Inside
Outside
Management interfaces can be placed
on the same subnets as data interfaces
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Reference
Management Connections
• FTD is managed by FMC through a management interface.
• Management interface is used only for management and eventing.
• Can be on the same subnet as a data interface or on separate subnet.
• Usually is placed on the same subnet as the inside interface.
• Management interfaces are not shown on diagrams, but are present.
Firepower Management
Center (FMC)
Additional details
Look for the star on recommendation
+
Latest Compatible FXOS Version (now 2.6.1.174)
New Recommended
Release: 6.4.0.4
• Even-numbered long-
term releases
• Certification every 2
years (6.4, 6.8)
• Predictable cadence
…
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
FTD Licensing Tips
• All licensing for FTD are installed and
enforced on the Firepower
Management Center via Smart
Licensing
• Licenses are transferrable between
firewalls of the same model
• Licensing is enforced when the policy
is pushed
• 90 day “Evaluation Mode” applies to
all FTD devices managed by that FMC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Reference
Deploying Changes
Changes don’t take affect until you deploy the policy
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Reference
Deploying Changes
Changes don’t take affect until you deploy the policy
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Reference
FTD Initial Setup –
FTD Console on Firepower 2100
• Initial setup through console interface is prompted. Default
username/password is admin/Admin123
Cisco Firepower 2140 Threat Defense v6.2.1 (build 10223)
firepower login: admin
Password: Admin123
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Reference
• Firewall mode is one of the few features configured locally. We will cover modes in
more detail later on.
Configure firewall mode? (routed/transparent) [routed]:
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Reference
Either hostname
or IP address
Registration key
we used in CLI Add device
drop down
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Firewall Deployment Mode & Interfaces
Firewall Design: Modes of Operation
• Routed Mode is the traditional mode of the firewall. Two or more 10.1.1.0/24
interfaces that separate L3 domains – Firewall is the Router and 10.1.1.1
Gateway for local hosts.
NAT
DRP
192.168.1.1
192.168.1.0/24
IP:192.168.1.100
GW: 192.168.1.1
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Firewall Design: Modes of Operation 192.168.1.1
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Routed/Transparent Interface Types
Standalone Interface Redundant Interface EtherChannel Interface
#3 #2 #1
Choice Choice Choice
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Reference
Edge
Aggregation
DMZ Network(2)
(Public Web/DB)
G1/1
VPC VPC
Edge Aggregation
VDC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Reference
outside
ISP-A ISP-B
Edge
Aggregation
DMZ Network(2)
(Public Web/DB)
G1/1 G1/2
VPC VPC
Edge Aggregation
VDC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Reference
ISP-A ISP-B
No security
Edge
zone this time Aggregation
DMZ Network(2)
(Public Web/DB)
GigabitEthernet1/3
VPC VPC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Reference
ISP-A ISP-B
Edge
Aggregation
DMZ Network(2)
(Public Web/DB)
G1/3 VLAN
150
VLAN
trunk
G1/4 151
VPC VPC
Edge Aggregation
VDC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Reference
ISP-A ISP-B
Edge
Aggregation
DMZ Network(2)
(Public Web/DB)
G1/3 VLAN
150
VLAN
trunk
G1/4 151
VPC VPC
Edge Aggregation
VDC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Reference
What is an EtherChannel?
• EtherChannel LAG (IEEE standard is 802.3ad) allows up
to 16 physical Ethernet links to be combined into one
logical link. 16 links can be active and forwarding data.
• Ports must be of same capabilities: duplex, speed, type, etc.
• Benefits of EtherChannel are increasing scale, load-
balancing and HA
• Load balancing is performed via a load-balancing hashing
algorithm (src-dst-ip, src-dst-ip-port, etc.) LACP Load Balance
• EtherChannel uses LACP (Link Aggregation Control
src-dst-IP (hash)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Reference
• vPC can maximize throughput since each port channel is treated LACP Load Balance
src-dst-IP (hash)
as a single link for spanning-tree purposes
• Spanning Tree is not disabled, but does not affect the network
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
EtherChannel on FTD
• Supports 802.3ad and LACP standards
Single • Direct support for vPC/VSS
• FPR2100/FPR4100/FPR9300 require LACP w/ 6.2.3
or • FPR4100/9300 support Etherchannel “On” mode w/ 6.3
Stack
• Up to 16 active links
• 100Mb, 1Gb, 10Gb, 40Gb are all supported – must match
No security zone on
the port-channel
because we are using
sub-interfaces
No IP
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Reference
VLAN 120
Repeat 2x for VLAN 2 and VLAN 1299
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Routing on FTD
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Routing on FTD
• FTD performs L3 route lookup as part of its normal packet processing flow Outside Network
• Multicast
• EIGRP (via FlexConfig)
• Complete IP Routing config:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configura Inside Network
tion/guide/fpmc-config-guide-
v64/routing_overview_for_firepower_threat_defense.pdf
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Reference
BGP
• FTD supports BGPv4 with IPv4 and IPv6 for dynamic routing across all platforms
• Standard communities / all path attributes, route redistribution; up to 100K prefixes and 2K neighbors
• Null0 and Remotely-Triggered Black Hole (RTBH) support
• Confederations, route reflectors, tagging, neighbor source-interface, and BFD are not supported
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Reference
• Non Stop Forwarding (NSF) and Graceful Restart (GR) support in FTD:
• Cisco or IETF compatible for OSPFv2, OSPF3; RFC 4724 for BGPv4
• FTD notifies compatible peer routers after a switchover in failover
• FTD acts as a helper to support a graceful or unexpected restart of a peer router in all modes
1. Active FTD fails over to standby; newly active 2. Router re-establishes OSPF adjacency with the
unit initiates OSPF adjacency with the router OSPF FTD while retaining the stale routes; these routes
indicating that traffic forwarding should continue. are refreshed when the adjacency reestablishes.
4. FTD continues normal traffic forwarding until the 3. Primary Route Processor undergoes a restart,
primary RP restarts or the backup takes over or the OSPF signals the peer FTD to continue forwarding while
timeout expires. Forwarding Plane the backup re-establishes adjacencies.
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
NAT on FTD
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
NAT on FTD
• NAT on FTD is built around objects, with two types of NAT:
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
NAT on FTD Processing
• Single NAT rule table (matching on a first match basis).
• Uses a simplified “Original Packet” to “Translated Packet” approach:
Manual NAT
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Manual NAT Use Case
Static NAT 192.168.1.10 → 192.168.1.155 to 128.107.1.242 → 128.107.1.155
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Reference
Easy to understand
NAT logic
Manual NAT Rules
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
FTD NGFW Policy Tips
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Reference
• Criteria can includes zones, networks, VLAN tags, applications, ports, URLs and
SGT/ISE attributes
• The same Access Control Policy can be applied to one or more device
• Complex policies can contain multiple rules, inherit settings from other access
control policies and specify other policy types that should be used for inspection
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Reference
Displays block
page over HTTP
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Reference
Access Control Policy Use Case #1 –
Applications
Allow MS SQL from inside to pubdmz
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Access Control Policy Use Case #1 – Logging Tab
Allow MS SQL from inside to pubdmz
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Logging Considerations for Large Deployments
Americas – DC #1
Americas – DC #2
1 FP4150 = 200K CPS
EMEA – DC #1
Policy With Full Logging:
EMEA – DC #2 10x FP4150s = 2M EPS 1x FMC4600
Rated for 20K EPS
APJC – DC #1
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
6.2.3
Logging Design for Large Deployments Example
FTD FMC
Security Events Security Events SIEM
Syslog or eStreamer
Connection Events
Syslog
SIEM
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
6.3+
Logging Design for Large Deployments Example
FTD FMC
Security Events Security Events SIEM
Syslog or eStreamer
6.3: Connection / Intrusion Events
6.4: Connection / Intrusion / File / File Malware Events
Syslog
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
FTD 6.3+ – Logging Tab in Access Control Policy
Allows more global control of syslog and more flexible syslog settings
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Reference
For more, check out :
• Individual rules can be set to generate events, drop and generate events, or disabled
• Layers allow for grouping of settings/rules for easier management
• Complex policies can contain multiple layers and multiple levels of inheritance
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Reference
Freeform search
Selecting browser-chrome
populates the appropriate
filter in the filter bar
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Reference
• Inspection includes static analysis of the file (via Spero), dynamic analysis (via AMP
Threat Grid) and local analysis (via ClamAV)
• Complex policies can include different actions and levels of inspections for different
application protocols, directions and file types.
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Reference
Detection only
(no blocking)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Reference
Detection only
(no blocking)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Reference
Rule we just
created
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Reference
• Many actions can be taken on encrypted traffic without decryption by inspecting the
certificate, distinguished name (DN), certificate status, cipher suite and version (all
supported by FTD)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
SSL/TLS Hardware Acceleration
Technically always TLS, but is called SSL in pre-6.4 versions
• TLS hardware acceleration consists of
three components (simplistically):
• TLS Proxy Session Setup Application Data
Encrypt/Decrypt Encrypt/Decrypt
• Session Setup Encrypt/Decrypt
(Asymmetric Key) (Symmetric Key)
• Application Data Encrypt/Decrypt
• TLS Proxy is always done in software TLS Proxy
(Software Only)
• Encrypt/Decrypt can be done in
hardware on:
• ASA 5525-X, 5545-X, 5555-X (6.2.3+) Network Data
• Firepower 4100/9300 series (6.2.3+)
• Firepower 1000 (6.4+) & 2100 series (6.3+)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Enabling SSL/TLS Hardware Acceleration
Enabled via CLI in 6.2.3, by default in 6.3+ and during upgrade in 6.4+.
• If not in the FTD console on a FPR4100/FPR9300, connect to FTD:
Firepower-module1> connect ftd
Enabling or disabling SSL hardware acceleration reboots the system. Continue? (y/n) [n]: y
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Reference
Inspection Options
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Reference
Edge SSL
Policy
Inspection Options
Criteria Action
Access Control
Rule All HTTP Allow Edge Intrusion Edge Malware &
Traffic Policy File Policy
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Reference
Intrusion policy we
created previously
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Reference
Rule we just
created
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
NTP Config #1 - FXOS
A leading cause of “no events are showing up in my FMC”…
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
NTP Config #2 – FMC for Non-FXOS Devices
A leading cause of “no events are showing up in my FMC”…
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
NTP Config #3 – FMC Itself
A leading cause of “no events are showing up in my FMC”…
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Organizing Access Control Rules
Policy Management – Categories
• All access control policies contain two categories - Mandatory and Default
• Customer categories can be created to further organize rules
• Note - After you create a category, you cannot move it. You can delete it, rename it,
and move rules into, out of, within, and around it
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Policy Management – Inheritance
• Allows an access control policy to Global Domain
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Policy Management – Multi-Domain Management
• Multitenancy for the Firepower management console
• Maximum of 50 (6.0+), 100 (6.5+) or 1024 domains (via expert mode in 6.5+)
• Maximum of 3 levels deep (2 child domains)
• Segments user access to devices, configurations and events
• Users can administer devices in that domain and below
• Devices are assigned to a domain
Global Domain
• Primarily for MSPs
EMEA
Americas Domain
• Uses in the Enterprise: Domain
• Force a policy to apply to all firewalls in a domain
Edge DC
• Limit user visibility to only select devices and events Domain Domain
• Delegate admin control while maintaining global visibility/control
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Policy Management – Object Overrides
• Allows an object to be reused on multiple firewalls, but with different meanings
• Networks, Ports, VLAN Tags and URLs all support overrides
Layer 7 application block rules (e.g. block Office 365) *length of flow does not matter on
ASA/FPR1000/FPR2100
Targeted layer 7 allow rules (e.g. allow HTTP with tailored AMP policy)
**length of flow only matters on
Generic layer 7 allow rules (e.g. allow all traffic with generic IPS policy) FPR4100/FPR9300
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Best Practices Docs
https://explore.cisco.com/ngfw_ftd_common-practices/ngfw-ftd-policy-mgmt
https://www.cisco.com/c/dam/en/us/td/docs/security/firepower/Self-Help/Basic_Policy_Creation_on_Cisco_Firepower_Devices.pdf
https://www.cisco.com/c/dam/en/us/td/docs/security/firepower/Self-Help/NGFW_Policy_Order_of_Operations.pdf
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
FTD High Availability
Firepower Threat Defense High Availability
• Supported on all physical models and ESXi
• Stateful Active/Standby failover only
• All features are supported with failover
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
How Failover Works
Failover link passes hellos between active
and standby units every 15 seconds
(tunable from 200msec - 15 seconds)
HELLO HELLO
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
How Failover Works
HELLO
HELLO
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
How Failover Works
Failover Secondary
FTD
State (active)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Reference
Easier Way:
Stateful Failover Unsupported Features
• Every feature is supported, except:
• Sessions inside plaintext tunnels
• Inspection after decryption
• TLS Decryption State
• The HTTP connection table
• DHCP client
• DHCP server address leases
• Multicast routing
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
HA with Interface Redundancy
Before… After with redundant interfaces
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
HA with Interface Redundancy
Before… After with redundant interfaces
Failures 11 - 7,
4 still
no FAILOVER
1 1
Any Causes
1
1
FAILOVER 2
1 4
Port Channel feature makes this concept somewhat obsolete if switches support VSS/vPC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Deploying Active/Standby Failover – Secondary IPs
Required to send hellos between data interfaces
Edit interfaces to
add standby IP
addresses for better
interface monitoring
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Deploying Active/Standby Failover – MAC Address
For stability, set virtual MAC address
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
FTD Clustering Overview
FTD Clustering Basics
• Designed to solve two critical issues with firewall HA:
• Aggregates firewall capacities for DC environments (bandwidth,
connections/sec, etc.)
• Provides dynamic N+1 stateful redundancy with zero packet loss
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
FTD Clustering Types with FPR9300
FTD Inter-Chassis Cluster
• Cluster of up to 6 modules (across 2 – 6 chassis)
• Off-chassis flow backup for complete redundancy
Switch 1 Switch 2
Nexus vPC
Supervisor Supervisor
FTD FTD FTD FTD
Cluster
FTD Cluster FTD
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Cluster Scalability – FTD 6.2.3 Example
54G 226G
30M 108M
Sessions Sessions
200K cps 2 6 600K cps
100% with no
Bandwidth 70% Avg.
Asymmetry*
Example 2 Firepower 9300s w/ 6 Total SM-44 Modules at 54 Gbps → 226 Gbps of throughput
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Correct Use of EtherChannels When Clustering
with VPCs 1 2 3 4
N7K VPC 32
Cluster Data Plane
Cluster Control Plane VPC PEER LINK
▪ Control Plane [Cluster Control Link]
of Cluster MUST use standard LACP
(Local Port-Channel)
▪ Each VPC Identifier on Nexus 7K is N7K VPC 42
unique N7K VPC 40
N7K VPC 41
N7K VPC 43
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Reference
Clustering Roles
• Flow Owner
• The unit that receives the connection, registers with Director
• Flow Director
• Backup to the Owner and responds to lookup requests from the Forwarders.
• Maintains a copy of state for individual Owner’s flow
• Forwarder
• Receives a connection but does not own it, queries Director for Owner
• Forwarders can derive Owner from SYN cookie if present (SYN-ACK) in asymmetric scenarios
or may query the Director via Multicast on CCL
Owner Forwarder Forwarder Director
Flow A
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Reference
Note #2: Some switches, such as the Nexus series, do not support LACP rate fast when performing in-service
software upgrades (ISSUs). Cisco does not recommend using ISSUs with clustering.
FXOS Compatibility Guide: https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/compatibility/fxos-compatibility.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Cisco Verified Switches for Clustering
Supported and Recommended: Supported but not recommended for spanned
EtherChannel mode:
• Nexus 7000 (M1, M2, F2 and F3)
• Cisco Nexus 7000 (F1)
• Cisco ASR 9000 with RSP 440
• Cisco Nexus 3000
• Cisco Nexus 9500, 9300, 6000, 5000
• Catalyst 4500-X
• Catalyst 6800 with Supervisor 2T
• Catalyst 3850
• Catalyst 6500 with Supervisor 2T, 32, 720,
and 720-10GE Reason – Asymmetric load-balancing can
cause performance degradation for data
• Catalyst 4500 with Supervisor 8-E throughput on the cluster
• Catalyst 3750-X
Note: Switches must run as a stack, vPC or VSS pair if cluster EtherChannel spans multiple switches
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Data Center - Cluster Connectivity Preferences
Firewall on a Stick Same Model Switches Different Model Switches
#1 #2 #3
Choice Choice Choice
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Data Center - Using 2 Different Switches
Switch Port Numbers Matter
Ascending
EtherChannel RBH values are sequentially allocated Order
in ascending order starting from the lowest 1/1 1/2 1/3 1/4
numeric line card and port ID.
0,4 1,5 2,6 3,7
For best cluster performance, keep traffic
symmetric and off the CCL:
• Use a symmetric hashing algorithm
• Use fixed RBH allocation for EtherChannels 0,4 1,5 2,6 3,7
e.g. port-channel hash-distribution fixed on
Nexus 7K and Catalyst 6500 1/7 2/1 5/7 6/1
• Links should be connected in matching Also
ascending order on each switch Ascending
Configuring Load Balancing Using Port Channels in Nexus 7000 Series NX-OS Interfaces Configuration Guide:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/nx-os/interfaces/configuration/guide/b-Cisco-Nexus-7000-Series-NX-
OS-Interfaces-Configuration-Guide-Book/configuring-port-channels.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
PAT in Clustering for Internet Egress
PAT pool is uniformly distributed to all cluster members at IP level
Multiple app connections load-
PAT Pool: 192.168.1.200-201
balance to different cluster members
High Security
with symmetric etherchannel hashes
TCP:192.168.1.200/31401 Web App
TCP:192.168.1.201/24109
ERROR: multiple app connections come
FTD Cluster from different source IP addresses
Use src-ip hashing on client side switch to keep NAT IPs consistent
Multiple app connections load-
PAT Pool: 192.168.1.200-201
balance to same cluster member
TCP:192.168.1.200/10001 High Security
with src-ip etherchannel hashing
TCP:192.168.1.200/10002 Web App
TCP:192.168.1.201/10001
FTD Cluster
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Other PAT with Cluster Best Practices
• Ensure there are as many or more IPs in the PAT pool as there are cluster
members or required for translations
• 4 cluster members = 4+ IPs in PAT pool, 8+ is ideal
• 250k translations = 4+ IPs in PAT pool, 8+ is deal
• Use flat port range option
• Stops FTD from prematurely moving to next
PAT IP due to high low port range usage
• Helps keep PAT IP pool IP distribution even
across the cluster members (each unit owns Cluster-PAT-Pool
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Set Cluster Control Link (CCL) MTU
Avoids fragmentation after encapsulation on CCL
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Pro-Tip – Set Virtual MAC Addresses
For stability, set Active Mac address, especially if using non-interface NAT
IPs
Why? Traffic disruption due to
MAC address changes:
• On boot, the MAC addresses of
the master unit are used across
the cluster. If the master unit
becomes unavailable, the MAC
addresses of the new master unit
Not required, but more
are used across the cluster.
stable if set. For clustering, • Gratuitous ARP for interface IPs
only Active Mac Address
needs to be set. partially mitigates this, but has no
effect on NAT IPs.
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Reference
6. Respond through
Flow Forwarder another unit
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Reference
Client Server
Flow Director
1. Connection is established
through the cluster
Flow Owner
2. Owner fails
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Reference
North Zone
VLAN 200
None
VPC
VLAN 200
Outside
VLAN 201
Inside
VPC BVI 172.16.25.86/24
Server in
VLAN 201
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Reference
Name of the
individual device,
not the cluster a.k.a. “Image Type”
- ASA or FTD
Images uploaded by the
user into the Firepower
Chassis Manager, make
sure they match across
cluster members
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
Reference
Port-channel48 is
automatically selected as the
cluster interface if configured
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Reference
Chassis ID of the
unit in the cluster
(must be unique)
Key to authenticate
units joining the
Name of the cluster cluster, must be the
to join, must be the same on all devices
same on all devices
Dedicated out-of-band
management port
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
Reference
Key to authenticate
the management
connection from FMC
Admin password to
login to FTD locally
Needed for dc-fw.clinet.com
uploading files to
AMP, etc. Routed or
Transparent
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Reference
FTD management
IP, this must work
for communications
to the FMC
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Reference
Name of the
individual device,
not the cluster
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Reference
Must be different
than other units
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Reference
Key to authenticate
the management
connection from FMC
Admin password to
login to FTD
dc-fw.clinet.com
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
Reference
Change to be
unique
Populated from the
pasted config
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
Reference
• Firewall does not need to run routing protocols / become a segment gateway
• Firewalls are more suited to security inspection (not packet forwarding like a router)
• Routing protocols can establish adjacencies through the firewall
• Protocols such as HSRP, VRRP, GLBP can cross the firewall
• Multicast streams can traverse the firewall
• Non-IP traffic can be allowed (IPX, MPLS, BPDUs)
• Much faster deployment time for brown field (months vs. years)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
Reference
North Zone
VLAN 200
VPC
VLAN 200
Outside
VLAN 201
Inside
VPC BVI 172.16.25.86/24
Server in
VLAN 201
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
Reference
North Zone
VLAN 200
VPC
VLAN 200
Outside
interfaces per
bridge group
Trunk Allowed 1,201 South Zone
VLAN 201
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
Reference
After deploying
changes, cluster
should turn green
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
Reference
Destination 1
1
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
Reference
Destination 5
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 183
FTD Multi-Instance Overview
FTD Multi-Instance Intro
• Next generation replacement for ASA Multiple Context Mode
• Create multiple logical devices on a single module or appliance
• Instances are truly virtual (unlike ASA contexts), leveraging Docker containers
• Dedicated resources allows for traffic processing and management isolation
• Each container instance runs its own FTD software version
• Physical, logical and VLAN separation provided by chassis supervisor
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
FTD Multi-Instance Key Details
• Requires FTD 6.3+
• Supported on Firepower 4100 and 9300 hardware only
• Supports inter-chassis HA for high availability only
• Supports hardware crypto:
• 1 instance/module (FTD 6.4+)
• 16 instances/modules (FTD 6.5+)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
Instance Counts by Platform
Max Cores Max Instances NEW Max Cores Max Instances
Model Model
Per Instance Per Chassis Per Instance Per Chassis
4110 22 3 4115 46 7
4120 46 3 4125 62 10
4140 70 7 4145 78 13
4150 86 7
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 187
Network Interfaces
• Supervisor assigns physical, EtherChannel, and VLAN subinterfaces
• FXOS supports up to 500 total VLAN subinterfaces
• FTD can create VLAN subinterfaces on physical/Etherchannel interfaces
• Each instance can have a combination of different interface types
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
Network Interface Scalability
If you only read one section of FXOS docs, read the interface section:
https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos261/cli-guide/b_CLI_ConfigGuide_FXOS_261/interface_management.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
Interface Scalability Best Practices
In order of preference:
• Use non-shared interfaces or subinterfaces
• Share subinterfaces under a single
physical/port-channel interface
• e.g. Share Po4.100, Po4.200, Po4.300
instead of Po1, Po2 and Po3
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
Interface Combinations That Work
Documented in FXOS docs under “Shared Interface Usage Examples”
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 191
Alternatives to
Multi-Instance
Use Cases for Multi-Tenancy
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
Multi-Tenancy Use Case Mapping to FTD
Policy Routing Independent Traffic Processing
Resource Sharing
Simplification Only Separation Only Management Isolation
Less Than
No 54 Tenants?
Yes
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
Zones and Categories for Policy Management
Migrate ASA contexts to FTD, without FTD Multi-Instance
Outside DMZ
Inside
DC Firewall DC Servers
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
Demo Scenario Logical Design
Edge DMZ Firewall
(Physical – L3)
Outside DMZ
DC Firewall DC Servers
(Instance – L2)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 201
Demo Scenario Logical Design
Edge DMZ Firewall
(Physical – L3)
Outside DMZ
Po3 Po4
Inside
Po5.301,Po5.302
DC Firewall DC Servers
(Instance – L2) Po5.303,Po5.304
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 202
Demo Scenario Multi-Instance Design
Po5.301 Po5.301
Po5.302 Po5.302
Po5.303 Po5.303
Po3 Po5.100 Po4 Po5.304 Po3 Po5.100 Po4 Po5.304
Internet Firewall DMZ Firewall DC Firewall Internet Firewall DMZ Firewall DC Firewall
FPR4K08-1-A FPR4K08-2-A FPR4K08-3-A FPR4K09-1-B FPR4K09-2-B FPR4K09-3-B
(Primary) (Primary) (Primary) (Secondary) (Secondary) (Secondary)
FPR4K08 FPR4K09
HA Link 1: Eth1/8.1001
HA Link 2: Eth1/8.1002
HA Link 3: Eth1/8.1003
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 203
Steps Involved in Bringing up a Multi-Instance
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 204
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 205
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 206
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+ - If you are impatient
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+ - If you are impatient
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
Multi-Instance Setup – FXOS Upgrade
Upload and upgrade FXOS to 2.4.1+
Upgrade is complete
when you are prompted to
log in again.
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
Multi-Instance Setup – Module Reinitialization
Required to support Container instances
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
Multi-Instance Setup – Configuring Interfaces
Adding Data-Sharing Interface for FPR4K08-1-A and FPR4K08-2-A
Data-Sharing interfaces
can be shared across
interfaces. Physical
interfaces, port-channels New in 6.3 is the option to
and subinterfaces can all add subinterfaces
be set to Data-Sharing
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 212
Multi-Instance Setup – Configuring Interfaces
Adding Data-Sharing Interface for FPR4K08-1-A and FPR4K08-2-A
Subinterface ID used by
FXOS and FMC
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
Multi-Instance Setup – Configuring Interfaces
Completed Interface Configuration
Dedicated port-channel to
be used on FPR4K08-1-A
Dedicated port-channel to
be used on FPR4K08-2-A
Shared subinterface to be
used on FPR4K08-1-A and
FPR4K08-2-A
Dedicated subinterfaces to
be used on FPR4K08-3-A
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 215
Multi-Instance Setup – First Instance Creation
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 216
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 217
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A
Semi-shared management
interface. If empty, check that
interfaces of type Management
are defined under Interfaces.
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A
Registration key used only
once when pairing with FMC.
Doesn’t need to be complex.
Admin password for FTD, not
the password for FMC
Controls whether entering
expert mode (Linux shell) is
allowed via SSH.
Transparent or Routed
Alphanumeric string to assist
setup w/ NAT. Must be unique
across all devices in FMC.
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
Multi-Instance Setup – First Instance Creation
FPR4K08-1-A
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 221
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 222
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 225
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 226
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 227
Reference
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 228
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 229
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A
Default profile
of 6 CPUs
Multiples of 2,
excluding 8.
(e.g. 6, 10, 12, 14, 16)
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A
If previously created,
the profile could have
been selected during
setup. It can be
changed after setup.
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 231
Multi-Instance Setup – Modify Resource Profile
FPR4K08-3-A
With HA and
decreasing resource,
stateful failover is not
guaranteed.
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 232
Multi-Instance Setup – Completed FXOS Setup
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 233
Reference
Multi-Instance Management
• Each instance is managed as a separate firewall in FMC
• Each instance has its own management IP address
• Each instance must be added to FMC separately
• Separate software upgrades, restarts and policies
• Name for the Instance is not pulled from FXOS, is defined in FMC
• Name for the Chassis is pulled from FXOS, is defined in FXOS
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 234
Multi-Instance Setup – FMC Setup
Adding devices
Adding an Instance to
FMC is no different than
adding a physical firewall
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 235
Multi-Instance Setup – FMC Setup
Adding devices
6.5.0
6.5.0
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
Multi-Instance Licensing
6 instances on 2 modules
requires only 2 licenses
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 238
Multi-Instance High Availability
• Container instances only support inter-chassis HA
• Configured exactly as you would physical appliances
• Multiple instances can share one HA Link, using one VLAN per instance
• An HA pair allows differently sized instances for seamless resizing
• Stateful HA is supported but not guaranteed when downsizing
Internet Firewall DMZ Firewall DC Firewall Internet Firewall DMZ Firewall DC Firewall
(Primary) (Primary) (Primary) (Secondary) (Secondary) (Secondary)
FPR4K08 FPR4K09
HA Link 1: Eth1/8.1001
HA Link 2: Eth1/8.1002
HA Link 3: Eth1/8.1003
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 239
Multi-Instance Hardware Crypto Acceleration
• Applies to VPN (IPSec/SSL)
and TLS HW decryption
• In FP 6.4, only one instance
could use crypto hardware
• Manually enabled via CLI
• In FP 6.5, up to 16 instances
can share crypto hardware
• Enabled by default for new
instances
• Must be manually enabled for
existing instance after upgrade
• Can be disabled by editing the
instance – will cause instance New instance
Existing instance
reboot
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 240
Managed Just Like A Physical Firewall
HA, Policies, Eventing, etc.
Subinterfaces are
managed within FXOS
#CLUS BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 241
Alternative Designs
Interfaces Revisited: Optional Interface Modes
• By default, all interfaces are firewall interfaces (routed or transparent)
• Optionally, specific interfaces can be configured for use as IDS or IPS
• IDS Mode
• Inline Tap
• Passive
• ERSPAN
• IPS Mode
• Inline Pair
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
Optional FTD Interface Modes
A Routed or Transparent
F Interfaces
Passive Policy Tables
B G
Inline Pair 1
C H
Inline Set
Inline Pair 2
D I
Inline Tap
E J
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 244
Inline NGFW
Firewall without Routing or Bridging Interfaces
• Although not a “Firewall” interface,
L3/L4/L7 rules can be enforced when
using “IPS” interface types
• Useful when Routed or Transparent aren’t
possible/feasible
Inline Pair
• No subinterfaces required for trunks, use
“VLAN Tags” in ACP instead:
• Caveats:
• No NAT / No Routing
• No strict TCP state tracking
Configuration: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepower-threat-defense-int.html
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 245
Out-of-Band IDS - Multichassis SPAN
When a single Firepower appliance is not enough
• Each device configured as a standalone device
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
Inline IPS – Passthrough EtherChannel w/o HA
LACP EtherChannel through FTD
• Useful for scaling IPS without Clustering VSS
or VPC
or scaling IPS with total fault isolation
SW Only: Port Channel 1
• LACP EtherChannel formed between Not HA or
switches on either side of FTD Clustered
• FTD has no knowledge of EtherChannel
• Interfaces configured as Inline Pair on FW
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 247
Inline IPS – Passthrough EtherChannel w/ HA
LACP EtherChannel through FTD w/o Symmetric Traffic
• Useful for IPS HA without Clustering VSS
or VPC
X X
• Same interface configuration as SW Only: Port Channel 1
Passthrough EtherChannel w/o HA Disabled
by LACP
• Traffic is automatically symmetric through FTD,
since only 1 unit is ever active
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 248
Inline IPS – Passthrough EtherChannel w/ HA
LACP EtherChannel through FTD w/o Symmetric Traffic
• Useful for IPS HA without Clustering VSS
or VPC
X X
• Same interface configuration as SW Only: Port Channel 1
Passthrough EtherChannel w/o HA Disabled
by LACP
• Traffic is automatically symmetric through FTD,
since only 1 unit is ever active
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 249
Inline IPS – EtherChannel Termination w/ Cluster
LACP EtherChannel to FTD
• Preferred method of scaling IPS w/ FTD VSS
or VPC
• Unlike previous designs, LACP
EtherChannel terminates on FTD SW+FW: Port Channel 1
• Traffic is automatically symmetric through FTD,
since Cluster handles any asymmetry
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 250
Reference
• 20+ Gbps per single flow (TCP/UDP) and 2.9us of 64-byte UDP latency
• Unicast IPv4 TCP/UDP/GRE and VLAN encapsulation only, no CMD/SGT
• FXOS 2.2(1) supports 4 million unidirectional or 2 million bidirectional flows
per security module
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 252
Reference
Incoming Established
Flow Classifier Rewrite Engine
traffic trusted flows
Smart NIC
Flow Offload
• Limited state tracking, NAT/PAT, TCP Sequence Randomization
• 20+ Gbps per single TCP/UDP flow, 2.5us UDP latency, 4M unidirectional/2M bidirectional (6.2.2)
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 253
Reference
VMware KVM
OVF for vSphere and ESXi Cisco FTDv qcow2 image
VMware ESXi 5.x, 6.x
Public Cloud
KVM 1.0 Virtio driver
E1000, VMXNET3
Amazon Web Services
AMI in the marketplace
Microsoft Azure
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 255
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 256
Reference
VM VM VM VM
VM Port-Group Failover VM VM
Port-Group A
VM VM VM VM
Port-Group B
Distributed Virtual Switch
ESXi-1 ESXi-2
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 257
Reference
group Virtual
Server B
NIC2 NIC3
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 258
Reference
Protected vSwitch
• Use port channels to avoid loops – NIC2 NIC4
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 260
Reference
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 261
Continuing the Discussion – It’s All About You
Email me at
schimes@cisco.com
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 262
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• All surveys can be taken:
– Cisco Live Mobile App
– Logging in to the Session Catalog:
BRKSEC-2020
was https://reg.rainfocus.com/flow/cisco/cllatam19/adash/
excellent! page/dashboard
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 263
Q&A
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• All surveys can be taken:
– Cisco Live Mobile App
– Logging in to the Session Catalog:
BRKSEC-2020
was https://reg.rainfocus.com/flow/cisco/cllatam19/adash/
excellent! page/dashboard
#CiscoLiveLA BRKSEC-2020 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 265
Thank you
#CiscoLiveLA
#CiscoLiveLA