FTD v7
FTD v7
FTD v7
Firepower Platform
Deep Dive
#CLUS
Your Speaker
Andrew Ossipov
aeo@cisco.com
Distinguished Engineer
NGFW, Solution Architecture, Hybrid Cloud DC
IETF: SFC and TLS Working Groups
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Agenda
• Hardware and Software
• Firepower Threat Defense Overview
• Security Applications on Firepower 4100 and 9300
• Multi-Instance Capability on Firepower 4100 and 9300
• Availability and Scalability
• Deployment Example: FTD Instance on Firepower 4100
• Closing
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Hardware and
Software
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Firepower 9300 Overview
Supervisor Network Modules
• Application deployment and orchestration • 10GE, 40GE, 100GE
• Network attachment and traffic distribution • Hardware bypass for inline NGIPS
• Clustering base layer for ASA or FTD
3RU
Security Modules
• Embedded Smart NIC and crypto hardware
• Cisco (ASA, FTD) and third-party (Radware DDoS) applications
• Standalone or clustered within and across chassis
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Supervisor Module
RJ-45 1GE Management Built-in 10GE Data Optional Network
Console Interface (SFP) Interfaces (SFP+) Modules (NM)
1 2
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Supervisor Architecture
System Bus
Security Security Security
RAM
Module 1 Module 2 Module 3
On-board 8x10GE NM NM
interfaces Slot 1 Slot 2
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Firepower 9300 Security Modules
• All modules have to match within a chassis for now
• Built-in hardware Smart NIC and Crypto Accelerator
• Previous generation SM-24, SM-36, and SM-44
• Dual 800GB SSD in RAID1 by default
• SM-24 is NEBS Level 3 Certified
• New SM-40, SM-48, and SM-56
• Dual 1.6TB SSD in RAID1 by default
• Higher performance on cryptographic operations
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Security Module Architecture
2x100Gbps
2x40Gbps
Backplane Supervisor Connection
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Firepower 4100 Overview
Solid State Drives
Built-in Supervisor and Security Module • Independent operation (no RAID)
• Same hardware and software architecture as 9300 • Slot 1 today provides limited AMP storage
• Fixed configurations (4110 – 4150) • Slot 2 adds 400GB of AMP storage
1RU
Network Modules
• 10GE and 40GE interchangeable with 9300
• Partially overlapping fail-to-wire options
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Firepower 4100 Architecture
RAM
4110: 64Gb
4115: 192Gb x86 CPU 1 x86 CPU 2
4120: 128Gb 4110: 24 cores 4110: N/A
4125: 192Gb 4115: 24 cores
4140: 256Gb 4120: 24 cores
4115: 24 cores
4120: 24 cores
System Bus
4145: 384Gb 4125: 32 cores 4125: 32 cores
4150: 256Gb 4140: 36 cores
RAM
4140: 36 cores
4145/4150: 44 cores 4145/4150: 44 cores
On-board NM NM
8x10GE interfaces Slot 1 Slot 2
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Firepower 4100/9300 Smart NIC and Crypto
x86 CPU 1 x86 CPU 2
Crypto Accelerator
• Single on 4110, dual elsewhere
• Configurable core bias to IPsec/TLS
on Firepower 4110, 4120, 4140,
4150 and Firepower 9300 SM-24,
Crypto Crypto SM-36, SM-44; shared elsewhere
1 2 • IPsec S2S and RAVPN
• TLS/DTLS RAVPN
• TLS inspection assistance
Cisco Programmable NIC
• Single on 4110, dual elsewhere Smart Smart
• 40Gbps connectivity each NIC 1 NIC 1
System Bus
• Packet Matching and Rewrite
• Tracks 2M flows for Flow Offload
FXOS 2.3.1 Ethernet
Internal Switch Fabric
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Firepower 2100 Overview
Integrated Security Platform for FTD or ASA Application
• Lightweight virtual Supervisor module
• Embedded x86 and NPU with Hardware Crypto Acceleration SFP/SFP+ Data Interfaces
• Fixed configurations (2110, 2120, 2130, 2140) • 4x1GE on Firepower 2110 and 2120
• Dual redundant power supplies on 2130 and 2140 only • 4x10GE on Firepower 2130 and 2140
1RU
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Firepower 2100 Architecture
x86 CPU RAM
2110: 4 cores
2120: 6 cores 2110-2120: 16GB
2130: 8 cores 2130: 32GB
System Bus
2140: 16 cores 2140: 64GB
Ethernet
Network Processor Unit (NPU) RAM
2110: 6 cores
2120: 8 cores
2130: 12 cores 2110-2120: 8GB
2140: 16 cores 2130-2140: 16GB
2110-2120: 2x10Gbps
2x10Gbps 2130-2140: 1x40Gbps
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Firepower 1100 Overview
1RU
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Firepower 1010 Overview
Desktop
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Firepower 1000 Architecture
System Bus
x86 CPU
RAM
1010: 8 cores
1120: 24 cores 1010: 8Gb Ethernet
1140: 32 cores 1120-1140: 16Gb
1010: 2x2.5Gbps
1120-1140: 2x10Gbps
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Standard Network Interfaces
• Supervisor attaches security modules to network
• All interfaces are called “Ethernet” and 1-referenced (i.e. Ethernet1/1)
• All external network ports require fiber or copper transceivers (SFP)
• Third-party SFP are allowed on best-effort support basis
•Same-kind OIR is supported for external network modules
8x1GE 8x10GE 4x40GE 2x100GE and 4x100GE
• Firepower 2100 only • Firepower 2100, • Firepower 4100 • Firepower 9300 only
in FXOS 2.4.1 4100, 9300 and 9300 • Single width in FXOS 2.4.1
• Single width • Single width • Single width • QSFP28 connector
• 10M/100M/1GE • 1GE/10GE SFP • 4x10GE breakouts • Future 4x25GE breakout
for each 40GE port • Legacy double width
2x100 still available
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Fail-to-Wire Network Modules
• Fixed interfaces, no removable SFP support or module OIR
• NGIPS inline interfaces for standalone FTD 6.1+ only
• Sub-second reaction time to application, software, or hardware failure
• Designed to engage during unplanned failure or restart events
• <90ms reaction time for Standby→Bypass with full power failure
• Firepower 2100, 4100 • Firepower 2100, 4100 • Firepower 2100, 4100, • Firepower 4100 and 9300
• Single width • Single width 9300 • Single width
• 10M/100M/1GE copper • 1GE fibre SX • Single width • 40GE SR4
• 10GE SR or LR • No 10GE breakout support
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Maximum Transmission Unit (MTU)
• Layer 2 MTU defines maximum Ethernet frame size on the wire
• Mostly relevant to switches and other passive Layer 2 devices
• Frames above the MTU size are discarded, not fragmented
• 9206 bytes on Firepower 4100/9300 in FXOS 2.1.1; 9216 bytes on 2100
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Firepower 4100/9300 Software
• Supervisor and security modules use multiple independent images
• All images are digitally signed and validated through Secure Boot
• Security application images are in Cisco Secure Package (CSP) format
Security Module 1 Security Module 2 Security Module 3
Decorator application from third-party (KVM)
DDoS
FTD FTD
Primary Cisco application (Native or Container) FTD
FXOS FXOS FXOS
FXOS upgrades are applied to Supervisor and
resident provisioning agent on modules
Firepower Extensible Operating System (FXOS)
Supervisor stores CSP application images Supervisor
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Firepower Platform Bundle
• Platform Bundle contains all Supervisor and module firmware images
fxos-9000-k9.2.4.1.101.gSPA
platform encryption version [g]db [S]igned [S]pecial key revision
or [P]roduction
• FXOS creates an environment for security applications
• Supervisor automatically selects components to upgrade
• Relevant components are reloaded automatically during the upgrade
• Firepower 1000 and 2100 FTD or ASA bundle includes virtual FXOS
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Firepower Supervisor CLI Interface
• FXOS uses object-based CLI representation similar to UCS Manager
• scope, enter, or exit select a command mode within the hierarchy
• create instantiates a new configuration object within the hierarchy
• set assigns a value to a configuration variable or object
• show displays object content
• commit-buffer applies changes to the running configuration
FP9300# scope eth-uplink
FP9300 /eth-uplink # scope fabric a
FP9300 /eth-uplink/fabric # create port-channel 2
FP9300 /eth-uplink/fabric/port-channel* # create member-port 1 11
FP9300 /eth-uplink/fabric/port-channel* # create member-port 1 12
FP9300 /eth-uplink/fabric/port-channel* # set speed 10gbps
FP9300 /eth-uplink/fabric/port-channel* # commit-buffer
FP9300 /eth-uplink/fabric/port-channel # exit
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Architecture and Logical Packet Flow
FTD
Main Access IP Reputation,
Policy SI
New Exist
ing Anomaly,
Flow Lookup
NGIPS, AMP
Advanced Inspection Modules (“Snort”)
Data Plane (“Lina”) Pointer
Prefilter
Flow Creation Normalization Verdict
Policy
New Fastpath
Exist
Packet Ingress ing Egress Packet
RX
Flow Lookup Clustering VPN
Checks Checks TX
Reinject
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Monitoring System Utilization
• Data Plane (Lina)
ftd# show cpu detailed
Break down of per-core data path versus control point cpu usage:
Core 5 sec 1 min 5 min Control Plane
Data Plane (most Core 0 2.0 (2.0 + 0.0) 1.1 (1.1 + 0.0) 0.9 (0.9 + 0.0) (network control and
transit traffic) Core 1 3.2 (3.2 + 0.0) 1.8 (1.8 + 0.0) 1.5 (1.5 + 0.0) application inspection)
[…]
Core 35 0.0 (0.0 + 0.0) 0.0 (0.0 + 0.0) 0.0 (0.0 + 0.0)
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
NGFW Interface Modes
• Must choose routed or transparent at deployment
10.1.1.0/24 10.1.2.0/24 Transparent FTD
Routed FTD inside outside
inside outside
DMZ 10.1.1.0/24
DMZ 10.1.3.0/24
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
NGIPS Interface Modes
• Any unused interface in routed/transparent can be in NGIPS mode
Inline FTD Inline Tap FTD Passive FTD
Eth1/1 Eth1/2 Eth1/1 Eth1/2 Eth1/1
• Inline pairing at physical/Etherchannel level; inline sets allow asymmetry
• True pass-through mode for VLAN
• LACP pass-through is supported with standalone interfaces in FXOS 2.3.1
• Most classic firewall functionality is disabled
• All security policies still apply
• Data Plane tracks connections for HA/clustering with no state enforcement
• NAT, application inspection, and similar ASA-style functionality is disabled
• Flow Offload is not triggered
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Prefilter Policy
• First access control phase in Data Plane for each new flow
• Block: Deny the flow without any further processing
• Fastpath: Allow and process entirely in Data Plane, attempt Flow Offload
• Analyze: Pass for evaluation in Main ACP, optionally assign tunnel zone
• Not a “high performance” substitute to true NGFW policies
• Non-NGFW traffic match criteria
• Limited early IP blacklisting
• Tunneled traffic inspection
• Accelerating high-bandwidth and latency-sensitive trusted flows
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Main Access Control Policy
• Second and final access control phase in Snort
• Block [with reset]: Deny connection [and TCP RST]
• Interactive Block [with reset]: Show HTTP(S) block page [and TCP RST]
• Monitor: Log event and continue policy evaluation
• Trust: Push all subsequent flow processing into Data Plane only
• Allow: Permit connection to go through NGIPS/File inspection
• Appropriate place for implementing NGFW policy rules
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
FlexConfig Policies
• Device-level free form CLI policies that follow ASA syntax
• Supports pre-defined object templates and completely custom objects
• Natively managed feature commands are blocked
• Must push an object with negated commands to remove
• FlexConfig is only supported on best-effort basis
• Deploy Once; Everytime is for interactions with managed features
• Always select Append rather than Prepend type
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Security
Applications on
Firepower 4100
and 9300
Security Applications Overview
• ASA or FTD are Primary applications in Native or Container mode
• Native application consumes full hardware resources of an entire module
• Firepower 4100 and 9300 support multiple FTD Container instances in FXOS 2.4.1
• All modules in a chassis run same primary application for now
• A Decorator application shares a module with a Native primary application
• Traffic flows from network interfaces through a decorator to primary application
• Service chaining with Radware vDefensePro decorator and ASA or FTD 6.2+
• Not supported with Container applications at this time
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Radware vDefensePro Summary
Application Server Network
Behavioral HTTP
Behavioral HTTP DNS Protection
DNS Protection Behavioral DoS
Behavioral DoS
Flood
Flood Protection
Protection
Anti-Scan
Anti-Scan SYN Protection
SYN Protection
Available Server
Server Cracking
Cracking
Services Connection Limit
Connection Limit Out-Of-State
Out-Of-State
Signature
Signature Connection PPS
Protection
Protection Per-flow PPS Limit Blacklist/Whitelist
BL/WL
Limit
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Firepower 9300 Native Application Deployment
Logical
Device FTD Cluster
Security Module 1 Security Module 2 Security Module 3 Primary
Application
Instance FTD FTD FTD Application
Decorator
Link DDoS DDoS DDoS
Decorator Application
Logical
Supervisor Data Outside Data Inside Packet Flow
PortChannel2 PortChannel1
Ethernet1/7
(Management)
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Smart Licensing
Cisco applications request feature license Third-party applications may
entitlements from Supervisor or FMC use out-of-band licensing
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Management Overview
• Chassis management is independent from applications
• On-box chassis manager UI, CLI, and REST
• SNMP and syslog support for chassis level counters/events on Supervisor
• Applications are managed through their respective interfaces
• CLI, REST API (except 1100 and 2100), ASDM, CSM, and CDO for ASA
• Off-box FMC, FMC REST API, and CDO (1100 and 2100 only for now) for FTD
• Device API-driven on-box FDM (1100 and 2100 only for now) for FTD
• Off-box APsolute Vision for Radware vDP
• Future off-box FMC support for both chassis and FTD management
• Already supported on Firepower 2100
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Automated Initial Provisioning
• FXOS 2.6.1 added remote provisioning on Firepower 4100 and 9300 only
DHCP Server
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Multi-Instance
Capability on
Firepower 4100
and 9300
Multi-Instance Capability Summary
• Supported on Firepower 4100 and 9300 only
• Instantiate multiple logical devices on a single module or appliance
• FTD application in 6.3, a mix of FTD and ASA instances in the future
• Leverage Docker infrastructure and container packaging
• Complete traffic processing and management isolation
• Physical and logical interface and VLAN separation at Supervisor
FTD Instance A FTD Instance B FTD Instance C FTD Instance D ASA Instance A (Future)
10 CPU 6 CPU 10 CPU
12 CPU 12 CPU
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Anatomy of a Container Instance
• Each instance uses from 6 logical CPU cores up to the platform maximum
• User-defined assignment with a 2-core step, skipping 8; e.g.: 6, 10, 12, …
• Memory size is automatically selected based on configured CPU core count
• Instance restart is required to change resource configuration, so use stateful HA
• Automatic CPU core allocation between internal components based on size
• System/Management process always takes 2 logical cores
FTD Docker Container (Instance A) FTD Docker Container (Instance B)
Advanced System/ Advanced System/
Data Plane Data Plane
Inspection Management Inspection Management
FXOS Docker Environment
CPU Memory Disk CPU Memory Disk
Firepower Module or Appliance
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Instance Scalability by Platform
CPU core count divided by at Disk space divided by 48Gb of
• Lower of the two limits: least 6 cores per instance required space per instance
Total Application Native CPU Core Allocation Total Application Maximum FTD Instances
Platform
CPU Cores (Data Plane/Snort/System) Disk CPU Bound Disk Bound
Firepower 4110 22 8/12/2 150Gb 3 3
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Performance
• All inter-instance communication occurs through Supervisor
• Docker form factor itself has minimal effect on performance
• Single full-blade instance performance is same as native application
• Main performance impact comes from additional System cores
• SM-44: 28 System cores with 14 instances → 33% overall impact
• Price to pay for independent and predicable management
• Partially offset by a more favorable inter-component CPU core allocation
• Future support for Clustering, Flow Offload, and Hardware Crypto Engine
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Reference
6 2/2/2
10 4/4/2
12 4/6/2
14 4/8/2
16 6/8/2
18 6/10/2
20 8/10/2
22 8/12/2
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Reference
6 2/2/2 28 10/16/2
10 4/4/2 30 10/18/2
12 4/6/2 32 12/18/2
14 4/8/2 34 12/20/2
16 6/8/2 36 12/22/2
18 6/10/2 38 14/22/2
20 6/12/2 40 14/24/2
22 8/12/2 42 14/26/2
24 8/14/2 44 16/26/2
26 8/16/2 46 16/28/2
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Reference
6 2/2/2 28 12/14/2
10 4/4/2 30 12/16/2
12 4/6/2 32 14/16/2
14 6/6/2 34 14/18/2
16 6/8/2 36 16/18/2
18 8/8/2 38 16/20/2
20 8/10/2 40 18/20/2
22 10/10/2 42 18/22/2
24 10/12/2 44 20/22/2
26 10/14/2 46 20/24/2
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Reference
88 38/48/2
90 38/50/2
92 40/50/2
94 40/52/2
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Network Interfaces
• Supervisor assigns physical, EtherChannel, and VLAN subinterfaces
• FXOS supports up to 500 total VLAN subinterfaces in FXOS 2.4.1
• FTD can also create VLAN subinterfaces on physical and EtherChannel interfaces
• Each instance can have a combination of different interface types
Ethernet1/1-3 Ethernet1/4-5
PortChannel1.100-101 PortChannel2
Supported Modes: Routed, Transparent, Supported Modes: Routed (no BVI Supported Modes: Management,
Inline, Inline-tap, Passive, HA members), HA Eventing
Supported Traffic: unicast, broadcast, Supported Traffic: unicast, Supported Traffic: unicast,
multicast broadcast, multicast broadcast, multicast
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Reference
Default prefix derived from a chassis MAC or user-defined Counter that increments for every interface
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Network Interface Scalability
• Supervisor has strict hardware limits on forwarding tables
• Use show detail under scope fabric-interconnect to monitor
• Limits apply across all standalone modules in a chassis or a cluster
• Ingress VLAN Group Entry Count defines maximum FXOS VLAN ID count
• Up to 500 total entries or unique Supervisor VLAN subinterfaces
• Re-using same VLAN ID under two parent interfaces consumes 2 entries
• Switch Forwarding Path Entry Count limits shared interfaces
• Up to 1021 TCAM entries for ingress/egress path programming
• Each Dedicated data interface consumes at least 2 entries
• Entries for Shared Data interfaces grow exponentially with instance count
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Interface Scalability Best Practices
• Refer to FXOS documentation for real-world examples
• Minimise the number of Shared Data (sub)interfaces
• A single instance can have up to 10 shared (sub)interfaces
• A single (sub)interface can be shared with up to 14 instances
• Sharing an interface across a subset of instances scales better
• Share subinterfaces rather than physical interfaces
• One parent interface is best, multiple parents is also acceptable
• 2 Dedicated, 10 Shared physical: 69% TCAM usage at 5 instances
• 10 Dedicated, 10 Shared subinterfaces: 46% TCAM usage at 14 instances
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Management and Licensing
• After FXOS 2.4.1 upgrade, must Reinitialize a module to deploy instances
• Different instances look and feel like completely independent FTD devices
• Software upgrades, restarts, and configuration management are isolated
• Each FTD instance has separate management IP, so add to FMC separately
• FTD Expert Mode access is enabled on per-instance basis at provisioning
• No additional feature license to enable multi-instance capability
• Each FTD subscription license is shared by all instances on a module
• License sharing requires all instances to be managed by a single FMC
• With multiple FMCs, each requires a separate set of FTD subscriptions
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Availability and
Scalability
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
FTD High Availability and Clustering
• FTD inherits failover and clustering infrastructure from ASA
• Replicates full NGFW/NGIPS configuration and opaque flow state
• Supports all NGFW/NGIPS interface modes
• Interface and Snort instance (at least 50%) health monitoring
• Zero-Downtime upgrades for most applications
• Ensures full stateful flow symmetry in both NGIPS and NGFW modes
vPC vPC
vPC vPC
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Multi-Instance High Availability
• Container instances support inter-chassis HA only
• Two instances are configured into an Active/Standby HA pair
• Share single physical HA link with one VLAN per instance pair
FTD Instance A FTD Instance B FTD Instance A FTD Instance B
Active Standby Standby Active
HA Link
Firepower 4100 Chassis 1 HA Pair A: VLAN100 Firepower 4100 Chassis 2
HA Pair B: VLAN101
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
FTD and ASA Clustering Overview
Inter-Chassis Cluster Control Link
• Cluster of up to 16 modules across 5+ chassis
• Off-chassis flow backup for complete redundancy
Switch 1 Switch 2
Nexus vPC
Chassis 1 Chassis 2
Supervisor Supervisor
FTD FTD FTD FTD
Cluster
FTD FTD
Cluster
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
New TCP Flow with FTD Inter-Chassis Clustering
1. Attempt new FTD Cluster
2. C1M1: Become
flow with TCP SYN Owner, add SYN
FTD O FTD B Cookie, send to Server
7. C1M1: Calculate
Module 1 off-chassis Backup
Module 1
C2M1, send update
5. C1M1:
Client FTD FTD
Send to Client M
Module 2 Module 2 Server
6. C1M1: Calculate
Director C1M3,
FTD D 4. C2M3: Redirect FTD F
send flow update 3. Server responds
Module 3 to Owner C1M1 Module 3
from SYN Cookie, with TCP SYN ACK
Chassis 1 become Forwarder Chassis 2 through another unit
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Equal Cost MultiPath with Traffic Zones
Standalone switches or
routers are common with Solution: Create a
multiple upstream paths separate Spanned
Etherchannel logical
Po10: outside-1 Po11: outside-2
BGP/OSPF BGP/OSPF interface per upstream
outside zone device and group them
into a single ECMP Traffic
Zone with FlexConfig
Supervisor Supervisor
FTD FTD FTD FTD
Cluster
FTD FTD
inside
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Inter-Site Clustering with ASA or FTD
• North-South insertion with LISP inspection and owner reassignment
Site A Site B
Inter-Site
Cluster
OTV
Inter-Site
Cluster
OTV
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Transport Layer Security
• Secure Sockets Layer (SSL) is broken, obsolete and no longer in use
• Transport Layer Security (TLS) is the current generic protocol layer
ClientHello, Server Name Indication (SNI)
Client ServerHello, ServerCertificate, ServerHelloDone Server
PKI Phase ClientKeyExchange, ChangeCipherSpec, Finished
ChangeCipherSpec, Finished
ApplicationData
Bulk Data Phase
• Some detectors do not need full session decryption until TLS 1.3
• Cleartext SNI extension indicates where client may be going – spoofable
• ServerCertificate contains server identity – legitimate, if CA is trusted
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Man-in-the-Middle (MITM) TLS Inspection
• Two separate TLS sessions with client and server
Client Public Key FTD Public Key
FTD (Resign) or Server (Known) Public Key Server Public Key
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Single-Flow Performance Considerations
• A single stateful flow must be processed by one CPU core at a time
• Trying to share a complex data structure leads to race conditions
• Stateless parallel processing leads to out-of-order packets
• No magic trick to single-flow throughput
• Deploy more powerful CPU cores
• Reduce the amount of security inspection
• Pay performance price for real security
• … or deploy a router or a switch instead
Source: https://science.energy.gov/~/media/ascr/ascac/pdf/reports/2013/SC12_Harrod.pdf
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Managing Single-Flow Throughput
• Roughly estimated as overall throughput divided by Snort cores on slide 49
• 53Gbps of 1024-byte AVC+IPS on SM-44 / 48 Snort cores = ~1.1Gbps
• Similar on most high-end ASA, FirePOWER, and Firepower platforms
• Reducing impact on all flows from few Superflows is more important
• Checking if an NGFW automatically reduces inspection is easy
• Transfer multiple benign and malicious files over a single SMB session
• Use HTTP Pipelining to service multiple requests over one TCP connection
• “What does your security policy tell you to do?”
• NGFW performance capacity must not dictate your security policy
• Flow Offload vs Intelligent Application Bypass (IAB)
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Flow Offload on Firepower 4100 and 9300
• Trusted flow processing with limited security visibility in Smart NIC
• Up to 39.7Gbps of single-flow UDP with 1500-byte packets
• Use for long-lived connections only
• Supports up to 4M offloaded stateful connections in FXOS 2.3.1
• Static offload for unicast flows on ASA with IP/SGACL in MPF
policy-map OFFLOAD_POLICY
class TRUSTED_FLOWS
set connection advanced-options flow-offload
• Offload multicast in transparent mode with 2 bridge group ports in ASA 9.6(2)
• Prefilter offload policy for IP/TCP/UDP Fastpath rules in FTD 6.1
• Dynamic Flow Offload for Trusted and Whitelisted flows in FTD 6.3
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Flow Offload Operation
Full Inspection
• Dynamically program Offload engine after flow establishment
• Ability to switch between Offload and full inspection on the fly
Security Module
x86 CPU Complex
Full FTD or ASA Engine
Incoming Established
Flow Classifier Rewrite Engine
traffic trusted flows
Smart NIC
Flow Offload
• Limited state tracking, NAT/PAT, TCP Seq Randomization
• 20-40Gbps per single TCP/UDP flow, 2.9us UDP latency, 4M tracked flows
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Deployment
Example: FTD
Container
Instances on
Firepower 4100
Firepower Chassis Manager (FCM)
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Logical Device Overview
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Interface Configuration
Dedicated management
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Adding a Supervisor VLAN Subinterface
Select Subinterface
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Creating Instance Resource Profile
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Adding Container Instance
Add new device.
Application type
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Configuring FTD Instance Size and Management
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Configuring FTD Device Settings
FMC management registration key must
match the device
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
FTD Instance Installation
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Adding FTD Instance to FMC
FTD application real management IP
Add new FTD device
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Reference
Application Use
Cases
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Reference
Services
Files Users
• Scalable IP and Trustsec policies in single or multiple contexts
• Same- and inter-site clustering with LISP integration
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Reference
VLAN Trunk
Switch
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Reference
RAVPN with ASA Load-Balancing ASA/FTD S2S VPN with Nexus ITD
RRI
RRI RRI RRI
Chassis 1 Chassis 2 Chassis 1 Chassis 2
Mas ter
.10 .20 .30 .10 .20 .30 .10 .20 .30 .40 .50 .60
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Reference
Campus
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Reference
Firepower 9300 PAT Pool .11-13 Firepower 9300 PAT Pool .14-16 Firepower 9300 PAT Pool .17-19
ISE NGFW
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Reference
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Reference
Campus
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Closing Remarks
Firepower Platform Summary
• Next-generation security platform architecture
• Security service chaining with Cisco and third-party applications
• Classic stateful firewall, VPN, NGFW, NGIPS, and DDoS protection
• Powerful multi-instance capability with resource reservation
• Intra- and inter-chassis clustering for high scalability
• Flow Offload for real time applications
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Questions?
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live water bottle.
• All surveys can be taken in the Cisco Live
Mobile App or by logging in to the Session
Catalog on ciscolive.cisco.com/us.
Cisco Live sessions will be available for viewing
on demand after the event at ciscolive.cisco.com.
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Continue your education
Demos in the
Walk-in labs
Cisco campus
#CLUS BRKSEC-3035 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Thank you
#CLUS
#CLUS