Uploaded by asdf0101

LTRSEC-3001

LTRSEC-3001
Deep Dive Lab on Cisco
Firepower NGFW and ASA
Integration in ACI
Goran Saradzic – Security TME Manager
Minako Higuchi – ACI TME
Lab Guide can be downloaded at http://cs.co/acisec-lab-guide
Cisco Spark
Questions?
Use Cisco Spark to communicate
with the speaker after the session
How
1.
Find this session in the Cisco Live Mobile App
2.
Click “Join the Discussion”
3.
Install Spark or go directly to the space
4.
Enter messages/questions in the space
cs.co/ciscolivebot#LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Programmatic Approach with Security
Stand up defenses at the same time as applications
APIC Security Device Packages.
 Cisco Security Device Packages
Automate security policy updates with tighter integration
between security appliances and APIC.
 Dynamic EPG updates to Rules/ACLs
Embrace a dynamic workload quarantine with
programmable policy enforcement.
 Cisco FMC Remediation Package for APIC
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
4
Agenda
•
Introduction
•
Work through Lab 1 together
•
SECURITY
Run Labs 2-7 on your own
ASAv
NGIPSv
FTDv
Cisco Firepower NGFW and ASA Integration in ACI
Lab Exercises:
1. Connect and run scripts to build-out your Tenant with security services
2. Change FTDv service graph to unmanaged mode on app-to-db contract
3. Change FTDv to EPG-attached NGFW Service with no Contract
4. Apply malware protection to FTDv service graph on app-to-db contract
5. Run Rapid Threat Containment with APIC Firepower remediation package
6. Enable Dynamic update to EPG feature on out-to-web contract
7. Study the mechanics and benefits of the ASA PBR service graph
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
6
Physical Gear – Two Fabrics
Fabric 1: pod1 to pod20
40G
Nexus9336PQ - Spine
APIC: 10.10.35.10
40G
vCenter: 10.10.35.120
vCenter
10G
Fabric 2: pod21 to pod40
10G
Nexus9396PX - Leaf
Nexus9396PX - Leaf
4x1G
APIC: 10.10.35.11
vCenter: 10.10.35.125
4x1G
4x ASA5525 ASA+SFR
4x1G
4x1G
2x FirePOWER7010
10G
10G
2x UCS C220 M4L
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
7
Automation and
Orchestration
Orchestrate Cisco ASA and FTD in ACI Fabric
React to detected threats
in an automated fashion
FMC Remediation
Module for ACI
ASAv
FPR9300
FPR4100/2100
Run ASA app
ASA5585-X (EoS)
ASA5500-X
Divert to SFR
ASAv50
ASAv30
ASAv10
NGFWv
FPR9300, FPR4100,
FPR2100
Run FTD app
ASA Device Package
Virtual FTD
Firepower
Management
Console
(FMC)
FTD Device Package
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
8
Cisco ASA and FTD Device Packages for ACI
Cisco NGFW (FTD image)
ASA with FirePOWER Services
ASA Embedded FirePOWER
Services - Threat Polices
Security team configures via FMC
Config added manually
via FMC, outside of
APIC control/visibility
Access & Threat Policies
URL filter, NGIPS, AMP, etc.
Security team configures via FMC
Adding Security Zone to predefined rules under Access &
Threat Policies
Interfaces, IP Addresses,
VLANs, Inline IPS pairs,
Security Zones
ACLs, Inspections, HA,
Special Features
Interfaces, VLANs, IPs, Static
or Dynamic Routes
APIC Added/Validated
Config
APIC Configures on ASA
via ASA Device Package
APIC configures via FMC
Via FTD Device Package
Nexus9k Leafs/Spines - Shadow EPG VLANs, L3outs
APIC Configures Tenant Networking and Service Graph Parameters in the ACI Fabric
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
9
Posted on Cisco.com
FTD Device Package for ACI
Hybrid – Device Manager
Threat Defense Policies
APIC configures in FMC:
•
•
•
•
Interfaces and VLANs
Routed, Transparent FW, NGIPS
Create Security Zone
Create/Update Policy & Rule
Access Control, URL filtering,
Geolocation features, etc.
Security team configures via FMC
Security Team update FMC:
•
•
•
Network Access Policy
NGIPS, File, Geo-location
Other items beyond APIC cfg
Interfaces, VLANs, BVIs,
Inline Pairs (Cross-connects)
APIC configures via FMC on NGFW(v)
Via FTD Device Package
Device Manager
SECURITY
Firepower NGFW 6.2 Code
Device Manager
Nexus9k Leafs/Spines - Shadow EPG VLANs, L3outs
APIC Configures Service Graph in the ACI Fabric
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
10
Reference
Cisco Security Devices in ACI Fabric
Cisco L4-7 Device
Supported Platforms
FTD on physical
appliance
FPR9300, FPR4100,
FPR2100, ASA5500-X
FTDv virtual
Vmware, KVM
ASA physical appliance
ASAv virtual
FirePOWER physical
appliance
FPR9300, FPR4100,
ASA5585-X,
ASA5500-X
ASAv5, v10, v30
VMware, Hyper-V
FP71x0, FP71x5,
FP70x0, FP8100,
FP8300
Device Package
Device Version
L4-7 Insertion
Mode
FTD_FI DP 1.0.2
FMC/FTD 6.2.2
APIC 2.2.2e
Go-To
(Routed, no L3out),
Go-Through
(L2FW, inline IPS)
DP 1.2.8
8.4+
9.6+ (ASA app)
DP 1.2.7
9.4+(SMART)
VMware
FTD DP 1.0.2 released!!!
HA (L3FW, L2FW, IPS) or
Fail-to-Wire (IPS only)
FTD DP 1.0.2 released
Go-To (Routed,
L3out supported)
ASA Active/Standby Failover,
ASA Clustering (Active/Active)
Go-Through (L2FW)
ASAv Active/Standby Failover
KVM SR-IOV use as Phys.Dom
Go-To (Routed)
Unmanaged
DP in the plans
Firepower NGIPSv
HA Mode
Go-Through
(inline IPS)
Go-Through
(inline IPS)
LTRSEC-3001
PBR works with Routed
Fail-to-Wire for IPS
N/A
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
11
Reference
Cisco Security Device Insertion into ACI
APIC Unmanaged Service Graph
APIC Managed Service Graph
ASA 1.2.8 Device Package
GoTo (L3FW), GoThrough (L2FW)
ACL, DPI, Netflow, Syslogs, TrustSec
L3out Dynamic Routing (BGP/OSPF)
NAT4/6, Dynamic Update EPG ACL
Global Service-Policy
Active / Standby Failover
Divert to embedded Firepower
Firepower NGFW (FTD) 1.0.2
Device Manager Package
Run Any ASA or Fire(power)
Platform, Code, and Features
GoTo (L3FW),
GoThrough (L2FW and Inline NGIPS)
APIC orchestrates Data Plane
Interfaces, creates Security Zones, and
attaches to pre-defined FMC Policy
FMC controls policy on FTD app,
including AMP, URL filter, Sandbox, etc.
APIC orchestrates the service graph on
Nexus leaf switches
ASA app
FTD app
ASAv
NGFWv
Security devices ASA, FirePOWER, or
Firepower NGFW (FTD) are managed
using CLI, REST-API, or purpose-built
management tools (ASDM, CSM,
FMC), and we now match settings on
unmanaged service graph (plug into
configured ports, and match interface
static/dynamic VLANs)
Partial orchestration: APIC controls
networking and policy on fabric leaf
switches but not L4-L7 devices
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
12
Cisco Security Device Integration in LTRSEC-3001
APIC Unmanaged Service Graph
APIC Managed Service Graph
ASA 1.2 Device Package
FTD 1.0.2 Device Manager
Package
Run Any ASA, FTD, or Fire(power)
Platform, Code, and Features
Exercise 1 – ASA5525-X
2x Go-To Service Graphs:
PBR Failover & L3out Cluster
Exercise 1 – FTD 6.2.2
Go-To Service Graph
Access Control Policy on FMC
Exercise 2 – FTD 6.2.2
Unmanaged Service Graph
Exercise 6 – ASA5525-X
Dynamic update on Web/App
Exercise 7 – PBR
Study PBR Contracts/Graph
Exercise 4,5 – FMC
Add Malware block policy,
Then add APIC remediation
instance & quarantine
APIC EPG-attached Services
Run Any ASA, FTD, or Fire(power)
Platform, Code, and Features
Exercise 3 – FTD 6.2.2
and EPG attached NGFW
Lab Guide can be downloaded at http://cs.co/acisec-lab-guide
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
13
Access Your Pod with RDP Session
Prep
POD Access and Instructions
Open RDP Session
Proctor provides
RDP Access and
Credentials
Open you instructions PDF
http://cs.co/acisec-lab-guide
Remember you POD Number
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
15
Exercises in Detailed Lab Diagrams
Exercise 1
Application Profile Before and After Orchestration
rebuild-mypod.bash
+ later exercises
contracts:
out-to-web (ASA)
web-to-app (ASA)
app-to-db (FTD)
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
17
APIC/vCenter Login: (pod# / cisco)
pod1 to pod20: APIC: 10.10.35.10, vCenter: 10.10.35.120
CL18 Barcelona
pod21 to pod40: APIC: 10.10.35.11, vCenter: 10.10.35.125
ASA and Firepower NGFW in ACI
ASA5525 Dynamic EPG
PBR GoTo L3FW
RoutedL3FW Context
One-Arm Mode
ASA5525 Cluster
Routed L3FW Context
Dynamic Routing to vPC
GoTo Non-PBR
External VRF
vrf(pod#)net
Click to Jumpbox icon
to see RDP menu.
Login info shown under
RDP icon in Topology
tab of labops portal
L3out2
10.60.0.10
ASAv5
outside
10.70.0.1
Outside host
10.70.0.101
Outside Network
Internal VRF – pod(pod#)net
ASA Cluster
10.50.0.10
L3out3
10.50.0.1
FTDv
ASA Failover
10.40.0.10
10.1.0.1
10.3.0.1
L3out1
10.2.0.1
FMC https://10.0.0.30
Login: (aciadmin / cisco)
BD3
pbr-bd
10.3.0.2
10.40.0.1
10.60.0.1
out-to-web contract
Source: 10.70.0.101
Destination: 10.1.0.101
NGFWv (FTDv)
Routed Mode
GoTo Non-PBR
SVI/Subnet 10.1.0.2/24
Web host
IP 10.1.0.101/16
web-to-app
Src: 10.1.0.101
Dst: 10.1.p#.102
Web EPG
app-to-db
Src: 10.1.0.102
IP 10.1.pod#.102/16 Dst: 10.2.#.103
App host
App EPG
BD1 (web)
LTRSEC-3001
DB host
IP 10.2.0.103
DB EPG
BD2 (db)
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
18
Let’s Do Exercise 1 Together…
•
Open Chrome and log into your APIC (pod# / cisco)
•
•
Click Tenants and find you pod# Tenant
Open another tab in Chrome and log into your FMC
•
https://10.0.0.30 (aciadmin /cisco)
• Go to System -> Licenses -> Smart Licenses
• Click on Evaluation (enable 90day eval)
•
Open Superputty via menu or desktop shortcut
•
Fabric 1: pod1 to pod20
APIC: 10.10.35.10
vCenter: 10.10.35.120
Fabric 2: pod21 to pod40
APIC: 10.10.35.11
vCenter: 10.10.35.125
Go to bottom-left api-client tab and run ./ftd-reg.pl
• This will register two FTDv instances on Vmware with your FMCv
• Now we wait for FTDv to show up in FMC
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
19
Choose to use FTDv in HA or Standalone
•
Standalone FTDv
•
•
Takes about 1min to deploy configuration from FMC
FTDv HA pair
•
Takes about 3min to deploy configuration from FMC
• Building HA pair will take about 5min
•
FTDv HA Build Details
•
Go to Step 13 of Exercise 1 for details or follow me along
• Gi0/0 is configured for HA link and lan
• Use Primary IP 10.10.1.1 and Secondary IP 10.10.1.2
• Now we wait for FTDv to show up in FMC
LTRSEC-3001
Fabric 1: pod1 to pod20
APIC: 10.10.35.10
vCenter: 10.10.35.120
Fabric 2: pod21 to pod40
APIC: 10.10.35.11
vCenter: 10.10.35.125
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
20
Let’s Do Exercise 1 Together… (continuted)
•
In APIC Tenant assigned to you, open L4-L7 services
•
Expand folder L4-L7 devices
• Expand folder Function Profiles
• Expand L4-L7 Service Graphs
•
In Superputty api-client run your python script
•
cd demo/
• ./rebuild-mypod.bash
• Now press Enter at each step to run each python script
• Watch your APIC folders reflect your script changes
LTRSEC-3001
Fabric 1: pod1 to pod20
APIC: 10.10.35.10
vCenter: 10.10.35.120
Fabric 2: pod21 to pod40
APIC: 10.10.35.11
vCenter: 10.10.35.125
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
21
Exercise 1
Firepower NGFWv HA in ACI
python
scripts
api-client
External VRF
Internal Tenant VRF
FTDv HA
pair
Step 1
Orchestrate FTDv
config to secure App
to DB communication
FMC
app-to-db
Contract
App host
App EPG
LTRSEC-3001
DB host
DB EPG
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
22
FTDv Managed Service Graph – vNIC Pairs
app
db
Vlan 100
Vlan 200
Vlan 304
Vlan 305
FTD Device Package in ACI
GoTo (Routed L3FW)
GoThrough (Transp. L2FW,
Inline NGIPS)
FMC manages FTDv Policy
APIC uses FMC APIs to
define interfaces, VLAN,
IPs, BVIs, Inline pairs, etc.
APIC tell vCenter to
connect graph vNICs
vNIC2
vNIC3
consumer
SG portgroup
provider
SG portgroup
vCenter
FMC Security Zones are defined
by APIC and inserted in ACP
rules which can be configured by
security admin to carry
appropriate traffic controls and
inspections (i.e. AMP) .
FTDv
FTDv on VMware
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
23
Exercise 1
ASA HA Context in ACI
python
scripts
Internal Tenant VRF
External VRF
Step 2
Orchestrate ASA
config to secure Web
to App communication
api-client
ASA Context
on HA pair
Web host
Web EPG
web-to-app
Contract
App host
App EPG
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
24
Managed
APIC 2.0
PBR Service Graph to a Single Interface L3FW ASA
ASA Context
10.3.0.1
Default or Static Route to SVI
Custom MAC 5585.4100.9300
Fabric directs traffic in and
out of the same interface,
using managed ASA. Must
enable this ASA feature:
same-security intra-interface
We can script a custom MAC
on ASA(v) and set that MAC
on the PBR redirect.
N9k SVIs
BD_pbr
10.3.0.2
EPG Web
PBR Service Graph
redirects traffic between
two EPGs within the same
Bridge Domain (subnet).
Select type of traffic to
redirect, verses what
protocols not to redirect.
One-arm
Graph
http
EPG App
BD1
ssh (file copy)
Protected
Servers
DHCP: 10.1.0.100 – 10.1.0.140
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
25
Exercise 1
ASA Cluster Context in ACI
python
scripts
Internal Tenant VRF
External VRF
Step 3
Orchestrate ASA
config and OSPF
peers to secure
campus to Web
communication
api-client
ASA Context
on a Cluster
Outside host
Campus Network
out-to-web
Contract
Web host
Web EPG
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
26
Contract out-to-web and ASA GoTo Service Graph
ASA5525 Cluster
Routed L3FW Context
Dynamic Routing to vPC
GoTo Non-PBR
External VRF
vrf(pod#)net
Internal VRF – pod(pod#)net
ASA Cluster
10.50.0.10
L3out2
10.60.0.10
L3out3
ASAv5
outside
10.70.0.1
Outside host
10.70.0.101
Outside Network
10.40.0.10
L3out1
10.40.0.1
10.50.0.1
10.60.0.1
out-to-web contract
Source: 10.70.0.101
Destination: 10.1.0.101
SVI/Subnet 10.1.0.2/16
Web host
App host
IP 10.1.0.101/16
IP 10.1.pod#.102/16
Web EPG
App EPG
BD1 (web)
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
27
Exercise 2
Contract app-to-db: FTDv GoTo Unmanaged Service Graph
NGFWv (FTDv)
Routed Mode
GoTo Non-PBR
Internal VRF – pod(pod#)net
python
scripts
FTDv
10.1.0.1
10.2.0.1
SVI/Subnet 10.1.0.2/24
api-client
FMC
Service Manager
Hybrid Model
APIC will create service
graph port-groups and
assign them to:
Network Adapter 3 & 4
Web host
app-to-db
Src: 10.1.0.102
IP 10.1.pod#.102/16 Dst: 10.2.0.103
App host
IP 10.1.0.101/16
Web EPG
App EPG
BD1 (web)
DB host
IP 10.2.0.103
DB EPG
BD2 (db)
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
28
Exercise 3
No Contract FTDv Routed EPG-attached Integration
NGFWv (FTDv)
Routed Mode
EPG-attached vNICs
Internal VRF – pod(pod#)net
python
scripts
FTDv
10.1.0.1
10.2.0.1
api-client
FMC
Service Manager
SVI/Subnet 10.1.0.2/24
Network Adapter 5 & 6 are
already statically assigned
to App and DB EPGs
Web host
app-to-db
Src: 10.1.0.102
IP 10.1.pod#.102/16 Dst: 10.2.0.103
App host
IP 10.1.0.101/16
Web EPG
App EPG
BD1 (web)
DB host
IP 10.2.0.103
DB EPG
BD2 (db)
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
29
Exercise 5
FMC to APIC Rapid Threat Containment
FMC Remediation Module for APIC
Step 3: Attack event is configured to trigger
remediation module for APIC and quarantine
infected host using APIC NB API
Step 4: APIC Quarantines infected App1
workload into an isolated uSeg EPG
3
4
ACI Fabric
FMC
1
2
Infected App1
App EPG
DB EPG
App2
Step 1: Infected End Point launches an attack
that NGFW(v), FirePOWER Services in ASA,
or FirePOWER appliance blocks the attack
See demo on http://cs.co/rtc-with-apic
Step 2: Event is generated to FMC about an attack
blocked from infected host
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
30
Exercise 6
Attachment Notification on Service Graph Terminals
P2-ASA5525-1/pod37# show object-group
object-group network __$EPG$_pod37-wan-out-out-l3out3
network-object 10.70.0.0 255.255.255.0
object-group network __$EPG$_pod37-aprof-app
network-object host 10.1.37.102
object-group network __$EPG$_pod37-aprof-web
network-object host 10.1.0.101
10.70.0.1
Outside host
10.70.0.101
Outside Network
SVI/Subnet 10.1.0.2/24
out-to-web contract
Source: 10.70.0.101
Destination: 10.1.0.101
Web host
App host
IP 10.1.0.101/16
IP 10.1.37.102/16
Web EPG
App EPG
BD1 (web)
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
31
Exercise 7
Study Mechanics and Benefits of PBR Service Graph
ASA Context
10.3.0.1
Default or Static Route to SVI
Custom MAC 5585.4100.9300
N9k SVIs
BD_pbr
10.3.0.2
EPG Web
One-arm
Graph
http/ssh
EPG App
BD1
icmp
Protected
Servers
DHCP: 10.1.0.100 – 10.1.0.140
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
32
Cisco Spark
Questions?
Use Cisco Spark to communicate
with the speaker after the session
How
1.
Find this session in the Cisco Live Mobile App
2.
Click “Join the Discussion”
3.
Install Spark or go directly to the space
4.
Enter messages/questions in the space
cs.co/ciscolivebot#LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
•
Please complete your Online
Session Evaluations after each
session
•
Complete 4 Session Evaluations
& the Overall Conference
Evaluation (available from
Thursday) to receive your Cisco
Live T-shirt
•
All surveys can be completed via
the Cisco Live Mobile App or the
Communication Stations
Complete Your Online
Session Evaluation
Don’t forget: Cisco Live sessions will be available
for viewing on-demand after the event at
www.ciscolive.com/global/on-demand-library/.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Continue Your Education
•
Demos in the WoS – Visit Security Booths
•
Walk-in Self-Paced Labs
•
Lunch & Learn
•
Meet the Engineer 1:1 meetings
•
Related sessions
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
35
Thank you
Additional Resources
List of ACI White Papers - https://www.cisco.com/c/en/us/solutions/data-centervirtualization/application-centric-infrastructure/white-paper-listing.html
Service Graph design - https://www.cisco.com/c/en/us/solutions/collateral/data-centervirtualization/application-centric-infrastructure/white-paper-c11-734298.html
ASAv PBR Service Graph - https://www.cisco.com/c/en/us/solutions/collateral/enterprisenetworks/secure-data-center-solution/guide-c07-739765.html
PBR Service Graph Designs - https://www.cisco.com/c/en/us/solutions/data-centervirtualization/application-centric-infrastructure/white-paper-c11-739971.html
Cisco Advanced Security in ACI Playlist
https://www.youtube.com/playlist?list=PLvnemMVdgW1s77HuPk04VWwP47Y8EvlQl
GitHub python scripting for automation of ASA and FTD service graph with ACI
https://github.com/cisco-security
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
37
FTD 1.0.2 FI Device Package Posted
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
38
ASA PO & FI Device Package
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
39
FMC Remediation Module for ACI on Cisco.com
LTRSEC-3001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
40