Overview de Cisco Security Portoflio
Overview de Cisco Security Portoflio
Overview de Cisco Security Portoflio
Redouane MEDDANE
Consultant en Collaboration et Security
Cisco Products Naming
ISE CASB
Stealthwatch
Attack Continuum
Umbrella
Umbrella
WSA SNA
ISE
ESA AMP
NGFW
NGIPS
• Stateful
• L3/4 Filtering Identity Awarness?
jdoe
• L7 Filtering
jdoe
Wired VPN
ASA Firewall
jdoe
Wireless
Application Awarness?
File Sharing News
FB
Youtube Webmail File Sharing = Malware?
Next-Generation Firewall
ASA-X with
Legacy FirePOWER Firepower Threat
FirePOWER Services Cisco Secure Firewall
Company Sourcefire Defense
Module
Cisco Secure Firewall Features
FTD
Inside Outside
Routed Mode
10.1.1.2 10.1.1.1 10.2.2.1 10.2.2.2
FTD
Inside Outside
Transparent Mode
10.1.1.2 10.1.1.1
Packet Flow
Deep Packet
Inspection
IPS Policy
Topology
12
Cisco Web Security Appliance
Cisco Web Security Appliance Features
Features www.google.com
Proxy (HTTP/HTTPS/FTP)
Caching
URL Filtering (par category)
Application Visibility Control
Reputation WBRS (Web Based Reputation Score)
Block [-10 à -9], Scan [-8.9 à 5.9], allow [6 à 10].
Dynamic Content Analysis
User Authentication
Bandwidth Limits Proxy (WSA)
Time Quotas
File Detection
- AMP, local AV (McFee, Sophos)
SSL Decryption
L4TM L4 Traffic Monitor
jdoe
Explicit Forward Mode
www.google.com
jdoe
Transparent Mode
www.google.com
Web Traffic redirected to WSA
-Redirection by Network Devices
-Redirection with WCCP protocol
Considerations
-DNS Resolution by Client
WSA ASA
-Destination IP = google.com
jdoe
Packet Flow
IP of cool.com?
Dilemma IP of bad.com?
IP of CnC SRV?
1. How to redirect to an Exploit kit server
Find CnC Server
2. How to reach out to CnC server?
Encrypted Key Ransomware
3. What to do with infected host? Legitimate Request
Malicious Website
Malware
Cisco Umbrella Components
100.1.1.1 100.1.1.1
www.games.com www.games.com
DNS Query DNS Query
www.games.com www.games.com
Intelligent Proxy vs Secure Web Gateway
Web Policy
DNS Policy
• URL Category
• DNS Request Filtering • AVC
• Intelligent Proxy • File Control
• AMP But what’s the • AMP / Threat grid
• SSLSSL Decryption
Decryption • HTTPS Inspection
HTTPS Decryption
difference?
DNS Server
collab.com MX mail.collab.com
MX of collab.com?
mail.collab.com A 200.1.1.1
200.1.1.1
200.1.1.1
jdoe@voip.com jsmith@collab.com
DNS Server
collab.com MX mail.collab.com
MX of collab.com? mail.collab.com A 100.1.1.1
100.1.1.1
100.1.1.1 200.1.1.1
jdoe@voip.com jsmith@collab.com
Cisco ESA
Mail Server Mail Server
voip.com collab.com
Cisco Email Security Appliance Deployment
Mail Server
Mail Server
cisco.com
10.1.1.10
Outside Inside
Mail Server
learning.com
15.1.2.13 DMZ
Listeners
Data1: 172.16.1.1 demo.com
10.1.1.11
Cisco ESA
Cisco Email Security Filters and Actions
Actions
ANTI-SPAM
Deliver Message
ANTI-VIRUS
Quarantine Message
Reputation Messages AMP
Filters Filters Bounce Message
GRAYMAIL
Drop Message
CONTENT
FILTERS
Content Filter contient des
OUTBREAK
actions supplémentaires
FILTERS
Mail Flow
Sender is checked based on the IP
Address Internal SMTP Server
Outgoing Mail Policy
Relayed Mail Flow Policy
Outgoing Mail Condition Sender or
From jdoe to jwhite Recipient
Relay From Connection
10.1.1.10 Behavior: Relay Inspection Engine
Sender is checked
Listener Based on the SBRS
HAT « Sender Based Reputation Score »
Incoming Mail Policy
Mail Flow Policy
Condition Sender or
Unknown Recipient
Incoming Mail List Connection
from jwhite to jdoe Behavior: Accept Inspection Engine
10.1.1.10
RAT
Recipient TO: cisco.com
jwhite Listener cisco.com jdoe Action: Accept
Cisco Secure Network Analytics
Why Network Visibility and analytics is important?
Firewall is there to protect your inside network from threats in internet. But
misconfiguration and mistake is possible, how to detect it?
If a policy rules on firewall or WSA are changed which causes some rules placed
on the top. How to detect this?
If an authorized server is used with stolen credentials and the attacker perfoms
scanning and reconnaissance attack. How to detect this?
If you are using DNS Layer security with Umbrella as the trusted DNS server, and users are using
rogue DNS servers with risk of traffic redirection to malicious websites. How to detect this
violation?
You want to build policy segmentation on firewalls and other security products but you dont want
to disrupt critical business activities. How to to use policies without enforcing them?
You want to detect malware in encrypted traffic without decryption while maintaining Data
Integrity. How to do this?
Why Network Visibility and analytics is important?
Telemetry
Network Device
Telemetry with NetFlow
Stealthwatch
Telemetry
Network Device
Stealthwatch Enterprise architecture
Management Console
Comprehensive
visibility and
security analytics ISE Threat Intelligence Cognitive Intelligence
License
Flow Collector
Other Traffic Analysis Stealthwatch
Software Cloud
Proxy Data
NetFlow enabled routers, switches, Endpoint License Non-NetFlow enabled equipment
firewalls
Cisco Secure Network Analytics Process
Classification
Behavioral Analytics
Modeling Alarms
Categorization
Cisco SNA Key Features
PX Grid Mitigation
Cisco® Stealthwatch
Identity Services Engine Management Console
Cisco Identity Services Engine
Context and Visibility with Cisco ISE
Without ISE Poor Context With ISE Rich context
IP Address Jdoe-PC
Unknown Windows
Unknown Wireless
Context and Visibility with Cisco ISE
Contexts
Device Admin
Visibility Compliance
Context
Threat Control
Exchange
Different Access Control
Internal
Network
NAD
Network Access
INTERNET
User User
VPN Access
Device Admin
Admin
Cisco ISE
Cisco ISE Personas
pXGrid Node
Cisco ISE Deployment
PAN MnT PAN MnT PAN MnT PAN MnT PAN PAN
PSN PXG
PSN PSN PSN PSN PXG
PSN PXG
PSN
Max 50 PSNs
Cisco ISE Deployment
Cisco ISE AAA service
Cisco ISE
Cisco WSA