SlideShare a Scribd company logo
1 of 65
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2012 Cisco and/or its affiliates. All rights reserved.
Toronto,. CA
May 30th, 2013
Eric Kostlan
Cisco Technical Marketing
Cisco Next
Generation Firewall
Services
Objectives
At the conclusion of this presentation and demonstration, you will be able to:
• Describe the ASA NGFW and PRSM architecture
• Describe the feature of the ASA NGFW
Application Visibility and Control (AVC)
Web Security Essentials
• Utilize the policy framework
Policy objects, policies, policy sets
Device and object discovery
Module Map
• Architecture
• Policy framework
• Device import
• Eventing and reporting
• Demonstration
ASA 5585-X with CX hardware module
Two Hard Drives Raid 1
(Event Data)
10GE and GE ports
Two GE Management Ports
8 GB eUSB (System)
The ASA 5500-X series firewalls
• Models are 5512-X, 5515-X, 5525-X,
5545-X and 5555-X
• 1-4 Gbps throughput
• Integrated services implemented as a
software module
o Intrusion prevention system (IPS)
o Context aware next generation firewall
(CX)
• Feature parity with the ASA CX on the
5585-X
• Must add a SSD to the ASA 5500-X to
install the CX module
Cisco Prime Security Manager (PRSM)
• Built-in
Configuration
Eventing
Reporting
• Off-box
Configuration
Eventing
Reporting
Multi-device Manager for ASA CX
Role Based Access Control
Virtual Machine or UCS Appliance
PRSM Virtual Machine supports VMWare ESXi
PRSM  ASA CX communication
RESTful XML
[REST = Representational State Transfer]
ASA CX PRSM
Reliable Binary Logging
Cisco SIO
Application
Identification
Updates
HTTPS HTTPS
Packet flow diagram – ASA and CX
• ASA processes all ingress/egress packets
No packets are directly process by CX except for management
• CX provides Next Generation Firewall Services
Egress after CX Processing
CX Ingress
ASA Ingress
CPU
Complex
Fabric
Switch
Crypto or
Regex
Engine
CX Module
CPU
Complex
Fabric
Switch
Crypto Engine
ASA Module
PORTS
PORTS
ASA CX
Backplane
10GE
NICs
10GE
NICs
Functional distribution
IP Fragmentation
IP Option Inspection
TCP Intercept
TCP Normalization
ACL
NAT
VPN Termination
Routing
TCP Proxy
TLS Proxy
AVC
Multiple Policy Decision
Points
HTTP Inspection
URL Category/Reputation
CX
ASA
Botnet filtering
TLS Proxy
IP Fragmentation
IP Option Inspection
TCP Intercept
TCP Normalization
ACL
NAT
VPN Termination
Routing
TCP Proxy
TLS Proxy
AVC
Multiple Policy Decision
Points
HTTP Inspection
URL Category/Reputation
CX
ASA
Botnet filtering
TLS proxy acts as man-in-the-middle
• Two separate sessions, separate certificates and keys
• ASA CX acts as a CA, and issues a certificate for the web server
Corporate
network
Web server
1. Negotiate algorithms. 1. Negotiate algorithms.
2. Authenticate server
certificate.3. Generate proxied
server certificate.
4. Client Authenticates “server”
certificate.
5. Generate encryption
keys.
5. Generate encryption
keys.
6. Encrypted data channel
established.
6. Encrypted data channel
established.
ASA CX
Cert is generated
dynamically with destination
name but signed by ASA CX.
TLS Proxy – Extending NGFW services to TLS traffic
• Decrypts SSL and TLS traffic across any port
• Self-signed (default) certificate or customer certificate and key
Self-signed certificate can be downloaded and added to trusted root certificate store on client
• Decryption policies can determine which traffic to decrypt
CX cannot determine the hostname in the client request to choose a decryption policy because the traffic is
encrypted
FQDN and URL Category are determined using the server certificate
• If the decision is made to decrypt, CX acts like man-in-the-middle
A new certificate is created, signed by CX or by the customer CA
Information such as FQDN and validity dates are copied from the original cert
Name mismatches and expired certificate errors are ignored
Name mismatches and expired certificate errors must be handled by the client
Licensed feature – Application Visibility and Control
IP Fragmentation
IP Option Inspection
TCP Intercept
TCP Normalization
ACL
NAT
VPN Termination
Routing
TCP Proxy
TLS Proxy
AVC
Multiple Policy Decision
Points
HTTP Inspection
URL Category/Reputation
CX
ASA
Botnet filtering
Application Visibility and Control
• Supported Applications 1000+
• Supported Micro-Applications 150,000+
• Powered by the Cisco Security Intelligence Operation (SIO)
Utilizes Application Signatures
By default, PRSM and CX check for updates every 5 minutes
Broad AVC vs. Web AVC
• Broad AVC
Broad protocol support
Resides in data plane
Less granular control
Supports:
Application types – for example email
Applications – for example
Simple Mail Transfer Protocol
• Web AVC
HTTP and decrypted HTTPS only
More granular control
Supports:
Application types – for example, Instant Messaging
Applications – for example, Yahoo Messenger
Application behavior – for example, File Transfer
None HTTP/HTTPS
packet flow
HTTP packet flow
HTTPS packet flow
Licensed feature – Web Security Essentials
IP Fragmentation
IP Option Inspection
TCP Intercept
TCP Normalization
ACL
NAT
VPN Termination
Routing
TCP Proxy
TLS Proxy
AVC
Multiple Policy Decision
Points
HTTP Inspection
URL Category/Reputation
CX
ASA
Botnet filtering
-10 +10-5 +50
Default web reputation profile
Dedicated or hijacked sites
persistently distributing
key loggers, root kits and
other malware. Almost
guaranteed malicious.
Aggressive Ad syndication
and user tracking networks.
Sites suspected to be
malicious, but not confirmed
Sites with some history of
Responsible behavior
or 3rd party validation
Phishing sites, bots, drive
by installers. Extremely
likely to be malicious.
Well managed,
Responsible content
Syndication networks and
user generated content
Sites with long history of
Responsible behavior.
Have significant volume
and are widely accessed
Suspicious
(-10 through -6)
Not suspicious
(-5.9 through +10)
Web Security Essentials -- Reputation
Web Security Essentials – URL filtering
• Used to enforce acceptable use
• Predefined and custom URL categories
• 78 predefined URL categories
• 20,000,000+ URLs categorized
• 60+ languages
• Powered by the Cisco Security Intelligence Operation (SIO)
Utilizes Application Signatures
By default, PRSM and CX check for updates every 5 minutes
Active authentication
• Requires HTTP request to initiate authentication
1. ASA CX sees HTTP request from a client to a remote website
2. ASA CX redirects the client to the ASA inside interface (port 885 by default)
Redirect is accomplished by sending a proxy redirect to the client
(HTTP return code 307) spoofing the remote website
3. Sends client authentication request (HTTP return code 401)
4. After authentication, the ASA CX redirects the client back to the remote website
(HTTP return code 307)
• After authentication, ASA CX uses IP address to track user
Both HTTP and non-HTTP traffic will now be associated with the user
• Integrates with enterprise infrastructure
• Supported directories include
Microsoft Active Directory
OpenLDAP
IBM Tivoli Directory Server
Passive authentication
• Endpoint must be domain member
• Supported for all traffic and all clients
• Utilizes an agent
Agent gathers information from Active Directory server
Agent caches information
ASA CX/PRSM queries agent for user information
ASA CX/PRSM queries Active Directory server for group membership information
• Two agents available
Cisco Active Directory Agent (AD agent) – older agent
Windows application
Context Directory Agent (CDA) – newer agent
Stand alone, Linux based server – can be run as VM
Intuitive web based GUI , and Cisco IOS style CLI
Passive authentication protocols
Active Directory
AD Agent or CDA (RADIUS server)
ASA CX
Clients
WMIRADIUS
LDAP
Module Map
• Architecture
• Policy framework
• Device import
• Eventing and reporting
• Demonstration
Policy objects, policies and policy sets
Policies and policy sets
• Policies apply actions to subsets of network traffic
• Two main components
Policy match – a set of criteria used to match traffic to the policies
Action – the action to be taken if the policy is matched
• Three types of policies
Access
Identity
Decryption
• A policy set is an ordered collection of policies of a particular type
For any ASA CX at most one policy set of each type is in use
Policies are assigned using top-down policy matching – order matters!
At most one policy is matched for each policy set
If no defined policy match is achieved, implicit policy is enforced
• Policy sets implicit policies are as follows
Access policy sets end with implicit allow all
Decryption policy sets end with implicit do not decrypt
Identity policy sets end with implicit do not require authentication
Policy sets
• How users will be identified?Identity
• What TLS/SSL traffic should be
decrypted?Decryption
• What traffic will be Allowed or
Denied?Access
Policy objects
• Used to create policies
Policy objects classify traffic
Are used to decide which policy to match
• Predefined and user defined
• Used to create policies.
• May be nested
• Many types
URL objects
• Used to identify traffic based on
URL or URL category
• Can only be used as a destination
in a policy
• HTTP or HTTPS only
For HTTPS, URL object uses information
in the subject of the certificate
Do not specify the protocol. URL objects
will match both HTTP and HTTPS
• Contains
URLs
Enter a domain to match any URL in domain
Supports limited string matching:
URL categories
Other URL objects
• Contain include and exclude lists
Application objects
• Used to identify what application
the client is attempting to use
• Utilizes the Application Visibility
And Control (AVC) functionality
of the ASA CX
• Contains
Applications (recognized by the ASA CX)
Examples:
Facebook photos, webmail, yahoo IM
Application types
Examples:
Facebook, e-mail, IM
Other Application objects
UserAgent objects
• User-agent string
Part of the HTTP request header
Identifies the client OS and agent
Examples:
Safari running on an iPad
Windows update agent
• User agent object
Can only be used for HTTP traffic
Can only be used as a source
in a policy
Predefined user agent objectsare sufficient
for most uses
Contains
User agent string – An asterisk (*) can be used
to match zero or more characters,
Other user agent objects
Example of user-agent string
Secure Mobility objects
• Used to create policies specific
to AnyConnect VPN traffic
• Can only be used as a source
in a policy
• One exists by default:
All remote users
• Others can be created to match
specific device types
• Can contain
Device types
Other Secure Mobility objects
Complex objects
• Allow for more complicated
traffic matching
• Contains collections of entries, or rows
Elements of each entry are ANDed together
Entries are then ORed together
• Application-Service objects
Match combinations of applications
and services
• Destination object groups
Match combinations of URL objects
and Network objects
• Source object groups
Match combinations of:
Network objects
Identity objects
User Agent Objects
Secure Mobility Objects
Profiles
• File filtering profile
HTTP and decryptedHTTPS traffic only
Blocks the download of specific MIME types
Blocks the upload of specific MIME types
• Web reputation profile
HTTP and decrypted HTTPS traffic only
Web reputation scores are provided for websites
by the Cisco Security Intelligence Operations
Web reputation scores vary from -10 to 10
Default profile considers websites with reputation
score from -10 through -6
(the default profile cannot be edited or deleted)
Websites without reputation scores are not considered suspicious
The action that is taken for suspicious website depends on the policy type
For example, access policies can block websites of low reputation
Module Map
• Architecture
• Policy framework
• Device import
• Eventing and reporting
• Demonstration
Device discovery and import (multi-device mode only)
• First you must enter the IP address (or hostname) of the ASA, along with privileged
credentials
• The CX module will be discovered through the ASA. You must enter the admin
password to complete the import.
• When a device is imported, it is placed into a device group
• Device groups are assigned policy sets. Therefore, policies are consistent within a
device group
• When the device is imported, you must resolve any policy set naming conflict
Valid Policy Set Assignment
Invalid Policy Set Assignment
ASA object discovery (multi-device mode only)
• Network and service objects and groups are imported from ASA during device imported
• Added to PRSM policy database and are available for policy configuration
Modifications made to objects on PRSM are not pushed to ASA
Modifications made to objects on ASA are not pushed to PRSM
• Are automatically renamed if there are naming conflicts
_<PRSM name for the ASA > is appended to name of imported object.
Module Map
• Architecture
• Policy framework
• Device import
• Eventing and reporting
• Demonstration
The Event viewer
• Gives visiblity to events generated by the CX module
• Tabs
System events
All events
Authentication
ASA (only used if PRSM is a SYSLOG server for ASAs)
Encrypted Traffic View
Context Aware Security  Shows next generation functionality
Context Aware Events
Custom tabs
Two Modes
• Real time eventing – user defined refresh interval
• Historic eventing – user defined time range
Event viewer filters
• Used to reduce the number of events that are displayed
• Filters are a list of attribute-value pairs
Attribute value pairs with the same attribute are ORed together
The expressions for each attribute are then ANDed together
Example: Username=Fred Username=Gail Application=Twitter
means (Username=Fred OR Username=Gail) AND Application=Twitter
Most attributes support the operations = and !=. Some also support > and <
• Two ways to add to filter
Click on the cell in the event viewer adds that attribute-value pair to the filter
Select attribute (with operation <,=,>) from the Filter drop-down list and then select the value
If you want the operator to be inequality, you must manually change = to !=
• Filters may be saved and recalled
Saved filters are added to right-hand side of the Filter drop-down list
Event viewer filters
Event Details
Event Details
Policy correlation
Network Overview (top)
Network Overview (middle)
Network Overview (bottom)
Other tabs
Malicious Traffic
Drill Down (Slide 1 of sequence)
Drill Down (Slide 2 of sequence)
Drill Down to view more details
Drill down to launch event viewer
Drill down to launch event viewer
Sample exported PDF report
Module Map
• Architecture
• Policy framework
• Device import
• Eventing and reporting
• Demonstration
Complete Your Paper
“Session Evaluation”
Give us your feedback and you could win
1 of 2 fabulous prizes in a random draw.
Complete and return your paper
evaluation form to the room attendant
as you leave this session.
Winners will be announced today.
You must be present to win!
..visit them at BOOTH# 100
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 65
Thank you.

More Related Content

What's hot

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadMehtabRohela
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services Felipe Lamus
 
Web Security Deployment
Web Security DeploymentWeb Security Deployment
Web Security DeploymentCisco Canada
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewallIT Tech
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies sushmil123
 
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...MehtabRohela
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherLancope, Inc.
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceAlfredo Boiero Sanders
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Shamal Abeyrathne
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 

What's hot (20)

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
Web Security Deployment
Web Security DeploymentWeb Security Deployment
Web Security Deployment
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewall
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
 
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 

Viewers also liked

ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookRHC Technologies
 
Project Report - Raymond Chepkwony
Project Report - Raymond ChepkwonyProject Report - Raymond Chepkwony
Project Report - Raymond ChepkwonyRaymond Chepkwony
 
Finding Public Policy briefs
Finding Public Policy briefsFinding Public Policy briefs
Finding Public Policy briefsguest388eb8e
 
Tips for searching (and finding!): Library Elevenses
Tips for searching (and finding!): Library ElevensesTips for searching (and finding!): Library Elevenses
Tips for searching (and finding!): Library ElevensesAnne Madden
 
Searching for evidence
Searching for evidenceSearching for evidence
Searching for evidenceAnne Madden
 
Combined Boolean Slideshare
Combined Boolean SlideshareCombined Boolean Slideshare
Combined Boolean SlideshareCommvault
 
An Introduction to Data Journalism
An Introduction to Data JournalismAn Introduction to Data Journalism
An Introduction to Data JournalismTony Hirst
 
Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...
Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...
Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...Cisco Russia
 
Configuration cisco asa ips module
Configuration cisco asa ips moduleConfiguration cisco asa ips module
Configuration cisco asa ips moduleLirouter Li
 
Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...
Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...
Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...Ted Drake
 
NACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg Hawkes
NACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg HawkesNACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg Hawkes
NACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg HawkesGreg Hawkes
 
NAT with ASA & ASA Security Context
NAT with ASA & ASA Security ContextNAT with ASA & ASA Security Context
NAT with ASA & ASA Security ContextNetProtocol Xpert
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context TrainingTariq Bader
 
TAG Recruiting JAN2015 - google cse (steve rath)
TAG Recruiting JAN2015 - google cse (steve rath)TAG Recruiting JAN2015 - google cse (steve rath)
TAG Recruiting JAN2015 - google cse (steve rath)Steve Rath
 
Hothouse: CX Design in a Big Company
Hothouse: CX Design in a Big CompanyHothouse: CX Design in a Big Company
Hothouse: CX Design in a Big CompanyShardul Mehta
 

Viewers also liked (20)

ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBook
 
Research Tools
Research ToolsResearch Tools
Research Tools
 
Project Report - Raymond Chepkwony
Project Report - Raymond ChepkwonyProject Report - Raymond Chepkwony
Project Report - Raymond Chepkwony
 
Finding Public Policy briefs
Finding Public Policy briefsFinding Public Policy briefs
Finding Public Policy briefs
 
Tips for searching (and finding!): Library Elevenses
Tips for searching (and finding!): Library ElevensesTips for searching (and finding!): Library Elevenses
Tips for searching (and finding!): Library Elevenses
 
Searching for evidence
Searching for evidenceSearching for evidence
Searching for evidence
 
Combined Boolean Slideshare
Combined Boolean SlideshareCombined Boolean Slideshare
Combined Boolean Slideshare
 
Bus
BusBus
Bus
 
An Introduction to Data Journalism
An Introduction to Data JournalismAn Introduction to Data Journalism
An Introduction to Data Journalism
 
Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...
Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...
Cisco NGFW, такой современный и такой непохожий на других МСЭ следующего поко...
 
Sba web sec_dg
Sba web sec_dgSba web sec_dg
Sba web sec_dg
 
Ping
PingPing
Ping
 
Configuration cisco asa ips module
Configuration cisco asa ips moduleConfiguration cisco asa ips module
Configuration cisco asa ips module
 
Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...
Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...
Open Source Search Tools for www2010 conferencesourcesearchtoolswww20100426dA...
 
NACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg Hawkes
NACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg HawkesNACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg Hawkes
NACHR Conf Presentation Headhunting in Healthcare - Free Tools Greg Hawkes
 
NAT with ASA & ASA Security Context
NAT with ASA & ASA Security ContextNAT with ASA & ASA Security Context
NAT with ASA & ASA Security Context
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context Training
 
TAG Recruiting JAN2015 - google cse (steve rath)
TAG Recruiting JAN2015 - google cse (steve rath)TAG Recruiting JAN2015 - google cse (steve rath)
TAG Recruiting JAN2015 - google cse (steve rath)
 
Hothouse: CX Design in a Big Company
Hothouse: CX Design in a Big CompanyHothouse: CX Design in a Big Company
Hothouse: CX Design in a Big Company
 

Similar to Deploying Next Generation Firewalling with ASA - CX

11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id conceptsMostafa El Lathy
 
Protecting your data at rest with Apache Kafka by Confluent and Vormetric
Protecting your data at rest with Apache Kafka by Confluent and VormetricProtecting your data at rest with Apache Kafka by Confluent and Vormetric
Protecting your data at rest with Apache Kafka by Confluent and Vormetricconfluent
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitToni de la Fuente
 
Secure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAFSecure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAFAmazon Web Services
 
Secure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAFSecure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAFAmazon Web Services
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeDigiCert, Inc.
 
Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101Arnaud Le Hors
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?Akana
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice ArchitectureMatt McLarty
 
SRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery NetworkSRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery NetworkAmazon Web Services
 
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸Amazon Web Services
 
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxAkashMalkood1
 
[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...
[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...
[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...European Collaboration Summit
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...Cisco Canada
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
SSL certificates in the Oracle Database without surprises
SSL certificates in the Oracle Database without surprisesSSL certificates in the Oracle Database without surprises
SSL certificates in the Oracle Database without surprisesNelson Calero
 

Similar to Deploying Next Generation Firewalling with ASA - CX (20)

F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Protecting your data at rest with Apache Kafka by Confluent and Vormetric
Protecting your data at rest with Apache Kafka by Confluent and VormetricProtecting your data at rest with Apache Kafka by Confluent and Vormetric
Protecting your data at rest with Apache Kafka by Confluent and Vormetric
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Secure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAFSecure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAF
 
Secure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAFSecure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAF
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
SRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery NetworkSRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery Network
 
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
 
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptx
 
[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...
[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...
[Collinge] Office 365 Enterprise Network Connectivity Using Published Office ...
 
Vpn
VpnVpn
Vpn
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
SSL certificates in the Oracle Database without surprises
SSL certificates in the Oracle Database without surprisesSSL certificates in the Oracle Database without surprises
SSL certificates in the Oracle Database without surprises
 
Intorduction to Datapower
Intorduction to DatapowerIntorduction to Datapower
Intorduction to Datapower
 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Deploying Next Generation Firewalling with ASA - CX

  • 1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2012 Cisco and/or its affiliates. All rights reserved. Toronto,. CA May 30th, 2013 Eric Kostlan Cisco Technical Marketing Cisco Next Generation Firewall Services
  • 2. Objectives At the conclusion of this presentation and demonstration, you will be able to: • Describe the ASA NGFW and PRSM architecture • Describe the feature of the ASA NGFW Application Visibility and Control (AVC) Web Security Essentials • Utilize the policy framework Policy objects, policies, policy sets Device and object discovery
  • 3. Module Map • Architecture • Policy framework • Device import • Eventing and reporting • Demonstration
  • 4. ASA 5585-X with CX hardware module Two Hard Drives Raid 1 (Event Data) 10GE and GE ports Two GE Management Ports 8 GB eUSB (System)
  • 5. The ASA 5500-X series firewalls • Models are 5512-X, 5515-X, 5525-X, 5545-X and 5555-X • 1-4 Gbps throughput • Integrated services implemented as a software module o Intrusion prevention system (IPS) o Context aware next generation firewall (CX) • Feature parity with the ASA CX on the 5585-X • Must add a SSD to the ASA 5500-X to install the CX module
  • 6. Cisco Prime Security Manager (PRSM) • Built-in Configuration Eventing Reporting • Off-box Configuration Eventing Reporting Multi-device Manager for ASA CX Role Based Access Control Virtual Machine or UCS Appliance PRSM Virtual Machine supports VMWare ESXi
  • 7. PRSM  ASA CX communication RESTful XML [REST = Representational State Transfer] ASA CX PRSM Reliable Binary Logging Cisco SIO Application Identification Updates HTTPS HTTPS
  • 8. Packet flow diagram – ASA and CX • ASA processes all ingress/egress packets No packets are directly process by CX except for management • CX provides Next Generation Firewall Services Egress after CX Processing CX Ingress ASA Ingress CPU Complex Fabric Switch Crypto or Regex Engine CX Module CPU Complex Fabric Switch Crypto Engine ASA Module PORTS PORTS ASA CX Backplane 10GE NICs 10GE NICs
  • 9. Functional distribution IP Fragmentation IP Option Inspection TCP Intercept TCP Normalization ACL NAT VPN Termination Routing TCP Proxy TLS Proxy AVC Multiple Policy Decision Points HTTP Inspection URL Category/Reputation CX ASA Botnet filtering
  • 10. TLS Proxy IP Fragmentation IP Option Inspection TCP Intercept TCP Normalization ACL NAT VPN Termination Routing TCP Proxy TLS Proxy AVC Multiple Policy Decision Points HTTP Inspection URL Category/Reputation CX ASA Botnet filtering
  • 11. TLS proxy acts as man-in-the-middle • Two separate sessions, separate certificates and keys • ASA CX acts as a CA, and issues a certificate for the web server Corporate network Web server 1. Negotiate algorithms. 1. Negotiate algorithms. 2. Authenticate server certificate.3. Generate proxied server certificate. 4. Client Authenticates “server” certificate. 5. Generate encryption keys. 5. Generate encryption keys. 6. Encrypted data channel established. 6. Encrypted data channel established. ASA CX Cert is generated dynamically with destination name but signed by ASA CX.
  • 12. TLS Proxy – Extending NGFW services to TLS traffic • Decrypts SSL and TLS traffic across any port • Self-signed (default) certificate or customer certificate and key Self-signed certificate can be downloaded and added to trusted root certificate store on client • Decryption policies can determine which traffic to decrypt CX cannot determine the hostname in the client request to choose a decryption policy because the traffic is encrypted FQDN and URL Category are determined using the server certificate • If the decision is made to decrypt, CX acts like man-in-the-middle A new certificate is created, signed by CX or by the customer CA Information such as FQDN and validity dates are copied from the original cert Name mismatches and expired certificate errors are ignored Name mismatches and expired certificate errors must be handled by the client
  • 13. Licensed feature – Application Visibility and Control IP Fragmentation IP Option Inspection TCP Intercept TCP Normalization ACL NAT VPN Termination Routing TCP Proxy TLS Proxy AVC Multiple Policy Decision Points HTTP Inspection URL Category/Reputation CX ASA Botnet filtering
  • 14. Application Visibility and Control • Supported Applications 1000+ • Supported Micro-Applications 150,000+ • Powered by the Cisco Security Intelligence Operation (SIO) Utilizes Application Signatures By default, PRSM and CX check for updates every 5 minutes
  • 15. Broad AVC vs. Web AVC • Broad AVC Broad protocol support Resides in data plane Less granular control Supports: Application types – for example email Applications – for example Simple Mail Transfer Protocol • Web AVC HTTP and decrypted HTTPS only More granular control Supports: Application types – for example, Instant Messaging Applications – for example, Yahoo Messenger Application behavior – for example, File Transfer
  • 19. Licensed feature – Web Security Essentials IP Fragmentation IP Option Inspection TCP Intercept TCP Normalization ACL NAT VPN Termination Routing TCP Proxy TLS Proxy AVC Multiple Policy Decision Points HTTP Inspection URL Category/Reputation CX ASA Botnet filtering
  • 20. -10 +10-5 +50 Default web reputation profile Dedicated or hijacked sites persistently distributing key loggers, root kits and other malware. Almost guaranteed malicious. Aggressive Ad syndication and user tracking networks. Sites suspected to be malicious, but not confirmed Sites with some history of Responsible behavior or 3rd party validation Phishing sites, bots, drive by installers. Extremely likely to be malicious. Well managed, Responsible content Syndication networks and user generated content Sites with long history of Responsible behavior. Have significant volume and are widely accessed Suspicious (-10 through -6) Not suspicious (-5.9 through +10) Web Security Essentials -- Reputation
  • 21. Web Security Essentials – URL filtering • Used to enforce acceptable use • Predefined and custom URL categories • 78 predefined URL categories • 20,000,000+ URLs categorized • 60+ languages • Powered by the Cisco Security Intelligence Operation (SIO) Utilizes Application Signatures By default, PRSM and CX check for updates every 5 minutes
  • 22. Active authentication • Requires HTTP request to initiate authentication 1. ASA CX sees HTTP request from a client to a remote website 2. ASA CX redirects the client to the ASA inside interface (port 885 by default) Redirect is accomplished by sending a proxy redirect to the client (HTTP return code 307) spoofing the remote website 3. Sends client authentication request (HTTP return code 401) 4. After authentication, the ASA CX redirects the client back to the remote website (HTTP return code 307) • After authentication, ASA CX uses IP address to track user Both HTTP and non-HTTP traffic will now be associated with the user • Integrates with enterprise infrastructure • Supported directories include Microsoft Active Directory OpenLDAP IBM Tivoli Directory Server
  • 23. Passive authentication • Endpoint must be domain member • Supported for all traffic and all clients • Utilizes an agent Agent gathers information from Active Directory server Agent caches information ASA CX/PRSM queries agent for user information ASA CX/PRSM queries Active Directory server for group membership information • Two agents available Cisco Active Directory Agent (AD agent) – older agent Windows application Context Directory Agent (CDA) – newer agent Stand alone, Linux based server – can be run as VM Intuitive web based GUI , and Cisco IOS style CLI
  • 24. Passive authentication protocols Active Directory AD Agent or CDA (RADIUS server) ASA CX Clients WMIRADIUS LDAP
  • 25. Module Map • Architecture • Policy framework • Device import • Eventing and reporting • Demonstration
  • 26. Policy objects, policies and policy sets
  • 27. Policies and policy sets • Policies apply actions to subsets of network traffic • Two main components Policy match – a set of criteria used to match traffic to the policies Action – the action to be taken if the policy is matched • Three types of policies Access Identity Decryption • A policy set is an ordered collection of policies of a particular type For any ASA CX at most one policy set of each type is in use Policies are assigned using top-down policy matching – order matters! At most one policy is matched for each policy set If no defined policy match is achieved, implicit policy is enforced • Policy sets implicit policies are as follows Access policy sets end with implicit allow all Decryption policy sets end with implicit do not decrypt Identity policy sets end with implicit do not require authentication
  • 28. Policy sets • How users will be identified?Identity • What TLS/SSL traffic should be decrypted?Decryption • What traffic will be Allowed or Denied?Access
  • 29. Policy objects • Used to create policies Policy objects classify traffic Are used to decide which policy to match • Predefined and user defined • Used to create policies. • May be nested • Many types
  • 30. URL objects • Used to identify traffic based on URL or URL category • Can only be used as a destination in a policy • HTTP or HTTPS only For HTTPS, URL object uses information in the subject of the certificate Do not specify the protocol. URL objects will match both HTTP and HTTPS • Contains URLs Enter a domain to match any URL in domain Supports limited string matching: URL categories Other URL objects • Contain include and exclude lists
  • 31. Application objects • Used to identify what application the client is attempting to use • Utilizes the Application Visibility And Control (AVC) functionality of the ASA CX • Contains Applications (recognized by the ASA CX) Examples: Facebook photos, webmail, yahoo IM Application types Examples: Facebook, e-mail, IM Other Application objects
  • 32. UserAgent objects • User-agent string Part of the HTTP request header Identifies the client OS and agent Examples: Safari running on an iPad Windows update agent • User agent object Can only be used for HTTP traffic Can only be used as a source in a policy Predefined user agent objectsare sufficient for most uses Contains User agent string – An asterisk (*) can be used to match zero or more characters, Other user agent objects
  • 34. Secure Mobility objects • Used to create policies specific to AnyConnect VPN traffic • Can only be used as a source in a policy • One exists by default: All remote users • Others can be created to match specific device types • Can contain Device types Other Secure Mobility objects
  • 35. Complex objects • Allow for more complicated traffic matching • Contains collections of entries, or rows Elements of each entry are ANDed together Entries are then ORed together • Application-Service objects Match combinations of applications and services • Destination object groups Match combinations of URL objects and Network objects • Source object groups Match combinations of: Network objects Identity objects User Agent Objects Secure Mobility Objects
  • 36. Profiles • File filtering profile HTTP and decryptedHTTPS traffic only Blocks the download of specific MIME types Blocks the upload of specific MIME types • Web reputation profile HTTP and decrypted HTTPS traffic only Web reputation scores are provided for websites by the Cisco Security Intelligence Operations Web reputation scores vary from -10 to 10 Default profile considers websites with reputation score from -10 through -6 (the default profile cannot be edited or deleted) Websites without reputation scores are not considered suspicious The action that is taken for suspicious website depends on the policy type For example, access policies can block websites of low reputation
  • 37. Module Map • Architecture • Policy framework • Device import • Eventing and reporting • Demonstration
  • 38. Device discovery and import (multi-device mode only) • First you must enter the IP address (or hostname) of the ASA, along with privileged credentials • The CX module will be discovered through the ASA. You must enter the admin password to complete the import. • When a device is imported, it is placed into a device group • Device groups are assigned policy sets. Therefore, policies are consistent within a device group • When the device is imported, you must resolve any policy set naming conflict
  • 39. Valid Policy Set Assignment
  • 40. Invalid Policy Set Assignment
  • 41. ASA object discovery (multi-device mode only) • Network and service objects and groups are imported from ASA during device imported • Added to PRSM policy database and are available for policy configuration Modifications made to objects on PRSM are not pushed to ASA Modifications made to objects on ASA are not pushed to PRSM • Are automatically renamed if there are naming conflicts _<PRSM name for the ASA > is appended to name of imported object.
  • 42. Module Map • Architecture • Policy framework • Device import • Eventing and reporting • Demonstration
  • 43. The Event viewer • Gives visiblity to events generated by the CX module • Tabs System events All events Authentication ASA (only used if PRSM is a SYSLOG server for ASAs) Encrypted Traffic View Context Aware Security  Shows next generation functionality
  • 46. Two Modes • Real time eventing – user defined refresh interval • Historic eventing – user defined time range
  • 47. Event viewer filters • Used to reduce the number of events that are displayed • Filters are a list of attribute-value pairs Attribute value pairs with the same attribute are ORed together The expressions for each attribute are then ANDed together Example: Username=Fred Username=Gail Application=Twitter means (Username=Fred OR Username=Gail) AND Application=Twitter Most attributes support the operations = and !=. Some also support > and < • Two ways to add to filter Click on the cell in the event viewer adds that attribute-value pair to the filter Select attribute (with operation <,=,>) from the Filter drop-down list and then select the value If you want the operator to be inequality, you must manually change = to != • Filters may be saved and recalled Saved filters are added to right-hand side of the Filter drop-down list
  • 57. Drill Down (Slide 1 of sequence)
  • 58. Drill Down (Slide 2 of sequence)
  • 59. Drill Down to view more details
  • 60. Drill down to launch event viewer
  • 61. Drill down to launch event viewer
  • 63. Module Map • Architecture • Policy framework • Device import • Eventing and reporting • Demonstration
  • 64. Complete Your Paper “Session Evaluation” Give us your feedback and you could win 1 of 2 fabulous prizes in a random draw. Complete and return your paper evaluation form to the room attendant as you leave this session. Winners will be announced today. You must be present to win! ..visit them at BOOTH# 100
  • 65. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 65 Thank you.