SlideShare uma empresa Scribd logo
1 de 78
Baixar para ler offline
Cisco Confidential© 2015 Cisco and/or its affiliates. All rights reserved. 1
NGFW Update and
Deployment Scenarios
Michael Mercier
Consulting Systems Engineer – Security Solutions
May 19, 2016
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Housekeeping notes
Thank you for attending Cisco Connect Toronto 2016, here are a few housekeeping notes
to ensure we all enjoy the session today.
• Please ensure your cellphones / laptops are set on silent to ensure no one is disturbed
during the session
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Agenda
Firepower NGFW
Firepower Threat Defense
Software Overview
Firepower 4100
Next-GenerationSecurity Architecture
Firepower 9300
Next-GenerationSecurity Architecture
FTDv
Licensing
Performance
Deployment Modes / Use Cases
DeploymentConsiderations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Firepower Threat Defense (FTD)
• Unified codebase software image
Firepower 4100 Series and 9300 Appliances
• Brand for new hardware product offerings which run FTD or ASA
“Firepower Next-Generation Firewall (NGFW)”
• FTD + Hardware appliance
Firepower Management Center (FMC)
• Formerly FireSIGHT. Unified manager for NGFW, NGIPS, AMP, FirePOWER on ISR
ASA with FirePOWER Services
• Two managers, full firewall feature set
Relevant Terminology
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Detect earlier,
act faster
Gain more
insight
Reduce
complexity
Get more from
your network
Stop more
threats
Enable your business with a fully integrated, threat-
focused solution
Threat Focused Fully Integrated
Cisco Firepower™ NGFW
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Stop more threats across
the entire attack continuum
Remediate breaches and
prevent future attacks
Detect, block, and defend
against attacks
Discover threats and enforce
security policies
Cisco Firepower™ NGFW
BEFORE AFTERDURING
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
“You can’t protect what you can’t see”
Gain more insight
with increased visibility
Malware
Clientapplications
Operating systems
Mobile devices
VoIP phones
Routers and switches
Printers
Command
and control
servers
Network servers
Users
File transfers
Web applications
Application
protocols
Threats
TypicalIPS
TypicalNGFW
Cisco Firepower™ NGFW
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Cisco: 17.5 hoursIndustry TTD rate:* 100 days
Detect infections earlier and act faster
• Automated attack
correlation
• Indications of
compromise
• Local or cloud
sandboxing
• Malware infection
tracking
• Two-click containment
• Malware analysis
Source: Cisco® 2016 Annual Security Report
*Median time to detection (TTD)
JAN
MONDAY
1
JAN
FEB
MAR
APR
Cisco Confidential 9© 2015 Cisco and/or its affiliates. All rights reserved.
Firepower Management Center
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Cisco Firepower™ Management Center
Reduce complexity with simplified,
consistent management
• Network-to-endpoint visibility
• Manages firewall, applications, threats, and files
• Track, contain, and recover remediation tools
Unified
• Central, role-based management
• Multitenancy
• Policy inheritance
Scalable
• Impact assessment
• Rule recommendations
• Remediation APIs
Automated
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Shared intelligence
Shared contextual
awareness
Consistent policy
enforcement
Cisco Firepower™ Management Center
Get more from your network
through integrated defenses
Talos
Firepower 4100 Series Firepower 9300 Platform
Visibility
Radware
DDoS
Network
analysis Email Threats
Identity
and NAC DNS FirewallURL
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
FS750 FS2000 FS4000 Virtual
Maximum
devices
managed*
10 70 300
Virtual FireSIGHT®
Management Center
Up to 25 managed devices
ASA or FirePOWER appliancesEvent storage 100 GB 1.8 TB 3.2 TB
Maximum
network map
(hosts/users)
2000/2000
150,000/
150,000
600,000/
600,000
Virtual FireSIGHT®
Management for 2 or 10 ASA
devices only!
Not upgradeable
FS-VMW-2-SW-K9
FS-VMW-10-SW-K9
Events per
second (EPS)
2000 12,000 20,000
Max number of devices is dependent upon sensor type and event rate
Management
Firepower Management Center Appliances
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Cisco NGFW Platforms
*5585-Xmanagement available 2HCY16
All* Managed by Cisco Firepower Management Center
Cisco Firepower™ 4100
Series and 9300
Cisco FirePOWER™ Services
on ASA 5585-X
Cisco Firepower Threat
Defense on ASA 5500-X
New
Appliances
Cisco Confidential 14© 2015 Cisco and/or its affiliates. All rights reserved.
Firepower Threat Defense
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
New Converged Software Image:
Firepower Threat Defense
Contains all Firepower Services plus
select ASA capabilities
Single Manager:
Firepower Management Center*
Same subscriptions as FirePOWER
Services, enabled by Smart Licensing:
Threat (IPS + SI + DNS)
Malware (AMP + ThreatGrid)
URL Filtering
Converged Software – Firepower Threat Defense
* Also manages FirepowerAppliances, Firepower Services (not ASASoftware)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
• Everything from Firepower 6.0.1
• Phased introduction of features from ASA
• FTD 6.0.1
IPv4 and IPv6 Connection state tracking and TCP normalization
Access Control
NAT (Full support)
Unicast Routing (except EIGRP)
ALGs (only default configuration)
Intra chassis Clustering on Firepower 9300
Stateful Failover (HA)
What features are available?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
High-Level Feature Comparison:
ASA with FirePOWER Services, Firepower Threat Defense
Feature Firepower
Services for ASA
Firepower Threat
Defense
Notes for Firepower Threat
Defense
HA, NAT ✔ ✔
Routing ✔ ✔ Multicast in 6.1, No EIGRP
Unified ASA and Firepower rules/objects ✘ ✔
Local Management ✔ ✔ In 6.1, features differ
Multi-Context ✔ ✘
Inter-chassis Clustering ✔ ✘
VPN ✔ ✔ Site-to-Site VPN in 6.1
Hypervisor Support ✘ ✔ AWS, VMware; KVM in 6.1
Smart Licensing support ✘ ✔
Note: Not an exhaustive list of differences between these offerings.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Firepower Threat Defense – Phased Delivery
• Remote Access VPN
• Device Clustering
• SSLAcceleration
• Traffic QoS
• Time-based Policies
• Hyper-V / Azure
• MS Exchange
identity
• Pkt Trace/Capture
• Configuration CLI
• Site-to-Site VPN
• Rate-Limiting
• Multicast and EIGRP
• VDI User Identity
• AMP Private Cloud
• ISE Remediation
• X-Forwarded-For
• Web Safe Search
• Built-in Risk Reports
• KVM Virtual platform
• On-box Web UI
• FMC HA, Scale and
API
GeneralAvailability
V6.0.1 – Mar. 2016
• FP 9300/4100 platforms
• ASALow/Mid platforms
• All of FP Services 6.0
• ASA+FP Rules/Objects
• Transp/Routed Deploy
• Active/Passive HA
• NAT (Dynamic/Static)
• OSPF, BGP, RIP, Static
• ALGs (fixed config)
• Syn Cookie/Anti-Spoof
V6.1 - Q4FY16 1HFY17
High-Priority NGFW Feature Parity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
What Platforms run Firepower Threat Defense?
*5585-XASAmodule management being investigated for 2HCY16
All* Managed by Cisco Firepower Management Center
Cisco Firepower Threat
Defense on Firepower™ 4100
Series and 9300
Cisco FirePOWER Services
on ASA 5585-X
Cisco FirePOWER on
7000/8000 Series Appliances
Cisco Firepower Threat
Defense on ASA 5500-X
New
Appliances
Cisco Confidential 20© 2015 Cisco and/or its affiliates. All rights reserved.
Firepower Threat Defense
Software Overview
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
• New Next Generation Firewall offering
• Brings together the best features from
ASA and Firepower, all under one OS
• Zero-copy packet inspection
• Single management application
• Duplicate functionality removed
Advantages of Firepower Threat Defense
Firepower	Threat	
Defense
L2-L4
Inspections
(ASA	
Technology)
Advanced	
Inspections
(FirePOWER
Technology)
Firepower	
Management	Center
ASA
FirePOWER
Services
CSM/ASDM FireSIGHT
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
ASA with FirePOWER Services Packet flow
Ingress NIC
L2/L3 Decode
L4 Decode
Flow Lookup Route Lookup
NAT Lookup
Inspection
checks
Routing
NAT
Egress NIC
Flow Update
File/AMP
IPS
AVC
Kernel
Virtual TAP
FirePOWER Services
Event
Database
Virtual Container
2 OS, ASA & FP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Firepower Threat Defense Packet Flow
Ingress NIC
L2/L3 Decode
L4 Decode
Flow Lookup Route Lookup
NAT Lookup
Inspection
checks
Routing
NAT
Egress NIC
Flow Update
File/AMP
IPS
AVC
FirePOWER Services
Event
Database
PacketLibrary(PDTS)
Zero Copy Single OS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• Access policies broken down into 2 sets of rules
• Advanced ACLs - Evaluate L2 – L4 attributes and give a verdict
Permit
Deny
Trust
• NGFW ACLs – Evaluate L7 attributes
Allow
Block
TrustPath
Unified Access Control policies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Unified Objects Configuration
Objects in 5.4
Objects in 6.0
Cisco Confidential 26© 2015 Cisco and/or its affiliates. All rights reserved.
Firepower 4100
Next Generation Firewall
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Cisco Firepower 4100 Series
Introducing four new high-performance models
Performance and
Density Optimization
Unified Management
Multiservice
Security
• Integrated inspectionengines
for FW, NGIPS,Application
Visibility and Control (AVC),
URL, Cisco Advanced
Malware Protection (AMP)
• Radware DefensePro DDoS
• ASA and otherfuture
third party
• 10-Gbps and 40-Gbps
interfaces
• Up to 80-Gbpsthroughput
• 1-rack-unit(RU) form factor
• Low latency
• Single managementinterface
with FirepowerThreatDefense
• Unified policy with inheritance
• Choice of management
deploymentoptions
Cisco Confidential 28© 2015 Cisco and/or its affiliates. All rights reserved.
Hardware Overview
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Firepower 4100 Series Front and Rear View
SSD1 SSD2
1 3 5 7 NetMod 1 (Slot)
NetMod 2 (Slot)
2 4 6 8
PS1 PS2 FAN1 FAN2 FAN3 FAN4 FAN5 FAN6
Power
Console
Mgmt. SYS
ACT SSD Status
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Supervisor Module:
Console and Management Port
8 10G Fixed Ethernet Ports
2 x Network Modules
Security Engine:
Dual CPU, each connected with a Smart
NIC and Crypto accelerator card
Two SSD - 1 Default + 1 Optional (For AMP
service)
SSD Size
200GB for 4120
400GB for 4140
Backplane
80GB Backplane support
Firepower 4110/20/40/50 - Hardware Components
Internal 720G Switch Fabric
Security Engine
RAMSmart NIC + Crypto Accelerator
2x40Gpbs
2x100Gbps
Built-in
8x10GE
interfaces
NM
Slot 1
X86
CPU
NM
Slot 2
80G
8x 10G (or) 4x 40G Network Module
…… ……
Console Mgmt. Port
200G2x40Gbps
5x
40Gbps 200G
5x
40Gbps
SSD
SSD
Cisco Confidential 31© 2015 Cisco and/or its affiliates. All rights reserved.
Software Overview
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
§ FP 4100 Series of platform supported from
FXOS 1.1.4
§ FXOS provides interfacefor device
managementand provisioning of the
security application on security engine.
§ All images are digitally signed and
validated throughSecure Boot.
§ Security application imagesare in Cisco
Secure Package(CSP)format
§ Multiple version of same application can be
stored in Supervisor. It can deployed to
Security Engine on demand
§ Contains system (i.e. ASA, FTD) and other
images (i.e. ASDM, REST, and so on)
Firepower 4100 Software
Decorator application from third-party (KVM)
Primary application from
Cisco (Native)
DDoS
ASAor FTD
FXOS
Firepower Extensible Operating System (FXOS)
Supervisor
Security
Engine
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Security Service Architecture for Firepower 4100 Series
Platform
Supervisor
Ethernet 1/1-8 Ethernet 2/1-8
Standalone/Cluster
Security Module 1
Ethernet 3/1-4
Application
Image Storage
PortChannel1
Ethernet1/7
(Management)
Data
Logical
Device
Link
Decorator
External
Connector
Primary
Application
Decorator
Application
On-board 8x10GE
interfaces
8x10GE NM
Slot 1
4x40GE NM
Slot 2
ASA/FTD
Packet
Flow
Security Engine
Radware vDP
Cisco Confidential 34© 2015 Cisco and/or its affiliates. All rights reserved.
Firepower 9300 Next Generation
Firewall
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Cisco Firepower 9300
Platform
Benefits
• Integration of best-in-class security
• Dynamic service stitching
Features*
• Cisco®ASA container
• Cisco Firepower™ Threat Defense
containers:
• NGIPS, AMP, URL, AVC
• Third-party containers:
• Radware DDoS
• Other ecosystem partners
Benefits
• Standards and interoperability
• Flexible architecture
Features
• Template-driven security
• Secure containerization for
customer apps
• RESTful/JSON API
• Third-party orchestration and
management
Benefits
• Industry-leading performance:
• 600% higher performance
• 30% higher port density
Features
• Compact, 3RU form factor
• 10-Gbps/40-Gbps I/O; 100-Gbps
ready
• Terabit backplane
• Low latency, intelligent fast path
• Network Equipment-Building
System (NEBS) ready
* Contact Cisco for services availability
Modular Carrier Class
Multiservice
Security
High-speed, scalable security
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Cisco Firepower 9300 Overview
Supervisor
§ Application deployment and orchestration
§ Network attachment (10/40/100GE) and traffic distribution
§ Clustering base layer for Cisco® ASA, NGFW, and NGIPS
1
3
2
Security
Modules
§ Embedded packet and flow classifier and crypto hardware
§ Cisco (ASA, NGFW, and NGIPS) and third-party (DDoS, load-balancer) applications
§ Standalone or clustered within (up to 240 Gbps) and across (1 Tbps+) chassis
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Cisco Firepower 9300 Chassis Hardware
§ 19-inch 3RU rack (32 in. deep, 17.5 in. wide, and
135 lb fully loaded)
§ Four FRU fan modules with OIR
§ N+1 redundancy
§ Front-to-back airflow
§ Dual redundant power supplies with load sharing and OIR
§ 2500 and 1300W AC power supplies initially; 2500W DC to
follow
§ Single supply at 110V is not enough for full chassis; 220V is
required
§ Scalable backplane support up to 200 Gbps per security
module
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Supervisor Module
Overall chassis management and network interaction
§ Network interface allocation and security module connectivity (960-Gbps internal fabric)
§ Application image storage, deployment, provisioning, and service chaining
§ Clustering infrastructure for supported applications
§ Cisco® Smart Licensing and NTP for entire chassis
RJ-45 Console
1 GE Management (SFP)
Built-in 10 GE Data (SFP+) Optional Network Modules (NMs)
1 2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Supervisor Simplified Hardware Diagram
Internal Switch Fabric (up to 24x40GE)
Security Module 1 Security Module 2 Security Module 3
On-Board 8 x 10
GE Interfaces Network Module 1 Network Module 2
2 x 40 Gbps 2 x 40 Gbps 2 x 40 Gbps
2 x 40 Gbps 5 x 40 Gbps 5 x 40 Gbps
x86 CPU
RAM
System Bus Ethernet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Network Modules
§ Supervisor configures interfaces and directs traffic to
security modules
§ All interfaces are called “Ethernet” and 1
referenced (for example, Ethernet1/1)
§ Hardware OIR support; software support to follow
§ Mix and match up to two 10 and 40 GE half-width
modules
§ 8 x 10 GE SFP or SFP+ per module
§ 4 x 40 GE QSFP per module; each port can be
split
to 4 x 10 GE
§ 100 GE modules
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Security Modules
§ Three security module configurations
§ SM36: 72 x86 CPU cores for up to 80 Gbps of
firewalled throughput
§ SM24: 48 x86 CPU cores for up to 60 Gbps of
firewalled throughput
§ (Future) NEBS: SM24 NEBS certification
§ Dual 800GB SSD in RAID1 by default
§ Built-in hardware packet and flow classifier and
crypto accelerator
§ Hardware VPN acceleration is targeted for a
subsequent software release
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Security Module Simplified Diagram
System Bus
x86 CPU 1
24 or 36 Cores
Packet and Flow Classifier
and
Crypto Accelerator
Backplane Supervisor Connection
x86 CPU 2
24 or 36 Cores
2 x 100 Gbps
2 x 100 Gbps
RAM
Ethernet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Cisco Firepower 9300 Software
§ Supervisor and security modules use multiple
independent images
§ Infrastructure software bundle for supervisor
§ Security module firmware bundle
§ Security application images bundles for modules
§ All images are digitally signed and validated through
Secure Boot
§ Service application images are in Cisco® Secure
Package (CSP) format
§ Stored on supervisor and deployed to security module on
demand
§ Multiple versions of the same application may be stored
§ Contains system (for example, CiscoASA) and other
images (Cisco ASDM, REST, etc.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Security Services Architecture on Firepower 9300
Cisco® ASA Cluster
Security Module 1 Security Module 2 Security Module 3
Supervisor
On-Board 8 x 10
GE Interfaces
8 x 10 GE NM
Slot 1
Application Image
Storage
4 x 40 GE NM
Slot 2
Ethernet 1/7
(Management)
Ethernet 1/1-8 Ethernet 2/1-8 Ethernet 3/1-4
Logical Device
Logical Device
Unit
Link Decorator
Application
Connector
External
Connector
Packet Flow
Primary
Application
Decorator
Application
PortChannel1
Data
DDoS DDoS DDoS
ASA ASA ASA
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Management Overview
§ Chassis management is independent from applications
§ On-box chassis manager UI and CLI
§ Cisco® ASDM is the only management GUI for
Cisco ASA initially
§ Future off-box Cisco Firepower Device Manager for
both chassis and Cisco applications
§ SNMP and syslog support for chassis-level counters
and events on supervisor
§ REST API on supervisor for third-party service
management
§ SDN orchestration enablement for security services
on demand
Cisco Confidential 46© 2015 Cisco and/or its affiliates. All rights reserved.
FTDv
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
FTDv
FMC
Cisco FTDv for Vmware: Routed, Transparent, Inline Mode
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
FTDv for Vmware: Passive mode
FTDv
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
BD1
BD2BD1
BD2
• Routed Mode (Go-To)
• Transparent Mode (Go-Through)
FTDv Service Graph in the ACI Fabric
EPG		
App
EPG
DB
FTDv
Graph	B
10.0.0.0/24
Tenant		B
External	 Internal	
EPG	
Web
EPG	
App
Graph	A
10.0.0.0/24 10.0.0.1 20.0.0.1 20.0.0.0/24
Tenant		A
External	 Internal	
FTDv
Bridge Domains need
flooding turned on, to
allow ASA to see and
bridge packets between
two EPGsBVI	10.0.0.10
Use port-channels on ESXi hosts instead of NIC teaming. It can break Go-Through mode.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
• FTDv can connect to Amazon Virtual Private Cloud (VPC) network which closely resembles
a traditional network topology.
• The FTDv and FMCv run as guests in AWS private Xen Hypervisor* environment.
• Protect your AWS environment by controlling and monitoring traffic. All features, Stateful L3
mode and ERSPAN Passive modes supported.
• FTDv Transparent Mode and Active/Standby HA is NOT supported (Roadmap)
Cisco FMCv/FTDv in AWS
*Note: The FTDv and FMCv do not supportthe Xen Hypervisoroutsideof the AWS environment.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
AWS FMCv is optional as many organizations like to use their on premises FMC.
• Cisco Smart Licensing,AWS hourly comingsoon
• AWS Security Group Accesscontrolmustpermit SSH/HTTPs access to yourinstances
• Create and attach Network interfaces and add Route table entry for Internet access
• An Elastic IP (Static persistentPublic IP) is required for eitherFTDv or FMCv remote admin access
• * 2 managementinterfaces requiredfor AWS FTDv
Cisco FMCv/FTDv in AWS
Instance Type Interf. Subnets vCPUs RAM (GB)
FMCv m3.large 3 2 7.5
FMCv m3.xlarge 3 4 15
FMCv & FTDv* c3.xlarge 2 4 7.5
FMCv c3.2xlarge 8 4 15
Cisco Confidential 52© 2015 Cisco and/or its affiliates. All rights reserved.
Licensing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Firepower Threat Defense Smart Licensing
Structure
• Base License enables NGFW
• Networking, Firewall and Application Visibility &
Control
• Perpetual license - included with appliance
purchase
• Term-based licenses for advanced protection
• Threat, Malware and URL Filtering
• Smart License Enabled only
Base (NGFW)
Threat
(IPS/SI/DNS)
Malware
(AMP/TG)
URLFiltering
Blue = Term-based
Green = Perpetual
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Mapping Classic Licenses to new Smart Licenses
Functionality Traditional Licensing Smart Licensing
Base License (includes
AVC)
Protect + Control Base
IPS (SI, DNS) (EULA Enforced) Threat
AMP/Threat GRID Malware Malware
URL Filtering URL Filtering URL Filtering
Management FireSIGHT Built into Firepower Management
Center
Cisco Confidential 55© 2015 Cisco and/or its affiliates. All rights reserved.
Performance:
Firepower 4100 and 9300
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Performance Highlights
4110 4120 4140 SM-24 SM-36 SM-36x3
Highlights Max FW 20G 40G 60G 75G 80G 225G
1024 AVC 12G 20G 25G 25G 35G 100G
1024 AVC+IPS 10G 15G 20G 20G 30G 90G
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
FTD Performance
4110 4120 4140 SM-24 SM-36 SM-36x3
Max	Throughput:	Application	
Control	(AVC)
12G 20G 25G 25G 35G 100G
Max	Throughput:	Application	
Control	(AVC)	and	IPS
10G 15G 20G 20G 30G 90G
Sizing	Throughput:		AVC	(450B) 4G 8G 10G 9G 12.5G 30G
Sizing	Throughput:		AVC+IPS	
(450B)
3G 5G 6G 6G 8G 20G
Maximum	concurrent	sessions	
w/AVC
4.5M 11M 14M 28M 29M 57M
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
ASA Performance
4110 4120 4140 SM-24 SM-36 SM-36x3
Stateful inspection	firewall	
throughput	(maximum)
20G 40G 60G 75G 80G 225G
Stateful inspection	firewall	
throughput	(multiprotocol)
10G 20G 30G 50G 60G 100G
Concurrent	firewall	connections 10M 15M 25M 55M 60M 70M
New	connections	per	second 150K 250K 350K 0.6M 0.9M 2M
Security	contexts 250 250 250 250 250 250
Virtual	Interfaces 1024 1024 1024 1024 1024 1024
IPSec	3DES/AES	VPN	
Throughput
8G 10G 14G 15G 18G 18G
Cisco Confidential 59© 2015 Cisco and/or its affiliates. All rights reserved.
Deployment Modes and Use
Cases
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Branding Terms: Review
Firepower NGFW
New NGFW brand (Unified ASA+Firepower)
Firepower Threat Defense
New unified appliance software
Firepower Management Center
New unified manager
Firepower Appliances
New Firepower4100 Series and
Firepower9300 appliances.
ASA with FirePOWER Services
• ASAApplianceswith ASAand
Firepowersoftware,application
firewalling and threat defense.
• The ASAand FirePOWER functions
have separatemanagers.
Today Recently Announced
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Deployment Modes
• Basic deployment modes: Firewall modes (choose one)
Routed
Transparent
• Other interface modes: IPS/IDS modes
Inline
Inline Tap
Passive
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Firepower Threat Defense interface modes
Routed/TransparentA
B
C
D
F
G
H
I
Inline Pair 1
Inline Pair 2
Inline Set
E J
Policy Tables
Passive
Interfaces
Inline Tap
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Malware
Protection
Firepower Threat Defense
Network Profiling
CISCO COLLECTIVE SECURITY INTELLIGENCE
URL Filtering
Integrated Software - Single Management
WWW
Identity-Policy
Control
Identity Based
Policy Control
Network
Profiling
Analytics &
AutomationApplication
Visibility
&Control
Intrusion
Prevention
High
Availability
Network
Firewall and
Routing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Internet Edge Use Case
Firepower NGFW
Requirements
Connectivity and Availability Requirements:
• Firewall for High Availability (Redundancy)
• Firewall should support Routed Mode
• Port-Channel for interface redundancy and link speed aggregation
• Dynamic Routing Support (OSPF / BGP)
Security Requirements:
• Single Context mode
• Dynamic NAT/PAT and Static NAT
• Identity based AVC, URL filtering, IPS and Malware protection
• SSL Decryption
Solution
Security Application: Firepower NGFW appliances with Firepower
Management Center
VPN connections via separate appliance until until 6.1+
ISP
FW in HA
Private Network
Service
Provider
Campus/Priv
ate Network
DMZ Network
Port-
Channel
Internet Edge
HSRP
Caveats
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Cloud Data Center Edge
Firepower NGFWv
Requirements
Connectivity and Availability Requirements:
• Virtual appliance form factor AWS / vSphere
• Firewall for High Availability (Redundancy)
• Firewall in router or transparent mode
• Support for both North/South and East/West deployments
Security Requirements:
• Single Context mode
• Identity based AVC, IPS and Malware & CnC protection
• SSL Decryption
• TrustSec Security Group Tag Support
Solution
Security Application: Firepower NGFWv virtual appliance with
Firepower Management Center
KVM support in 6.1 and Microsoft Azure in 6.2
Not suitable for Micro-Segmentation / per server firewalling.
ISP
FW in HA
Service
Provider
Data Center
Network
vPC / Port-
Channel
Data Center
Edge Traffic Zone
StorageApp
Servers
WWW
Server
Caveats
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Local Data Center Edge
Appliance & Virtual Firepower NGFW
Requirements
Connectivity and Availability Requirements:
• Firewall for High Availability (Redundancy)
• Firewall in router or transparent mode
• High bandwidth interfaces (10/40Gb/100Gb) and throughput
• High bandwidth flow offload support (fast path)
• Support for both North/South and East/West deployments
Security Requirements:
• Single Context mode
• Identity based AVC, IPS and Malware & CnC protection
• SSL Decryption
• TrustSec Security Group Tag Support
Solution
Security Application: Firepower Threat Defense physical or virtual
appliance for Amazon Web Services (AWS) with FMC management
Active / Standy Failover only, no clustering until future release.
No VXLAN support.
ISP
FW in HA
Service
Provider
Data Center
Network
vPC / Port-
Channel
Data Center
Edge Traffic Zone
StorageApp
Servers
WWW
Server
Caveats
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Campus NGFW
Firepower NGFW
Requirements
Connectivity and Availability Requirements:
• Firewall for High Availability (Redundancy)
• Firewall in router or transparent mode
• Dynamic Routing Support (OSPF / BGP)
• High bandwidth interfaces (10/40Gb) and throughput
• Port-Channel for interface redundancy and firewall-on-a-stick
Security Requirements:
• Firewall support between security domains within campus
• Campus edge firewall
• Single Context mode
• Identity based AVC, IPS and Malware & CnC protection
• TrustSec Security Group Tag Support
Security Application: Firepower NGFW appliances with Firepower
Management Center
Active / Standy Failover only, no clustering until future release.
HA for FMC in 6.1+
No EIGRP Support
DC / Internet
FW in HA
Access Layer
Port-
Channel
Data Center
Edge
Campus
Distriubtion
Core
FW in A/S HA
NGFW
Database
App
Servers
WWW Database
App
Servers
WWW
vPC / Port-
Channel
Caveats
Solution
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
ASA
ASDM/CSM/RESTful API for Management
HA and Clustering
Network Firewall
[Routing | Switching]
Data Center
Security
Service Provider
Security
Protocol
Inspection
Identity Based
Policy Control
VPN
Mix Multi Context
Mode
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Use Case
Internet Edge Firewall with VPN Support
Requirement
Connectivity and Availability Requirement:
• Firewall for High Availability (Redundancy)
• Firewall in the Router Mode
• vPC/Port-Channel for interface redundancy and link speed
aggregation
Security Requirement:
• Dynamic NAT/PAT and Static NAT
• Application Inspection
• ACL to control the traffic flows
• VPN support (S2S, SSL and AnyConnect)
Solution
Security Application: ASA Firewall
ISP
FW in HA
Private Network
Service
Provider
Campus/Priv
ate Network
DMZ Network
vPC / Port-
Channel
Internet Edge
Remote VPN
Users
Branch Office
HSRP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Map Product to Use Case
5585-X
Firepower 4100
& 9300
Firepower 4100
& 9300
ASA with Firepower Services ASA Software Firepower Threat Defense Software
NGFW for Data Center &
Enterprise Core; anywhere
clustering, VPN, on-box
managementare required.
Dedicated ASA
Service Provider, Data
Center
(Firewall only)
Firepower NGFW
High-speed Internet Edge (where
clustering, VPN, multi-context, and
on-box managementare not
required)
Cisco’s driving rapid feature parity between ASA with FirePOWER Services and
Firepower NGFW, with two additional major releases planned for this year.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
• There are no EOS/EOL plans: won’t be considered until
CY2017
• Superior reputation: 5585-X cited in Nov. 2015 Gartner
Research Highlight for Carrier Class Firewalls: our market
share is near 50%
• As customers migrate to newer platforms over the next
5 years, long-term evolution and protection is assured
• Investment protection built into the engineering
plan: threat defense innovation will continue to
come regularly to both ASA with FirePOWER
Services and Firepower NGFWs
• Firepower Management Center expected to support
mgmt. of key ASA features on 5585-X Q4CY2016*
ASA5585-X: 2016 and Beyond
ASA	5585	– X:
üProven
üReliable
üSupported
* Pre-Commit Date
Cisco Confidential 72© 2015 Cisco and/or its affiliates. All rights reserved.
Deployment Considerations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Software Support by Platform
Firepower
NGFW
(Firepower
Threat
Defense)
Firepower
NGIPS/
AMP
Appliance
ASA with
FirePOWER
Services
ASA
Radware
vDP
DDoS
FirePOWER 7000/8000 Series ✓
ASA Low/Mid Range (5506/08/16/25/45/55) ✓ ✓ ✓
ASA High-end (5585 SSP-10/20/40/60) ✓ ✓
Firepower 4100/9300 (4110/20/40
/ FPR9K, SM-24/36) ✓ ✓ ✓
*Subject to Compliance Hold
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Deployment Considerations - Migration
• New Deployments
All hardware and software options depending on the requirements
Firepower appliances for 40/100 Gb interfaces
• ASA Refresh
All hardware options – ASA and Fireppwer appliances
Software Migration
ASA to ASA software
Limited migration from ASA to FTD in July timeframe
Native migration from ASA to FTD in the November timeframe
Cisco Confidential 75© 2015 Cisco and/or its affiliates. All rights reserved.
Security Architecture
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
More than just an NGFW
• When considering the move to an NGFW
Think about more than just the firewall features
Consider the various use cases and integration opportunities
Use an architectural approach to ensure the NGFW meets the capabilities required
Cisco Confidential 77© 2015 Cisco and/or its affiliates. All rights reserved.
Thank you.

Mais conteúdo relacionado

Mais procurados

Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Canada
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookRHC Technologies
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
ACI MultiPod Config Guide
ACI MultiPod Config GuideACI MultiPod Config Guide
ACI MultiPod Config GuideWoo Hyung Choi
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectDavid Pasek
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010chanwitcs
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster ConfigurationKashif Latif
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and PfsenseSite-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and PfsenseHarris Andrea
 

Mais procurados (20)

Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
CCDE Experience
CCDE ExperienceCCDE Experience
CCDE Experience
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBook
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
ACI MultiPod Config Guide
ACI MultiPod Config GuideACI MultiPod Config Guide
ACI MultiPod Config Guide
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real project
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
RAP Networks Validated Reference Design
RAP Networks Validated Reference DesignRAP Networks Validated Reference Design
RAP Networks Validated Reference Design
 
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and PfsenseSite-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
 

Semelhante a ASA Firepower NGFW Update and Deployment Scenarios

Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewallCisco Canada
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfTaherAzzam2
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewallCisco Canada
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)SDNRG ITB
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 

Semelhante a ASA Firepower NGFW Update and Deployment Scenarios (20)

Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdf
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 

Mais de Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 

Mais de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

ASA Firepower NGFW Update and Deployment Scenarios

  • 1. Cisco Confidential© 2015 Cisco and/or its affiliates. All rights reserved. 1 NGFW Update and Deployment Scenarios Michael Mercier Consulting Systems Engineer – Security Solutions May 19, 2016
  • 2. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Housekeeping notes Thank you for attending Cisco Connect Toronto 2016, here are a few housekeeping notes to ensure we all enjoy the session today. • Please ensure your cellphones / laptops are set on silent to ensure no one is disturbed during the session
  • 3. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Agenda Firepower NGFW Firepower Threat Defense Software Overview Firepower 4100 Next-GenerationSecurity Architecture Firepower 9300 Next-GenerationSecurity Architecture FTDv Licensing Performance Deployment Modes / Use Cases DeploymentConsiderations
  • 4. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Firepower Threat Defense (FTD) • Unified codebase software image Firepower 4100 Series and 9300 Appliances • Brand for new hardware product offerings which run FTD or ASA “Firepower Next-Generation Firewall (NGFW)” • FTD + Hardware appliance Firepower Management Center (FMC) • Formerly FireSIGHT. Unified manager for NGFW, NGIPS, AMP, FirePOWER on ISR ASA with FirePOWER Services • Two managers, full firewall feature set Relevant Terminology
  • 5. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Detect earlier, act faster Gain more insight Reduce complexity Get more from your network Stop more threats Enable your business with a fully integrated, threat- focused solution Threat Focused Fully Integrated Cisco Firepower™ NGFW
  • 6. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Stop more threats across the entire attack continuum Remediate breaches and prevent future attacks Detect, block, and defend against attacks Discover threats and enforce security policies Cisco Firepower™ NGFW BEFORE AFTERDURING
  • 7. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 “You can’t protect what you can’t see” Gain more insight with increased visibility Malware Clientapplications Operating systems Mobile devices VoIP phones Routers and switches Printers Command and control servers Network servers Users File transfers Web applications Application protocols Threats TypicalIPS TypicalNGFW Cisco Firepower™ NGFW
  • 8. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Cisco: 17.5 hoursIndustry TTD rate:* 100 days Detect infections earlier and act faster • Automated attack correlation • Indications of compromise • Local or cloud sandboxing • Malware infection tracking • Two-click containment • Malware analysis Source: Cisco® 2016 Annual Security Report *Median time to detection (TTD) JAN MONDAY 1 JAN FEB MAR APR
  • 9. Cisco Confidential 9© 2015 Cisco and/or its affiliates. All rights reserved. Firepower Management Center
  • 10. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco Firepower™ Management Center Reduce complexity with simplified, consistent management • Network-to-endpoint visibility • Manages firewall, applications, threats, and files • Track, contain, and recover remediation tools Unified • Central, role-based management • Multitenancy • Policy inheritance Scalable • Impact assessment • Rule recommendations • Remediation APIs Automated
  • 11. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Shared intelligence Shared contextual awareness Consistent policy enforcement Cisco Firepower™ Management Center Get more from your network through integrated defenses Talos Firepower 4100 Series Firepower 9300 Platform Visibility Radware DDoS Network analysis Email Threats Identity and NAC DNS FirewallURL
  • 12. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 FS750 FS2000 FS4000 Virtual Maximum devices managed* 10 70 300 Virtual FireSIGHT® Management Center Up to 25 managed devices ASA or FirePOWER appliancesEvent storage 100 GB 1.8 TB 3.2 TB Maximum network map (hosts/users) 2000/2000 150,000/ 150,000 600,000/ 600,000 Virtual FireSIGHT® Management for 2 or 10 ASA devices only! Not upgradeable FS-VMW-2-SW-K9 FS-VMW-10-SW-K9 Events per second (EPS) 2000 12,000 20,000 Max number of devices is dependent upon sensor type and event rate Management Firepower Management Center Appliances 12
  • 13. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Cisco NGFW Platforms *5585-Xmanagement available 2HCY16 All* Managed by Cisco Firepower Management Center Cisco Firepower™ 4100 Series and 9300 Cisco FirePOWER™ Services on ASA 5585-X Cisco Firepower Threat Defense on ASA 5500-X New Appliances
  • 14. Cisco Confidential 14© 2015 Cisco and/or its affiliates. All rights reserved. Firepower Threat Defense
  • 15. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 New Converged Software Image: Firepower Threat Defense Contains all Firepower Services plus select ASA capabilities Single Manager: Firepower Management Center* Same subscriptions as FirePOWER Services, enabled by Smart Licensing: Threat (IPS + SI + DNS) Malware (AMP + ThreatGrid) URL Filtering Converged Software – Firepower Threat Defense * Also manages FirepowerAppliances, Firepower Services (not ASASoftware)
  • 16. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 • Everything from Firepower 6.0.1 • Phased introduction of features from ASA • FTD 6.0.1 IPv4 and IPv6 Connection state tracking and TCP normalization Access Control NAT (Full support) Unicast Routing (except EIGRP) ALGs (only default configuration) Intra chassis Clustering on Firepower 9300 Stateful Failover (HA) What features are available?
  • 17. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 High-Level Feature Comparison: ASA with FirePOWER Services, Firepower Threat Defense Feature Firepower Services for ASA Firepower Threat Defense Notes for Firepower Threat Defense HA, NAT ✔ ✔ Routing ✔ ✔ Multicast in 6.1, No EIGRP Unified ASA and Firepower rules/objects ✘ ✔ Local Management ✔ ✔ In 6.1, features differ Multi-Context ✔ ✘ Inter-chassis Clustering ✔ ✘ VPN ✔ ✔ Site-to-Site VPN in 6.1 Hypervisor Support ✘ ✔ AWS, VMware; KVM in 6.1 Smart Licensing support ✘ ✔ Note: Not an exhaustive list of differences between these offerings.
  • 18. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Firepower Threat Defense – Phased Delivery • Remote Access VPN • Device Clustering • SSLAcceleration • Traffic QoS • Time-based Policies • Hyper-V / Azure • MS Exchange identity • Pkt Trace/Capture • Configuration CLI • Site-to-Site VPN • Rate-Limiting • Multicast and EIGRP • VDI User Identity • AMP Private Cloud • ISE Remediation • X-Forwarded-For • Web Safe Search • Built-in Risk Reports • KVM Virtual platform • On-box Web UI • FMC HA, Scale and API GeneralAvailability V6.0.1 – Mar. 2016 • FP 9300/4100 platforms • ASALow/Mid platforms • All of FP Services 6.0 • ASA+FP Rules/Objects • Transp/Routed Deploy • Active/Passive HA • NAT (Dynamic/Static) • OSPF, BGP, RIP, Static • ALGs (fixed config) • Syn Cookie/Anti-Spoof V6.1 - Q4FY16 1HFY17 High-Priority NGFW Feature Parity
  • 19. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 What Platforms run Firepower Threat Defense? *5585-XASAmodule management being investigated for 2HCY16 All* Managed by Cisco Firepower Management Center Cisco Firepower Threat Defense on Firepower™ 4100 Series and 9300 Cisco FirePOWER Services on ASA 5585-X Cisco FirePOWER on 7000/8000 Series Appliances Cisco Firepower Threat Defense on ASA 5500-X New Appliances
  • 20. Cisco Confidential 20© 2015 Cisco and/or its affiliates. All rights reserved. Firepower Threat Defense Software Overview
  • 21. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 • New Next Generation Firewall offering • Brings together the best features from ASA and Firepower, all under one OS • Zero-copy packet inspection • Single management application • Duplicate functionality removed Advantages of Firepower Threat Defense Firepower Threat Defense L2-L4 Inspections (ASA Technology) Advanced Inspections (FirePOWER Technology) Firepower Management Center ASA FirePOWER Services CSM/ASDM FireSIGHT
  • 22. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 ASA with FirePOWER Services Packet flow Ingress NIC L2/L3 Decode L4 Decode Flow Lookup Route Lookup NAT Lookup Inspection checks Routing NAT Egress NIC Flow Update File/AMP IPS AVC Kernel Virtual TAP FirePOWER Services Event Database Virtual Container 2 OS, ASA & FP
  • 23. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Firepower Threat Defense Packet Flow Ingress NIC L2/L3 Decode L4 Decode Flow Lookup Route Lookup NAT Lookup Inspection checks Routing NAT Egress NIC Flow Update File/AMP IPS AVC FirePOWER Services Event Database PacketLibrary(PDTS) Zero Copy Single OS
  • 24. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 • Access policies broken down into 2 sets of rules • Advanced ACLs - Evaluate L2 – L4 attributes and give a verdict Permit Deny Trust • NGFW ACLs – Evaluate L7 attributes Allow Block TrustPath Unified Access Control policies
  • 25. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Unified Objects Configuration Objects in 5.4 Objects in 6.0
  • 26. Cisco Confidential 26© 2015 Cisco and/or its affiliates. All rights reserved. Firepower 4100 Next Generation Firewall
  • 27. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Cisco Firepower 4100 Series Introducing four new high-performance models Performance and Density Optimization Unified Management Multiservice Security • Integrated inspectionengines for FW, NGIPS,Application Visibility and Control (AVC), URL, Cisco Advanced Malware Protection (AMP) • Radware DefensePro DDoS • ASA and otherfuture third party • 10-Gbps and 40-Gbps interfaces • Up to 80-Gbpsthroughput • 1-rack-unit(RU) form factor • Low latency • Single managementinterface with FirepowerThreatDefense • Unified policy with inheritance • Choice of management deploymentoptions
  • 28. Cisco Confidential 28© 2015 Cisco and/or its affiliates. All rights reserved. Hardware Overview
  • 29. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Firepower 4100 Series Front and Rear View SSD1 SSD2 1 3 5 7 NetMod 1 (Slot) NetMod 2 (Slot) 2 4 6 8 PS1 PS2 FAN1 FAN2 FAN3 FAN4 FAN5 FAN6 Power Console Mgmt. SYS ACT SSD Status
  • 30. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Supervisor Module: Console and Management Port 8 10G Fixed Ethernet Ports 2 x Network Modules Security Engine: Dual CPU, each connected with a Smart NIC and Crypto accelerator card Two SSD - 1 Default + 1 Optional (For AMP service) SSD Size 200GB for 4120 400GB for 4140 Backplane 80GB Backplane support Firepower 4110/20/40/50 - Hardware Components Internal 720G Switch Fabric Security Engine RAMSmart NIC + Crypto Accelerator 2x40Gpbs 2x100Gbps Built-in 8x10GE interfaces NM Slot 1 X86 CPU NM Slot 2 80G 8x 10G (or) 4x 40G Network Module …… …… Console Mgmt. Port 200G2x40Gbps 5x 40Gbps 200G 5x 40Gbps SSD SSD
  • 31. Cisco Confidential 31© 2015 Cisco and/or its affiliates. All rights reserved. Software Overview
  • 32. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 § FP 4100 Series of platform supported from FXOS 1.1.4 § FXOS provides interfacefor device managementand provisioning of the security application on security engine. § All images are digitally signed and validated throughSecure Boot. § Security application imagesare in Cisco Secure Package(CSP)format § Multiple version of same application can be stored in Supervisor. It can deployed to Security Engine on demand § Contains system (i.e. ASA, FTD) and other images (i.e. ASDM, REST, and so on) Firepower 4100 Software Decorator application from third-party (KVM) Primary application from Cisco (Native) DDoS ASAor FTD FXOS Firepower Extensible Operating System (FXOS) Supervisor Security Engine
  • 33. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Security Service Architecture for Firepower 4100 Series Platform Supervisor Ethernet 1/1-8 Ethernet 2/1-8 Standalone/Cluster Security Module 1 Ethernet 3/1-4 Application Image Storage PortChannel1 Ethernet1/7 (Management) Data Logical Device Link Decorator External Connector Primary Application Decorator Application On-board 8x10GE interfaces 8x10GE NM Slot 1 4x40GE NM Slot 2 ASA/FTD Packet Flow Security Engine Radware vDP
  • 34. Cisco Confidential 34© 2015 Cisco and/or its affiliates. All rights reserved. Firepower 9300 Next Generation Firewall
  • 35. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Cisco Firepower 9300 Platform Benefits • Integration of best-in-class security • Dynamic service stitching Features* • Cisco®ASA container • Cisco Firepower™ Threat Defense containers: • NGIPS, AMP, URL, AVC • Third-party containers: • Radware DDoS • Other ecosystem partners Benefits • Standards and interoperability • Flexible architecture Features • Template-driven security • Secure containerization for customer apps • RESTful/JSON API • Third-party orchestration and management Benefits • Industry-leading performance: • 600% higher performance • 30% higher port density Features • Compact, 3RU form factor • 10-Gbps/40-Gbps I/O; 100-Gbps ready • Terabit backplane • Low latency, intelligent fast path • Network Equipment-Building System (NEBS) ready * Contact Cisco for services availability Modular Carrier Class Multiservice Security High-speed, scalable security
  • 36. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Cisco Firepower 9300 Overview Supervisor § Application deployment and orchestration § Network attachment (10/40/100GE) and traffic distribution § Clustering base layer for Cisco® ASA, NGFW, and NGIPS 1 3 2 Security Modules § Embedded packet and flow classifier and crypto hardware § Cisco (ASA, NGFW, and NGIPS) and third-party (DDoS, load-balancer) applications § Standalone or clustered within (up to 240 Gbps) and across (1 Tbps+) chassis
  • 37. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 Cisco Firepower 9300 Chassis Hardware § 19-inch 3RU rack (32 in. deep, 17.5 in. wide, and 135 lb fully loaded) § Four FRU fan modules with OIR § N+1 redundancy § Front-to-back airflow § Dual redundant power supplies with load sharing and OIR § 2500 and 1300W AC power supplies initially; 2500W DC to follow § Single supply at 110V is not enough for full chassis; 220V is required § Scalable backplane support up to 200 Gbps per security module
  • 38. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Supervisor Module Overall chassis management and network interaction § Network interface allocation and security module connectivity (960-Gbps internal fabric) § Application image storage, deployment, provisioning, and service chaining § Clustering infrastructure for supported applications § Cisco® Smart Licensing and NTP for entire chassis RJ-45 Console 1 GE Management (SFP) Built-in 10 GE Data (SFP+) Optional Network Modules (NMs) 1 2
  • 39. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Supervisor Simplified Hardware Diagram Internal Switch Fabric (up to 24x40GE) Security Module 1 Security Module 2 Security Module 3 On-Board 8 x 10 GE Interfaces Network Module 1 Network Module 2 2 x 40 Gbps 2 x 40 Gbps 2 x 40 Gbps 2 x 40 Gbps 5 x 40 Gbps 5 x 40 Gbps x86 CPU RAM System Bus Ethernet
  • 40. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Network Modules § Supervisor configures interfaces and directs traffic to security modules § All interfaces are called “Ethernet” and 1 referenced (for example, Ethernet1/1) § Hardware OIR support; software support to follow § Mix and match up to two 10 and 40 GE half-width modules § 8 x 10 GE SFP or SFP+ per module § 4 x 40 GE QSFP per module; each port can be split to 4 x 10 GE § 100 GE modules
  • 41. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Security Modules § Three security module configurations § SM36: 72 x86 CPU cores for up to 80 Gbps of firewalled throughput § SM24: 48 x86 CPU cores for up to 60 Gbps of firewalled throughput § (Future) NEBS: SM24 NEBS certification § Dual 800GB SSD in RAID1 by default § Built-in hardware packet and flow classifier and crypto accelerator § Hardware VPN acceleration is targeted for a subsequent software release
  • 42. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Security Module Simplified Diagram System Bus x86 CPU 1 24 or 36 Cores Packet and Flow Classifier and Crypto Accelerator Backplane Supervisor Connection x86 CPU 2 24 or 36 Cores 2 x 100 Gbps 2 x 100 Gbps RAM Ethernet
  • 43. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Cisco Firepower 9300 Software § Supervisor and security modules use multiple independent images § Infrastructure software bundle for supervisor § Security module firmware bundle § Security application images bundles for modules § All images are digitally signed and validated through Secure Boot § Service application images are in Cisco® Secure Package (CSP) format § Stored on supervisor and deployed to security module on demand § Multiple versions of the same application may be stored § Contains system (for example, CiscoASA) and other images (Cisco ASDM, REST, etc.)
  • 44. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 Security Services Architecture on Firepower 9300 Cisco® ASA Cluster Security Module 1 Security Module 2 Security Module 3 Supervisor On-Board 8 x 10 GE Interfaces 8 x 10 GE NM Slot 1 Application Image Storage 4 x 40 GE NM Slot 2 Ethernet 1/7 (Management) Ethernet 1/1-8 Ethernet 2/1-8 Ethernet 3/1-4 Logical Device Logical Device Unit Link Decorator Application Connector External Connector Packet Flow Primary Application Decorator Application PortChannel1 Data DDoS DDoS DDoS ASA ASA ASA
  • 45. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 Management Overview § Chassis management is independent from applications § On-box chassis manager UI and CLI § Cisco® ASDM is the only management GUI for Cisco ASA initially § Future off-box Cisco Firepower Device Manager for both chassis and Cisco applications § SNMP and syslog support for chassis-level counters and events on supervisor § REST API on supervisor for third-party service management § SDN orchestration enablement for security services on demand
  • 46. Cisco Confidential 46© 2015 Cisco and/or its affiliates. All rights reserved. FTDv
  • 47. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 FTDv FMC Cisco FTDv for Vmware: Routed, Transparent, Inline Mode
  • 48. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 FTDv for Vmware: Passive mode FTDv
  • 49. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 BD1 BD2BD1 BD2 • Routed Mode (Go-To) • Transparent Mode (Go-Through) FTDv Service Graph in the ACI Fabric EPG App EPG DB FTDv Graph B 10.0.0.0/24 Tenant B External Internal EPG Web EPG App Graph A 10.0.0.0/24 10.0.0.1 20.0.0.1 20.0.0.0/24 Tenant A External Internal FTDv Bridge Domains need flooding turned on, to allow ASA to see and bridge packets between two EPGsBVI 10.0.0.10 Use port-channels on ESXi hosts instead of NIC teaming. It can break Go-Through mode.
  • 50. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 • FTDv can connect to Amazon Virtual Private Cloud (VPC) network which closely resembles a traditional network topology. • The FTDv and FMCv run as guests in AWS private Xen Hypervisor* environment. • Protect your AWS environment by controlling and monitoring traffic. All features, Stateful L3 mode and ERSPAN Passive modes supported. • FTDv Transparent Mode and Active/Standby HA is NOT supported (Roadmap) Cisco FMCv/FTDv in AWS *Note: The FTDv and FMCv do not supportthe Xen Hypervisoroutsideof the AWS environment.
  • 51. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 AWS FMCv is optional as many organizations like to use their on premises FMC. • Cisco Smart Licensing,AWS hourly comingsoon • AWS Security Group Accesscontrolmustpermit SSH/HTTPs access to yourinstances • Create and attach Network interfaces and add Route table entry for Internet access • An Elastic IP (Static persistentPublic IP) is required for eitherFTDv or FMCv remote admin access • * 2 managementinterfaces requiredfor AWS FTDv Cisco FMCv/FTDv in AWS Instance Type Interf. Subnets vCPUs RAM (GB) FMCv m3.large 3 2 7.5 FMCv m3.xlarge 3 4 15 FMCv & FTDv* c3.xlarge 2 4 7.5 FMCv c3.2xlarge 8 4 15
  • 52. Cisco Confidential 52© 2015 Cisco and/or its affiliates. All rights reserved. Licensing
  • 53. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 Firepower Threat Defense Smart Licensing Structure • Base License enables NGFW • Networking, Firewall and Application Visibility & Control • Perpetual license - included with appliance purchase • Term-based licenses for advanced protection • Threat, Malware and URL Filtering • Smart License Enabled only Base (NGFW) Threat (IPS/SI/DNS) Malware (AMP/TG) URLFiltering Blue = Term-based Green = Perpetual
  • 54. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 Mapping Classic Licenses to new Smart Licenses Functionality Traditional Licensing Smart Licensing Base License (includes AVC) Protect + Control Base IPS (SI, DNS) (EULA Enforced) Threat AMP/Threat GRID Malware Malware URL Filtering URL Filtering URL Filtering Management FireSIGHT Built into Firepower Management Center
  • 55. Cisco Confidential 55© 2015 Cisco and/or its affiliates. All rights reserved. Performance: Firepower 4100 and 9300
  • 56. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 Performance Highlights 4110 4120 4140 SM-24 SM-36 SM-36x3 Highlights Max FW 20G 40G 60G 75G 80G 225G 1024 AVC 12G 20G 25G 25G 35G 100G 1024 AVC+IPS 10G 15G 20G 20G 30G 90G
  • 57. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 FTD Performance 4110 4120 4140 SM-24 SM-36 SM-36x3 Max Throughput: Application Control (AVC) 12G 20G 25G 25G 35G 100G Max Throughput: Application Control (AVC) and IPS 10G 15G 20G 20G 30G 90G Sizing Throughput: AVC (450B) 4G 8G 10G 9G 12.5G 30G Sizing Throughput: AVC+IPS (450B) 3G 5G 6G 6G 8G 20G Maximum concurrent sessions w/AVC 4.5M 11M 14M 28M 29M 57M
  • 58. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 ASA Performance 4110 4120 4140 SM-24 SM-36 SM-36x3 Stateful inspection firewall throughput (maximum) 20G 40G 60G 75G 80G 225G Stateful inspection firewall throughput (multiprotocol) 10G 20G 30G 50G 60G 100G Concurrent firewall connections 10M 15M 25M 55M 60M 70M New connections per second 150K 250K 350K 0.6M 0.9M 2M Security contexts 250 250 250 250 250 250 Virtual Interfaces 1024 1024 1024 1024 1024 1024 IPSec 3DES/AES VPN Throughput 8G 10G 14G 15G 18G 18G
  • 59. Cisco Confidential 59© 2015 Cisco and/or its affiliates. All rights reserved. Deployment Modes and Use Cases
  • 60. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Branding Terms: Review Firepower NGFW New NGFW brand (Unified ASA+Firepower) Firepower Threat Defense New unified appliance software Firepower Management Center New unified manager Firepower Appliances New Firepower4100 Series and Firepower9300 appliances. ASA with FirePOWER Services • ASAApplianceswith ASAand Firepowersoftware,application firewalling and threat defense. • The ASAand FirePOWER functions have separatemanagers. Today Recently Announced
  • 61. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Deployment Modes • Basic deployment modes: Firewall modes (choose one) Routed Transparent • Other interface modes: IPS/IDS modes Inline Inline Tap Passive
  • 62. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Firepower Threat Defense interface modes Routed/TransparentA B C D F G H I Inline Pair 1 Inline Pair 2 Inline Set E J Policy Tables Passive Interfaces Inline Tap
  • 63. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 Malware Protection Firepower Threat Defense Network Profiling CISCO COLLECTIVE SECURITY INTELLIGENCE URL Filtering Integrated Software - Single Management WWW Identity-Policy Control Identity Based Policy Control Network Profiling Analytics & AutomationApplication Visibility &Control Intrusion Prevention High Availability Network Firewall and Routing
  • 64. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Internet Edge Use Case Firepower NGFW Requirements Connectivity and Availability Requirements: • Firewall for High Availability (Redundancy) • Firewall should support Routed Mode • Port-Channel for interface redundancy and link speed aggregation • Dynamic Routing Support (OSPF / BGP) Security Requirements: • Single Context mode • Dynamic NAT/PAT and Static NAT • Identity based AVC, URL filtering, IPS and Malware protection • SSL Decryption Solution Security Application: Firepower NGFW appliances with Firepower Management Center VPN connections via separate appliance until until 6.1+ ISP FW in HA Private Network Service Provider Campus/Priv ate Network DMZ Network Port- Channel Internet Edge HSRP Caveats
  • 65. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Cloud Data Center Edge Firepower NGFWv Requirements Connectivity and Availability Requirements: • Virtual appliance form factor AWS / vSphere • Firewall for High Availability (Redundancy) • Firewall in router or transparent mode • Support for both North/South and East/West deployments Security Requirements: • Single Context mode • Identity based AVC, IPS and Malware & CnC protection • SSL Decryption • TrustSec Security Group Tag Support Solution Security Application: Firepower NGFWv virtual appliance with Firepower Management Center KVM support in 6.1 and Microsoft Azure in 6.2 Not suitable for Micro-Segmentation / per server firewalling. ISP FW in HA Service Provider Data Center Network vPC / Port- Channel Data Center Edge Traffic Zone StorageApp Servers WWW Server Caveats
  • 66. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 Local Data Center Edge Appliance & Virtual Firepower NGFW Requirements Connectivity and Availability Requirements: • Firewall for High Availability (Redundancy) • Firewall in router or transparent mode • High bandwidth interfaces (10/40Gb/100Gb) and throughput • High bandwidth flow offload support (fast path) • Support for both North/South and East/West deployments Security Requirements: • Single Context mode • Identity based AVC, IPS and Malware & CnC protection • SSL Decryption • TrustSec Security Group Tag Support Solution Security Application: Firepower Threat Defense physical or virtual appliance for Amazon Web Services (AWS) with FMC management Active / Standy Failover only, no clustering until future release. No VXLAN support. ISP FW in HA Service Provider Data Center Network vPC / Port- Channel Data Center Edge Traffic Zone StorageApp Servers WWW Server Caveats
  • 67. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Campus NGFW Firepower NGFW Requirements Connectivity and Availability Requirements: • Firewall for High Availability (Redundancy) • Firewall in router or transparent mode • Dynamic Routing Support (OSPF / BGP) • High bandwidth interfaces (10/40Gb) and throughput • Port-Channel for interface redundancy and firewall-on-a-stick Security Requirements: • Firewall support between security domains within campus • Campus edge firewall • Single Context mode • Identity based AVC, IPS and Malware & CnC protection • TrustSec Security Group Tag Support Security Application: Firepower NGFW appliances with Firepower Management Center Active / Standy Failover only, no clustering until future release. HA for FMC in 6.1+ No EIGRP Support DC / Internet FW in HA Access Layer Port- Channel Data Center Edge Campus Distriubtion Core FW in A/S HA NGFW Database App Servers WWW Database App Servers WWW vPC / Port- Channel Caveats Solution
  • 68. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 ASA ASDM/CSM/RESTful API for Management HA and Clustering Network Firewall [Routing | Switching] Data Center Security Service Provider Security Protocol Inspection Identity Based Policy Control VPN Mix Multi Context Mode
  • 69. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69 Use Case Internet Edge Firewall with VPN Support Requirement Connectivity and Availability Requirement: • Firewall for High Availability (Redundancy) • Firewall in the Router Mode • vPC/Port-Channel for interface redundancy and link speed aggregation Security Requirement: • Dynamic NAT/PAT and Static NAT • Application Inspection • ACL to control the traffic flows • VPN support (S2S, SSL and AnyConnect) Solution Security Application: ASA Firewall ISP FW in HA Private Network Service Provider Campus/Priv ate Network DMZ Network vPC / Port- Channel Internet Edge Remote VPN Users Branch Office HSRP
  • 70. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 Map Product to Use Case 5585-X Firepower 4100 & 9300 Firepower 4100 & 9300 ASA with Firepower Services ASA Software Firepower Threat Defense Software NGFW for Data Center & Enterprise Core; anywhere clustering, VPN, on-box managementare required. Dedicated ASA Service Provider, Data Center (Firewall only) Firepower NGFW High-speed Internet Edge (where clustering, VPN, multi-context, and on-box managementare not required) Cisco’s driving rapid feature parity between ASA with FirePOWER Services and Firepower NGFW, with two additional major releases planned for this year.
  • 71. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71 • There are no EOS/EOL plans: won’t be considered until CY2017 • Superior reputation: 5585-X cited in Nov. 2015 Gartner Research Highlight for Carrier Class Firewalls: our market share is near 50% • As customers migrate to newer platforms over the next 5 years, long-term evolution and protection is assured • Investment protection built into the engineering plan: threat defense innovation will continue to come regularly to both ASA with FirePOWER Services and Firepower NGFWs • Firepower Management Center expected to support mgmt. of key ASA features on 5585-X Q4CY2016* ASA5585-X: 2016 and Beyond ASA 5585 – X: üProven üReliable üSupported * Pre-Commit Date
  • 72. Cisco Confidential 72© 2015 Cisco and/or its affiliates. All rights reserved. Deployment Considerations
  • 73. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73 Software Support by Platform Firepower NGFW (Firepower Threat Defense) Firepower NGIPS/ AMP Appliance ASA with FirePOWER Services ASA Radware vDP DDoS FirePOWER 7000/8000 Series ✓ ASA Low/Mid Range (5506/08/16/25/45/55) ✓ ✓ ✓ ASA High-end (5585 SSP-10/20/40/60) ✓ ✓ Firepower 4100/9300 (4110/20/40 / FPR9K, SM-24/36) ✓ ✓ ✓ *Subject to Compliance Hold
  • 74. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74 Deployment Considerations - Migration • New Deployments All hardware and software options depending on the requirements Firepower appliances for 40/100 Gb interfaces • ASA Refresh All hardware options – ASA and Fireppwer appliances Software Migration ASA to ASA software Limited migration from ASA to FTD in July timeframe Native migration from ASA to FTD in the November timeframe
  • 75. Cisco Confidential 75© 2015 Cisco and/or its affiliates. All rights reserved. Security Architecture
  • 76. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76 More than just an NGFW • When considering the move to an NGFW Think about more than just the firewall features Consider the various use cases and integration opportunities Use an architectural approach to ensure the NGFW meets the capabilities required
  • 77. Cisco Confidential 77© 2015 Cisco and/or its affiliates. All rights reserved.