FTD v7
FTD v7
Firepower Platform
Deep Dive
                                  #CLUS
Your Speaker
                       Andrew Ossipov
                        aeo@cisco.com
             Distinguished Engineer
      NGFW, Solution Architecture, Hybrid Cloud DC
                IETF: SFC and TLS Working Groups
                                      #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   3
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
                                              #CLUS      © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   4
Agenda
•   Hardware and Software
•   Firepower Threat Defense Overview
•   Security Applications on Firepower 4100 and 9300
•   Multi-Instance Capability on Firepower 4100 and 9300
•   Availability and Scalability
•   Deployment Example: FTD Instance on Firepower 4100
•   Closing
                                     #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   5
Hardware and
Software
                                                                                                                                                  Reference
                                                    #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   7
Firepower 9300 Overview
   Supervisor                                               Network Modules
   • Application deployment and orchestration               • 10GE, 40GE, 100GE
   • Network attachment and traffic distribution            • Hardware bypass for inline NGIPS
   • Clustering base layer for ASA or FTD
3RU
        Security Modules
        • Embedded Smart NIC and crypto hardware
        • Cisco (ASA, FTD) and third-party (Radware DDoS) applications
        • Standalone or clustered within and across chassis
                                                   #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   8
Supervisor Module
 RJ-45          1GE Management     Built-in 10GE Data                              Optional Network
Console          Interface (SFP)   Interfaces (SFP+)                                Modules (NM)
1 2
                                                        #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   9
Supervisor Architecture
                                                                                                                                   System Bus
            Security               Security                 Security
                                                                                                    RAM
            Module 1               Module 2                 Module 3
      On-board 8x10GE                NM                      NM
         interfaces                 Slot 1                  Slot 2
                                                    #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   10
Firepower 9300 Security Modules
•   All modules have to match within a chassis for now
•   Built-in hardware Smart NIC and Crypto Accelerator
•   Previous generation SM-24, SM-36, and SM-44
    •   Dual 800GB SSD in RAID1 by default
    •   SM-24 is NEBS Level 3 Certified
•   New SM-40, SM-48, and SM-56
    •   Dual 1.6TB SSD in RAID1 by default
    •   Higher performance on cryptographic operations
                                             #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   11
Security Module Architecture
2x100Gbps
                                           2x40Gbps
                        Backplane Supervisor Connection
                                                   #CLUS             BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   12
  Firepower 4100 Overview
                                                          Solid State Drives
  Built-in Supervisor and Security Module                 • Independent operation (no RAID)
  • Same hardware and software architecture as 9300       • Slot 1 today provides limited AMP storage
  • Fixed configurations (4110 – 4150)                    • Slot 2 adds 400GB of AMP storage
1RU
                                                              Network Modules
                                                              • 10GE and 40GE interchangeable with 9300
                                                              • Partially overlapping fail-to-wire options
                                                      #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   13
Firepower 4100 Architecture
    RAM
   4110: 64Gb
  4115: 192Gb             x86 CPU 1            x86 CPU 2
  4120: 128Gb           4110: 24 cores            4110: N/A
  4125: 192Gb           4115: 24 cores
  4140: 256Gb           4120: 24 cores
                                                4115: 24 cores
                                                4120: 24 cores
                                                                                                                                            System Bus
  4145: 384Gb           4125: 32 cores          4125: 32 cores
  4150: 256Gb           4140: 36 cores
                                                                                                            RAM
                                                4140: 36 cores
                      4145/4150: 44 cores     4145/4150: 44 cores
         On-board                     NM                             NM
      8x10GE interfaces              Slot 1                         Slot 2
                                                         #CLUS               BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   14
      Firepower 4100/9300 Smart NIC and Crypto
                                     x86 CPU 1           x86 CPU 2
                                                                                       Crypto Accelerator
                                                                                       • Single on 4110, dual elsewhere
                                                                                       • Configurable core bias to IPsec/TLS
                                                                                         on Firepower 4110, 4120, 4140,
                                                                                         4150 and Firepower 9300 SM-24,
                                             Crypto           Crypto                     SM-36, SM-44; shared elsewhere
                                               1                2                      • IPsec S2S and RAVPN
                                                                                       • TLS/DTLS RAVPN
                                                                                       • TLS inspection assistance
Cisco Programmable NIC
• Single on 4110, dual elsewhere     Smart            Smart
• 40Gbps connectivity each           NIC 1            NIC 1
                                                                                                                                            System Bus
• Packet Matching and Rewrite
• Tracks 2M flows for Flow Offload
         FXOS 2.3.1                                                                                                                             Ethernet
                                       Internal Switch Fabric
                                                      #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   15
  Firepower 2100 Overview
 Integrated Security Platform for FTD or ASA Application
 • Lightweight virtual Supervisor module
 • Embedded x86 and NPU with Hardware Crypto Acceleration        SFP/SFP+ Data Interfaces
 • Fixed configurations (2110, 2120, 2130, 2140)                 • 4x1GE on Firepower 2110 and 2120
 • Dual redundant power supplies on 2130 and 2140 only           • 4x10GE on Firepower 2130 and 2140
1RU
                                                    #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   16
                                                                                                                                    Reference
                                           #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   17
Firepower 2100 Architecture
                        x86 CPU                                                        RAM
                        2110: 4 cores
                        2120: 6 cores                                             2110-2120: 16GB
                        2130: 8 cores                                               2130: 32GB
                                                                                                                              System Bus
                        2140: 16 cores                                              2140: 64GB
                                                                                                                                  Ethernet
                     Network Processor Unit (NPU)                                      RAM
                                    2110: 6 cores
                                    2120: 8 cores
                                   2130: 12 cores                                 2110-2120: 8GB
                                   2140: 16 cores                                 2130-2140: 16GB
                                              2110-2120: 2x10Gbps
                 2x10Gbps                     2130-2140: 1x40Gbps
                                                      #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   18
  Firepower 1100 Overview
1RU
                                                     #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   19
Firepower 1010 Overview
Desktop
                                         #CLUS       BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   20
Firepower 1000 Architecture
                                                                                                                           System Bus
                       x86 CPU
                                                                                       RAM
                        1010: 8 cores
                       1120: 24 cores                                              1010: 8Gb                                   Ethernet
                       1140: 32 cores                                           1120-1140: 16Gb
                                               1010: 2x2.5Gbps
                                               1120-1140: 2x10Gbps
                                                       #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   21
   Standard Network Interfaces
   •   Supervisor attaches security modules to network
       •   All interfaces are called “Ethernet” and 1-referenced (i.e. Ethernet1/1)
       •   All external network ports require fiber or copper transceivers (SFP)
       •   Third-party SFP are allowed on best-effort support basis
       •Same-kind OIR is supported for external network modules
       8x1GE                 8x10GE                 4x40GE                                      2x100GE and 4x100GE
• Firepower 2100 only       • Firepower 2100,      • Firepower 4100                         •     Firepower 9300 only
  in FXOS 2.4.1               4100, 9300             and 9300                               •     Single width in FXOS 2.4.1
• Single width              • Single width         • Single width                           •     QSFP28 connector
• 10M/100M/1GE              • 1GE/10GE SFP         • 4x10GE breakouts                       •     Future 4x25GE breakout
                                                     for each 40GE port                     •     Legacy double width
                                                                                                  2x100 still available
                                                 #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   22
     Fail-to-Wire Network Modules
     •   Fixed interfaces, no removable SFP support or module OIR
     •   NGIPS inline interfaces for standalone FTD 6.1+ only
     •   Sub-second reaction time to application, software, or hardware failure
         •   Designed to engage during unplanned failure or restart events
         •   <90ms reaction time for Standby→Bypass with full power failure
• Firepower 2100, 4100 • Firepower 2100, 4100 •      Firepower 2100, 4100, • Firepower 4100 and 9300
• Single width         • Single width                9300                  • Single width
• 10M/100M/1GE copper • 1GE fibre SX          •      Single width          • 40GE SR4
                                              •      10GE SR or LR         • No 10GE breakout support
                                                  #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   23
Maximum Transmission Unit (MTU)
•   Layer 2 MTU defines maximum Ethernet frame size on the wire
    •   Mostly relevant to switches and other passive Layer 2 devices
    •   Frames above the MTU size are discarded, not fragmented
    •   9206 bytes on Firepower 4100/9300 in FXOS 2.1.1; 9216 bytes on 2100
                                               #CLUS   BRKSEC-3035    © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   24
    Firepower 4100/9300 Software
    •   Supervisor and security modules use multiple independent images
    •   All images are digitally signed and validated through Secure Boot
    •   Security application images are in Cisco Secure Package (CSP) format
                                                  Security Module 1            Security Module 2                          Security Module 3
 Decorator application from third-party (KVM)
                                                          DDoS
                                                                                          FTD                                          FTD
Primary Cisco application (Native or Container)            FTD
                                                          FXOS                          FXOS                                          FXOS
FXOS upgrades are applied to Supervisor and
  resident provisioning agent on modules
                                                   Firepower Extensible Operating System (FXOS)
  Supervisor stores CSP application images                                         Supervisor
                                                  #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   25
Firepower Platform Bundle
•   Platform Bundle contains all Supervisor and module firmware images
                  fxos-9000-k9.2.4.1.101.gSPA
                platform   encryption    version     [g]db [S]igned [S]pecial key revision
                                                                  or [P]roduction
    •   FXOS creates an environment for security applications
    •   Supervisor automatically selects components to upgrade
    •   Relevant components are reloaded automatically during the upgrade
• Firepower 1000 and 2100 FTD or ASA bundle includes virtual FXOS
                                             #CLUS       BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   26
Firepower Supervisor CLI Interface
•   FXOS uses object-based CLI representation similar to UCS Manager
    •   scope, enter, or exit select a command mode within the hierarchy
    •   create instantiates a new configuration object within the hierarchy
    •   set assigns a value to a configuration variable or object
    •   show displays object content
    •   commit-buffer applies changes to the running configuration
        FP9300# scope eth-uplink
        FP9300 /eth-uplink # scope fabric a
        FP9300 /eth-uplink/fabric # create port-channel 2
        FP9300 /eth-uplink/fabric/port-channel* # create member-port 1 11
        FP9300 /eth-uplink/fabric/port-channel* # create member-port 1 12
        FP9300 /eth-uplink/fabric/port-channel* # set speed 10gbps
        FP9300 /eth-uplink/fabric/port-channel* # commit-buffer
        FP9300 /eth-uplink/fabric/port-channel # exit
                                        #CLUS       BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   29
    Architecture and Logical Packet Flow
         FTD
                                                                   Main Access                               IP Reputation,
                                                                      Policy                                       SI
                                                                      New                       Exist
                                                                                                ing            Anomaly,
                                                                    Flow Lookup
                                                                                                              NGIPS, AMP
         Advanced Inspection Modules (“Snort”)
         Data Plane (“Lina”)                                      Pointer
                         Prefilter
                                             Flow Creation         Normalization                           Verdict
                          Policy
                        New                                                        Fastpath
                                     Exist
Packet     Ingress                   ing                                                                           Egress                          Packet
 RX
                       Flow Lookup            Clustering                   VPN
           Checks                                                                                                  Checks                            TX
                                               Reinject
                                                  #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public     30
   Monitoring System Utilization
   •   Data Plane (Lina)
                    ftd# show cpu detailed
                    Break down of per-core data path versus control point cpu                           usage:
                    Core         5 sec            1 min            5 min                                                             Control Plane
Data Plane (most    Core 0       2.0 (2.0 + 0.0) 1.1 (1.1 + 0.0) 0.9 (0.9 +                             0.0)                      (network control and
 transit traffic)   Core 1       3.2 (3.2 + 0.0) 1.8 (1.8 + 0.0) 1.5 (1.5 +                             0.0)                     application inspection)
                    […]
                    Core 35      0.0 (0.0 + 0.0) 0.0 (0.0 + 0.0) 0.0 (0.0 +                             0.0)
                                                        #CLUS        BRKSEC-3035    © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   31
NGFW Interface Modes
•   Must choose routed or transparent at deployment
                 10.1.1.0/24              10.1.2.0/24          Transparent                            FTD
        Routed                   FTD                                                inside                              outside
                     inside               outside
                                                                                                DMZ           10.1.1.0/24
                               DMZ 10.1.3.0/24
                                                              #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   32
NGIPS Interface Modes
•   Any unused interface in routed/transparent can be in NGIPS mode
Inline               FTD             Inline Tap             FTD                          Passive                                    FTD
            Eth1/1          Eth1/2                Eth1/1               Eth1/2                                   Eth1/1
    •   Inline pairing at physical/Etherchannel level; inline sets allow asymmetry
    •   True pass-through mode for VLAN
    •   LACP pass-through is supported with standalone interfaces in FXOS 2.3.1
•   Most classic firewall functionality is disabled
    •   All security policies still apply
    •   Data Plane tracks connections for HA/clustering with no state enforcement
    •   NAT, application inspection, and similar ASA-style functionality is disabled
    •   Flow Offload is not triggered
                                                    #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   33
Prefilter Policy
•   First access control phase in Data Plane for each new flow
    •   Block: Deny the flow without any further processing
    •   Fastpath: Allow and process entirely in Data Plane, attempt Flow Offload
    •   Analyze: Pass for evaluation in Main ACP, optionally assign tunnel zone
•   Not a “high performance” substitute to true NGFW policies
    •   Non-NGFW traffic match criteria
    •   Limited early IP blacklisting
    •   Tunneled traffic inspection
    •   Accelerating high-bandwidth and latency-sensitive trusted flows
                                              #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   34
Main Access Control Policy
•   Second and final access control phase in Snort
    •   Block [with reset]: Deny connection [and TCP RST]
    •   Interactive Block [with reset]: Show HTTP(S) block page [and TCP RST]
    •   Monitor: Log event and continue policy evaluation
    •   Trust: Push all subsequent flow processing into Data Plane only
    •   Allow: Permit connection to go through NGIPS/File inspection
•   Appropriate place for implementing NGFW policy rules
                                             #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   35
FlexConfig Policies
•   Device-level free form CLI policies that follow ASA syntax
    •   Supports pre-defined object templates and completely custom objects
    •   Natively managed feature commands are blocked
    •   Must push an object with negated commands to remove
•   FlexConfig is only supported on best-effort basis
•   Deploy Once; Everytime is for interactions with managed features
•   Always select Append rather than Prepend type
                                           #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   36
Security
Applications on
Firepower 4100
and 9300
Security Applications Overview
•   ASA or FTD are Primary applications in Native or Container mode
    •   Native application consumes full hardware resources of an entire module
    •   Firepower 4100 and 9300 support multiple FTD Container instances in FXOS 2.4.1
    •   All modules in a chassis run same primary application for now
•   A Decorator application shares a module with a Native primary application
    •   Traffic flows from network interfaces through a decorator to primary application
    •   Service chaining with Radware vDefensePro decorator and ASA or FTD 6.2+
    •   Not supported with Container applications at this time
                                              #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   38
Radware vDefensePro Summary
                         Application             Server             Network
                        Behavioral  HTTP
                         Behavioral HTTP      DNS Protection
                                              DNS Protection      Behavioral  DoS
                                                                   Behavioral DoS
                        Flood
                         Flood Protection
                               Protection
                                                Anti-Scan
                                                Anti-Scan         SYN  Protection
                                                                   SYN Protection
           Available    Server
                         Server Cracking
                                Cracking
           Services                          Connection  Limit
                                              Connection Limit     Out-Of-State
                                                                    Out-Of-State
                           Signature
                            Signature          Connection PPS
                           Protection
                           Protection       Per-flow PPS Limit   Blacklist/Whitelist
                                                                       BL/WL
                                                   Limit
                                                      #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   39
   Firepower 9300 Native Application Deployment
 Logical
 Device                                           FTD Cluster
                Security Module 1               Security Module 2               Security Module 3                                                 Primary
Application
 Instance                FTD                            FTD                                    FTD                                               Application
                                                                                                                                                 Decorator
  Link              DDoS                           DDoS                               DDoS
Decorator                                                                                                                                        Application
                                                                                                                                                  Logical
              Supervisor         Data Outside             Data Inside                                                                           Packet Flow
                                      PortChannel2            PortChannel1
                 Ethernet1/7
               (Management)
                                                          #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   40
                                                                                                                                                           Reference
                                                           #CLUS           BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   41
                                                                                                                                                   Reference
                                                     #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   42
  Smart Licensing
Cisco applications request feature license       Third-party applications may
  entitlements from Supervisor or FMC             use out-of-band licensing
                                                         #CLUS       BRKSEC-3035    © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   43
Management Overview
•   Chassis management is independent from applications
    •   On-box chassis manager UI, CLI, and REST
    •   SNMP and syslog support for chassis level counters/events on Supervisor
•   Applications are managed through their respective interfaces
    •   CLI, REST API (except 1100 and 2100), ASDM, CSM, and CDO for ASA
    •   Off-box FMC, FMC REST API, and CDO (1100 and 2100 only for now) for FTD
    •   Device API-driven on-box FDM (1100 and 2100 only for now) for FTD
    •   Off-box APsolute Vision for Radware vDP
•   Future off-box FMC support for both chassis and FTD management
    •   Already supported on Firepower 2100
                                            #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   44
    Automated Initial Provisioning
    •   FXOS 2.6.1 added remote provisioning on Firepower 4100 and 9300 only
                                                                                                DHCP Server
                                                         #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   45
Multi-Instance
Capability on
Firepower 4100
and 9300
Multi-Instance Capability Summary
•   Supported on Firepower 4100 and 9300 only
•   Instantiate multiple logical devices on a single module or appliance
    •   FTD application in 6.3, a mix of FTD and ASA instances in the future
    •   Leverage Docker infrastructure and container packaging
•   Complete traffic processing and management isolation
•   Physical and logical interface and VLAN separation at Supervisor
        FTD Instance A    FTD Instance B      FTD Instance C           FTD Instance D              ASA Instance A (Future)
           10 CPU            6 CPU                                        10 CPU
                                                 12 CPU                                                    12 CPU
                                                                   #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   47
Anatomy of a Container Instance
•   Each instance uses from 6 logical CPU cores up to the platform maximum
    •   User-defined assignment with a 2-core step, skipping 8; e.g.: 6, 10, 12, …
    •   Memory size is automatically selected based on configured CPU core count
    •   Instance restart is required to change resource configuration, so use stateful HA
•   Automatic CPU core allocation between internal components based on size
    •   System/Management process always takes 2 logical cores
             FTD Docker Container (Instance A)              FTD Docker Container (Instance B)
                         Advanced        System/                                Advanced                         System/
          Data Plane                                    Data Plane
                         Inspection    Management                               Inspection                     Management
                                       FXOS Docker Environment
             CPU          Memory          Disk              CPU                  Memory                                Disk
                                      Firepower Module or Appliance
                                                    #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   48
Instance Scalability by Platform
                                                     CPU core count divided by at                          Disk space divided by 48Gb of
•   Lower of the two limits:                          least 6 cores per instance                            required space per instance
                                 Total Application   Native CPU Core Allocation   Total Application                    Maximum FTD Instances
            Platform
                                   CPU Cores         (Data Plane/Snort/System)          Disk                    CPU Bound                        Disk Bound
    Firepower 4110                      22                     8/12/2                  150Gb                            3                                3
                                                                    #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   49
Performance
•   All inter-instance communication occurs through Supervisor
•   Docker form factor itself has minimal effect on performance
    •   Single full-blade instance performance is same as native application
•   Main performance impact comes from additional System cores
    •   SM-44: 28 System cores with 14 instances → 33% overall impact
    •   Price to pay for independent and predicable management
    •   Partially offset by a more favorable inter-component CPU core allocation
•   Future support for Clustering, Flow Offload, and Hardware Crypto Engine
                                             #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   50
                                                                                                                          Reference
   6           2/2/2
  10           4/4/2
  12           4/6/2
  14           4/8/2
  16           6/8/2
  18           6/10/2
  20           8/10/2
  22           8/12/2
                                  #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   51
                                                                                                                                                    Reference
   6           2/2/2               28           10/16/2
  10           4/4/2               30           10/18/2
  12           4/6/2               32           12/18/2
  14           4/8/2               34           12/20/2
  16           6/8/2               36           12/22/2
  18           6/10/2              38           14/22/2
  20           6/12/2              40           14/24/2
  22           8/12/2              42           14/26/2
  24           8/14/2              44           16/26/2
  26           8/16/2              46           16/28/2
                                                         #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   52
                                                                                                                                                    Reference
   6           2/2/2               28           12/14/2
  10           4/4/2               30           12/16/2
  12           4/6/2               32           14/16/2
  14           6/6/2               34           14/18/2
  16           6/8/2               36           16/18/2
  18           8/8/2               38           16/20/2
  20           8/10/2              40           18/20/2
  22          10/10/2              42           18/22/2
  24          10/12/2              44           20/22/2
  26          10/14/2              46           20/24/2
                                                         #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   53
                                                                                                                                                              Reference
 88           38/48/2
 90           38/50/2
 92           40/50/2
 94           40/52/2
                                       #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   60
                                                                                                                                                              Reference
                                              #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   63
 Network Interfaces
 •   Supervisor assigns physical, EtherChannel, and VLAN subinterfaces
     •   FXOS supports up to 500 total VLAN subinterfaces in FXOS 2.4.1
     •   FTD can also create VLAN subinterfaces on physical and EtherChannel interfaces
 •   Each instance can have a combination of different interface types
     Ethernet1/1-3    Ethernet1/4-5
                                               PortChannel1.100-101                                                   PortChannel2
Supported Modes: Routed, Transparent,    Supported Modes: Routed (no BVI                       Supported Modes: Management,
Inline, Inline-tap, Passive, HA          members), HA                                          Eventing
Supported Traffic: unicast, broadcast,   Supported Traffic: unicast,                           Supported Traffic: unicast,
multicast                                broadcast, multicast                                  broadcast, multicast
                                                           #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   64
                                                                                                                                                        Reference
Default prefix derived from a chassis MAC or user-defined Counter that increments for every interface
                                                         #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   65
Network Interface Scalability
•   Supervisor has strict hardware limits on forwarding tables
    •   Use show detail under scope fabric-interconnect to monitor
    •   Limits apply across all standalone modules in a chassis or a cluster
•   Ingress VLAN Group Entry Count defines maximum FXOS VLAN ID count
    •   Up to 500 total entries or unique Supervisor VLAN subinterfaces
    •   Re-using same VLAN ID under two parent interfaces consumes 2 entries
•   Switch Forwarding Path Entry Count limits shared interfaces
    •   Up to 1021 TCAM entries for ingress/egress path programming
    •   Each Dedicated data interface consumes at least 2 entries
    •   Entries for Shared Data interfaces grow exponentially with instance count
                                              #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   66
Interface Scalability Best Practices
•   Refer to FXOS documentation for real-world examples
•   Minimise the number of Shared Data (sub)interfaces
    •   A single instance can have up to 10 shared (sub)interfaces
    •   A single (sub)interface can be shared with up to 14 instances
•   Sharing an interface across a subset of instances scales better
•   Share subinterfaces rather than physical interfaces
    •   One parent interface is best, multiple parents is also acceptable
    •   2 Dedicated, 10 Shared physical: 69% TCAM usage at 5 instances
    •   10 Dedicated, 10 Shared subinterfaces: 46% TCAM usage at 14 instances
                                              #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   67
Management and Licensing
•   After FXOS 2.4.1 upgrade, must Reinitialize a module to deploy instances
•   Different instances look and feel like completely independent FTD devices
    •   Software upgrades, restarts, and configuration management are isolated
    •   Each FTD instance has separate management IP, so add to FMC separately
    •   FTD Expert Mode access is enabled on per-instance basis at provisioning
•   No additional feature license to enable multi-instance capability
•   Each FTD subscription license is shared by all instances on a module
    •   License sharing requires all instances to be managed by a single FMC
    •   With multiple FMCs, each requires a separate set of FTD subscriptions
                                             #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   68
Availability and
Scalability
                                                                                                                                            Reference
                                                 #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   70
FTD High Availability and Clustering
•   FTD inherits failover and clustering infrastructure from ASA
    •   Replicates full NGFW/NGIPS configuration and opaque flow state
    •   Supports all NGFW/NGIPS interface modes
    •   Interface and Snort instance (at least 50%) health monitoring
    •   Zero-Downtime upgrades for most applications
•   Ensures full stateful flow symmetry in both NGIPS and NGFW modes
                                        vPC                           vPC
vPC vPC
                                                      #CLUS            BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   71
Multi-Instance High Availability
•   Container instances support inter-chassis HA only
    •   Two instances are configured into an Active/Standby HA pair
    •   Share single physical HA link with one VLAN per instance pair
          FTD Instance A   FTD Instance B                          FTD Instance A        FTD Instance B
              Active          Standby                                 Standby                Active
                                                 HA Link
           Firepower 4100 Chassis 1         HA Pair A: VLAN100     Firepower 4100 Chassis 2
                                            HA Pair B: VLAN101
                                                           #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   72
FTD and ASA Clustering Overview
                     Inter-Chassis Cluster Control Link
                     • Cluster of up to 16 modules across 5+ chassis
                     • Off-chassis flow backup for complete redundancy
                   Switch 1                                Switch 2
                                        Nexus vPC
Chassis 1 Chassis 2
               Supervisor                              Supervisor
             FTD              FTD                   FTD                         FTD
                                         Cluster
             FTD                                    FTD
                              Cluster
                                           #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   74
   New TCP Flow with FTD Inter-Chassis Clustering
    1. Attempt new                            FTD Cluster
                                                                                                                        2. C1M1: Become
  flow with TCP SYN                                                                                                      Owner, add SYN
                                FTD    O                                        FTD    B                              Cookie, send to Server
                                           7. C1M1: Calculate
                              Module 1     off-chassis Backup
                                                                              Module 1
                                           C2M1, send update
           5. C1M1:
Client                          FTD                                             FTD
         Send to Client                                                                M
                              Module 2                                        Module 2                                             Server
    6. C1M1: Calculate
      Director C1M3,
                                FTD    D    4. C2M3: Redirect                   FTD    F
     send flow update                                                                                                     3. Server responds
                              Module 3        to Owner C1M1                   Module 3
                                             from SYN Cookie,                                                             with TCP SYN ACK
                              Chassis 1     become Forwarder                  Chassis 2                                  through another unit
                                                  #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   75
   Equal Cost MultiPath with Traffic Zones
 Standalone switches or
routers are common with                                                                                                    Solution: Create a
 multiple upstream paths                                                                                                   separate Spanned
                                                                                                                          Etherchannel logical
                                 Po10: outside-1             Po11: outside-2
                  BGP/OSPF                                                            BGP/OSPF                          interface per upstream
                                                outside zone                                                            device and group them
                                                                                                                      into a single ECMP Traffic
                                                                                                                         Zone with FlexConfig
                           Supervisor                                Supervisor
                      FTD                 FTD                      FTD                      FTD
                                                   Cluster
                      FTD                                          FTD
inside
                                                          #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   76
Inter-Site Clustering with ASA or FTD
•   North-South insertion with LISP inspection and owner reassignment
                   Site A                        Site B
                            Inter-Site
                              Cluster
OTV
                            Inter-Site
                              Cluster
                              OTV
                                         #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   77
                                                                                                                                                    Reference
                                                       #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   78
                                                                                                                                      Reference
                                           #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   79
Transport Layer Security
•   Secure Sockets Layer (SSL) is broken, obsolete and no longer in use
•   Transport Layer Security (TLS) is the current generic protocol layer
                                    ClientHello, Server Name Indication (SNI)
                      Client     ServerHello, ServerCertificate, ServerHelloDone                    Server
        PKI Phase               ClientKeyExchange, ChangeCipherSpec, Finished
                                         ChangeCipherSpec, Finished
                                                 ApplicationData
                                                                                                                      Bulk Data Phase
•   Some detectors do not need full session decryption until TLS 1.3
    •   Cleartext SNI extension indicates where client may be going – spoofable
    •   ServerCertificate contains server identity – legitimate, if CA is trusted
                                                    #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   80
Man-in-the-Middle (MITM) TLS Inspection
•   Two separate TLS sessions with client and server
                           Client Public Key                           FTD Public Key
               FTD (Resign) or Server (Known) Public Key              Server Public Key
                                                           #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   81
Single-Flow Performance Considerations
•   A single stateful flow must be processed by one CPU core at a time
    •   Trying to share a complex data structure leads to race conditions
    •   Stateless parallel processing leads to out-of-order packets
•   No magic trick to single-flow throughput
    •   Deploy more powerful CPU cores
    •   Reduce the amount of security inspection
•   Pay performance price for real security
    •   … or deploy a router or a switch instead
                                            Source: https://science.energy.gov/~/media/ascr/ascac/pdf/reports/2013/SC12_Harrod.pdf
                                               #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   82
Managing Single-Flow Throughput
•   Roughly estimated as overall throughput divided by Snort cores on slide 49
    •   53Gbps of 1024-byte AVC+IPS on SM-44 / 48 Snort cores = ~1.1Gbps
    •   Similar on most high-end ASA, FirePOWER, and Firepower platforms
    •   Reducing impact on all flows from few Superflows is more important
•   Checking if an NGFW automatically reduces inspection is easy
    •   Transfer multiple benign and malicious files over a single SMB session
    •   Use HTTP Pipelining to service multiple requests over one TCP connection
•   “What does your security policy tell you to do?”
    •   NGFW performance capacity must not dictate your security policy
    •   Flow Offload vs Intelligent Application Bypass (IAB)
                                              #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   83
Flow Offload on Firepower 4100 and 9300
•   Trusted flow processing with limited security visibility in Smart NIC
    •    Up to 39.7Gbps of single-flow UDP with 1500-byte packets
    •    Use for long-lived connections only
•   Supports up to 4M offloaded stateful connections in FXOS 2.3.1
•   Static offload for unicast flows on ASA with IP/SGACL in MPF
        policy-map OFFLOAD_POLICY
         class TRUSTED_FLOWS
          set connection advanced-options flow-offload
    •    Offload multicast in transparent mode with 2 bridge group ports in ASA 9.6(2)
•   Prefilter offload policy for IP/TCP/UDP Fastpath rules in FTD 6.1
•   Dynamic Flow Offload for Trusted and Whitelisted flows in FTD 6.3
                                               #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   84
Flow Offload Operation
                   Full Inspection
                   • Dynamically program Offload engine after flow establishment
                   • Ability to switch between Offload and full inspection on the fly
                                               Security Module
            x86 CPU Complex
                                           Full FTD or ASA Engine
Incoming                                        Established
                   Flow Classifier                                                   Rewrite Engine
  traffic                                      trusted flows
            Smart NIC
             Flow Offload
             • Limited state tracking, NAT/PAT, TCP Seq Randomization
             • 20-40Gbps per single TCP/UDP flow, 2.9us UDP latency, 4M tracked flows
                                                 #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   85
                                                                                                                                                                     Reference
                                                                      #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   86
Deployment
Example: FTD
Container
Instances on
Firepower 4100
Firepower Chassis Manager (FCM)
                     #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   88
Logical Device Overview
                      #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   89
Interface Configuration
Dedicated management
                                          #CLUS       BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   90
Adding a Supervisor VLAN Subinterface
Select Subinterface
                          #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   91
Creating Instance Resource Profile
                       #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   92
Adding Container Instance
                          Add new device.
Application type
                                         #CLUS       BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   94
Configuring FTD Instance Size and Management
                     #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   95
Configuring FTD Device Settings
                                              FMC management registration key must
                                                       match the device
                      #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   96
FTD Instance Installation
                        #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   97
     Adding FTD Instance to FMC
FTD application real management IP
                                                                             Add new FTD device
                                           #CLUS          BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   98
                  Reference
Application Use
Cases
                                                                                                                                        Reference
                                               #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   100
                                                                                                                                                 Reference
Services
                                                                                                                    Files           Users
•   Scalable IP and Trustsec policies in single or multiple contexts
•   Same- and inter-site clustering with LISP integration
                                                        #CLUS    BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   101
                                                                                                                                                        Reference
                                   VLAN Trunk
                                                                           Switch
                                                             #CLUS      BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   102
                                                                                                                                                        Reference
                                                           #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   103
                                                                                                                                                               Reference
          RAVPN with ASA Load-Balancing                                   ASA/FTD S2S VPN with Nexus ITD
                                                                                                                       RRI
                    RRI                      RRI                                              RRI
Chassis 1                           Chassis 2                      Chassis 1                                        Chassis 2
                          Mas ter
.10 .20 .30 .10 .20 .30 .10 .20 .30 .40 .50 .60
                                                                 #CLUS         BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   104
                                                                                                                                                  Reference
                                                     #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   105
                                                                                                                                            Reference
                                               #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   106
                                                                                                                                                 Reference
                                                     #CLUS       BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   107
                                                                                                                                                             Reference
Campus
                                                                #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   108
                                                                                                                                                               Reference
Firepower 9300 PAT Pool .11-13 Firepower 9300 PAT Pool .14-16 Firepower 9300 PAT Pool .17-19
ISE NGFW
                                                   #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   110
                                                                                                                                          Reference
                                             #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   111
                                                                                                                                                       Reference
                                                                                                                                            Campus
                                                          #CLUS        BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   112
Closing Remarks
Firepower Platform Summary
•   Next-generation security platform architecture
•   Security service chaining with Cisco and third-party applications
•   Classic stateful firewall, VPN, NGFW, NGIPS, and DDoS protection
•   Powerful multi-instance capability with resource reservation
•   Intra- and inter-chassis clustering for high scalability
•   Flow Offload for real time applications
                                      #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   114
Questions?
Complete your
online session   •   Please complete your session survey
evaluation           after each session. Your feedback
                     is very important.
                 •   Complete a minimum of 4 session
                     surveys and the Overall Conference
                     survey (starting on Thursday) to
                     receive your Cisco Live water bottle.
                 •   All surveys can be taken in the Cisco Live
                     Mobile App or by logging in to the Session
                     Catalog on ciscolive.cisco.com/us.
                     Cisco Live sessions will be available for viewing
                     on demand after the event at ciscolive.cisco.com.
                     #CLUS     BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   116
Continue your education
        Demos in the
                                                      Walk-in labs
        Cisco campus
                            #CLUS   BRKSEC-3035   © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public   117
Thank you
            #CLUS
#CLUS