places in the network: secure internet edge - · pdf filesafe architecture guide places in the...

28
SAFE Architecture Guide Places in the Network: Secure Internet Edge January 2018

Upload: phamdiep

Post on 06-Feb-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

SAFE Architecture Guide Places in the Network: Secure Internet Edge

January 2018

Page 2: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents January 2018

© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

2

Contents Overview

Business Flows

Threats

Security Capabilities

ArchitectureSecure Internet Edge 14

Attack SurfaceUntrusted Layer 2

Perimeter Services Layer 17

Demilitarized Layer 20

VPN Layer 21

Trusted Layer 23

Summary

AppendixA Proposed Design 25

Suggested Components

3

5

8

9

13

15

24

25

26

Page 3: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

3

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Overview January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

OverviewThe Secure Internet Edge is a place in the network (PIN) where a company connects to the public Internet, service providers, partners, and customers. As internal company users reach out to websites, use email and other collaboration tools, and as remote workers and customers reach in, the services of the network must remain both accessible and secure.

The Secure Internet Edge is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs

model the physical infrastructure and Secure Domains represent the operational aspects of a network.

The Secure Internet Edge architecture guide provides:

• Business flows typical for edge locations

• Edge threats and security capabilities

• Business flow security architecture

• Design examples and a parts list

Figure 1 The Key to SAFE. SAFE provides the Key to simplify cybersecurity into Secure Places in the Network (PINs) for infrastructure and Secure Domains for operational guidance.

Management

Security Intelligence

Secure Services

Threat Defense

Compliance Segmentation

Places in the Network (PINs) Domains

Page 4: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

4

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Overview January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Architecture Guides

SecureData Center

SecureCloud

SecureWAN

SecureInternet Edge

SecureBranch

SecureServices

Threat Defense

Segmentation

Compliance

SecurityIntelligence

Management SecureCampus

Design Guides

SAFEOverview

Capability Guide

Operations GuidesDesign Guides

SECU RE DOMAINSPL ACES IN THE NE T WO RK

T H E K E Y T O S A F E

YOU ARE

HERE

SAFE simplifies security by starting with business flows, then addressing their respective threats with corresponding

security capabilities, architectures, and designs. SAFE provides guidance that is holistic and understandable.

Figure 2 SAFE Guidance Hierarchy

Page 5: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

5

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Business Flows January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Business FlowsThe Secure Internet Edge does not have local users; it is the main security choke point between the internal company and external users.

• Internally, employees located in campus or branch locations require access to external application services (voice, video, email) and the Internet.

• Third parties, such as service providers and partners, require remote access to applications and devices.

• Customers access portals to their personal or financial information.

Figure 3 Edge business use cases are color coded to define where they flow.

Employee researching product information

Field Engineer updating work order

Connected device with remote vendor support

Guest accesing the Internet to watch hosted video

Customer making purchase

CEO sending email to shareholder

Cus

tom

erTh

ird P

arty

Inte

rnal

Page 6: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

6

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Business Flows January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Functional ControlsEdge business flows direct the type of functional controls that are used to secure them.

Secure Applications Applications require sufficient security controls for protection.

Secure Remote Access Secure remote access for employees and third-party partners that are external to the company network.

Secure Communications Email, voice, and video communications connect to potential threats outside of company control and must be secured.

Secure Web Access Web access controls enforce usage policy and help prevent network infection.

Figure 4 Internet Edge business flows map to functional controls based on the types of risk they present

Secure web access for employees: Employee researching product information

Secure remote access for employees: Field Engineer updating work order

Secure remote access for third party: Connected device with remote vendor support

Secure web access for guests: Guest accesing the Internet to watch hosted video

Secure applications for PCI: Customer making purchase

Secure communications for email: CEO sending email to shareholder

Cus

tom

erTh

ird P

arty

Inte

rnal

Page 7: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

7

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Business Flows January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Capability GroupsInternet Edge security is simplified using foundational, access and business capability groups. Each flow requires the foundational group. Additional business activity risks require appropriate controls as shown in figure 5.

User and Device capabilities are located where the flow originates within the Campus, Branch or external locations (Non-Internet Edge Capabilities).

For more information regarding capability groups, refer to the SAFE overview guide.

Figure 5 The Secure Internet Edge Business Flow Capability Diagram

Edge Capabilities Non-Edge Capabilities

Identity Client-BasedSecurity

PostureAssessment

Identity Client-BasedSecurity

PostureAssessment

Identity Client-BasedSecurity

Identity Client-BasedSecurity

Identity Client-BasedSecurity

PostureAssessment

FlowAnalytics

IntrusionPrevention

Firewall ThreatIntelligence

Anti-Malware

AVC

FlowAnalytics

IntrusionPrevention

Firewall ThreatIntelligence

Anti-Malware

WebSecurity

Client-BasedSecurity

FlowAnalytics

IntrusionPrevention

Firewall ThreatIntelligence

Anti-Malware

EmailSecurity

Host-BasedSecurity

DDoS WAFVPNConcentrator

AVC WebSecurity

WIPS

DDoSVPNConcentrator

Host-BasedSecurity

DDoS WAFSSL/TLSO­oad

PostureAssessment

FlowAnalytics

IntrusionPrevention

Firewall ThreatIntelligence

Anti-Malware

FlowAnalytics

IntrusionPrevention

Firewall ThreatIntelligence

Anti-Malware

FlowAnalytics

IntrusionPrevention

Firewall ThreatIntelligence

Anti-Malware

Cus

tom

erTh

ird P

arty

Inte

rnal

Website

Engineer

Website

RemoteTechnician

Shareholder

Employee

Work�ow Application

Guest

Thermostat

Customer E-commerce

CEO

Secure web access for employees: Employee researching product information

Secure remote access for employees: Field Engineer updating work order

Secure web access for guests: Guest accesing the Internet to watch hosted video

Secure remote access for third party: Connected device with remote vendor support

Secure communications for email: CEO sending email to shareholder

Secure applications for PCI: Customer making purchase

VPN

VPN

BUSINESS FOUNDATIONAL ACCESS

Secure Internet Edge threats and capabilities are defined in the following sections.

Page 8: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

8

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Threats January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

ThreatsThe Internet Edge connects the internal company to the external world and all its associated dangers. Employees, partner and customer users use a combination of services such as email, browse the web, and collaborate. The attack surface is particularly dangerous as most threats originate or coordinate services exposed from the Internet.

The Internet Edge has four primary threats.

Web server vulnerabilities

Web servers with poorly coded applications are susceptible to threats such as SQL Injections, Cross Site Scripting (XSS) and Request Forgery. These allow an attacker to read, alter, or delete data. Compromised servers enable attackers to execute scripts in the victim's browser which can hijack user sessions, deface websites, or redirect the user to other malicious sites.

Distributed denial of service (DDoS)

An attack utilizing multiple sources of traffic which overwhelmes the capabilities of a system. These connections overload systems and stops all normal operation.

Data loss

The internet edge is a choke point for traffic exiting the company. Data theft via email and compromised web sessions occurs commonly through these flows.

Man-in-the-Middle (MitM)

An attacker inserts themselves in to the communications between the company and their partners or customers. Compromised email, web proxies, or DNS name services enable traffic interception and redirection with out the knowledge of the parties.

The defense is explained throughout the rest of the document.

Page 9: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

9

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Security Capabilities January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Figure 6 Secure Internet Edge Attack Surface and Security Capabilities

Security CapabilitiesThe attack surface of the internet edge is defined by the business flow, which includes the people and the technology present. The security capabilities that are needed to

respond to the threats are mapped in Figure 6 and defined in Table 1. The placement of these capabilities are discussed in the architecture section.

Atta

ck S

urfa

ce

HUMAN APPLICATIONSDEVICES NETWORK

Secu

rity

Users Endpoints Wired Wireless Analysis WAN Cloud Services

Identity Firewall Anti-Malware

Network WirelessConnection

ThreatIntelligence

IntrusionPrevention

FlowAnalytics

Client PublicEmployees,Third Parties,

Customers, andAdministrators

ServerLoad Balancer

Storage

VPN Concentrator

Distributed Denialof Service

Cloud Security

Web Security

Web ApplicationFirewall

ApplicationVisibility

Control (AVC)

SSL/TLSO�oad

MalwareSandbox

EmailSecurity

Server-BasedSecurity

Public/HybridCloud

Page 10: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

10

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Security Capabilities January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Table 1 Secure Internet Edge Attack Surface, Security Capability, and Threat Mapping

Internet Edge Attack Surface

Human Security Capability Threat

Users: Remote employees, third parties, customers and administrators.

Identity: Identity-based access.

Attackers accessing restricted information resources.

Devices Security Capability Threat

Clients: N/A Typically, user devices are not physically present within the Internet Edge.

N/A: Relevant to the policy of the remote user.

Dependent on the environment of remote user, customer, or partner.

Network Security Capability Threat

Wired Network: Physical network infrastructure; routers, switches, used to connect trusted, untrusted, perimeter services, VPN, and service layers together.

Firewall: Stateful filtering and protocol inspection between Internet Edge layers.

Unauthorized access and malformed packets between layers of the Internet Edge.

Intrusion Prevention: Blocking of attacks by signatures and anomaly analysis.

Attacks using worms, viruses, or other techniques.

Wireless Network: The Internet Edge is used to anchor guest traffic from other PINs to centralize insecure traffic.

Wireless services:Wireless detection and anomalies detected in branch and campus PIN.

Attacks on the infrastructure via wireless technology.

Analysis: Analysis of network traffic within the Internet Edge layers.

Anti-Malware: Identify, block, and analyze malicious files and transmissions.

Malware distribution across networks or between servers and devices.

Threat Intelligence: Contextual knowledge of existing and emerging hazards.

Zero-day malware and attacks.

Flow Analytics: Network traffic metadata identifying security incidents.

Traffic, telemetry, and data ex-filtration from successful attacks.

Page 11: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

11

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Security Capabilities January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Network (cont.) Security Capability Threat

WAN: Public and untrusted Wide Area Networks that connect to the company, such as the Internet.

DDoS Protection: Protection against scaled attack forms.

Massively scaled attacks that overwhelm services.

VPN Concentrator: The Internet Edge consolidates remote users for encrypted remote access.

Exposed services and data theft of remote workers and third parties.

Web Security Appliance: Advanced analysis and filtering of web communications.

Redirection to malicious URLs and data loss.

Cloud

Cloud Security: Web, DNS, and IP-layer security and control in the cloud for the campus.

Attacks from malware, viruses, and redirection to malicious URLs.

DNS Security Redirection of user to malicious website.

Cloud-based FirewallUnauthorized access and malformed packets connecting to services.

Software-Defined Perimeter (SDP/SD-WAN):

Easily collecting information and identities.

Web Security:Internet access integrity and protections.

Infiltration and ex-filtration via HTTP.

Web Reputation/Filtering:Tracking against URL-based threats.

Attacks directing to a malicious URL.

Cloud Access Security Broker (CASB)

Unauthorized access and Data loss.

Page 12: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

12

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Security Capabilities January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Applications Security Capability Threat

Applications: Servers, database, load balancer.

Server-Based Security: Anti-virus, anti-malware, firewall, DNS security.

Viruses or malware compromising systems.

Anti-Malware: Identify, block, and analyze malicious files and transmissions.

Malware distribution across servers.

Anti-Virus Viruses compromising systems.

Cloud Security Redirection of session to malicious website.

Host-based FirewallUnauthorized access and malformed packets connecting to server.

Email Security: Inspects email communications.

Phishing, MitM, malicious attachments, and data loss.

TLS Encryption Offload: Accelerated encryption of data services.

Theft of unencrypted traffic.

Web Application Firewalling: Advanced application inspection and monitoring.

Attacks against poorly developed applications and website vulnerabilities.

Management Security Capability

These security capabilities are required across all PINs:

• Identity/authorization• Policy/configuration• Analysis/correlation• Monitoring• Vulnerability management• Logging/reporting• Time synchronization/NTP

Get details on these management security capabilities in the SAFE Management Architecture Guide.

Page 13: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

13

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Architecture January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

ArchitectureSAFE underscores the challenges of securing the business. It enhances traditional network diagrams to include a security-centric view of the company business. The Secure Internet Edge architecture is a logical grouping of security and network technology that supports Internet Edge business use cases.

SAFE business flow security architecture depicts a security focus. Traditional design diagrams that depict cabling, redundancy, interface addressing, and specificity are depicted in SAFE design diagrams. Note that a SAFE logical architecture can have many different physical designs.

vFirepower Appliance vSwitch

vSwitch

vFirepower Appliance

vRadware Appliance

vSwitch

Secure Server

Secure Server

vRouter

vFirepower Appliance vRadware Appliance vSwitch Secure Server

ComparativeShopping Website

Third-party Technicianaccessing logs

Customermaking purchase

Shareholder receivingemail from CEO

Techniciansubmitting task

Product InformationWebsite

Wholesaler Website

DatabaseZone

Work owApplication

PaymentApplication

vSwitch Storage ServervFirepower Appliance

Application VisibilityControl (AVC)

AnomalyDetection

Web Reputation/Filtering/DCS

Anti-Malware

Threat Intelligence

DistributedDenial of Service

Protection

IdentityAuthorization

DNS Security

HostedE-Commerce

Services BusinessUse Cases

Web Security Guest Wireless

Switch

CommunicationsManager

Switch Router

Wireless Controller

Firepower Appliance

Distribution Switch Core Switch

Corporate Device

WirelessAccess Point

Wireless Guest

Employee Phone

Environmental Controls

Corporate Device Switch

Switch

Firepower Appliance

AccessEndpoints

Endpoints

BusinessUse Cases

Distribution Core Services

Building Controls

Subject MatterExpert

CEO sending emailto Shareholders

Guest browsing

Employee browsing

BUILDING BLOCK CORE BLOCK

Blade Server

Router Switch Firepower Appliance Switch

Services

TrustedEnterpriseUntrusted

DMZ

VPN

Perimeter ServicesWireless Controller

FirepowerAppliance

Switch RadwareAppliance

Switch Secure Server SwitchSwitchRouter

FirepowerAppliance

DMVPNSwitchRA VPN

Services Core Distribution EndpointsAccess BusinessUse Cases

Database

PaymentApplication

Work owApplication

CommunicationServices

Communications Manager

Secure Server

Nexus SwitchDistribution Switch

FMC

Wireless Controller

Nexus SwitchFirepower Appliance

Radware Appliance

Radware Appliance

Nexus Fabric Switch

Nexus Fabric Switch

Blade Server

Hyper ex Server

Secure Server

Secure Server

Nexus Fabric SwitchNexus Switch

Adaptive SecurityAppliance

Firepower Appliance

Adaptive SecurityAppliance

Corporate Device

Access Switch

Employee Phone

Environmental Controls

Wireless Controller

Switch Router

AccessBusinessUse Cases

WirelessAccess Point

Services

Wireless Guest

Corporate Device

Building Controls

Subject MatterExpert

Branch Managerbrowsing information

Customer browsing prices

Clerk processingcredit card

Server

SwitchEmail Security

FirepowerAppliance

SwitchWeb Security

Internet

R E M O T E U S E R S

PaymentApplication

Cloud

Bran

ch

Cam

pus

WAN

Data

Cen

ter

Edge

SERVICESAPPLICATIONSNETWORK

NETWORK

SERVICES

DEVICESHUMAN NETWORK APPLICATIONS

NETWORK

SERVERS APPLICATIONSNETWORK

DEVICESHUMAN NETWORK APPLICATIONS

Figure 7 SAFE Model. The SAFE Model simplifies complexity across a business by using Places in the Network (PINs) that it must secure.

Page 14: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

14

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Architecture January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Switch Wireless ControllerEmail Security

FirepowerAppliance

FirepowerAppliance

SwitchWeb Security

Switch RadwareAppliance

Switch Secure Server

Website

Wholesaler Website

Shareholder receivingemail from CEO

Customermaking purchase

Field Engineersubmitting work order

Third-party Technicianaccessing logs

SwitchPayment

ApplicationSwitchRouter

FirepowerAppliance

DMVPNSwitchRA VPN

TrustedEnterpriseUntrusted

DMZ

VPN

Perimeter Services

T O T H EE N T E R P R I S E

C O R E

T O T H EI N T E R N E T

Corporate Guest accessing Internet

CEO sending email to Shareholders

Employeebrowsing

Work�owApplication

BuildingControls

Edge Architecture

NETWORK ATTACK

SURFACE

APPLICATIONATTACK

SURFACE

Secure Internet EdgeThe Secure Internet Edge architecture is logically arranged into five layers to provide a company with several lines of defense from the threats that exist in public networks. It connects the dangers of the untrusted Internet to the trusted internal company; certain cautionary layers are used to protect public-facing services without exposing the internal company directly. Each of these layers

supports the different business functions and security control points. They are separated because of the need for layered defense that provides more security in the event of one compromise point, scalability concerns when one layer needs growth or change, and tailored security controls. These could be consolidated into fewer systems initially that can be increased as the needs grow.

Figure 8 Secure Internet Edge Architecture. The Secure Internet Edge business flows and security capabilities are arranged into a logical architecture. The colored business use cases flow through the green architecture icons with the required blue security capabilities.

Page 15: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

15

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Attack SurfaceThe Secure Internet Edge attack surface consists of Network and Applications. The sections below discuss the security capability that defends the threats associated with each layer of the surface. Note that the capability might be a service that is supplied

from another PIN. For example, the Identity service is prompted to a human, on a user’s device, enforced at the switch, and served from the Data Center. However, for the sake of simplifying, Identity is depicted logically where the risk exists

Untrusted LayerThe untrusted layer connects the Internet, partners, service providers, and customers directly to the company. It connects service providers using routers that demark where the public domain ends and the internal company begins. All public traffic can access these edge routers, making this layer susceptible to

threats such as volume-based denial of service attacks (DDoS). Switching infrastructure connects the untrusted layer to the perimeter services, DMZ, and VPN layers, providing visibility into the traffic using analytics.

Business Flows/Functional Controls

• Secure email

• Secure outbound web access

• Corporate employee remote access

• Guest wireless access

• External corporate VPN

• Hosted applications

Primary Security Capability

DDoS Filtering- Router ACLs

Flow Analytics

Switch Wireless ControllerEmail Security

FirepowerAppliance

FirepowerAppliance

SwitchWeb Security

Switch RadwareAppliance

Switch Secure Server SwitchPayment

ApplicationSwitchRouter

FirepowerAppliance

DMVPNSwitchRA VPN

TrustedEnterpriseUntrusted

DMZ

VPN

Perimeter Services

T O T H EE N T E R P R I S E

C O R E

T O T H EI N T E R N E T

Figure 9 Untrusted Layer

Guest web access Employee web access Email communications Secure applications Employee remote access Third party remote access

Page 16: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

16

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Design Considerations for the Untrusted Layer

• Implement out-of-band management for all systems in the edge using dedicated management interfaces and Virtual Route Forwarding (VRF) or console access for high-security implementations.

• Segment the untrusted layer from all other edge layers by implementing separate physical switches which are used to connect each of the layers for common egress.

• Implement edge DDoS capabilities in conjunction with service provider DDoS services for offloading volumetric attacks.

Edge Routers

• Contains the edge routing capability and forms the first layer of defense for the Internet edge.

• Implement authenticated routing protocols.

• Use physical versus virtual segmentation.

• Implement infrastructure access control list filtering for all inbound and outbound packets allowing only public addresses.

• Block spoofed packet flows with Unicast Reverse Path Forwarding (RPF).

BGP Considerations

• Use Border Gateway Protocol (BGP) with authentication as the routing protocol for all dynamic routing—both between the border routers and between the border routers and the service provider or partner.

• Have an independent autonomous system number. This will give the flexibility of advertising your Internet prefix to different service providers and partners, optimizing communications.

• BGP TTL security check – The BGP support for the time-to-live (TTL) security check feature introduces a lightweight security mechanism to protect eBGP peering sessions from CPU utilization-based attacks. These types of attacks are typically brute-force DoS attacks that attempt to disable the network by flooding the network with IP packets that contain forged source and destination IP addresses.

Page 17: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

17

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Perimeter Services LayerThe perimeter services layer segments the connections of the other layers and has all of the core security and inspection capabilities

necessary to protect. Man in the Middle attacks and data loss via exfiltration are mitigated at the perimeter.

Figure 10 Perimeter Services Layer

Switch Wireless ControllerEmail Security

FirepowerAppliance

FirepowerAppliance

SwitchWeb Security

Switch RadwareAppliance

Switch Secure Server SwitchPayment

ApplicationSwitchRouter

FirepowerAppliance

DMVPNSwitchRA VPN

TrustedEnterpriseUntrusted

DMZ

VPN

Perimeter Services

T O T H EE N T E R P R I S E

C O R E

T O T H EI N T E R N E T

Design Considerations for the Perimeter Services Layer

The perimeter services layer contains the wired, email, web, and wireless security platforms.

Wired Security

The perimeter security is enforced by next-generation firewalling and intrusion prevention.

Business Flows

• Secure email

• Guest wireless access

• Secure outbound web access

Primary Security Capability

Firewall IPS Anti- Malware

Threat Intelligence

Flow Analytics

The corporate access policies are enforced by edge firewalls in this layer. Multiple appliances should be used to provide redundancy and implemented in active/standby mode. This simplifies inspection capabilities and ensures that no traffic loss occurs in the event of a failover.

Key objectives of firewall requirements:

• All users and guests must be able to access the Internet.

• All HTTP/HTTPS traffic must pass through web security.

• Allow only authorized DNS queries.

• Only web, email, and some Internet Control Message Protocol (ICMP) traffic are allowed into the network.

• Firewalls should be hardened and configured for redundancy.

• Implement an appropriate policy for intrusion prevention, such as Security over Connectivity.

Guest web access Employee web access Email communications Secure applications Employee remote access Third party remote access

Page 18: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

18

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

• Secure device access by limiting accessible ports, authentication for access, specifying policy for permitted action for different groups of people, and proper logging of events.

• Disable Telnet and HTTP; allow only secure shell (SSH) and HTTPS.

• Secure firewall routing protocols by implementing Message Digest 5 (MD5) authentication.

• Enable firewall network telemetry functionality by using features such as Network Time Protocol (NTP), logging, and NetFlow.

Email Security

Email is a critical communication service used by corporate business people including the CEO, which makes it an attractive target for hackers. The two major threats to email systems are spam and malicious email.

Primary Security Capability

Email Security Anti-Malware

If spam is not properly filtered, its sheer volume can consume valuable resources such as bandwidth and storage, and require network users to waste time manually filtering messages. Legitimate messages may be discarded, potentially disrupting business operations. Failing to protect an email service against spam and malicious attacks can result in a loss of data and network user productivity.

Logically, the email security appliance acts as a Mail Transfer Agent (MTA) within the email delivery chain. There are multiple

deployment approaches for the security appliance depending on the number of interfaces used. The best practice is for the email security appliance to be deployed with a single physical interface to transfer emails to and from both the Internet and the internal mail servers. The edge firewalls should be configured to allow incoming mail from the Internet, and outgoing mail from specific servers in the company.

Other recommendations and best practices for email security deployment:

• A static address must be defined on the firewall to translate a publicly accessible IP address for the email server to a private IP address used by the email security appliance.

• The email security appliance should be configured to access a DNS in the outside network, rather than the internal DNS. This means that the firewall must allow it to perform DNS queries and receive DNS replies.

• The email security appliance downloads the latest threat intelligence information through HTTP/HTTPS connections. Firewall rules must allow HTTP/HTTPS traffic from the email security appliance.

• SMTP routes must be set to point to inside email servers.

• Either the same interface or a separate interface can be used for incoming or outgoing mail. If the same interface is used, mail must be relayed on the interface.

• Use a separate interface to connect to the management network.

Page 19: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

19

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Web Security

Web access is a requirement for the day-to-day functions of most organizations. Companies must maintain appropriate web access while minimizing the impact of unacceptable or risky use.

Primary Security Capability

Cloud Web Security

Web Security Appliance

Implement policy-based web access to help users work effectively, and to ensure that personal web activity does not waste bandwidth, affect productivity, or expose the organization to undue risk, such as very broad threats of viruses and Trojans. The web security appliance is logically placed in the path between corporate web users and the Internet. In effect, it acts as a web proxy for the corporate users residing inside the network.

Other recommendations and best practices for web security deployment:

• Specify policies for handling HTTPS traffic.

• Configure the policies and actions to be taken for the different ranges in the web reputation score based on the reputation

score, pass, monitor, or dropped web traffic.

• The edge firewalls should be configured to allow only outgoing HTTP or Hypertext Transfer Protocol over SSL (HTTPS) connections sourced from the web security appliance to prevent users from bypassing it in order to directly connect to the Internet.

• Use separate interfaces for management.

• Disable unnecessary services (such as Telnet, HTTP) to prevent users from taking advantage of open ports.

Wireless Network

The wireless controller terminates guest wireless communications.

Primary Security Capability

Wireless IDS Wireless IPS

Guest wireless termination within the Internet edge is detailed in the Campus Wireless LAN Technology Design Guide: http://cvddocs.com/fw/355-14b

Page 20: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

20

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Demilitarized LayerThe demilitarized zone (DMZ) is a restricted layer containing both internal and public-facing services. The DMZ has the all of the core security and inspection capabilities

necessary to protect the enterprise.

DMZ threats like Web server vulnerability attacks are protected by the following architectural guidance.

Design Considerations for the Demilitarized Layer

Wired Security

The perimeter security is enforced by firewalling and intrusion prevention.

Corporate access policies are enforced by edge firewalls in this layer. Multiple appliances

should be used to provide redundancy and should be implemented in active/standby mode. This simplifies inspection capabilities and ensures that no traffic loss occurs in the event of a failover.

Figure 11 Demilitarized Layer

Business Flow

• Secure applications

Primary Security Capability

Server-Based SecurityFirewall IPS Anti-

Malware

Threat Intelligence

Flow Analytics

Switch Wireless ControllerEmail Security

FirepowerAppliance

FirepowerAppliance

SwitchWeb Security

Switch RadwareAppliance

Switch Secure Server SwitchPayment

ApplicationSwitchRouter

FirepowerAppliance

DMVPNSwitchRA VPN

TrustedEnterpriseUntrusted

DMZ

VPN

T O T H EE N T E R P R I S E

C O R E

T O T H EI N T E R N E T

Guest web access Employee web access Email communications Secure applications Employee remote access Third party remote access

Anti-Virus Anti-Malware

Cloud Security Host-based Firewall

Page 21: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

21

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

VPN LayerThe Virtual Private Network (VPN) layer connects to the remote places and people who are using untrusted public connections, and requires encryption technology to secure it.

There are two types of VPN connections: site-to-site and remote access.

The VPN layer has the all of the core security and inspection capabilities necessary to protect the company.

Figure 12 VPN Layer

FirepowerAppliance

Switch RadwareAppliance

Switch Secure Server SwitchPayment

ApplicationSwitchRouter

FirepowerAppliance

DMVPNSwitchRA VPN

Untrusted

DMZ

VPNT O T H E

I N T E R N E T

Business Flows

• Corporate employee remote access

• External corporate VPN

Guest web access Employee web access Email communications Secure applications Employee remote access Third party remote access

Page 22: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

22

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Design Considerations for the VPN Layer

Wired Security

The perimeter security is enforced by firewalling and intrusion prevention.

Primary Security Capability

Firewall IPS Anti- Malware

Threat Intelligence

Flow Analytics

The corporate access policies are enforced by edge firewalls in this layer. Multiple appliances should be used to provide redundancy and should be implemented in active/standby mode. This simplifies inspection capabilities and ensures that no traffic loss occurs in the event of a failover.

Site-to-Site VPN

Primary Security Capability

DMVPN Router

Site-to-site VPN secures connections between the Internet edge and other company PINs, employee home offices, and third-party partners.

Remote Access VPN

Primary Security Capability

VPN Concentrator

The remote access virtual private network (RA VPN) layer implements dedicated resources to connect remote users. Employees, contractors, and partners often need to access the network when traveling or working from home or other off-site locations. Many organizations therefore need to provide users in remote locations with network connectivity to data resources.

Secure connectivity to the Internet edge requires:

• Support for a wide variety of endpoint devices.

• Seamless access to networked data resources.

• Authentication and policy control that integrates with the authentication resources used by the organization.

• Cryptographic security to prevent sensitive data from exposure to unauthorized parties who accidentally or intentionally intercept the data.

Page 23: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

23

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Attack Surface January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Trusted LayerThe trusted layer connects the Internet edge to the rest of the internal company network. Typically, this is the data center core that

contains core services needed to securely implement, manage, monitor, and operate the Internet edge.

Design Considerations for the Trusted Layer

Infrastructure protection plays an important role in the Internet edge trusted layer. These best practices are recommended:

• All infrastructure protection hardening, such as management access control lists (ACL), authentication, control plane policing, or Layer-2 hardening, must be implemented

on the inner switches.

• Routing protocols between switches and Cisco Firepower and core routers must be authenticated.

• Implement NetFlow generation, or attach flow generators to span ports to collect detailed traffic telemetry.

Figure 13 Trusted Layer

Wireless Controller

Switch Wireless ControllerEmail Security

FirepowerAppliance

FirepowerAppliance

SwitchWeb Security

Switch RadwareAppliance

Switch Secure Server SwitchPayment

ApplicationSwitchRouter

FirepowerAppliance

DMVPNSwitchRA VPN

TrustedEnterpriseUntrusted

DMZ

T O T H EE N T E R P R I S E

C O R E

T O T H EI N T E R N E T Business Flows

• Secure email

• Secure outbound web access

• Corporate employee remote access

• Guest wireless access

• External corporate VPN

Primary Security Capability

Flow Analytics

Guest web access Employee web access Email communications Secure applications Employee remote access Third party remote access

Page 24: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

24

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Summary January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

SummaryToday’s networks extend to wherever employees are, wherever data is, and wherever data can be accessed. The Internet edge is often the first point of attack and is subsequently the first line of defense.

As a result, technologies must be applied that focus on detecting, understanding, and stopping threats. Attacks can render a company inaccessible from the Internet and

prevent employees from being productive.

Cisco’s Secure Internet Edge architecture and solutions defend the business against corresponding threats.

SAFE is Cisco’s security reference architecture that simplifies the security challenges of today and prepares for the threats of tomorrow.

Page 25: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

25

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Appendix January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Appendix

A Proposed DesignThe Secure Internet Edge has been deployed in Cisco’s laboratories. Portions of the design have been validated and documentation is available on Cisco Design Zone.

Figure 14 depicts the specific products that were selected within Cisco’s laboratories. It is important to note that the Secure Internet

Edge architecture can produce many designs based on performance, redundancy, scale, and other factors. The architecture provides the required logical orientation of security capabilities that must be considered when selecting products to ensure that the documented business flows, threats, and requirements are met.

E1/5

E1/1-4

E1/5

E1/7

E0

E1/6E1/1

G1/0/2 G1/0/1

E1/1

E1/11-18

E1/8

E1/6

E1/5

E1/8

E1/1 E1/1E1/2

E1/2E1/5E1/7

E1/6

E1/6E1/5

E1/1-4

E0E1

G1/0/1G1/0/2

E0 E1

E1/1-4 E1/1-4

E1/8E1/9 E1/6

E1

VLAN104

VLAN105VLAN102

VLAN101

TRUNK

HSRP

HSRP

HSRP

Peer Link

Peer Link

Peer LinkPeer Link

VLAN103

E0E1 E0E1E0 E0E0E1 E0

E1/1-4

E1/8E1/9

E1/1-4 E1/5E1/5

E1/7E1/10 E1/6E1/8E1/9

E1/1-4

E1/7E1/10 E1/6

E1/7E1/5

E1/8E1/9 E1/6

E1/1-4

E1/8E1/9 E1/7

E1/8

E1/2

E1/1

E1/8

E1/8

E1/6

E1/7E1/8 E1/6

E1/3

E1/2

E1/3

E1/8

E1/1

E1/2

E1/1

E1/8

E1/2

E1/1

E1/8

G3/0/1

G3/0/1

E1/9 E1/1-4E1/1-4

E1/11-18

HSRP VLAN301

VLAN302

HSRP

TRUNK

HSRP

VLAN300

HSRP

HSRP

HSRP

HSRP

HS

RP

HS

RP

VLA

N20

1

HSRP

E1/2

E1/1 E1/3

E1/8E1/8

E1/1 E1/3

E1/2

E1/7

E0

VLAN202

VLAN202

VLAN201

RW-ALT-5412

ASA5555-X

WSA690ESA690

FC-5020

Webserver-3Webserver-2Webserver-1

Loadbalancer-1WebAppFW-1SSL-VIP-1

T O T H EE N T E R P R I S E

C O R E

UCSB-5108-AC2w/UCS-FI-M-6324

N3K-C3172PQ-10GEFP-9300-24

FP-9300-24

FP-9300-24

Perimeter Services

DMZ

Untrusted

VPN

Edge Architecture

T O T H EI N T E R N E T

AIR-CT5520

Figure 14 Secure Internet Edge Proposed Design

Page 26: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

26

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Suggested Components January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Suggested ComponentsTable 2 SAFE Design Components for Secure Internet Edge

Internet Edge Attack Surface Internet Edge Security Suggested Components

Human Administrators Typically, no humans are physically present in Internet Edge.

Identity Identity Services Engine

Remote Access VPN AnyConnect

Network Wired Network

Routers, Switches FirewallFirepower Appliance

Adaptive Security Appliance

Intrusion Prevention Firepower Appliance

Analysis

Anti-Malware

Advanced Malware Protection for Endpoints

Advanced Malware Protection for Network

Advanced Malware Protection for Email Security Appliance

Advanced Malware Protection for Web Security Appliance

Threat Intelligence

Firepower Appliance

Adaptive Security Appliance

Aggregation Services Router

Flow Analytics

Nexus and Catalyst Switch

Integrated Services Router

Aggregation Services Router

WANDDoS Protection Cisco Partner

VPN Concentrator

Integrated Services Router

Aggregation Services Router

Firepower Appliance

Adaptive Security Appliance

Page 27: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

27

SAFE Architecture Guide Places in the Network: Secure Internet Edge | Suggested Components January 2018

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Internet Edge Attack Surface Edge Security Suggested Components

Network (cont.) CloudCloud Security

Cisco Umbrella Secure Internet Gateway(SIG)

Cisco Cloudlock

DNS Security Cisco Umbrella Secure Internet Gateway (SIG)

Cloud-based Firewall

Cisco Umbrella Secure Internet Gateway (SIG)

Software-Defined Perimeter (SDP/SD-WAN)

AnyConnect Agent

Cisco Viptela

Meraki

Web Security:Internet access integrity and protections.

Firepower virtual URL

Cisco Umbrella Secure Internet Gateway (SIG)

Web Reputation/Filtering:Tracking against URL-based threats.

Web Security Appliance

Cloud Web Security

Meraki

Cloud Access Security Broker (CASB)

Cloudlock

Web Security

Firepower URL

Web Security Appliance

Umbrella Secure Internet Gateway (SIG)

Applications Service

Servers, Database,

Load Balancer

Server-Based Security

Cisco AMP

Cisco Umbrella

Web Application Firewalling Cisco Partner

TLS Encryption Offload Cisco Partner

Email Security Email Security Appliance

Page 28: Places in the Network: Secure Internet Edge - · PDF fileSAFE Architecture Guide Places in the Network: Secure Internet Edge | Contents September 2016 Contents Overview Business Flows

Return to Contents© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

For more information on SAFE, see www.cisco.com/go/SAFE.

Americas HeadquartersCisco Systems, Inc.San Jose, CA

Asia Paci�c HeadquartersCisco Systems (USA) Pte. Ltd.Singapore

Europe HeadquartersCisco Systems International BV Amsterdam, The Netherlands

Cisco has more than 200 o�ces worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/o�ces.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its a�liates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its a�liates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the

word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Americas HeadquartersCisco Systems, Inc.San Jose, CA

Asia Paci�c HeadquartersCisco Systems (USA) Pte. Ltd.Singapore

Europe HeadquartersCisco Systems International BV Amsterdam, The Netherlands

Cisco has more than 200 o�ces worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/o�ces.