Cisco Moves to the Next Generation with its ASA CX Firewall



Similar documents
How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Integrating Single Sign-on Across the Cloud By David Strom

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Next Generation IPS and Reputation Services

Networking for Caribbean Development

Cisco Advanced Malware Protection

Content Security: Protect Your Network with Five Must-Haves

Readiness Assessments: Vital to Secure Mobility

The Advantages of a Firewall Over an Interafer

Cisco & Big Data Security

Cisco EXAM Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product.

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

Cisco IPS Tuning Overview

Integrating MSS, SEP and NGFW to catch targeted APTs

Lab Testing Summary Report

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Braindumps QA

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Use Cases for ASA CX

Cisco AnyConnect Secure Mobility Solution Guide

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

Cisco Cloud Web Security

Orchestrating your Disaster Recovery with QuorumLabs onq

5nine Virtual Firewall 2.1 for Microsoft Hyper-V

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Next-Generation Firewalls: CEO, Miercom

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

Unified Security, ATP and more

WEBSENSE TRITON SOLUTIONS

Internet Content Provider Safeguards Customer Networks and Services

IBM Security IBM Corporation IBM Corporation

The Cisco ASA 5500 as a Superior Firewall Solution

McAfee Network Security Platform

isheriff CLOUD SECURITY

Deploying Firewalls Throughout Your Organization

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Full version is >>> HERE <<<

Shootout results: Best security tools for small business

Dell SonicWALL report portfolio

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Security Manager

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

Fidelis XPS Tech Talk: Preventing Cyber Attacks With Real-Time Threat Intelligence. June 2010 Version 1.0 PAGE 1 PAGE 1

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Introducing IBM s Advanced Threat Protection Platform

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Comprehensive real-time protection against Advanced Threats and data theft

Firewall Testing Methodology W H I T E P A P E R

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Check Point submitted the SWG Secure Web Gateway for

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Intelligent Business Solutions MALLSFORCE. Mall Management System

DYNAMIC DNS: DATA EXFILTRATION

Firewalls Overview and Best Practices. White Paper

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

PROACTIVE PROTECTION MADE EASY

WhatWorks in Detecting and Blocking Advanced Threats:

Cisco RSA Announcement Update

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Symantec Endpoint Protection

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

CASE STUDY. NEXON ASIA PACIFIC Nexon Securely Onboards 25 Cloud Customers in Only Eight Months

The Importance of Cybersecurity Monitoring for Utilities

ENABLING FAST RESPONSES THREAT MONITORING

Application Visibility and Monitoring >

WildFire. Preparing for Modern Network Attacks

Cisco SecureX Product Brochure

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

White Paper Instant Messaging (IM) HIPAA Compliance

Covert Operations: Kill Chain Actions using Security Analytics

Carbon Black and Palo Alto Networks

Cisco NetFlow Generation Appliance (NGA) 3140

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Storm Worm & Botnet Analysis

POLIWALL: AHEAD OF THE FIREWALL

Protecting the Infrastructure: Symantec Web Gateway

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Fighting Advanced Threats

Transcription:

Cisco Moves to the Next Generation with its ASA CX Firewall By David Strom January 30, 2013 2013 David Strom Inc. page 1

2013 David Strom Inc. page 2

We all know that the bad guys are getting more sophisticated and determined to invade business networks. The first week of 2013 started out with a bang: a series of well-publicized Java exploits, watering hole campaigns, and denial of service attacks and that was just business as usual for the modern cyber-crook. Enterprise network managers have to fight these exploits with better tools, and one ray of hope is a new context-aware firewall from Cisco called ASA CX. This includes more sophisticated software that fights on three fronts: Web-based protection using reputation scoring and URL filtering for zero-day malware, next generation firewall software that is application-, user- and device-aware, and integration with endpoint device control for better end-to-end network protection. There are several components of ASA CX, including: A new hardware platform called the ASA-5500-X, which can support a variety of subscription software modules, A new Web-based management interface for both a single device and a collection of them called Cisco Prime Security Manager, Integration with Cisco AnyConnect Secure Mobility (which I didn't test), Integration with Cisco's Security Intelligence and Operations (SIO) reputation insight and data collection process. I tested one of their midrange ASA-5525-X devices during January at Cisco's offices, with assistance from their product team to set up advanced features and to better understand the product. I used a combination of Windows and Mac clients along with some synthetic traffic generators for throughput tests. While I did not do a comprehensive test all of the above features, I can see that ASA CX represents a major step forward for Cisco and an important tool for today's network protection. Cisco Prime Security Manager Cisco had two tired graphical management interfaces called ASDM and the Security Manager. Both were complex jumbles and not very useful, let alone anywhere near state-of-the-art. The new Prime Security Manager software is a major step forward and very competitive in terms of usability, features, and controls. Since this is where any IT manager is going to spend the lion's share of time, let's begin by looking at what it offers. First is its clean dashboard that offers the ability to drill down into analyzing network events, examining particular user traffic flows, and summarizing major Web destinations. Everything is clickable, and menus are fairly self-evident and clearly labeled. You can quickly discover what is happening on your network and act on what you see. I thought the layouts of the controls and menus were very clear. 2013 David Strom Inc. page 3

Second and related to the dashboard is its reporting features. Gone are the days when event viewers were the only tools that a security professional could use, and you had to page through reams of text-heavy log dumps. Cisco has done a nice job with integrating actionable and very graphical reports as part of its Prime Security Manager interface (as seen below), where you can drill down from the main dashboard on a user-by-user basis, as well as examine particular applications or destinations, and get deeper into the malicious incident reports too. 2013 David Strom Inc. page 4

Cisco could have taken its reporting a step further, as McAfee has done with its Firewall Profiler application that represents traffic flows on a grid with bubbles that indicate the volume of events and firewall actions between a source (who) and a destination (where). The bigger the bubble means the more traffic. The darker the dot the more dominant the ratio. Sadly, (maybe not for Cisco!) the Profiler product is no longer on the market. Third is the ability to have tremendous application awareness. Other firewalls can either block or allow all traffic on particular ports or using specific protocols, but that isn't good enough for today's networks. Given that port 80 has become the great dumping ground for most corporate SaaS applications, network managers need better tools that can understand how particular applications behave and how to control them. The ASA CX software does this quite nicely, by having two important innovations: first is a huge applications portfolio. There are more than a thousand applications that are recognized by ASA CX, making it easy to set up a specific blocking rule in a matter of minutes. These come already part of the product, so you don't have to figure out a particular app's behavioral characteristics, or try to cobble together a firewall rule that will work properly to allow or deny it across your network. Included in this collection of application profiles are ones for protection against peer-to-peer and file sharing networks that are particularly vexing since they typically include port-hopping behaviors that try to elude firewalls. Many of Cisco's competitors have included protection with app-specific behavior for some time, but it is nice to see the ease that you can set up your profile with just a few mouse clicks. Let's take a typical scenario. No one wants to block Facebook completely as it can have some big business benefits, and besides, most of us do want to check in with 2013 David Strom Inc. page 5

our social network at some time during the workday. But a network manager has to balance the convenience of social networks with some very real potential threats. One way around a total ban on Facebook is to be more discrete over its operations, and allow some activities while preventing others that carry more risk. Just for Facebook alone Cisco includes more than a dozen different applications profiles for such activities as games, messaging, photos, sports and other kinds of activities. While McAfee and Palo Alto Networks have similar collections of specific applications profiles, ASA CX goes a step further by having built-in additions to control the behavior relevant to each profile. So for example, we could set up a scenario where a user could view a photo, tag it but not upload any new photos to their Wall. That is a nice touch, and moreover it is done with just a few mouse clicks and moving a couple of slider controls too as shown in the screencap below. 2013 David Strom Inc. page 6

Next, running encrypted traffic through firewalls of the past used to be an issue, but not for ASA CX. As an example of its sophistication, I set up a rule to decrypt and examine all packets except keeping any financial institutions traffic private and secure. There are lots of other examples where mixing and matching encrypted and decrypted traffic could be easily handled. Finally, ASA CX comes with the concept of objects to make rule and policy creation very powerful. Almost anything can become an object, and you can create two policies (as shown below) where as an example anyone on an ipad can view Salesforce data, but anyone on Android devices cannot. This makes the product very flexible without having to write tedious firewall rules and keep track of rule syntax and ordering, as was required on earlier firewalls. 2013 David Strom Inc. page 7

Global Reputation Management SIO is the next step in the global reputation management system that had its origins in the Ironport/Senderbase product line years ago. Information is collected from actual Cisco customer networks around the world to serve as an early warning system when new exploits are first observed. As the virus writers become more creative and customize their code to run on just one or two computers, these sensor networks are becoming a necessary piece in the protective puzzle. A number of other vendors have these sorts of operations -- including BlueCoat, Network Box, WebSense, Symantec and others. But Cisco has arguably the widest global customer reach and has done a nice job integrating this research into the firewall itself. SIO also includes intelligence from a wide variety of Cisco gear, including its IPS, its Web Security Appliance, and other products. Each policy has a separate line for choosing a custom reputation scoring rubric, which is accomplished by adjusting the slider control as shown below. Downsides No product is perfect, and I saw the following issues with ASA CX: One drawback is that Cisco is still in transition with managing all of its firewall features, and the Prime Security Manager interface is just for ASA CX for now. For the remaining ASA firewall operations, you still have to use either a command line or Cisco Security Manager. That is somewhat cumbersome, and I ran into a bug with one of the ASA CX devices because of a misplaced debugging command line parameter that took some effort to track down. Another issue to keep in mind is that ASA CX features add about a 30 percent processing overhead to the Cisco ASA. This is based on a throughput test I ran on one of the midrange devices (the ASA-5525-X) using the BreakingPoint Storm application traffic simulator, where I saw about 700 Mb/s throughput compared to 2013 David Strom Inc. page 8

the published specs of 1 Gb/s for normal operations without CX activated. Cisco s spec sheets stated a 35% overhead for the CX processing, so this is better than expected. This may mean that for networks with higher traffic loads, you may end up buying a more expensive box to handle the CX overhead. Of course, this result is based on the particular mix of synthetic traffic that was chosen, so the results could vary. One issue that I had is that while you can manually adjust the sensitivity for the reputation scoring system, the documentation for the numerical settings is somewhat obscure, mentioned on this Web page. Ideally, Cisco should include this information right in the Prime Security Manager interface to help users better understand what the implications of each setting in terms of traffic acceptance or rejection will be. Next, the ideal situation would be for a customer to have both the ASA CX features along with Cisco's IPS present in the same device. This is currently not available in Cisco's product line, meaning that a customer has to purchase two separate appliances to protect their network. Supposedly, Cisco is working on integrating the two lines in the future. Finally, there is the usual Cisco pricing issue. The ASA CX product line comes in many different SKUs depending on the features that you desire, the hardware to match your traffic loads, and other variables. That can be initially confusing and will take some effort to sort out, although things are improving as Cisco adopts more licensing-friendly pricing routines on more of its product lines. The price of the model we tested was $13,500, including hardware and software subscriptions. 2013 David Strom Inc. page 9

Summary Nonetheless, these issues are minor and overall Cisco has done a superior job at its next generation of firewall technology. The user interface of the Prime Security Manager is, well, prime and one of the best pieces of software I have seen from them, and the features are on par if not better than what their competitors offer. BIO David Strom was the founding editor-in-chief of Network Computing magazine and also ran the editorial operations at DigitalLanding.com and Tom's Hardware.com. He is the author of two computer networking books and over a 25-year career has written thousands of articles on a variety of subjects for the enthusiast, gaming, IT, network computing, channel, and electronics industries. Since September 1995, he has self-published a weekly series of essays called Web Informant, sent via email to several thousand subscribers. Over the course of his editorial career, he has helped launch dozens of editorial-rich websites and other publications. He can be reached at strominator.com, @dstrom on Twitter, and david@strom.com for the old schoolers that still use email. This written review is a companion to a video screencast where you can see many of these features in action here: http://webinformant.tv/cisco-asa.html 2013 David Strom Inc. page 10