Cisco SD-WAN Security Policy offers us native built-in SD-WAN security features such as zone-based firewall, intrusion prevention system (IPS), URL filtering, anti-malware protection, DNS security and TLS/SSL decryption to be implemented directly in WAN edge routers.

Cisco SD-WAN Security Policy Oveview

Cisco SD-WAN Service Chaining

In the previous section we learned how to bring and use non-SD-WAN security devices to secure SD-WAN traffic through service chaining.

30. Cisco SD-WAN Service Chaining

Cisco SD-WAN Service Chaining
Cisco SD-WAN Service Chaining

Cisco SD-WAN Native Security Features

However, a simpler design is to use native SD-WAN security features built into WAN edge routers. in WAN edge routers we have almost all of security features that are required in WAN edge routers. they are added in vManage through a “security application image file” and “advantage” license.

Cisco SD-WAN Native Security Features
Cisco SD-WAN Native Security Features
Cisco SD-WAN Security Policy Features
Cisco SD-WAN Security Policy Features

Cisco SD-WAN Security Policy Configuration

To start configuring, first we have to upload security application image through software repository.

MAINTENANCE -> SOFTWARE REPOSITORY -> Virtual Images -> Upload Virtual Image -> vManage -> secapp-ucmk9.16.12.01e.1.0.8_SV2.9.13.0_XE16.12.x86_64.tar
Security App Software Image
Security App Software Image

I am not going to test a specific scenario to show cisco SD-WAN security features since security concepts are independent of SD-WAN infrastructure. I just want to show how they are implemented in a Cisco SD-WAN environment.

First of all we need to make the lists that we will likely need to refer to them in security rules. As an example, I’ll create a ZONE list and a data-prefix list that are mostly needed to configure rules. Zoning is required to implement zone-based firewall.

CONFIGURATION -> SECURITY -> Custom Options -> Lists -> Zones -> New Zone List
 Zone List Name: VPN10_ZONE
 Add VPN: 10

 Zone List Name: VPN11_ZONE
 Add VPN: 11
!
! CONFIGURATION -> SECURITY -> Custom Options -> Lists -> Data Prefix -> New Data Prefix List  Data Prefix List Name: NET_172_11  Add Data Prefix: 172.11.0.0/16  Data Prefix List Name: NET_172_16  Add Data Prefix: 172.16.0.0/16

Zone-based Firewall

The zone-based firewall is certainly the most important security feature which is used in the SD-WAN infrastructure.

However, we have already implemented access list in Cisco SD-WAN environment, but the zone-based firewall is very different since it is stateful and we don’t have to inspect both directions.

as I have said earlier, for zone-based firewall, zoning is required. Firewall rules are applied in zone-pair. I will not discuss the details of zoning and zone-pair in cisco SD-WAN training.

Just as an example, I will add a rule in this section

CONFIGURATION -> SECURITY -> Add Security Policy -> Custom
!
 Section: Firewall -> Add Firewall Policy -> Create New
  Apply Zone Pairs
   Source Zone: VPN11_ZONE
   Destination Zone: VPN10_ZONE

  Name: VPN11_to_VPN10_FW
  Description: VPN11_to_VPN10_FW

  Add Rules:
   Default Action: Drop
   
   Source Data prefix: NET_172_11
   Destination Data prefix: NET_172_16
   Destination Ports: 23
   Protocol: 6 (TCP)
   Log: Set

Intrusion Prevention System

IPS is designed to detect and prevent intrusions into the network. We don’t have many options to fine-tune the IPS rules and signatures. We can only define how aggressively our IPS should be implemented. The default option is balanced. We also have the options “connectivity”, which is less aggressive in terms of security, and “security”, which is more aggressive.

We also have the option to configure whether potential intrusions only be detected and logged or be prevented, since there is always a false positive probability.

We also need to configure which VPNs need to be affected by each IPS rule.

 Section: Intrusion Prevention -> Add Intrusion Prevention Policy -> Create New
  Target
   VPNs: 10,11

  Policy Name: IPS_Balanced
  Signature Set: Balanced
  Inspection Mode: Protection

URL Filtering

With URL filtering, you can permit or block based on web category or web reputation. Also we can control based on blacklist or whitelist that we may already configured in the list.

URL Filtering Policy 1
URL Filtering Policy 1
URL Filtering Policy 2
URL Filtering Policy 2

Apply Security Policy to Device

Also there are some other security features like anti-malware protection, DNS security and also SSL/TLS inspection which can be implemented in cisco SD-WAN infrastructure.

We have to choose a name for our policy then apply it to a device or group of devices through device template.

CONFIGURATION -> SECURITY -> Add Security Policy -> Custom
!
 Section: Firewall -> Add Firewall Policy -> Create New
  Apply Zone Pairs
   Source Zone: VPN11_ZONE
   Destination Zone: VPN10_ZONE

  Name: VPN11_to_VPN10_FW
  Description: VPN11_to_VPN10_FW

  Add Rules:
   Default Action: Drop
   
   Source Data prefix: NET_172_11
   Destination Data prefix: NET_172_16
   Destination Ports: 23
   Protocol: 6 (TCP)
   Log: Set
!
 Section: Intrusion Prevention -> Add Intrusion Prevention Policy -> Create New
  Target
   VPNs: 10,11

  Policy Name: IPS_Balanced
  Signature Set: Balanced
  Inspection Mode: Protection
...
!
 Section: Policy Summary
  Security Policy Name: cEdge1_Security_Policy
  Security Policy Description: cEdge1_Security_Policy
CONFIGURATION -> TEMPLATES -> Device -> CSR1000v_Device_Template_cEdge1 -> Edit
 Section: Additional TEMPLATES
  Security Policy: cEdge1_Security_Policy
Back to: Implementing Cisco SD-WAN Solutions > Cisco SD-WAN Security Services

Leave a Reply

Your email address will not be published. Required fields are marked *


Post comment