Course Content
Spanning Tree
An overview of how switches become aware of other switches and prevent loops.
0/2
Multiple Spanning Tree Protocol (MST)
0/1
Advanced OSPF
The (OSPF) protocol scales well with proper network planning. IP addressing schemes, area segmentation, address summarization, and hardware capabilities for each area should considered when designing a network.
0/6
Introduction to Automation Tools  
To provide a high-level overview of some of the most common configuration management and automation tools that are available.
0/3
ENCOR Course
About Lesson

Next-Generation Endpoint Security

security components such as NGFW, Web Security Appliance (WSA), and Email Security Appliance (ESA) to protect endpoints from threats and attacks.

  • The most critical components needed to implement the SAFE framework for a campus environment.

Talos

  • The Cisco threat intelligence organization,
  • An elite team of security experts to create threat intelligence that detects, analyzes, protects against both known and emerging threats for Cisco products.
  • Created from the combination of three security research teams:
  • IronPort Security Applications (SecApps)
  • Sourcefire Vulnerability Research Team (VRT)
  • Cisco Threat Research, Analysis, and Communications (TRAC) team

Receives valuable intelligence through the following intelligence feeds:

  • Advanced Microsoft, AMP community
  • ClamAV, Snort, Immunet, SpamCop, SenderBase, Threat Grid, Talos user communities
  • Honeypots
  • The Sourcefire Awareness, Education, Guidance, Intelligence Sharing (AEGIS) program
  • Private and public threat feeds
  • Dynamic analysis

Threat Grid

A solution that can perform static file analysis, dynamic file analysis (behavioral analysis), by running the files in a controlled and monitored sandbox.

  • Behavioral analysis is combined with threat intelligence feeds from Talos, and with existing security technologies.
  • Possible to upload suspicious files into a sandbox called Glovebox to safely interact with them and observe malware behavior directly.
  • Available as an appliance and in the cloud.

AMP

A malware analysis and protection solution that goes beyond point-in-time detection.

Attack Time AMP Processes
Before Global threat intelligence from Talos and Threat Grid feeds into AMP to protect against known and new emerging threats.
During File reputation to determine whether a file is clean or malicious as well as sandboxing used to identify threats during an attack.
After AMP provides retrospection, IoCs, breach detection, tracking, analysis, and surgical remediation after an attack, when advanced malware has slipped past other defenses.

AMP Components

  • AMP Cloud (private/public).
  • AMP connectors
  • AMP for Endpoints (Win, macOS X, Android, Apple iOS, Linux)
  • AMP for Networks (NGFW, NGIPS, ISRs)
  • AMP for ESA
  • AMP for Web (WSA)
  • AMP for Meraki MX
  • Threat intelligence from Talos and Threat Grid.

AnyConnect

  • AnyConnect Secure Mobility Client is a modular endpoint software: VPN client (TLS/SSL and IPsec IKEv2), VPN Posture (HostScan) and an ISE Posture module.
  • Also includes web security (Cloud Web Security), network visibility (Stealthwatch), roaming protection (Umbrella).
  • Supported Win, macOS, iOS, Linux, Android, Windows Phone/Mobile, BlackBerry, ChromeOS.

Umbrella

  • Provides the first line of defense against threats on the internet.
  • Blocking requests to malicious destinations (domains, IPs, URLs) using DNS before an IP connection is established or a file is downloaded.
  • It is 100% cloud delivered, with no hardware/software to install.
  • The Umbrella global network includes 30 DCs around the world using Anycast DNS, which allows it to guarantee 100% uptime.

Web Security Appliance

  • Web Proxy incl. Caching (http,https, ftp, ftp over http)

and

  • Rich security functionalities
    • Reputation filtering
    • Malware scanning
    • URL Filtering
    • Application visibility & control
    • HTTPS inspection Authentication
    • Reporting and tracking L4TM

WSA

An all-in-one web gateway that includes a wide variety of protections that can block hidden malware from both suspicious and legitimate websites.

Before During After
Web reputation filters Web filtering Application Visibility and Control (AVC) Cloud access security Parallel antivirus (AV) scanning Layer 4 traffic monitoring File reputation and analysis with AMP Data loss prevention (DLP) Continuously inspects for instances of undetected malware and breaches. Global Threat Analytics (GTA)

Before an Attack content

Terms Description
Web reputation filters WSA detects and correlates threats in real time using Talos. Web reputation filtering prevents client devices from accessing dangerous websites containing malware or phishing links.
Web filtering Traditional URL filtering is combined with real-time dynamic content analysis. This is used to shut down access to websites known to host malware.
Application Visibility and Control (AVC) AVC identifies and classifies the most relevant and widely used web and mobile applications and more than 150,000 microapplications.

During an Attack

Terms Description
Cloud access security WSA protect against hidden threats in cloud apps
Parallel antivirus (AV) scanning WSA enhances malware defense coverage with multiple antimalware scanning engines
Layer 4 traffic monitoring WSA scans all traffic, ports, and protocols to detect and block spyware “phone-home” communications
File reputation and analysis with Cisco AMP WSA assesses files using the latest threat information from Talos
Data loss prevention (DLP) WSA uses Internet Control Adaptation Protocol (ICAP) to integrate with DLP solutions from leading third-party DLP vendors

After an Attack

  • After an initial detection, using AMP retrospection capabilities, WSA continues to scan files over an extended period of time, using the latest threat intelligence from Talos and AMP Thread Grid.
  • Alerts are sent when a file disposition changes to provide awareness and visibility into malware that evades initial defenses.

Global Threat Analytics (GTA) analyzes web traffic, endpoint data from AMP for Endpoints, and network data from Stealthwatch. It then identifies malicious activity before it can exfiltrate sensitive data.   WSA can be deployed in the cloud, as a virtual appliance, on-premises, or in a hybrid arrangement. All features are available across any deployment option.

ESA

  • Deployed as a physical appliance, virtual appliance, a cloud service.
  • Act as the email gateway to an organization, controlling the transfer of all email connections, accepting messages, relaying messages to the appropriate email servers.
  • Handle all SMTP connections for an organization, acting as the SMTP gateway.
  • ESA is the destination of the public MX records, the MX records of the underlying domain should point to ESA’s public IP address. The first hop the organization’s email infrastructure.
  • ESA needs to be accessible through the public Internet.
  • Enables users to communicate securely via email and helps organizations combat email security threats with a multilayered approach.
  • Includes the following advanced threat protection capabilities that allow it to detect, block, and remediate threats across the attack continuum:
  • Global threat intelligence – leverages real-time threat intelligence from Talos/AMP.
  • Reputation filtering – blocks unwanted email with reputation filtering.
  • Spam protection – uses the Cisco Context Adaptive Scanning Engine (CASE) to block spam emails.
  • Forged email detection – Forged email detection protects high-value targets such as executives against business email compromise (BEC) attacks.

MIME – What is it?

  • MIME refers to an official Internet standard that specifies how messages must be formatted so that they can be exchanged between different email systems.
  • MIME permits the inclusion of virtually any type of file or document in an email message.
  • Specifically, MIME messages can contain text images audio video application-specific data. spreadsheets word processing documents

Mapping Features to Protection

ESA (Cont.)

  • Cisco Advanced Phishing Protection (CAPP) – combines Talos with local email intelligence and advanced machine learning techniques to model trusted email behaviors.
  • Cisco Domain Protection (CDP) – CDP for external email helps prevent phishing emails from being sent using a customer domains.
  • Malware defense – ESA protects against malware with AMP for email.
  • Graymail detection and Safe Unsubscribe – ESA detects and classifies graymail for an administrator to take action on it if necessary. Graymail consists of marketing, social networking, bulk messages (mailing list emails).
  • URL-related protection and control – ESA protects against malicious URLs with URL filtering and scanning of URLs in attachments and shortened URLs.
  • Outbreak filters – Outbreak filters defend against emerging threats and blended attacks by leveraging Talos.
  • Web interaction tracking – generates reports that track the end users who click on URLs that have been rewritten by the outbreak filters.
  • Top users who clicked on malicious URLs
  • The top malicious URLs clicked by end users
  • Date and time, rewrite reason, action taken on the URLs
  • Data security for sensitive content in outgoing emails – Confidential outbound messages that match one of the more than 100 expert policies included with ESA are automatically protected.

NGIPS

  • An IDS: A system that passively monitors and analyzes network traffic for potential network intrusion attacks and logs the intrusion attack data for security analysis.
  • An IPS: A system that provides IDS functions and also automatically blocks intrusion attacks.
  • NGIPS should include IPS functionality as well as the following capabilities:
    • Real-time contextual awareness
    • Advanced threat protection
    • Intelligent security automation
    • Unparalleled performance and scalability
    • AVC and URL filtering

With the acquisition of Sourcefire in 2013, Cisco added the Firepower NGIPS to its portfolio.

Features Advanced Features
Real-time contextual awareness Centralized management
Advanced threat protection and remediation Global threat intelligence from Talos
Intelligent security automation Snort IPS detection engine
Unparalleled performance and scalability High availability and clustering
AVC Third-party and open-source ecosystem
URL filtering Integration with ISE: Quarantine, Unquarantine, Shutdown

NGFW

  • A firewall is a network security device that monitors incoming and outgoing network traffic and allows/blocks traffic by performing simple packet filtering and stateful inspection based on ports and protocols.
  • Block threats such as advanced malware and application-layer attacks.
  • A NGFW firewall must include:
    • Standard firewall capabilities such as stateful inspection
    • Integrated IPS
    • Application-level inspection (to block malicious or risky apps)
    • Leverage external security intelligence to address evolving security threats

NGFW: Management Options

  • For FTD or Firepower Services software:
    • Firepower Management Center (FMC) API
    • Firepower Device Manager (FDM) for small appliances
  • For ASA software:
    • CLI
    • Cisco Security Manager (CSM)
    • ASDM
    • Cisco Defense Orchestrator

FTD or Firepower Services software CLI configuration is not supported. CLI is only available for initial setup and troubleshooting purposes.

FMC

  • A centralized management platform that aggregates and correlates threat events, contextual information, network device performance data.
  • The FMC performs event and policy management:
    • Firepower NGFW and NGFWv
    • Firepower NGIPS and NGIPSv
    • Firepower Threat Defense for ISR
    • ASA with Firepower Services
    • AMP

Stealthwatch – Visibility

  • A collector and aggregator of network telemetry data that performs network security analysis and monitoring to automatically detect threats that manage to infiltrate a network as well as the ones that originate from within a network.

  • Two offerings available for Stealthwatch:
    • Stealthwatch Enterprise
    • Stealthwatch Cloud
    • LanCope Stealwatch

Stealthwatch Enterprise

Provides real-time visibility into activities occurring within the network.

  • At the core are the Flow Rate License, the Flow Collector, Management Console, Flow Sensor. Optional but recommended components include the following:
    • Stealthwatch Threat Intelligence
    • Stealthwatch Endpoint
    • Stealthwatch Cloud
  • Offers the following benefits:
    • Real-time threat detection
    • Incident response and forensics
    • Network segmentation
    • Network performance and capacity planning
    • Ability to satisfy regulatory requirements

Requires the following components:

  • Flow Rate License – required for the collection, management, and analysis of flow telemetry data and aggregates flows at the Stealthwatch Management Console, as well as to define the volume of flows that can be collected
  • Flow Collector – collects and analyzes enterprise telemetry data and other types of flow data.
  • Stealthwatch Management Console (SMC) – the control center that aggregates, organizes, and presents analysis from up to 25 Flow Collectors, ISE, and other sources.

Optional Stealthwatch Enterprise components include the following:

  • Flow Sensor
  • UDP Director

Stealthwatch Cloud

Provides the visibility and continuous threat detection required to secure the onpremises, hybrid, and multicloud environments. q Consists of two primary offerings:

  • Public Cloud Monitoring – provides visibility and threat detection in AWS, GCP, and MS Azure cloud infrastructures. It is a SaaS-based solution that can be deployed easily and quickly.
  • Private Network Monitoring – provides visibility and threat detection for the onpremises network, delivered from a cloud-based SaaS solution.

Consumes metadata only. The actual packet payloads are never retained or transferred outside the network.

ISE vs MS NPS (Radius)

A security policy management platform that provides highly secure NAC to users and devices across wired, wireless, VPN connections.

ISE Features
Streamlined network visibility Streamlined device onboarding
DNA Center integration Internal certificate authority
Centralized secure network access control (authorization) Device profiling
Centralized device access control (digital certificate) Endpoint posture service
TrustSec Active Directory support
Guest lifecycle management Platform Exchange Grid (pxGrid)

ISE Example

Example 25-1 Contextual Information from Cisco ISE Session Directory

 

 

Other useful information:

Join the conversation