Example: barber

Cisco SD-WAN: Enabling Firewall and IPS for Compliance

Cisco SD-WAN: Enabling Firewall and IPS. for Compliance Prescriptive Deployment Guide September, 2020. 1. Table of contents Introduction .. 4. About the Guide .. 4. 5. Define .. 6. About the Solution .. 6. Benefits of Deploying SD-WAN Security for PCI Compliance .. 7. design - Cisco SD-WAN Security - Compliance Use Case .. 8. Use case #1 - Compliance .. 8. SD-WAN Security design Components .. 8. Transport Security .. 9. Secure Segmentation .. 10. Enterprise Firewall with App Aware .. 12. Intrusion Prevention System .. 14. SD-WAN Compliance Use Case Packet flow.

• The Design section includes the use case covered in the guide, along with the design components and considerations in order to deploy the security features. • The Deploy section discusses the automated deployment of the Cisco SD-WAN security features specific to the compliance use case using the vManage security policy dashboard.

Tags:

  Cisco, Design, Firewall, Compliance, Enabling, Deploy, Cisco sd wan, Enabling firewall and ips for compliance

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Cisco SD-WAN: Enabling Firewall and IPS for Compliance

1 Cisco SD-WAN: Enabling Firewall and IPS. for Compliance Prescriptive Deployment Guide September, 2020. 1. Table of contents Introduction .. 4. About the Guide .. 4. 5. Define .. 6. About the Solution .. 6. Benefits of Deploying SD-WAN Security for PCI Compliance .. 7. design - Cisco SD-WAN Security - Compliance Use Case .. 8. Use case #1 - Compliance .. 8. SD-WAN Security design Components .. 8. Transport Security .. 9. Secure Segmentation .. 10. Enterprise Firewall with App Aware .. 12. Intrusion Prevention System .. 14. SD-WAN Compliance Use Case Packet flow.

2 19. deploy - Cisco SD-WAN Security - Compliance Use Case - Prerequisites .. 21. Prerequisites .. 21. deploy - Cisco SD-WAN Security - Compliance Use Case .. 34. Configuration Workflow .. 34. Process 1: IPS Signature 34. Process 2: Create Security Policy - Enterprise Firewall with App Aware (Application Firewall ) and IPS Policy.. 36. Process 3: Attach the Security Policy to the Device Template.. 56. Operate - Cisco SD-WAN Security Compliance Use Case .. 61. Process 1: Monitor the Enterprise Firewall with App Aware Feature via vManage NMS.

3 61. Procedure 1: Monitor the Firewall Feature via vManage Main Dashboard .. 61. Procedure 2: Monitor the Firewall Feature via vManage Monitor Dashboard .. 64. Procedure 3: Monitor the Firewall Feature and Statistics via vManage SSH Server Dashboard .. 69. Process 2: Monitor IPS Feature via vManage NMS .. 72. Procedure 1: Monitor IPS Signature Violations via vManage Main Dashboard .. 72. Procedure 2: Monitor IPS Feature via vManage Monitor Dashboard .. 75. Procedure 3: Monitor IPS Feature and Statistics via vManage SSH Server Dashboard.

4 79. Process 3: Monitor IPS Signature Violations via Syslog Server .. 83. Appendix A: New in this Guide .. 84. Appendix B: Hardware and Software Used for Validation .. 85. Appendix C: Deployment Example .. 86. Topology .. 86. System IP Address and Site ID .. 86. 2. Appendix D: Cisco WAN Edge Configuration Summary (Templates).. 88. Feature Template .. 88. Security Policy feature template .. 88. Container Profile feature template .. 90. Device Template .. 90. Example Branch Configuration .. 91. Branch 122003: BR2-WAN-Edge1: 91. Appendix E: Glossary.

5 98. About this guide .. 99. Feedback & discussion .. 99. 3. Introduction Introduction About the Guide This document provides information on the design and deployment of the Cisco SD-WAN security infrastructure specific to the Compliance use case within remote sites running IOS-XE SD-WAN WAN edge platforms. The security features leveraged within this guide include Enterprise Firewall with Application Awareness and Intrusion Prevention System (IPS). The guide explains the platforms deployed at length, highlights the best practices, and assists with the successful configuration and deployment of security features.

6 However, the document is not exhaustive in terms of covering all possible deployment options. This document assumes that the controllers are already deployed and integrated into vManage, the WAN. edge devices are deployed and the SD-WAN overlay network is successfully established. Refer to the Cisco SD-WAN design Guide for background information and the Cisco SDWAN Deployment Guide for information on deploying device templates to establish a Cisco SD-WAN overlay network. This document contains four major sections: The Define section defines the shortcomings of a secure traditional WAN architecture, to then explain the benefits of deploying SD-WAN security solution.

7 The design section includes the use case covered in the guide, along with the design components and considerations in order to deploy the security features. The deploy section discusses the automated deployment of the Cisco SD-WAN security features specific to the Compliance use case using the vManage security policy dashboard. The section also includes the prerequisites to deploy this security solution. The Operate section explains some of the monitoring and troubleshooting methods used when Cisco SD-WAN security features, Enterprise Firewall with Application Awareness, and IPS are configured.

8 Implementation Flow 4. Introduction Refer to Appendix B for the hardware models and software versions used in this deployment guide, Appendix C for the topology and Appendix D for the feature and device templates, along with the CLI- equivalent configuration for one of the WAN edge devices configured. Audience The audience for this document includes network design engineers, network operations personnel, and security operations personnel who wish to implement the Cisco SD-WAN security infrastructure for PCI. Compliance within SD-WAN enabled remote sites.

9 5. Define Define About the Solution Companies handling credit card information are required to maintain data in a secure manner that reduces the likelihood of sensitive financial data from being stolen. If merchants fail to securely handle credit card information, that data could be hacked and used to make fraudulent purchases. Additionally, sensitive information about the cardholder could be used in identity fraud. As the attack surface at the branch continues to increase, the need to protect sensitive information with the right security capabilities within the branch site before that data is tunneled over to the data center is critical.

10 Companies that store, process or transmit cardholder data are required to inspect all the packets that leave the branch, by a stateful Firewall and an IPS solution, and this is required before the data is tunneled over to the data center. The solution is to deploy and maintain Cisco SD-WAN within your WAN infrastructure, which allows you to manage your SD-WAN WAN network centrally via Cisco vManage GUI and leverage the security capabilities embedded natively in the SD-WAN single-pane of management to secure traffic within the remote site before it is tunneled over to the data center.


Related search queries