21.1 Planning For Security Services
21.1 Planning For Security Services
Introduction
As a network solutions architect, you need to stay sharp on all your skills. You feel you need
to know more about security services. Your colleague has passed on some documentation
regarding Cisco modular network architecture, security zoning, and Cisco next-generation
security. Go through the documentation to begin updating your knowledge about Cisco
network security.
Choose an option:
To restrict access between different parts of the network, the concept of zoning is used.
Restrict access between different parts of the network to only those flows that are
defined by security policy.
1. Public zone
3. Restricted zone
Zoning is used to mitigate the risk of an open network by segmenting infrastructure services
into logical groupings that have the same communication security policies and security
requirements. It is a design approach that is used to restrict communication to only those
flows that are defined by security policy. The zones are separated by zone interface points.
The zone interface point provides a network interface between a zone and another zone. The
zone interface point is implemented with network security devices. Each zone interface point
can be accomplished using a single component or a combination of the components.
Many types of zones can exist in the network. The most typical zones are the following:
Public zone: This zone is external and not under the control of the organization.
Public services are located in this zone.
Public access zone: This zone hosts public services of the organization, and it is often
called a DMZ. These services can be accessed from the public zone. Typical services
are email proxy service, web proxy service, reverse proxy service, remote access
service, and so on.
Restricted zone: This zone is internal, and it hosts the most critical data services for
the organization. Usually this zone is the most secured zone and access to it should be
limited.
Note
These are the examples of the most typical zones. Many additional zones can usually exist in
modern networks.
To limit access between different zones, network security devices use the concept of filtering.
So the traffic that is not allowed to flow from one zone to another is filtered at the zone
interface points. Security policy is used to control which traffic is allowed and which is not.
21.3 Planning for Security Services
The Cisco modular network architecture positions Cisco products and capabilities throughout
the network and provides collaborative capabilities between the platforms. A wide range of
security technologies is deployed in multiple layers. Products and capabilities are positioned
where they deliver the most value, while facilitating collaboration and operation.
Architecture principles:
Defense in depth
Regulatory compliance
Auditable implementations
Modularity and flexibility: All components are described by functional roles. The
overall network infrastructure is divided into functional modules, such as the campus
and the data center. Functional modules are then subdivided into more manageable
and granular functional layers and blocks, such as the access layer, edge distribution
layer, and so on. The modular designs result in added flexibility, which allows a
phased implementation when it comes to deployment, selection of the best platforms,
and their eventual replacement as technology and business need to evolve. Finally, the
modularity also accelerates the adoption of new services and roles.
Striving for operational efficiency: Designs are conceived with simplicity in order
to accelerate provisioning and to help troubleshoot and isolate problems quickly,
effectively reducing operative expenditures.
Enterprise Core
Enterprise Campus
Enterprise Branch
Management
Each module can be further subdivided into more manageable and granular functional layers
and blocks, each serving a specific role in the network.
Enterprise Core: The core infrastructure is the main part of the network, which
connects all other modules. It is a high-speed infrastructure, whose objective is to
provide reliable and scalable Layer 2 and Layer 3 transport.
Intranet Data Center: The objective of the Intranet data center is to host many
systems for serving applications and storing significant volumes of data. The data
center also hosts network infrastructure that supports applications, including routers,
switches, load balancer, application acceleration, and so on. The intranet data center is
designed to serve internal users and applications.
Enterprise Campus: The enterprise campus provides network access to the users and
devices. It may span over several floors or buildings on the same geographical
location. The Cisco modular network architecture includes a campus design that
allows users to securely access any internal or external resource.
Enterprise Internet Edge: The Internet edge is the network architecture that
provides connectivity to the Internet. It includes the public services DMZ, corporate
Internet access, and remote-access VPN.
Enterprise WAN Edge: The WAN edge is the part of the network infrastructure that
aggregates the WAN links that connect geographically distant branch offices to a
central site or regional hub site. The objective of the WAN is to provide to users at the
branches the same network services that campus users at the central site receive. The
Cisco modular network architecture includes a WAN edge design that allows
branches and remote offices to securely communicate over a private WAN.
The Cisco modular network architecture must include several security zones. Some of the
zones and the location of these zones are described below.
Public zone: The public zone is the zone outside of the organization and is located in
the Enterprise Internet Edge.
Public access zone: This zone hosts public services of the organization, and it
provides secure access for the enterprise users to the public zone. It is located in the
Enterprise Internet Edge.
Operations zone: This zone hosts support services for internal users and services.
The zone is usually located in the Intranet Data Center functional module.
Restricted zone: This zone hosts the most critical data services, and access should be
limited to only necessary traffic. The zone is located in the Intranet Data Center
module.
Management restricted zone: This zone provides management for the network and
other infrastructure. It should be secured to limit access to the management resources.
The zone is hosted in the Intranet Data Center module.
The following products and technologies can provide a secure network design:
Secure network access: Organizations today use a complex and diverse set of
endpoints, both wired and wireless. The endpoints are located in the Enterprise
Campus and Enterprise Branch modules in the Cisco modular network architecture.
The main objectives of those two functional modules are to provide secure network
access and to protect endpoints from data loss, data theft, and privacy invasions.
Firewalls/IPS: Firewalls and IPS provide access control between different points of
the network. These technologies are typically used in the Enterprise Internet Edge to
control traffic between different security zones. Firewall and IPS are also used in
Intranet Data Center to control traffic between different functional modules for
applications and application stacks.
Network and security management: Network and security management tools are
usually located in the Management functional module. These tools provide central
network and security management. It helps organizations to automate and simplify
network management to reduce operational cost.
21.4 Planning for Security Services
To protect against threats, Cisco offers products like the Cisco Adaptive Security Appliance
(ASA) 5500-X Series Next-Generation Firewall and the Cisco FirePOWER Next-Generation
IPS.
URL filtering
Cisco AMP
The Cisco ASA 5500-X Series Next-Generation Firewall helps you to balance security
effectiveness with productivity. The solution offers the following highlighted features:
Granular Cisco Application Visibility and Control (AVC) to support more than 3000
application layer and risk-based controls
The Cisco FirePOWER Next-Generation IPS can be deployed as a physical appliance. The
8000 Series appliances can provide from 15 Gbps to 60 Gbps of IPS throughput, while the
7000 Series can provide from 50 Mbps to 1.25 Gbps of IPS throughput. The Cisco
FirePOWER Next-Generation IPS can also be deployed as a virtual appliance or as an ASA
with FirePOWER Services.