F5 SSL Orchestrator allows companies to secure their enterprises and provides the scale necessary to prevent various attack types, vectors, and presentations while offering uncompromising visibility into data traffic traversing diverse security zones. When combined with a strong distributed denial-of-service (DDoS) strategy, SSL Orchestrator and its integration with Cisco Firepower Threat Defense (FTD) deliver the necessary components of perimeter security and provide comprehensive protection by protecting the enterprise from malware, bots, and other attacks.
To achieve seamless integration, F5 partnered with Cisco to validate and produce reference architectures for integrating SSL Orchestrator and Firepower Threat Defense. Testing and validation were conducted at the F5 Labs facilities using both virtual and physical Firepower devices with FTD.
This guide helps administrators identify and deploy validated configurations for common use cases. The customer scenarios defined here address policy-based traffic steering and blocking as well as SSL visibility and control.
This scenario employs SSL Orchestrator to allocate traffic flows to different resources based on load. Alternately, is allocates using business intelligence, based on features such as centralized policy management or F5 iRules for deeper decision-making processes, which FTD resources can leverage for inspection. For example, Application A can be directed to one pool of FTD servers with a specialized ruleset that monitors signatures specific to its environment, while Application B is directed to another pool. Integration with the Firepower remediation API allows the system to dynamically react to reduce the demand on FTD infrastructure by using an iRule to populate an IP address into a block list. Traffic from the identified offender is blocked before entering FTD for a preset period of time. Since one strategy of attackers is to provide an overwhelming amount of distracting traffic to mask the real attack, this remediation tactic can allow FTD to focus resources on identifying new attacks without having to remediate already identified attackers.
SSL termination is a resource-intensive process, but F5 devices include dedicated hardware processors specializing in SSL processing. For both inbound and outbound deployment scenarios, utilizing SSL Orchestrator plus FTD provides uncompromising visibility into SSL traffic.
Inbound applications are rarely deployed without high availability in mind, and SSL termination on an F5 BIG-IP instance ensures secure and enhanced application delivery while providing FTD sensors with visibility into SSL traffic. Where security policy dictates, traffic can be re-encrypted before being passed to the back-end servers.
The proliferation of websites now using SSL encryption to protect users poses a challenge to FTD sensor pools in their mission to eliminate malware and attacks. SSL Orchestrator can provide full visibility into user traffic.
SSL Orchestrator supports inbound SSL/TLS inspection to prevent encrypted threats from going undetected and compromising critical assets. Protects your apps and servers by eliminating security blind spots and stopping hidden threats.
The validated architecture contains a load-balanced pool of Firepower devices front-ending web application server pools. This approach maximizes the effectiveness of the combined Cisco and F5 solution while it addresses both SSL visibility and control and traffic management and blocking. The inspection zone traffic is decrypted long enough to be inspected by the Firepower devices and re-encrypted before being sent to the application server or client.
In Figure 1, the Firepower Services inspect, block, and report on all network flows. After traffic traverses the FTD devices, it is then routed back through SSL Orchestrator. This ensures that traffic can be inspected, and, if necessary, IP addresses can be blocked.
Figure 1: SSL Orchestrator creates an inspection zone where FTD can inspect traffic and detect and block threats.
SSL Orchestrator supports outbound SSL/TLS inspection to stop malware from penetrating the corporate network and to prevent command and control (C&C) communication through encrypted channels. The solution halts malware infections, data exfiltration, and C&C communications.
The validated architecture protects internal clients from Internet-based threats. Clients access the Internet through SSL Orchestrator, which decrypts this traffic and sends a copy of it to the Firepower devices for inspection.
Figure 2: SSL Orchestrator sends outbound traffic to FTD for inspection to protect internal clients from Internet threats.
These procedures assume the existence of a working SSL Orchestrator topology, either incoming or outgoing, and focus on adding a Cisco Firepower TAP Service, including these steps:
Both topology types are supported, and configuration of the Cisco remediation solution is the same. If you do not already have a working SSL Orchestrator topology, refer to the SSL Orchestrator article series on F5 DevCentral for full configuration steps.
This guide outlines the necessary steps to deploy Cisco FTD with SSL Orchestrator, including configuration of the Firepower Services (Firepower nodes), security policy, and the application of iRules. FTD can be deployed as a layer 2/3 or TAP solution. SSL Orchestrator can be deployed as a layer 2 or 3 solution. SSL Orchestrator provides the flexibility to deploy in the manner that works best for you. For example, SSL Orchestrator can be deployed in layer 2 mode while FTD is deployed in layer 3 mode, and vice versa.
A familiarity with F5 deployment concepts and technology as well as basic networking is essential for configuring and deploying SSL Orchestrator. For further details on configuration and networking setup, please visit the F5 support site, AskF5.
Although the Guided Configuration wizard will help configure most of this solution, a few things must be done outside of it. This example uses an existing L2 outbound topology.
Create two iRules and two virtual servers. The first iRule listens for HTTP requests from the Firepower device. Firepower then responds via its Remediation API and sends an HTTP request containing an IP address and a timeout value. The address is the source IP to be blocked by SSL Orchestrator, which will block it for the duration of the timeout period. For details and iRules tutorials, please consult F5 DevCentral.
when HTTP_REQUEST { if { [URI::query [HTTP::uri] "action"] equals "blocklist" } { set blockingIP [URI::query [HTTP::uri] "sip"] set IPtimeout [URI::query [HTTP::uri] "timeout"] table add -subtable "blocklist" $blockingIP 1 $IPtimeout HTTP::respond 200 content "$blockingIP added to blocklist for $IPtimeout seconds" return } HTTP::respond 200 content "You need to include an ? action query" }
|
---|
|
---|
You have now:
These procedures assume Cisco Firepower and Firepower Management Center (FMC) have been licensed and deployed and are working properly.
This guide assumes that intrusion and malware policies, which should look something like the example below, are enabled for the Firepower device.
Next, create a Firepower remediation policy. A remediation policy can take a variety of actions based on an almost infinite set of criteria. For example, if an intrusion event is detected, Firepower can tell SSL Orchestrator to block the source IP for a certain amount of time.
The status of remediation events can be viewed in the FMC by clicking Analysis > Correlation > Status. See the Result Message column for the “Successful completion of remediation” message.
These recommended practices configure F5 BIG-IP SSL Orchestrator with the Cisco FTD in an architecture demonstrated to address both the SSL visibility and control user scenario and the IPS policy-based traffic steering and blocking user scenario. With SSL termination on SSL Orchestrator, FTD sensors provide visibility into both ingress and egress traffic to adapt and protect an organization’s applications, servers, and other resources. Using security policy-based traffic steering, an organization can capitalize on this configuration and continue to scale, adding more FTD-managed devices to provide greater traffic capacity for the protected networks and applications. The policy-based flexibility provided by SSL Orchestrator can also be leveraged to selectively direct traffic to different pools of resources based on business, security, or compliance requirements.