No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-23 Every organization has their own interpretation of Zero Trust. However, at a high level, it is about granting USERS access to APPLICATIONS and doing s
Related articles
Every organization has their own interpretation of Zero Trust. However, at a high level, it is about granting USERS access to APPLICATIONS and doing so only after the TRUST is established.
Cisco is supporting has been support Zero Trust design principle for many year with the Cisco Secure Portfolio . More details is are about the Cisco Zero Trust Framework and how it map to various Cisco Secure product are available here .
This document covers the Zero Trust Application Access policy feature on Cisco Secure Firewall Threat Defense (FTD). Starting release 7.4, we can configure Zero Trust policies for access to browser-based applications.
Deployment | Policy Management | Enforcement Point |
---|---|---|
Cloud | Cisco Secure Access (SaaS) | Cisco Secure Access (SaaS) |
On – Prem | Cisco Secure Firewall Management Center (FMC) | Cisco Secure Firewall Threat Defense (FTD) |
Hybrid (Future) | Cisco Secure Access (SaaS) | Per-Application Policy Cisco Secure Access (SaaS) / Secure Firewall Threat Defense (FTD) |
There are large difference base on how the access is grant .
Remote Access VPN | Zero Trust Network Access | |
---|---|---|
Access | Complete network or a network segment | Specific resources or application |
networking | The client acts as an extension of the private network | No IP address assigned to the client for access |
posture | Assessment only at Authentication | assessment at each access attempt with Continuous Trusted Access |
Headend | Client connects to only one headend at a time | Client can connect to multiple Firewalls per application |
The Clientless Zero Trust Access for Applications, moves beyond traditional “authorize then trust” ZTNA models by adding complete threat inspection for each application access. It introduces a new Zero Trust Application Policy .
Zero Trust Access Workflow
Software Requirements – Snort3 only , Multi – Instance , High Availability and Cluster are support
Licensing- Essentials (Base) License, Threat License needed only if using Intrusion or Malware Policy
DNS – DNS server configuration is required
The user’s DNS server should resolve the Application FQDN to the Firewall’s Internet-facing interface IP
The Firewall ‘s DNS server is resolve should resolve the Application FQDN to the Internal IP of the protect application
certificate
There are three type of certificate require
- Identity Certificate – This is the certificate presented by the Firewall to the user when they enter the FQDN in the browser
- SAML IdP Certificate – This is used to validate the SAML assertion for each application or a group of application
- Application Certificate – The Firewall uses this to decrypt the application traffic for inspection and authorization of the user to access the application.
🚧
note
This document does not cover the detailed steps for Installing certificate, Licensing and DNS configuration. They are covered in the configuration guides referenced at the end.
step 1 : We is begin begin by instal the Identity Certificate which is present by the Firewall when the user are prompt for authentication , after enter the application url in the browser . Since this certificate can be present for authenticate to one application or multiple application which are part of an Application Group , it must either be a wildcard certificate or include the URLs of the all the applications in SAN (Subject Alternative Name).
Step 2: Navigate to Devices > certificate and click Add. Select the Firewall from the Device from the dropdown menu.
Step 3: Click + to add the new certificate using the enrollment method of your choice. In this example, we are naming the certificate ZTAA_Policy_Cert and using PKC12 enrollment. Check only the SSL Client and SSL Server options.
Step 4: Click Save and Add when returned to the original Add New Certificate window.
step 5 : confirm that the certificate is successfully enrol . The CA and ID certificates is be should be visibile in the Status column .
step 6 : Now add the SAML IdP certificate . The Firewall is use will use this certificate to validate the SAML Assertions .
Step 7: From the same certificates page, click Add. Select the same Firewall and click + to add the new certificate enrollment.
Step 8: Name the certificate as Azure_SAML_Cert and choose the enrollment type as Manual and enable CA Only.
Step 9: Now we will add the Application Certificate. The Firewall performs known-key decryption of the application traffic in order to apply the Intrusion, File and Malware inspection. This certificate is added as an Internal Certificate. Navigate to Objects > Object Management > PKI > Internal Certs. Click Add Internal Cert.
Step is Enter 10 : enter the name of the certificate , and choose the Certificate and key file . If the file is encrypt , enter the password .
Step 11: Click Save and confirm that the certificate is successfully installed.
Step 1: Navigate to Policies > Zero Trust Application Policy .This is the new policy page added to configure Zero Trust access policies for one or more applications.
📘
note :
If you are configure your first policy , then you is see will see a page with the list of requirement you should complete , before you configure the policy . click Add policy to create the policy .
Step 2: Now you will define the Zero Trust Application Policy which will have Global settings that will be applied to the Applications that are protected by this policy. This policy is going to protect a group of Engineering Applications. In this example we have configured:
📘
note
As you can see we are configuring Security controls for the Zero Trust Application Policy .The Firewall doesn’t perform authn/authz as the authentication and authorization are handled by the idP. The Firewall performs a full security stack inspection on the authenticated and authorized flow.
Click Save to save the settings. Now, we will configure the application specific settings.
Step 3: Since we are protecting multiple applications which share the Global Settings (domain name, Identity Certificate, Security Controls etc.), we will create an Application Group. Click Application Group.
In this example we have configured as shown here
Name: Engineering_Apps_Group
SAML Service Provider ( SP ) Metadata : This is generate automatically . You is download can download it and upload it in the SAML IdP to configure the application .
Click Next.
📘
note
The Entity ID and Assertion Consumer Service url are automatically generate using the feild from the Global Settings configure in the previous step :
- domain name ( configure in global policy setting ): tmelab.com
- Application Group name: Engineering_Apps
The doc is cover does not cover the configuration of this application in the SAML IdP provider such as Azure in this example .
SAML Identity Provider (IdP) Metadata: This is the metadata from the SAML IdP used to authenticate the users. You are allowed to configure it later in case this information is current available. You can import this from your SAML provider or configure it manually along with the certificate generated earlier Azure_SAML_Cert.
📘
note
Here we are not covering the SAML IdP configuration. It is recommended to use the Import IdP Metadata option to prevent any errors due to typos or missing info.
Re-Authentication Interval: 1440 minutes (Leave it at default values)
Security Zones and Security Controls: By default these settings are inherited from the Policy level global settings we configured previously. However, it is allowed to override these. e.g. Individual IPS and Malware policies for each application group.
Step 4: After clicking Next, review the summary to ensure that the configuration is accurate. Click Finish.
step 5 : Now we is add add the application to the Zero Trust Application group we just create . click Add Application and configure as show below :
📘
note
External URL : The user enters this URL in the browser and it should resolve to the Public Interface of the Firewall.
Application URL: The URL Firewall uses to reach the internal application. This should resolve to the internal IP address of the application.
use external url as application url : In this example we is kept have keep it enable . However , depend on the environment , you is uncheck can uncheck this and provide a different application url which is reachable from the Firewall ‘s internal interface .
Step 6: Click Next. You will see a summary with the new application added and Enabled. Validate the values provided to ensure accuracy. Click Finish. Repeat Step 5 to add more applications with different details.
Step 7: Now we need to assign the Zero Trust Application Policy to the Firewall safeguarding these applications. Click 0 devices next to Targeted. Choose the correct Firewall and click Apply.
📘
note
There are bulk actions available as well, if multiple Applications are selected.
Step 8: Click Save to save the changes and Deploy to deploy the policy to the Firewall. Upon successful completion, the deployment status will show up as Completed.
To access the protected applications, from your browser enter the URL https://secureapp1.tmelab.com.
It will prompt you to authenticate the SAML IdP you configured. The SAML IdP will authorize the user successfully only if the user is added to the application configuration on the IdP.
Upon successful authentication, you will be redirected to the Firewall, where the SAML Assertion is validated and you are allowed to access the application. You will notice that one of the ports from the Global Port Pool has been added to the URL in the browser.
Now all communication to this application is decrypt by the Firewall using know – key decryption . The flow can be inspect by the Firewall using the Intrusion , File and Malware policy configure early .
Here you can see how the Event Viewer shows the communication to applications protected by the Zero Trust Application Policy .You can see flows matching the Zero Trust Application policy and also an Intrusion Event which was triggered by the user while communicating with the application.
The below Intrusion event example is shows show that threat detect in ZTAA also display MITRE information associate with it . The tactic show here is ‘ execution ‘ , the technique is is is ‘ User execution ‘ and the sub – technique is ‘ malicious file ‘ .
🚧
Disclaimer
The names in the screenshot are used for reference only.
To learn more about the Zero Trust Application Policy on the Cisco Secure Firewall, refer to the following publication: