fbpx

Cisco Secure Firewall on AWS: Create resilience at level with stateful firewall clustering

Organizations embrace the general public cloud for the agility, scalability, and dependability it provides when running applications. And organizations need these abilities to ensure their apps operate where needed so when needed, they might need their security does exactly the same also. Organizations might introduce several individual firewalls to their AWS infrastructure to create this outcome. In theory, this can be a good choice, but in practice-this may lead to asymmetric routing issues. Complicated SNAT construction can mitigate asymmetric routing problems, but this isn’t useful for sustaining open public cloud operations. Organizations want out for his or her long-term cloud methods by ruling out SNAT and so are calling for a far more dependable and scalable solution allowing you to connect their applications and protection for always-on protection.

To solve these problems, Cisco created stateful firewall clustering with Secure Firewall within AWS.

 <h2>          <span>          <strong>     Cisco Protected Firewall clustering overview     </strong>          </span>          </h2>     

Firewall clustering for Secure Firewall Threat Protection Virtual provides a extremely resilient and reliable architecture for securing your AWS cloud environment. This capacity enables you to group multiple Safe Firewall Threat Defense Digital appliances together as an individual logical device, referred to as a “cluster.”

The cluster provides all of the conveniences of an individual device (administration and integration right into a system) while benefiting from the increased throughput and redundancy you’ll expect from deploying several devices individually. Cisco utilizes Cluster Control Hyperlink (CCL) for forwarding asymmetric visitors across gadgets in the cluster.

In this full case, clustering gets the following roles:

 <figcaption id="caption-attachment-421232" class="wp-caption-text">     Figure 1: Cisco Protected Firewall Clustering Review     </figcaption>     

 </figure>     

The aforementioned diagram explains visitors flow between the customer and the server with the insertion of the firewall cluster in the network. Below defines the functions of clustering and how packet movement interacts at each action.

 <h2>          <strong>          <span>          <span class="TextRun MacChromeBold SCXW92945481 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none">          <span class="NormalTextRun SCXW92945481 BCX0">     Clustering functions and duties     </span>          </span>          <span class="EOP SCXW92945481 BCX0">           </span>          </span>          </strong>          </h2>     

 <strong>     Proprietor     </strong>     : The      <em>     Proprietor     </em>      may be the node in the cluster that at first receives the connection.

 <ul>     
 <li>     
 <ul>     
 <li>          <span data-contrast="none">     The      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      maintains the TCP state and procedures the packets.     </span>          <span>           </span>          </li>     
 <li>          <span data-contrast="none">     A link has only 1      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">     .     </span>          <span>           </span>          </li>     
 <li>          <span data-contrast="none">     If the initial      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      fails, the brand new node gets the packets, and the      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">      chooses a fresh      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      from the accessible nodes in the cluster.     </span>          </li>     
 </ul>     
 </li>     
 </ul>     

 <b>          <span data-contrast="none">     Backup Proprietor     </span>          </b>          <span data-contrast="none">     : The node that shops TCP/UDP state information obtained from the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      so the connection could be seamlessly used in a new proprietor in the event of failure.     </span>     

 <b>          <span data-contrast="none">     Director     </span>          </b>          <span data-contrast="none">     : The      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">      may be the node in the cluster that handles proprietor lookup requests from the      </span>          <i>          <span data-contrast="none">     Forwarder(s)     </span>          </i>          <span data-contrast="none">     .     </span>          <span>           </span>     

 <ul>     
 <li>     
 <ul>     
 <li data-leveltext="·" data-font="Symbol" data-listid="1" data-aria-posinset="1" data-aria-level="1">          <span data-contrast="none">     Once the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      gets a new link, it chooses a      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">      predicated on a hash of the resource/destination Ip and ports. The      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      after that sends a note to the      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">      to join up the new link.     </span>          <span>           </span>          </li>     
 <li data-leveltext="·" data-font="Symbol" data-listid="1" data-aria-posinset="1" data-aria-level="1">          <span data-contrast="none">     If packets reach any node apart from the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">     , the node queries the      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">     . The      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">      after that seeks out and defines the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      node so the      </span>          <i>          <span data-contrast="none">     Forwarder     </span>          </i>          <span data-contrast="none">      can redirect packets to the right location.     </span>          <span>           </span>          </li>     
 <li data-leveltext="·" data-font="Symbol" data-listid="1" data-aria-posinset="1" data-aria-level="1">          <span data-contrast="none">     A link has only 1      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">     .     </span>          <span>           </span>          </li>     
 <li data-leveltext="·" data-font="Symbol" data-listid="1" data-aria-posinset="1" data-aria-level="1">          <span data-contrast="none">     In case a      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">      fails, the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      chooses a fresh      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">     .     </span>          </li>     
 </ul>     
 </li>     
 </ul>     

 <b>          <span data-contrast="none">     Forwarder     </span>          </b>          <span data-contrast="none">     : The      </span>          <i>          <span data-contrast="none">     Forwarder     </span>          </i>          <span data-contrast="none">      is really a node in the cluster that redirects packets to the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">     .     </span>          <span>           </span>     

 <ul>     
 <li>     
 <ul>     
 <li data-leveltext="·" data-font="Symbol" data-listid="1" data-aria-posinset="1" data-aria-level="1">          <span data-contrast="none">     In case a      </span>          <i>          <span data-contrast="none">     Forwarder     </span>          </i>          <span data-contrast="none">      gets a packet for a link it does not very own, it queries the      </span>          <i>          <span data-contrast="none">     Director     </span>          </i>          <span data-contrast="none">      to search out the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">     .      </span>          <span>           </span>          </li>     
 <li data-leveltext="·" data-font="Symbol" data-listid="1" data-aria-posinset="1" data-aria-level="1">          <span data-contrast="none">     After the      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">      is described, the      </span>          <i>          <span data-contrast="none">     Forwarder     </span>          </i>          <span data-contrast="none">      establishes a stream, and redirects any upcoming packets it receives because of this connection to the described      </span>          <i>          <span data-contrast="none">     Proprietor     </span>          </i>          <span data-contrast="none">     .     </span>          </li>     
 </ul>     
 </li>     
 </ul>     

 <b>          <span data-contrast="none">     Fragment Proprietor     </span>          </b>          <span data-contrast="none">     : For fragmented packets, cluster nodes that get a fragment determine a      </span>          <i>          <span data-contrast="none">     Fragment Proprietor     </span>          </i>          <span data-contrast="none">      utilizing a hash of the fragment supply IP address, destination Ip, and the packet ID. All fragments are after that redirected to the      </span>          <i>          <span data-contrast="none">     Fragment Proprietor     </span>          </i>          <span data-contrast="none">      over Cluster Control Hyperlink.      </span>          <span>           </span>     

 <h2>          <span>          <strong>     Integration with AWS Gateway Load Balancer (GWLB)     </strong>          </span>          </h2>     

In the Secure Firewall Threat Defense 7.1 discharge, Cisco brought assistance for AWS Gateway Load Balancer (Physique 2). This feature allows organizations to level their firewall existence as had a need to meet demand (notice information right here ).

 <figcaption id="caption-attachment-421233" class="wp-caption-text">     Figure 2: Cisco Safe Firewall and AWS Gateway Load Balancer integration     </figcaption>     

 </figure>     

 <h2>          <span>          <strong>     Cisco Protected Firewall clustering in AWS     </strong>          </span>          </h2>     

Building off the prior figure, organizations may take benefit of the AWS Gateway Load Balancer along with Secure Firewall’s clustering capacity to evenly distribute visitors at the Safe Firewall cluster. This permits organizations to maximize the advantages of clustering capabilities including increased redundancy and throughput. Figure 3 displays how positioning a Secure Firewall cluster behind the AWS Gateway Load Balancer generates a resilient architecture. Let’s have a nearer look at the proceedings in the diagram.

 <figcaption id="caption-attachment-421234" class="wp-caption-text">     Figure 3: Cisco Protected Firewall clustering in AWS     </figcaption>     

 </figure>     

Figure 3 shows a good Internet user seeking to access the workload. Prior to the user can accessibility the workload, the user’s visitors is usually routed to Firewall Node 2 for inspection. The traffic circulation because of this example includes:

 <strong>          <span>     Consumer -&gt; IGW -&gt; GWLBe -&gt; GWLB -&gt; Safe Firewall (2) -&gt; GLWB -&gt; GWLBe -&gt; Workload     </span>          </strong>     

In case of failure, the AWS Gateway Load Balancer cuts off current connections to the failed node, making the aforementioned solution non-stateful.

Lately, AWS announced a fresh feature because of their load balancers referred to as Target Failover for Existing Flows . This function enables forwarding of current connections to some other target in case of failure.

Cisco can be an early adaptor of the feature and contains combined Focus on Failover for Existing Flows with Secure Firewall clustering features to generate the industry’s very first stateful cluster within AWS.

aws

 <figcaption id="caption-attachment-421235" class="wp-caption-text">     Figure 4: Cisco Protected Firewall clustering rehashing current flow to a fresh node     </figcaption>     

 </figure>     

Figure 4 shows the firewall failure occasion and the way the AWS Gateway Load Balancer utilizes the mark Failover for Existing Flows function to change the traffic movement from Firewall Node 2 to Firewall Node 3 . The traffic flow because of this example includes:

 <span>          <strong>     Consumer -&gt; IGW -&gt; GWLBe -&gt; GWLB -&gt; Safe Firewall (3) -&gt; GLWB -&gt; GWLBe -&gt; Workload     <br />          </strong>          </span>     

 <h2>          <span>          <strong>     Bottom line     </strong>          </span>          </h2>     

Organizations require scalable and reliable security to safeguard always-on applications within their AWS cloud environment. With stateful firewall clustering abilities from Cisco, companies can protect their programs while maintaining cloud advantages such as for example agility, scalability, and dependability.

Cisco Secure Firewall Risk Defense Virtual comes in the AWS market, providing functions like firewalling, application presence & manage, IPS, URL filtering, and malware defense. Cisco provides flexible choices for firewall licensing, such as for example pay-as-you-move (PAYG) and bring-your-own-license (BYOL). For more information about how exactly Cisco Secure Firewall clustering features can help guard your AWS apps, see our additional assets, have a look at our 30-day trial offer , or get hold of your Cisco product sales representative .

 <h2>          <span>          <strong>     Additional Assets     </strong>          <strong>           </strong>          </span>          </h2>     

 <a href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/cluster/ftdv-cluster-public.html" target="_blank" rel="noopener">     Cisco Protected Firewall Clustering in the Cloud     </a>     

 <a href="https://blogs.cisco.com/security/building-a-scalable-security-architecture-on-aws-with-cisco-secure-firewall-and-aws-transit-gateway" target="_blank" rel="noopener">     Creating a Scalable Safety Architecture on AWS with Cisco Secure Firewall and AWS Gateway Load Balancer     </a>     

 <a href="https://aws.amazon.com/blogs/networking-and-content-delivery/introducing-aws-gateway-load-balancer-target-failover-for-existing-flows/" target="_blank" rel="noopener">     Presenting AWS Gateway Load Balancer Focus on Failover for Current Flows     </a>     

 <a href="https://www.cisco.com/c/en/us/products/security/firewalls/firepower-public-cloud.html" target="_blank" rel="noopener">     Safe Firewall for Open public Cloud webpage     </a>     

 <hr />     

 <em>     We’d want to hear everything you think. Ask a relevant question, Comment Below, and Remain Linked to Cisco Secure on interpersonal!     </em>     

 <strong>     Cisco Protected Social Channels     </strong>     

 <strong>          <a href="https://www.instagram.com/CiscoSecure/" target="_blank" rel="noopener noreferrer">     Instagram     </a>          </strong>          <br />          <strong>          <a href="https://www.facebook.com/ciscosecure/" target="_blank" rel="noopener noreferrer">     Facebook     </a>          </strong>          <br />          <strong>          <a href="https://twitter.com/CiscoSecure" target="_blank" rel="noopener noreferrer">     Twitter     </a>          </strong>          <br />          <strong>          <a href="https://www.linkedin.com/showcase/cisco-secure" target="_blank" rel="noopener noreferrer">     LinkedIn     </a>          </strong>     

 <pre>          <code>        &lt;br&gt;

<br>