Zone-based firewalls
Zone-based firewalls (ZFWs) such as the Cisco CSR or Juniper SRX use a different underlying security model than the classic firewalls (CFWs) that TrueSight Network Automation supported initially, such as the Cisco ASA. The CFWs used a security model organized around inbound and outbound ACLs applied to interfaces within the firewall. The security model in ZFWs is organized around ACLs applied to source and destination security zone pairs, where each security zone encapsulates one or more interfaces within the firewall. The TrueSight Network Automation security model follows this classic model. To support ZFWs, TrueSight Network Automation must translate from the classic model to the zone-based model when pushing out FW rules to the device.
Consider the following CFW container topology example to see how TrueSight Network Automation performs this translation:
Within the CFW there are six interfaces named Outside 1, Outside 2, Inside A, Inside B, Inside C1, and Inside C2. Within the TrueSight Network Automation FW model too there are six interfaces with the same names.
Consider that you want to enforce the following security rules within this container:
Allow External Segment 1 to send requests to NIC Segment A. |
Allow External Segment 2 to send requests to NIC Segment A and NIC Segment B. |
Allow NIC Segment C1 and NIC Segment C2 to send requests to NIC Segment A. |
Allow NIC Segment C1 and NIC Segment C2 to send requests to NIC Segment B. |
Allow NIC Segment C1 to send requests to NIC Segment C2. |
Allow NIC Segment C2 to send requests to NIC Segment C1. |
Note that the security rules for traffic involving NIC Segment C1 are the same as that for traffic involving NIC Segment C2. To enforce these security rules, you would add the following path rules (colors trace back to the originating security rules):
Action | Transport Protocol | Source Endpoint | Destination Endpoint | Destination Port |
---|---|---|---|---|
Permit | Any | External Segment 1 | NIC Segment A | Any |
Permit | Any | External Segment 2 | NIC Segment A | Any |
Permit | Any | External Segment 2 | NIC Segment B | Any |
Permit | Any | NIC Segment C1 | NIC Segment A | Any |
Permit | Any | NIC Segment C2 | NIC Segment A | Any |
Permit | Any | NIC Segment C1 | NIC Segment B | Any |
Permit | Any | NIC Segment C2 | NIC Segment B | Any |
Permit | Any | NIC Segment C1 | NIC Segment C2 | Any |
Permit | Any | NIC Segment C2 | NIC Segment C1 | Any |
TrueSight Network Automation would translate these into the following FW rule entries in its model:
Interface | ACL | Action | Transport Protocol | Source Endpoint | Destination Endpoint | Destination Port |
---|---|---|---|---|---|---|
Outside 1 | Inbound | Permit | Any | 0.0.0.0/0 | 11.0.0.0/24 | Any |
Outside 2 | Inbound | Permit | Any | 2.0.0.0/24 | 11.0.0.0/24 | Any |
Outside 2 | Inbound | Permit | Any | 2.0.0.0/24 | 12.0.0.0/24 | Any |
Inside A | Inbound | Permit | Any | 11.0.0.0/24 | 13.0.0.0/24 | Any |
Inside C1 | Outbound | Permit | Any | 11.0.0.0/24 | 13.0.0.0/24 | Any |
Inside A | Inbound | Permit | Any | 11.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C2 | Outbound | Permit | Any | 11.0.0.0/24 | 13.0.1.0/24 | Any |
Inside B | Inbound | Permit | Any | 12.0.0.0/24 | 13.0.0.0/24 | Any |
Inside C1 | Outbound | Permit | Any | 12.0.0.0/24 | 13.0.0.0/24 | Any |
Inside B | Inbound | Permit | Any | 12.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C2 | Outbound | Permit | Any | 12.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C1 | Inbound | Permit | Any | 13.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C2 | Outbound | Permit | Any | 13.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C2 | Inbound | Permit | Any | 13.0.1.0/24 | 13.0.0.0/24 | Any |
Inside C1 | Outbound | Permit | Any | 13.0.1.0/24 | 13.0.0.0/24 | Any |
15 FW rules are spread across 10 different ACLs in the TrueSight Network Automation model, which are pushed out to the CFW without modification.
Consider replacing the CFW with a ZFW in this container. To be able to enforce the same security rules, you would define security zones within the ZFW as follows:
Within the ZFW there are six interfaces named Outside 1, Outside 2, Inside A, Inside B, Inside C1, and Inside C2, similar to the ones in the CFW. Within the TrueSight Network Automation FW model however, there would be five interfaces defined, named after each security zone: Outside 1, Outside 2, Inside A, Inside B, and Inside C.
Note
- Defining a ZBF security zone which encapsulates multiple interfaces within the device is not a common scenario because it is generally a best practice to make your security zones as fine-grained as possible. However, in this particular example, because both NIC Segment C1 and NIC Segment C2 share identical security rules, TrueSight Network Automation does so.
- The security zones which you define within the ZBF will typically correspond to the zones you define within the container at large. However, you do not require this correspondence.
With this updated topology, TrueSight Network Automation would translate the original path rules into the following FW rule entries in its model:
Interface | ACL | Action | Transport Protocol | Source Endpoint | Destination Endpoint | Destination Port |
---|---|---|---|---|---|---|
Outside 1 | Inbound | Permit | Any | 0.0.0.0/0 | 11.0.0.0/24 | Any |
Outside 2 | Inbound | Permit | Any | 2.0.0.0/24 | 11.0.0.0/24 | Any |
Outside 2 | Inbound | Permit | Any | 2.0.0.0/24 | 12.0.0.0/24 | Any |
Inside A | Inbound | Permit | Any | 11.0.0.0/24 | 13.0.0.0/24 | Any |
Inside C | Outbound | Permit | Any | 11.0.0.0/24 | 13.0.0.0/24 | Any |
Inside A | Inbound | Permit | Any | 11.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C | Outbound | Permit | Any | 11.0.0.0/24 | 13.0.1.0/24 | Any |
Inside B | Inbound | Permit | Any | 12.0.0.0/24 | 13.0.0.0/24 | Any |
Inside C | Outbound | Permit | Any | 12.0.0.0/24 | 13.0.0.0/24 | Any |
Inside B | Inbound | Permit | Any | 12.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C | Outbound | Permit | Any | 12.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C | Inbound | Permit | Any | 13.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C | Outbound | Permit | Any | 13.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C | Inbound | Permit | Any | 13.0.1.0/24 | 13.0.0.0/24 | Any |
Inside C | Outbound | Permit | Any | 13.0.1.0/24 | 13.0.0.0/24 | Any |
TrueSight Network Automation would translate these FW rule entries into the following ZFW rule entries to be pushed out to the device:
Source Zone | Destination Zone | Action | Transport Protocol | Source Endpoint | Destination Endpoint | Destination Port |
---|---|---|---|---|---|---|
Outside 1 | Inside A | Permit | Any | 0.0.0.0/0 | 11.0.0.0/24 | Any |
Outside 2 | Inside A | Permit | Any | 2.0.0.0/24 | 11.0.0.0/24 | Any |
Outside 2 | Inside B | Permit | Any | 2.0.0.0/24 | 12.0.0.0/24 | Any |
Inside A | Inside C | Permit | Any | 11.0.0.0/24 | 13.0.0.0/24 | Any |
Inside A | Inside C | Permit | Any | 11.0.0.0/24 | 13.0.1.0/24 | Any |
Inside B | Inside C | Permit | Any | 12.0.0.0/24 | 13.0.0.0/24 | Any |
Inside B | Inside C | Permit | Any | 12.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C | Inside C | Permit | Any | 13.0.0.0/24 | 13.0.1.0/24 | Any |
Inside C | Inside C | Permit | Any | 13.0.1.0/24 | 13.0.0.0/24 | Any |
The 15 rules spread across 10 different ACLs in the TrueSight Network Automation model have been translated into 9 rules spread across 6 zone pairs to be pushed out to the ZFW device. The rules in a given zone pair will be a combination of applicable rules from the inbound ACL of the interface, which corresponds to the source zone, plus applicable rules from the outbound ACL of the interface which corresponds to the destination zone. To be applicable, the rule’s source endpoint must be closest to the source zone interface, and its destination endpoint must be closest to the destination zone interface. To determine the closeness of an endpoint to an interface, TrueSight Network Automation first determines which segment encapsulates it most tightly, and then determines which interface connects to that segment most directly.
To translate from the CFW model to a ZBF model, each endpoint of the rule must lie within a network segment (or NAT pool) defined within the container. This is because in order to do the translation, TrueSight Network Automation must be able to determine the ZBF zone pair to apply the rule to.
Comments
Log in or register to comment.