Configure Firewall Policies for SD-Routing Devices, Release 17.16.x
What’s new and changed
Cisco IOS XE Release |
Feature Name and Description |
Supported Platforms |
---|---|---|
Cisco IOS XE 17.16.1a |
Configure Source Interface for High Speed Logging From Cisco IOS XE 17.16.1a, you can configure source interfaces for High-Speed Logging (HSL) and SysLog for security logging in Cisco SD-WAN Manager. You can also enable HSL for your firewall messages, to allow a firewall to log records with minimum impact to packet processing. |
|
NGFW policies for SD-Routing devices
A firewall policy is a localized security policy that allows the inspection of data traffic flows in your network. Using firewall policies, you can configure zone-based policies to protect your network against breaches and threats.
SD-Routing supports high-speed logging (HSL). When HSL is configured, a firewall provides a log of packets that flow through routing devices to an external collector or destination servers.
You can configure a source interface for HSL and a UTD syslog interface in a policy group. Also, you can define, apply, and manage firewall policies to define traffic flows between zones. You can create zones based on the interface and control all the data traffic that pass between zones.
In addition, the New Gen Firewall (NGFW) functionality in SD-Routing supports Unified Logging. It allows the stateful and stateless inspection of TCP, UDP, and ICMP data traffic that flows in your network. This functionality also allows you to effortlessly incorporate firewall solutions from the Cisco SD-WAN manager.
From 17.16.1a release onwards, you can clone, copy, and search for a rule using Cisco SD-WAN Manager.
Restrictions
-
You can configure a maximum of 4 High Speed Logging (HSL) source interfaces in a firewall policy.
-
VRF is not supported.
-
You can configure only one external syslog server source interface for UTD.
Before you begin
You must create a policy group from the SD-WAN Manager. For more information, see Policy Groups in the Policy Groups Configuration Guide, Cisco IOS XE Catalyst SD-WAN Release 17.x.
Workflow to set up firewall policy using Policy Groups
This workflow outlines the high-level steps required to set up firewall policies for your SD-Routing devices. The detailed instructions are covered in each of the sections.
Task |
Detailed steps |
---|---|
Create an NGFW Policy |
|
Add a Sub Policy |
|
Review and create the policy |
|
Associate the NGFW policy with a Policy Group |
Create an NGFW policy
This task specifies the steps you must perform to create a firewall policy for your network.
Step 1 | On the SD-WAN Manager main menu, go to Configuration > Policy Groups. | ||||||
Step 2 | On the Policy Groups window, click the NGFW tab. | ||||||
Step 3 | On the Create NGFW Policy window, specify the details for these fields:
| ||||||
Step 4 | From the Device Solution radio button, select sd-routing. | ||||||
Step 5 | Click Next to go to the Select Configuration Groups page. This SD-Routing page is not applicable for SD-Routing devices. Click Next, again, to proceed to create a sub policy. |
Create a sub policy
Perform these steps to create sub policies under a security policy.
Step 1 | On the Create Sub-Policy window, click Add Sub Policy. | ||||||||||||||||||||||||||||||
Step 2 | In the Source Zone field, choose the zone that is the source of the data packets. | ||||||||||||||||||||||||||||||
Step 3 | In the Destination Zone field, choose the zone that is the destination of the data packets. | ||||||||||||||||||||||||||||||
Step 4 | On the Add Rule pop-up window that is displayed, configure the rules for your sub policy. This table specifies the fields under each section.
| ||||||||||||||||||||||||||||||
Step 5 | Click Additional Settings and configure the following:
| ||||||||||||||||||||||||||||||
Step 6 | Click Save. |
Review and create the policy
Perform this task after you add a Sub-Policy to your firewall policy.
Step 1 | On the Summary window, review all the configuration settings for your firewall policy. |
Step 2 | Click Create NGFW Policy to create the policy. |
Associate a Policy Group with the NGFW policy
Before you begin
Perform this task to associate the firewall policy you created with a Policy Group. If you don't have a Policy Group already, you must create one.
Step 1 | On the SD-WAN Manager main menu, go to Configurations > Policy Groups. |
Step 2 | Select the Policy Group to which you want to associate the NGFW Policy. |
Step 3 | From the NGFW drop-down field, select the NGFW policy you created. |
Step 4 | Click Save to create an association between the NGFW Policy and the Policy Group. This association ensures that the NGFW Policy is applied to the Policy Group. |
Step 5 | Select the SD Routing devices on which you want to provision this policy, and click Next. |
Step 6 | Review the workflow and complete the wizard by clicking Deploy, to deploy the Policy Group to the device. Your device is now ready to use the NGFW Policy. |
High speed logging
After you create a Policy group and a NGFW policy, you can enable High Speed Logging (HSL) for your firewall messages. When you configure HSL, a firewall provides a log of packets that flow through the SD-Routing devices to an external collector. Records are sent when sessions are created and destroyed. Session records contain the source IP address, destination IP address, source port, destination port, and protocol.
HSL allows a firewall to log records with minimum impact to packet processing. The firewall uses buffered mode for HSL. In buffered mode, a firewall logs records directly to the high-speed logger buffer, and exports of packets separately.
Enable high speed logging
Perform this procedure to configure your log server destination IP addresses to export Syslog records.
Step 1 | On the SD-WAN Manager main menu, go to Configuration > Network Hierarchy. |
Step 2 | Under the Collectors tab, select the Security Logging toggle button. |
Step 3 | In the High Speed Logging Servers field, configure up to four labels for the source interface configured with the destination servers to collect logs for HSL. Specify the VPN, Server IP, and Port details for the HSL servers here. |
Step 4 | In the External SysLog Server Source Interface field, enter these details to export the UTD logs to the external syslog server:
|
Step 5 | Click Save. |
Step 6 | Add the Source Interface in the Additional Settings and associate a Policy Group with the firewall policy where you have enabled HSL. |
Step 7 | Preview and deploy the policy to the SD-Routing devices to use HSL. Note If you do not configure the HSL and Syslog servers through Network Hierarchy page, a pop-up window appears for the first time under Configuration > Policy Groups > NGFW> Additional Settings to support the addition of HSL and syslog details. However, once you configure HSL and syslog, you can edit or update the settings only through Network Hierarchy page. |
Verify high speed logging
After you deploy a NGFW policy with HSL and Syslog Source Interface configuration on the CLI Pane, verify whethere the:
|