

In addition, the same process can take place in reverse. This entire process is 100% transparent to your end users. The result is all internet-bound traffic can now be secured, logged, and inspected.

The traffic flows through the various inspection engines (IPS, Anti-Malware, etc.) and gets re-encrypted before it leaves the egress interface. How do we log/track/monitor traffic we cannot see? Firepower solves this problem by allowing all outbound internet traffic to be decrypted at the ingress. This is great for internet security in general but posed a problem for firewall engineers. Most websites had little choice but to turn on this feature. SSL Decryption: Virtually all websites require SSL/TLS security, which was brought about when Google decided it was going to prefer SSL/TLS enabled websites. Now the full SNORT v3 ruleset ships with Firepower and a dedicated appliance is no longer required or recommended. SNORT was developed by Sourcefire in 1998, and the company was purchased by Cisco in 2013. There are many IPS vendors, but the “Gold Standard” is really SNORT. Intrusion Prevention System (IPS): An IPS monitors traffic on your network and blocks traffic that matches a known malicious traffic pattern. Now, this is not an acceptable security posture. To get around the complexity, many customers put up their firewall alone and called it a win. Not to mention the finger-pointing when things go amiss. Too many security appliances equate to risk of performance, operations, or bad user experience. Often these problems were not solved at all. Security Intelligence: If a website is cracked and begins distributing malware, an ASA would not know this is taking place.ĭuring this period, these problems were solved with extremely complicated designs and many different appliances, support contracts, and vendors. URL Filtering: It was then decided maybe we should not let end users visit certain types of websites.


This was not supported and typically required a proxy solution with user authentication. Users/Identity Mapping: IT and security managers started wondering “who” is sending traffic through the firewall. It did have rudimentary inspection options, but they were difficult to configure and did not work very well. Layer 7 Inspection: An ASA is a Layer 3 and Layer 4 device it is not aware of any application. SSL Decryption: You cannot really have network security if all it takes to get around your policy is encryption.Īnti-Malware: Of course, detecting malware before it gets to your users is always a good thing. This feature was not supported on an ASA and required a separate appliance. IPS (Intrusion Prevention System): If you need network security, you need an IPS.
