Hi, i'm Lucian and on this blog I share my experiences, thoughts and opinions in long form on life in the blue cloud. I'm a Cloud Solution Architect, specialising in Azure infrastructure, at Microsoft, in Sydney, Australia.
Lessons learned from deploying Cisco Firepower Threat Defence firewall virtual appliances in Azure
A brain dump.
/0080
3min read
This is going to be a point form brain dump of some important titbits of information associated with deploying Cisco virtual firewall appliances in Azure. Here we go:
Azure Network Security Groups (NSGs) are underrated and work really well, with the lack of detailed traffic flow reporting being the only negative
I’m sure that will be improved
I need to tinker with OMS Log Analytics more and see if that negative is no longer the case
NSGs
NSGs can be used with the firewall
Inbound or outbound rules should state source of TAG Internet not the FTDs themselves
The default rules for VirtualNetwork cover the FTD traffic flow
Isolating subnets can be achieved still- for DMZs/ Controlled subnets
Just deny all other subnets in a VNET address space
Do this with low priority rules @ #4000 or higher (max is 4096)
Firewall interfaces are important, but, not a deal breaker when it comes to routing traffic
All you need at a minimum is two interfaces that support routing traffic
Ideally you should have three:
Untrusted (External, WWW)
Controlled (DMZ)
Trusted (Restricted and Secured traffic)
Cisco Firepower Threat Defence Virtual - Azure only supports routing traffic on TWO of the available 4 interfaces
Cisco Adaptive Security Appliance (ASA) Virtual - Azure has 3 interfaces supporting routing of traffic
The third interface is designated for Controlled or DMZ traffic / networks
Cisco Firepower Threat Defence Virtual
Each interface must be on a unique subnet
A PIP is provisioned on Nic0 which is the management interface
Nic1 is used for diagnostics only and does not support routing of any traffic
Nic2 can be used for either trusted or untrusted traffic
Nic3 can be used for either trusted or untrusted traffic
Firepower Management Centre is required for management of the appliance
FMC is listed as being required from on-premises
Have connected the firewall to FMC via ExpressRoute and MPLS via internal network addresses
This leads me to believe an FMC should be able to be deployed in Azure
LOAD BALANCING
Azure Load Balancers are used to achieve “availability” - true HA isn’t available as the devices are not stateful, and they don’t replicate between each other
Devices can be provisioned in an availability set
A load balancer sandwich is then implemented
ELB for inbound from Untrusted
ILB outbound from trusted
This ensures that at least one firewall is up all the time- guaranteed by Azure
Achieves 99.95% SLA
Out of the box, the Azure Load Balancer requires a health probe to ensure that the host or instance its sending traffic too is healthy
This health probe is on the same interface that the traffic needs to be going to
The Cisco FTDv does not play nicely with this out of the box