Mitigation Technologies for E-mail-Based and Web-Based Threats

Date: Sep 29, 2015

Return to the article

This chapter from CCNA Security 210-260 Official Cert Guide covers the Cisco E-mail Security Appliances (ESA) and the Cisco Web Security Appliance (WSA) technologies and solutions in detail. You will learn mitigation technologies such as spam and antimalware filtering, data loss prevention (DLP), blacklisting, e-mail encryption, and web application filtering.

Efficient e-mail-based and web-based security requires a robust solution that is expanded beyond the traditional perimeter, as new threats are emerging on a daily basis. The Cisco E-mail Security Appliances (ESA) and the Cisco Web Security Appliance (WSA) provide a great solution designed to protect corporate users against these threats. Cisco has added advanced malware protection (AMP) to the ESA and WSA to allow security administrators to detect and block malware and perform continuous analysis and retrospective alerting. Both the ESA and WSA use cloud-based security intelligence to allow protection before, during, and after an attack. This chapter covers these technologies and solutions in detail. You will learn mitigation technologies such as spam and antimalware filtering, data loss prevention (DLP), blacklisting, e-mail encryption, and web application filtering.

“Do I Know This Already?” Quiz

The “Do I Know This Already?” quiz helps you determine your level of knowledge of this chapter’s topics before you begin. Table 18-1 details the major topics discussed in this chapter and their corresponding quiz questions.

Table 18-1 “Do I Know This Already?” Section-to-Question Mapping

Foundation Topics Section

Questions

Mitigation Technology for E-mail-Based Threats

1–4

Mitigation Technology for Web-Based Threats

5–8

  1. Which of the following features does the Cisco ESA provide? (Choose all that apply.)

    1. Network antivirus capabilities
    2. E-mail encryption
    3. Threat outbreak prevention
    4. Support for remote access SSL VPN connections
  2. Which of the following Cisco ESA models are designed for mid-sized organizations? (Choose all that apply.)

    1. Cisco C380
    2. Cisco C670
    3. Cisco C680
    4. Cisco X1070
  3. What is a spear phishing attack?

    1. Unsolicited e-mails sent to an attacker.
    2. A denial-of-service (DoS) attack against an e-mail server.
    3. E-mails that are directed to specific individuals or organizations. An attacker may obtain information about the targeted individual or organization from social media sites and other sources.
    4. Spam e-mails sent to numerous victims with the purpose of making money.
  4. Which of the following e-mail authentication mechanisms are supported by the Cisco ESA? (Choose all that apply.)

    1. Sender Policy Framework (SPF)
    2. Sender ID Framework (SIDF)
    3. DomainKeys Identified Mail (DKIM)
    4. DomainKeys Mail Protection (DMP)
  5. Which of the following is the operating system used by the Cisco WSA ?

    1. Cisco AsyncOS operating system
    2. Cisco IOS-XR Software
    3. Cisco IOS-XE Software
    4. Cisco IOS Software
    5. Cisco ASA Software
  6. Which of the following connectors are supported by the Cisco CWS service? (Choose all that apply.)

    1. Cisco Security Manager (CSM)
    2. Cisco ASA
    3. Cisco ISR G2 routers
    4. Cisco AnyConnect Secure Mobility Client
    5. Cisco WSA
  7. Which of the following features are supported by the Cisco WSA? (Choose all that apply.)

    1. File reputation
    2. File sandboxing
    3. Layer 4 traffic monitor
    4. Real-time e-mail scanning
    5. Third-party DLP integration
  8. Cisco WSA can be deployed using the Web Cache Communication Protocol (WCCP) configured in which of the following modes? (Choose all that apply.)

    1. Multiple context mode
    2. Explicit proxy mode
    3. Transparent proxy mode
    4. Virtualized mode

Foundation Topics

Mitigation Technology for E-mail-Based Threats

Users are no longer accessing e-mail from the corporate network or from a single device. Cisco provides cloud-based, hybrid, and on-premises ESA-based solutions that can help protect any dynamic environment. This section introduces these solutions and technologies explaining how users can use threat intelligence to detect, analyze, and protect against both known and emerging threats.

E-mail-Based Threats

There are several types of e-mail-based threats. The following are the most common:

Cisco Cloud E-mail Security

Cisco cloud e-mail security provides a cloud-based solution that allows companies to outsource the management of their e-mail security management. The service provides e-mail security instances in multiple Cisco data centers to enable high availability. Figure 18-1 illustrates the Cisco cloud e-mail security solution.

Figure 18-1 Cisco Cloud E-mail Security Architecture

In Figure 18-1, three organizations (a large enterprise, a university, and a small- to medium-size business) leverage the Cisco hosted (cloud) environment. The solution also supports mobile workers.

Cisco Hybrid E-mail Security

The Cisco hybrid e-mail security solution combines both cloud-based and on-premises ESAs. This hybrid solution helps Cisco customers reduce their on-site e-mail security footprint, outsourcing a portion of their e-mail security to Cisco, while still allowing them to maintain control of confidential information within their physical boundaries. Many organizations need to stay compliant to many regulations that may require them to keep sensitive data physically on their premises. The Cisco hybrid e-mail security solution allows network security administrators to remain compliant and to maintain advanced control with encryption, data loss prevention (DLP), and on-site identity-based integration.

Cisco E-mail Security Appliance

The following are the different ESA models:

The Cisco ESA runs the Cisco AsyncOS operating system. The Cisco AsyncOS supports numerous features that will help mitigate e-mail-based threats. The following are examples of the features supported by the Cisco ESA:

The Cisco ESA acts as the e-mail gateway to the organization, handling all e-mail connections, accepting messages, and relaying them to the appropriate systems. The Cisco ESA can service e-mail connections from the Internet to users inside your network, and from systems inside your network to the Internet. E-mail connections use Simple Mail Transfer Protocol (SMTP). The ESA services all SMTP connections by default acting as the SMTP gateway.

The Cisco ESA uses listeners to handle incoming SMTP connection requests. A listener defines an e-mail processing service that is configured on an interface in the Cisco ESA. Listeners apply to e-mail entering the appliance from either the Internet or from internal systems.

The following listeners can be configured:

Figure 18-2 illustrates the concept of Cisco ESA listeners.

Figure 18-2 Cisco ESA Listeners

Cisco ESA listeners are often referred to as SMTP daemons running on a specific Cisco ESA interface. When a listener is configured, the following information must be provided:

Cisco ESA Initial Configuration

To perform the initial Cisco ESA configuration, complete the following steps:

Example 18-1 Initial Setup with the systemsetup Command

IronPort> systemsetup
WARNING: The system setup wizard will completely delete any existing
‘listeners’ and all associated settings including the ‘Host Access Table’ - mail
operations may be interrupted.
Are you sure you wish to continue? [Y]> Y


You are now going to configure how the IronPort C60 accepts mail by
creating a “Listener”.

Please create a name for this listener (Ex: “InboundMail”):
[]> InboundMail

Please choose an IP interface for this Listener.
1. Management (192.168.42.42/24: mail3.example.com)
2. PrivateNet (192.168.1.1/24: mail3.example.com)
3. PublicNet (192.168.2.1/24: mail3.example.com)

[1]>3
Enter the domains or specific addresses you want to accept mail for.
Hostnames such as “example.com” are allowed.

Partial hostnames such as “.example.com” are allowed.

Usernames such as “postmaster@” are allowed.

Full email addresses such as “joe@example.com” or “joe@[1.2.3.4]” are allowed.
Separate multiple addresses with commas

[]> securemeinc.org
Would you like to configure SMTP routes for example.com? [Y]> y

Enter the destination mail server which you want mail for example.com to be delivered.


Separate multiple entries with commas.
[]> exchange.securemeinc.org


Do you want to enable rate limiting for this listener? (Rate limiting defines the
maximum


number of recipients per hour you are willing to receive from a remote domain.) [Y]> y


Enter the maximum number of recipients per hour to accept from a remote domain.
[]> 4500


Default Policy Parameters
==========================
Maximum Message Size: 100M
Maximum Number Of Connections From A Single IP: 1,000
Maximum Number Of Messages Per Connection: 1,000
Maximum Number Of Recipients Per Message: 1,000
Maximum Number Of Recipients Per Hour: 4,500
Maximum Recipients Per Hour SMTP Response:
 452 Too many recipients received this hour
Use SenderBase for Flow Control: Yes
Virus Detection Enabled: Yes
Allow TLS Connections: No
Would you like to change the default host access policy? [N]> n
Listener InboundMail created.
Defaults have been set for a Public listener.

Use the listenerconfig->EDIT command to customize the listener.
*****

Do you want to configure the C60 to relay mail for internal hosts? [Y]> y

Please create a name for this listener (Ex: “OutboundMail”):
[]> OutboundMail

Please choose an IP interface for this Listener.
1. Management (192.168.42.42/24: mail3.example.com)
2. PrivateNet (192.168.1.1/24: mail3.example.com)
3. PublicNet (192.168.2.1/24: mail3.example.com)

[1]> 2

Please specify the systems allowed to relay email through the IronPort C60.

Hostnames such as “example.com” are allowed.

Partial hostnames such as “.example.com” are allowed.

IP addresses, IP address ranges, and partial IP addressed are allowed.

Separate multiple entries with commas.
 []> .securemeinc.org

Do you want to enable rate limiting for this listener? (Rate limiting defines the 
maximum number of recipients per hour you are willing to receive from a remote 
domain.)
[N]> n

Default Policy Parameters
==========================
Maximum Message Size: 100M
Maximum Number Of Connections From A Single IP: 600
Maximum Number Of Messages Per Connection: 10,000
Maximum Number Of Recipients Per Message: 100,000
Maximum Number Of Recipients Per Hour: Disabled
Use SenderBase for Flow Control: No
Virus Detection Enabled: Yes
Allow TLS Connections: No
Would you like to change the default host access policy? [N]> n
Listener OutboundMAil created.
Defaults have been set for a Private listener.
Use the listenerconfig->EDIT command to customize the listener.
*****

Congratulations! System setup is complete. For advanced configuration, please refer to 
  the User Guide.
mail3.securemeinc.org >

In Example 18-1, the inside (private) and outside (public) listeners are configured. The domain name of securemeinc.org is used in this example.

To verify the configuration, you can use the mailconfig command to send a test e-mail containing the system configuration data that was entered in the System Setup Wizard, as shown in Example 18-2.

Example 18-2 Verifying the Configuration with the mailconfig Command

mail3.securemeinc.org> mailconfig

Please enter the email address to which you want to send
the configuration file. Separate multiple addresses with commas.

[]> admin@securemeinc.org

The configuration file has been sent to admin@securemeinc.org.

mail3.securemeinc.org>

In Example 18-2, the e-mail is sent to the administrator (admin@securemeinc.org).

Mitigation Technology for Web-Based Threats

For any organization to be able to protect its environment against web-based security threats, the security administrators need to deploy tools and mitigation technologies that go far beyond traditional blocking of known bad websites. Nowadays, you can download malware through compromised legitimate websites, including social media sites, advertisements in news and corporate sites, gaming sites, and many more. Cisco has developed several tools and mechanisms to help their customers combat these threats. The core solutions for mitigating web-based threats are the Cisco Cloud Web Security (CWS) offering and the integration of advanced malware protection (AMP) to the Cisco Web Security Appliance (WSA). Both solutions enable malware detection and blocking, continuous monitoring, and retrospective alerting. The following sections cover the Cisco CWS and Cisco WSA in detail.

Cisco CWS

Cisco CWS is a cloud-based security service from Cisco that provides worldwide threat intelligence, advanced threat defense capabilities, and roaming user protection. The Cisco CWS service uses web proxies in Cisco’s cloud environment that scan traffic for malware and policy enforcement. Cisco customers can connect to the Cisco CWS service directly by using a proxy autoconfiguration (PAC) file in the user endpoint or through connectors integrated into the following Cisco products:

Organizations using the transparent proxy functionality through a connector can get the most out of their existing infrastructure. In addition, the scanning is offloaded from the hardware appliances to the cloud, reducing the impact to hardware utilization and reducing network latency. Figure 18-3 illustrates how the transparent proxy functionality through a connector works.

Figure 18-3 Cisco ASA with Cisco CWS Connector Example

In Figure 18-3, the Cisco ASA is enabled with the Cisco CWS connector at a branch office. The following steps explain how Cisco CWS protects the corporate users at the branch office:

  1. An internal user makes an HTTP request to an external website (securemeinc.org).
  2. The Cisco ASA forwards the request to Cisco CWS global cloud infrastructure.
  3. It notices that securemeinc.org had some web content (ads) that were redirecting the user to a known malicious site.
  4. Cisco CWS blocks the request to the malicious site.

Cisco WSA

The Cisco WSA uses cloud-based intelligence from Cisco to help protect the organization before, during, and after an attack. This “lifecycle” is what is referred to as the attack continuum. The cloud-based intelligence includes web (URL) reputation and zero-day threat intelligence from Cisco’s security intelligence and research group named Talos. This threat intelligence helps security professionals to stop threats before they enter the corporate network, while also enabling file reputation and file sandboxing to identify threats during an attack. Retrospective attack analysis allows security administrators to investigate and provide protection after an attack when advanced malware might have evaded other layers of defense.

The Cisco WSA can be deployed in explicit proxy mode or as a transparent proxy using the Web Cache Communication Protocol (WCCP). WCCP is a protocol originally developed by Cisco, but several other vendors have integrated it in their products to allow clustering and transparent proxy deployments on networks using Cisco infrastructure devices (routers, switches, firewalls, and so on).

Figure 18-4 illustrates a Cisco WSA deployed as an explicit proxy.

Figure 18-4 Explicit Proxy Configuration

The following are the steps illustrated in Figure 18-4:

  1. An internal user makes an HTTP request to an external website. The client browser is configured to send the request to the Cisco WSA.
  2. The Cisco WSA connects to the website on behalf of the internal user.
  3. The firewall (Cisco ASA) is configured to only allow outbound web traffic from the Cisco WSA, and it forwards the traffic to the web server.

Figure 18-5 shows a Cisco WSA deployed as a transparent proxy.

Figure 18-5 Transparent Proxy Configuration

The following are the steps illustrated in Figure 18-5:

  1. An internal user makes an HTTP request to an external website.
  2. The internal router (R1) redirects the web request to the Cisco WSA using WCCP.
  3. The Cisco WSA connects to the website on behalf of the internal user.
  4. Also in this example, the firewall (Cisco ASA) is configured to only allow outbound web traffic from the WSA. The web traffic is sent to the Internet web server.

Figure 18-6 demonstrates how the WCCS registration works. The Cisco WSA is the WCCP client, and the Cisco router is the WCCP server.

Figure 18-6 WCCP Registration

During the WCCP registration process, the WCCP client sends a registration announcement (“Here I am”) every 10 seconds. The WCCP server (the Cisco router in this example) accepts the registration request and acknowledges it with an “I See You” WCCP message. The WCCP server waits 30 seconds before it declares the client as “inactive” (engine failed). WCCP can be used in large-scale environments. Figure 18-7 shows a cluster of Cisco WSAs, where internal Layer 3 switches redirect web traffic to the cluster.

Figure 18-7 Cisco WSA Cluster Example

The Cisco WSA comes in different models. The following are the different Cisco WSA models:

The Cisco WSA runs Cisco AsyncOS operating system. The Cisco AsyncOS supports numerous features that will help mitigate web-based threats. The following are examples of these features:

Cisco Content Security Management Appliance

Cisco Security Management Appliance (SMA) is a Cisco product that centralizes the management and reporting for one or more Cisco ESAs and Cisco WSAs. Cisco SMA has consistent enforcement of policy, and enhances threat protection. Figure 18-8 shows a Cisco SMA that is controlling Cisco ESA and Cisco WSAs in different geographic ocations (New York, Raleigh, Chicago, and Boston).

Figure 18-8 Cisco SMA Centralized Deployment

The Cisco SMA comes in different models. These models are physical appliances or the Cisco Content Security Management Virtual Appliance (SMAV). The following are the different Cisco SMA models:

Exam Preparation Tasks

Review All the Key Topics

Review the most important topics from this chapter, denoted with a Key Topic icon. Table 18-2 lists these key topics.

Table 18-2 Key Topics

Key Topic Element

Description

Page Number

Section

E-mail-Based Threats

479

Section

Cisco Cloud E-mail Security

479

Section

Cisco E-mail Security Appliance

480

Section

Mitigation Technology for Web-Based Threats

486

Section

Cisco CWS

486

Section

Cisco WSA

487

Complete the Tables and Lists from Memory

Print a copy of Appendix C, “Memory Tables,” (found on the CD) or at least the section for this chapter, and complete the tables and lists from memory. Appendix D, “Memory Tables Answer Key,” also on the CD, includes completed tables and lists so that you can check your work. There are no applicable tables in this specific chapter.

Define Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

Command Reference to Check Your Memory

This section includes the most important configuration and EXEC commands covered in this chapter. To see how well you have memorized the commands as a side effect of your other studies, cover the left side of Table 18-3 with a piece of paper, read the descriptions on the right side, and see whether you remember the commands.

Table 18-3 Command Reference

Command

Description

systemsetup

Launch the System Setup Wizard to initially configure the Cisco ESA.

mailconfig

Verify the Cisco ESA configuration by sending a test e-mail that contains the system configuration data that was entered in the system setup wizard.

800 East 96th Street, Indianapolis, Indiana 46240

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |