cc/td/doc/product/ismg/policy/ver20
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Representing Your Network Topology

Representing Your Network Topology

In the Network Topology tree, you must map some portion of your physical network topology from the outside to the inside, or downstream to upstream. To create this mapping, start from the most downstream point of the network segment that you want to control using Cisco Secure Policy Manager and continue defining upstream into the networks that you want to protect. This outside-to-inside perspective means that you start with the network connection to the outermost, downstream Policy Enforcement Point that you want to manage. Commonly, you construct your network to reflect your connection from the Internet node (the sea of information, to complete the downstream/upstream analogy) to your internal, upstream networks.


Note While you typically have more than one outermost gateway object (one for each connection point to the Internet), we illustrate the basic concepts in this discussion using a single outermost gateway object.

Process Overview

You must first consider the downstream network to which your outermost gateway object's downstream interface is attached. This downstream network always contains the default gateway to which the Policy Enforcement Point delivers all network packets that are destined downstream of this gateway object. In many cases, the default gateway is an IP address (or hop address) assigned to an upstream interface of a border/access router owned by your Internet service provider. However, you can manage only an internal segment of a larger network, and in such cases, the default gateway point maps to a router or other gateway object that you own. In either case, this outermost point represents the default gateway for the network objects that are members of the same perimeter, and this "gateway" is represented by an IP address and network definition assigned to the Internet node in the Network Topology tree.

Let's study a simple example. Figure 3-1 identifies a simple network topology:


Figure 3-1: Simple Network Topology Example

When this network is mapped into the Network Topology tree, it will look something like Figure 3-2:


Figure 3-2: Simple Network Topology in GUI Client

Figure 3-1 identifies seven key pieces that are mapped into the Network Topology tree as follows:

1 and 2. Untrusted Network and External Router. The Internet node represents several key pieces of information. Its interface represents the external router's upstream interface and the default gateway address that the downstream interface of the PIX Firewall uses to deliver all outbound network packets. The Internet node also represents all untrusted and unknown networks to which the External Router leads.
3. Shared network between External Router and PIX Firewall. This network is the network on which the downstream interface address of the PIX Firewall and the inside interface address of the External Router reside. When you define the default gateway address on the Internet node, you must also define this network. After you have defined this network, you can define another member of the network, such as the downstream interface of the PIX Firewall.
4. PIX Firewall. The PIX Firewall node is where you specify the downstream (outside) and upstream (inside) interface addresses for this PIX Firewall. For each interface that you define, you must specify the IP address assigned to that interface and the network to which that IP address belongs. For example, when you specify the upstream interface, you must define the network to which that interface is attached and specify the IP address that the interface has on that network. In addition, any network address translation rules that you require must be defined in the Mapping panel of the PIX Firewall. On Policy Enforcement Point nodes in the Network Topology tree, you do not define the actual filtering rules, as you would otherwise with the command-line interface. You use security policy abstracts to define filtering rules, and the task of defining policies is separate from that of defining your network topology.
5. Shared network between PIX Firewall and Internal Router. This network is actually created automatically when you define the upstream interface for the PIX Firewall node. The important point of this network is that it is shared between the Internal Router and the PIX Firewall, which means they both have an IP address that resides on this network.
6. Internal Router. Like the Internet and PIX Firewall nodes, a generic router is a gateway object. For any gateway object, you must define the IP addresses for the interfaces installed on that device. As with the PIX Firewall, when you define the upstream interface on this router node, you automatically create the Internal Network node.
7. Internal Network. This network represents the upstream, internal network on which all the hosts reside that need to be protected. Because it includes all the IP addresses (logically collecting them) for these hosts, you do not need to define any individual host, unless you want to apply a security policy to a host that is different (or an exception to) from the one that is applied to this network.
8. Cisco Secure Policy Manager Server. (Not shown in the first figure but shown as Lady in the second figure.) Hosts that run components of Cisco Secure Policy Manager are special. Because they require security policies that are different from those applied to their container networks, they must be explicitly defined. In addition, these special hosts organize information about the configuration and settings for Cisco Secure Policy Manager.

So How Much do I have to Define?

The answer to this question depends on what type of security policies you need to define, where your Policy Enforcement Points are positioned in your network, and where your Cisco Secure Policy Manager servers are positioned. The goal is to define all the network objects that Cisco Secure Policy Manager must know about and all the unique network objects for which you want to define a unique security policy. The key phrase is "you must adequately describe your physical network topology." This definition is required because Cisco Secure Policy Manager must know the location of the objects on your network with which it must interact and communicate.

The extent to which you define your network topology depends on what you want to do. If you intend to enforce a security policy directly on a network object (as opposed to indirectly by applying a security policy to a parent node, such as a network), you must define that network object and include it in the Security Policy Enforcement branch of the Network Policy tree, a task described later in this collection of topics.

However, some network objects are required. You must define the following network objects under the Network Topology tree:

While you do not have to define every network object that physically exists on your network, you must ensure that all network objects that encompass multiple child network objects (such as an internal network) are present. Basically, if you intend to define a special security policy for any network object directly (as opposed to indirectly by applying a more general security policy to a parent node, such as a network), you need to define it in the Network Topology tree. In addition, to actually define a unique policy for a network object, you must reference it in the Security Policy Enforcement branch of the Network Policy tree.

You do not define rules for the Policy Enforcement Points directly, instead you apply "policies" to the network objects against which you want those policies to be enforced. Cisco Secure Policy Manager generates the "rules" that these policies represent and distributes these device-specific rule sets to the individual Policy Enforcement Points. Therefore, if you are familiar with defining rules for a PIX Firewall or IOS Router, you can understand that if you want to define specific rules for specific network objects, you must define those network objects in the Network Topology tree, as well as any objects that those network objects are dependent on, such as a host's parent network.

Checklist for Defining your Network Topology

The first task that you must perform after installing Cisco Secure Policy Manager is to define the basics of your network topology. This task involves identifying the network assets for which you want to define specific security policies, identifying the Policy Enforcement Points that can enforce/effect the security policies for these network assets, identifying the policy enablement hosts, and creating a network topology that represents these network objects in a manner that ensures that you can define and apply security policies to those network objects.

The checklist below outlines the steps required to understand the decision-making process and basic flow required to complete the definition of your Network Topology tree. Each step, described in the Step column, may contain several substeps and should be performed in the order presented. References to the specific procedures used to perform each step appear in the Reference column.


Table 3-1: Checklist for Defining your Network Topology
Step Reference

1. Identify the required network objects on your network

  • Internet Connection Points. Because
    Cisco Secure Policy Manager controls the flows into and out of your network, you must identify the connection points out of your network. Within Cisco Secure Policy Manager, all such connection points must be defined within the Internet node in the Network Topology tree.

  • Most Valuable Network Assets. While your entire network is considered an asset, you can define a global security policy that addresses the enablement of most network service flows that commonly occur across your network. It is only when you want to define an exception to this global security policy that you need to be concerned with defining specific network assets within your network topology tree.

  • Policy Enforcement Points. Policy Enforcement Points represent those network objects that enforce some aspect of the defined network policies. For example, an IOS Router or PIX Firewall can enforce the permitted traffic flows across your network.

  • Policy Enablement Hosts. Policy enablement hosts represent those network objects that are required to enable network policy deployment. These hosts include the
    Cisco Secure Policy Manager hosts, as well as other hosts such as certificate authority servers and syslog servers.

Reachable Networks. This list of networks identifies your internal networks that can send or receive network traffic. Many of these networks will be attached to a Policy Enforcement Point. The purpose of identifying these networks is to ensure that they are defined within Cloud nodes so that the correct routing rules can be generated for those Policy Enforcement Points that act as gateway objects.

"Identifying Key Components in Your Network Topology" section

"Worksheet for Defining your Network Topology" section

Result: You should have a completed worksheet that identifies the required network objects, their IP addresses, and the types of network servers that run on the policy enablement hosts. This worksheet is used to complete Step 2.

2. Define the outermost gateway objects

When you define your network topology, you must define it from downstream (from the Internet) to upstream (into your internal networks). The easiest method for defining gateway objects is to use the Topology Wizard. Using the Topology Wizard, you can discover the interface and device settings or specify them manually. You can access the Topology Wizard by clicking Topology Wizard on the Wizards menu.

In addition, you can manually define any gateway object. The tasks referenced by this step are the tasks that explain how to manually define a gateway object. You must define the interface settings on the Internet node before you can define any other gateway objects. If you use the Topology Wizard, the interface settings for the Internet node are defined automatically based on the configuration information that you provide.

One of the most important concepts within
Cisco Secure Policy Manager is a Cloud node. A strongly suggested guideline is that unless you must define a managed gateway or a specific network on which special hosts, such as a policy enablement host, resides, you should use a Cloud node to represent all gateways and networks. You can define networks going into and out of a Cloud node, as well as networks contained within the cloud. For more information on Cloud nodes, refer to Step 5 in this checklist.

Result: The outermost networks and gateway devices are defined and the connections between those gateway devices and the Internet node, which represent connections to Internet service providers, are defined.

"Specifying the Interface Settings of the Internet Node" section

"Creating an IOS Router Node" section

"Specifying the Interface Settings for an IOS Router Node" section

"Creating a PIX Firewall Node" section

"Specifying the Interface Settings for a PIX Firewall Node" section

"Defining a New Cloud Node" section

"Specifying Interface Settings for a Cloud Node" section

"Defining Cloud Networks Within a Cloud Node" section

3. Define network assets

Network assets represent those network objects, such as specific networks and hosts, for which you want to define exceptional network policies. These network objects are the ones that were identified in Step 1, with the exception of the
Cisco Secure Policy Manager hosts, which will be defined during the next step.

Result: The network assets that you identified in Step 1 are defined under the Network Topology tree.

"Creating a Network Node" section

"Creating a Host Node" section

"Specifying a Client/Server Product is Running on a Host Node" section

"Creating an IP Range Node" section

4. Define Cisco Secure Policy Manager hosts

The Primary Server node represents one of two server types that host the client/server products for Cisco Secure Policy Manager. The Primary Server node indicates that this host is running the Primary Policy Database, where all configuration information is stored and to which all GUI clients connect to view or edit the system configuration. This node organizes those settings specific to the subsystems that store and retrieve audit event records, generate and display reports, and publish network policies to Policy Enforcement Points. These subsystems include the Primary Policy Database, Policy Monitor Point, Policy Report Point, and Policy Distribution Point.

The Secondary Server node indicates that this host is running a distributed installation feature set. Depending on what feature set you installed, this node organizes those settings specific to the subsystems that store and retrieve audit event records, generate and display reports, and publish network policies to Policy Enforcement Points. These subsystems can include the Secondary Policy Database, Policy Monitor Point, Policy Report Point, and Policy Distribution Point.

"Creating a Cisco Secure Policy Manager Host" section


Note You must create the nodes that represent any
Cisco Secure Policy Manager servers that you have installed on your network. To create these nodes, you must first define the parent network on which these hosts reside and then create a host under that node. You will be prompted to add a host based on the Windows NT name of that computer. The special panels associated with a primary or secondary server were automatically defined when you chose to add a host of this type.

Result: All Cisco Secure Policy Manager hosts are defined within your Network Topology.

5. Define reachable networks

When you define the remainder of your network topology, you should use Cloud nodes. In fact, you should define Cloud nodes for as much of your network as possible. Clouds provide a logical grouping of networks, and thereby, hosts residing on those networks, that are reachable via an upstream gateway.

The Cloud node is a special gateway object that attaches cloud networks to fully defined networks. To attach the two types of networks, the Cloud node identifies the IP addresses, representing default gateways, attached to those interfaces residing on the fully defined networks (which are either upstream or downstream of the cloud). The Cloud node also has a special interface type called Cloud Networks, which organizes the cloud networks. In terms of the Cloud node, cloud networks exist within the cloud. However, in reality, they exist upstream from the default gateway specified on the downstream interface of the Cloud node.

"Defining a New Cloud Node" section

"Specifying Interface Settings for a Cloud Node" section

"Defining Cloud Networks Within a Cloud Node" section

Cloud nodes organize those settings required to identify and route to networks that reside upstream from the gateway. Clouds are unique gateway objects because they do not require at least two real interfaces, as do Policy Enforcement Points. Instead, the Cloud node has at least one real interface (the downstream interface) and exactly one Cloud Networks interface (an upstream interface). When you specify an IP address associated with a non-cloud interface, you are specifying the default gateway through which the cloud networks organized under the Cloud Networks interface (and therefore, within the cloud) can be reached.

Result: All internal networks that are reachable from other network objects within your network are defined within one or more Cloud nodes.

Worksheet for Defining your Network Topology

The following worksheet identifies network objects and information that you must identify and define in the Network Topology tree.


Table 3-2: Worksheet for Defining your Network Topology
Network Object Type Required Information
ISP Connections IP Address used by your outermost gateways to reach the ISP connections

Valuable Network Assets asset name IP address or network address associated network mask (if asset is a network)

Policy Enforcement Points IP addresses/per interface associated network address associated network mask
Policy Enablement Hosts hostname IP address client/server product type
Reachable Networks network name network address default gateway address for network


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu May 25 13:18:18 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.