cc/td/doc/product/ismg/policy/ver21
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Working with Security Policies

Working with Security Policies

Security policies are the means by which you configure your Policy Enforcement Points to permit or deny network traffic. In Cisco Secure Policy Manager, security policies take the form of graphical decision trees contained within a security policy abstract. The security policy abstract is then applied to network objects in the Security Policy Enforcement branch of the Network Policy tree.

Successfully building and applying security policies is a complex task. It requires careful planning, a thorough understanding of the policy development and deployment process, an understanding of what security policies can and cannot control, and a thorough understanding of how the security policies are evaluated. Only by understanding these concepts, and how they are interrelated, can you build effective, scalable security policies.

Policy Enforcement Points

Policy Enforcement Points are gateway devices for which you want Cisco Secure Policy Manager to generate and publish device-specific command sets. They act as regulators, controlling the flow of traffic from one network to another based on defined policies. Cisco Secure Policy Manager can manage the following Cisco devices as Policy Enforcement Points:

You do not define your managed Policy Enforcement Points within security policies or the Security Policy Enforcement branch; they are defined within your network topology. For more information about configuring Policy Enforcement Points to be managed by Cisco Secure Policy Manager, see Cisco Secure Policy Manager Administrator's Guide: Network Topology Definition.

Components of a Security Policy

Security policies instruct Policy Enforcement Points to evaluate network sessions according to specified conditions, and then to take the appropriate action based on those conditions. There are three conditions that are evaluated: a source condition, a service condition, and a destination condition. On the basis of those conditions, the Policy Enforcement Point then dictates the parameters of the session with an optional non-terminal action and the disposition of that session with a terminal action.

Conditional Evaluations

The conditions provide the evaluative logic for a security policy. Each session passing through a Policy Enforcement Point is evaluated based on the settings for each of these conditions. If a match is made, the policy is enforced. If a match is not made, the session is either rejected or evaluated by another policy (see Policy Evaluation Rules for more information about how policies are evaluated).

The following types of sources can be specified in a security policy:

Tips The External Host Name panel contains a DNS lookup function that returns the IP address for the host. To specify more than one host name, look up and note the IP address for each host name in the External Host Name panel and then switch to the External IP Address panel, where you can enter all discovered IP addresses.

You cannot use this workaround if one or more hosts use a dynamically assigned IP address.

The following types of destinations can be specified in a security policy:

Tips The External Host Name panel contains a DNS lookup function that returns the IP address for the host. To specify more than one host name, look up and note the IP address for each host name in the External Host Name panel and then switch to the External IP Address panel, where you can enter all discovered IP addresses.

You cannot use this workaround if one or more hosts use a dynamically assigned IP address.

Valid services include the following:

Non-Terminal Actions

Non-terminal actions are used to modify the parameters of a particular network session. They do not terminate the security policy, and therefore can be followed by one of two terminal action nodes.

Terminal Actions

Terminal actions define the final disposition of a network session.

Security Policy Scope

A security policy defines the rules for permitting or denying a specific type of network traffic for a specific user or group of users under specific conditions. Security policies are not device configuration tools. Some settings that you may attempt to control through policy are actually device-specific settings that should be configured when setting up your devices in the Network Topology tree.

This topic lists the items you cannot control with policies as well as the items that you can. Where possible, links to additional information about achieving the desired configuration are provided.

What Security Policies Cannot Control

The Policy Enforcement Points managed by Cisco Secure Policy Manager enforce many session settings, such as the Idle Timeout setting, as global, rather than session specific, settings. These settings are configured at the device level. Refer to Cisco Secure Policy Manager Administrator's Guide: Network Topology Definition for information about configuring global session settings.
Security policies do not determine routing for any network session. They do, however, determine if that session is permitted to pass through a Policy Enforcement Point. Specific routing rules are set up at the device level when you define your network topology.
NAT is configured at the device level when you define your network topology.
Although you are creating end-to-end security policies, the policies are enforced by a Policy Enforcement Point and not by the endpoints. Therefore, you cannot control network sessions between two hosts on the same network segment, or between two network segments, that do not have a Policy Enforcement Point between them.

What Security Policies Can Control


Note This assumes that the network traffic being controlled passes through a managed Policy Enforcement Point (see above).

Basically, security policies can control whether specific network sessions are permitted or denied between a specified source and destination when passing through a managed Policy Enforcement Point. Additionally, security policies can control some parameters of those sessions:

The security policy can configure the Policy Enforcement Point to block or permit Java applications in HTTP sessions.
Cisco Secure Policy Manager can force specific sessions between two Policy Enforcement Points to be routed through IPSec tunnels. To create a policy that forces the use of tunnels, you must specify IPSec support on the Policy Enforcement Points and you must have the IPSec Tunnel Group defined in the Security Policy Enforcement branch. Refer to Cisco Secure Policy Manager Administrator's Guide: IPSec Tunnel Implementation for more information about using Cisco Secure Policy Manager to implement IPSec.

Checklist for Creating and Enforcing Policy

The  following checklist provides an overview of the policy development and deployment process. Before you begin developing your security policies within Cisco Secure Policy Manager, you should become familiar with these steps and the various options for performing them.

Each step, described in the Step column, may contain several sub-steps and should be performed in the order presented. References to the specific procedures used to perform each step appear in the Reference column.


Table 1-1: Security Policy Definition Checklist
Step Reference

1. Populate the Network Topology Tree (prerequisite)

Before you can begin to build security policies in Cisco Secure Policy Manager, you must populate your Network Topology tree. The Network Topology tree performs three main functions in the construction and deployment of security policies. First of all, it provides source and destination objects within the security policies. Secondly, it provides the objects used to populate the Security Policy Enforcement branch (where security policies are applied to network objects). Finally, it provides the topology and routing information for the device-specific command sets generated by the system.

Cisco Secure Policy Manager Administrator's Guide: Network Topology Definition

2. Populate the Security Policy Enforcement Branch

The Security Policy Enforcement branch is where the security policies are applied to network objects. It is a good idea to populate the Security Policy Enforcement branch before you begin to build security policies. The way you populate your Security Policy Enforcement branch will determine the syntax for your security policies. Also, you will be better able to visually identify the policies that are required to meet your business objectives, as well as identify the policy constructors and decisions you will need to make to build the security policies.

"Security Policy Enforcement"

3. Develop Policy Components

Before you begin to develop your policies, you should plan and develop the components of those policies. These components include the following:

  • Network Protocols. While the network protocol settings do not directly affect the creation of security policy, they are used in developing another policy component, network services.

  • Network Services. You should determine what services you are going to regulate (permit or deny) on your network. The default stance of Cisco Secure Policy Manager is to deny anything that is not expressly permitted, so you will need to define the services that you want to permit across your Policy Enforcement Points. Cisco Secure Policy Manager comes with many common network services pre-defined, and the ability to define any custom services that you may need.

  • Network Service Bundles. Network service bundles are logical collections of network services that can be used, as a whole, as the service being referenced by the security policy. They provide a shortcut method for referencing a group of common services (such as web and mail services) without having to create complex decision trees. Before building your security policies, you should determine if you will have common groups of services that you will be permitting for destinations, groups of destinations, sources, or groups of sources. You can be fairly liberal with the services you include in network service bundles, because policy evaluation and inheritance enable you to create specific exceptions for more permissive policies that apply to a higher level group (for example, denying Telnet sessions to a particular host that is part of a group of hosts with a policy that permits Telnet sessions).

  • Policy Domains. Policy domains are logical collections of perimeters that can be used as the source or destination of network services in a security policy. You can also place policy domains in the Security Policy Enforcement branch of the Network Policy tree and apply policies to them.

"Protocol Definitions"

"Network Services"

"Network Service Bundles"

"Network Object Groups"

  • Network Object Groups. Network object groups are logical collections of network objects from your network topology that can be used, as a whole, as the source or destination of network services in a security policy. You should group common network objects, such as web servers, that may be scattered throughout your network topology, in network object groups to facilitate referencing them in common security policies.

4. Develop Security Policy Abstracts

After you have formulated your overall security strategy, built your network topology, populated your Security Policy Enforcement branch, and created the necessary policy components, you then construct the actual policies that will be applied to the objects in your Security Policy Enforcement branch. You create and manage your policies on the Security Policy Abstracts branch of the Tools and Services tree and use Policy Builder to develop and modify the contents of each security policy.

"Security Policy Abstracts"

"Policy Builder"

5. Assign Policy

After creating and populating your security policies, you assign your policies to the objects in the Security Policy Enforcement branch.

"Security Policy Enforcement"

6. Generate and Publish the Command Sets

The final step in the policy development and deployment process is the generation of device-specific command sets and publication of those command sets to the Policy Enforcement Points. You generate the command sets from the Command Console panel. After generating the command sets, you have the opportunity to review each Policy Enforcement Point's device-specific command set. You can also define commands that are not automatically derived by Cisco Secure Policy Manager either as a prologue or epilogue command set and import and export your custom commands sets to ease administration of like Policy Enforcement Points.

"Generating, Verifying, and Publishing Command Sets"


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Jun 5 19:58:23 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.