Cisco Secure Access utilizes a modernized approach to effectively securing today’s complex, hybrid work environments. It achieves this by improving user access to all applications and resources, simplifying operations with a Single-Console Deployment and Policy Engine, and featuring a unified client with Cisco Secure Client for end-user connectivity.
Cisco Secure Access combines core Secure Services Edge (SSE) principals, such as Secure Web Gateway( SWG), Cloud Access Security Broker (CASB), DNS Security, Data Loss Prevention (DLP), and Cloud Delivered Firewall (CDFW), Zero Trust Access (ZTNA) and VPN-as-a-Service (VPNaaS) secure end-user connectivity methods, with advanced features, and Intrusion Prevention System (IPS) capabilities, Malware Protection, and Digital Experience Monitoring (DEM) allows users to easily and securely gain access to business-critical applications and private resources, creating a low-friction environment for the end-user.
The result is a holistic, resilient cloud-delivered solution, allowing for IT teams to become more efficient, decreased OpEx, and increased user-productivity.
Let’s Dive into the Basics of Cisco Secure Access
Within Cisco Secure Access, there are two overarching Use Cases - Secure Internet Access and Secure Private Access.
Secure Internet Access:
Secure Internet Access (SIA) allows for the “Split-Tunneling” of unmonitored internet connections, connections to trusted SaaS applications and public internet resources.
Secure Internet Access Policy implements core SSE features, such as DNS Security, CASB, DLP, RBI and SWG.
Secure Internet Access allows for a wide rand of Access Rules, such as:
Secure Private Access:
Secure Private Access (SPA) secures end-user access to private resources by allowing Zero Trust Network Access connections to securely access Private Resources and Applications.
Secure Private Access offers two types of Access rules:
On the backend, Private Access to Resources and Applications can be achieved through either Network Tunnels or Resource Connectors.
Network Tunnels:
Network Tunnels connect Cisco Secure Access to your Datacenters to enable fast, reliable private network connections to your applications through IPsec Internet Protocol Security) IKEv2 (Internet Key Exchange, version 2) tunnels.
With a maximum capacity of 1G per tunnel, additional Tunnels can be added to achieve the desired throughput.
Network Tunnels are grouped for HA and can failover to Resource Connectors if configured to do so. From a User Access perspective, users can private resources through Network Tunnels by with either a VPNaaS or a ZTNA connection.
There are no restrictions on throughput measured in packets per second, nor are there any restrictions on the number of users per tunnel.
Resource Connectors:
Resource Connectors are lightweight VMs deployed in either AWS, Azure, or ESXi that provide access to private resources for both Client-Based and Clientless ZTA connections, providing a DTLS tunnel to Secure Access.
From there, Zero Trust Access user requests are sent to the Resource Connector, where the connection would be proxied to the internal resource.
From an internal resource perspective, the resource is coming from Resource Connector, with all traffic egressing from the Resource Connector IP.
Resource Connectors allow access to applications with overlapping IPs, and are strictly an outbound connection, requiring no routing configuration changes and eliminating the need to punch holes in the firewall.
Resource Connectors can be grouped for High Availability, and feature Auto=failover, as well as Load Balancing support for Resource Connectors in the same Resource Connector Group, Region, and Deployment type.
Workflow for ZTNA Connections in Cisco Secure Access:
To learn more about how to optimize your organization’s Zero Trust Strategy with Cisco Secure Access, please reach out to the ModernCyber Team to learn more about our Consulting Services, Deployment, and Enablement Services!