Brksec 2236
Brksec 2236
Nicholas C. Carrieri
Director of Product Management
Technical Marketing and Go-To Market
[Link]/in/nicholas-carrieri-782b3530
BRKSEC-2236
Your Speaker
Nicholas Carrieri
nicarrie@[Link]
Director, Product Management
Go To Market and Technical Marketing
Firewall Architecture, Threat Visibility, Hybrid Cloud
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
Webex spaces will be moderated by the speaker until June 13, 2025.
Every flow
Every app
Every VM
Cisco Hybrid
Mesh Firewall
Placement
Every container
Reduce attack surface Every IoT device
Every user
Perimeter
Identity intelligence
Firewall AI app runtime guardrails
in the modern data center, Manage NGFW in Microsegmentation
multiple form factors
cloud, campus, and factory at key chokepoints
Protect vulnerable IoT
Traditional Modern
© 2025 Cisco and/or its affiliates. All rights reserved. BRKSEC-2236 Threat Protection 7
Hybrid Mesh Firewall: Network, Workload, Cloud
Cisco Security Cloud Control abstracts end-to-end policy intent from enforcement point specific configuration.
Internet
Customers
VM 3
Secure Access Secure Workload
SD-WAN
Campus Firewall Threat
Defense SD-WAN
Branch
NEW
Hypershield
DPU
• Common User experience • Cross-product trust – no • Configure permissions once • Portfolio convergence around
across products manual integrations per user identity and subscription
concepts
• Centralized onboarding and • Extends to MSPs who don’t • Manage access
provisioning want to provision and manage control/compliance auditing • Enables common frameworks
individual products centrally, reduce potential for for hybrid deployment (Policy,
• End-to-end product
misconfiguration network, posture)
interactions (e.g. Hybrid
ZTNA) • Take advantage of IDP • Common services (search,
integration and group notifications, AI) extend
mapping across all products
6100 Series
150-400 Gbps
4200 Series up to 5Tbps in 16x cluster
3100 Series 65-145 Gbps
10-45 Gbps up to 1.79Tbps in 16x cluster
1200 Series up to 0.57Tbps in 16x cluster
1200 Series Compact 9-18 Gbps
200 Series 6-9 Gbps
1.5 Gbps
93xx
41xx 55-68 Gbps
19-53 Gbps
21xx
11xx 2.5-10 Gbps
1010 2-5 Gbps
ISA 3000 <1 Gbps
<0.7 Gbps
Cisco Confidential
Secure Firewall 1200 Overview FTD
7.6+
ASA
9.21+
1RU
Ethernet
Inline Crypto Accelerator
QUIC (HTTP/3) uses UDP with modified TLS 1.3 for encryption
Initial, ClientHello
Client Initial, ServerHello, Certificate, Finished Server
Finished, HTTP Request
HTTP Response
HTTP Session Data
Decryption Bypass
• New Client Threat tab in the
Decryption Rule Editor
• Client Threat – Identified by EVE
• Threat Levels – Very Low to Very
High (Or Any)
• For traffic originating from clients
identified by EVE as Very Low,
decryption is bypassed.
• Recommended to add a URL
Category and Reputation filter.
Secure Elastic High availability with Increased Usable Direct internet access for Simplified
Connectivity near-zero network down Bandwidth public cloud and guest Management
time / WAN optimization traffic
• Configure route-based • ECMP support for load- • Zero Touch
VPN VTI tunnels • Multi-ISP configuration balancing across • SaaS application Provisioning
between branches multiple ISPs detection (First Packet
(Spokes) to • Active-standby backup using DNS snooping) • Data interface
headquarters (Hubs) VTI tunnel • ECMP support for VTI management
configuration with SLA • Policy-based routing
• IPv6 overlay support monitoring • Application based load using application, user • Auto config rollback
balancing using policy- and SGT as matching
• BGPv6 over VTI • Optimal path selection based routing criteria • Bulk pre-provisioning
based on interface with device templates
• EIGRP, OSPF and BGP monitoring • SDWAN Monitoring • Local tunnel ID support
over VTI Dashboard with for Umbrella • Umbrella SASE auto-
• HA Management with Application tunnel deployment
• DVTI supports DHCP Dual WAN links via performance • BGP AS Override
(spokes) Data Interface • Simplified branch to
hub communication
using SD-WAN Wizard
Trust Access –
Hybrid Private
Access
• Unified management and
distributed enforcement for
cloud and on-premises
🟣 ◽️ Fleet 🔻FMC and Device: 🟣 FMC: Reduced 🟣 ◽️ FMC and Device: Remove 🟣 ◽️ Wizard
🟣 ◽️ FMC: UX HA
Upgrade Fixed 52 Upgrade backup time significantly need for Readiness Check before Enhancement –
Simplification – reduce
Improvements defects upgrade – FMC ->3 click upgrade reduce clicks by
need to switch FMC’s
= 9 click 🟣 ◽️ FMC and Device: 🟣 ◽️ FMC: In Product 🟣 FMC: Reduce Backup time - 50%
during upgrades, reduce
improvement Package Management Notifications for 75% 🟣 ◽️ Complete
time, reduce user
and Landing Page Suggested Releases - 🟣 FMC and Device: Reduce FMC and FTD
interactions/clicks
improvements = can don’t have to ad hoc find Upgrade Image Size by 25% Install Scripts
🔻 Reduce Failures -
complete upgrade out about releases = 4 🟣 🔻FMC and Device: Install redesign 25-40%
Target 99.5% success
process without having click improvement Scripts Redesign – 200+ scripts time reduction
🔻 FMC and Device:
to leave the product reviewed for purpose, 🟣 ◽️ Deployment
Build Telemetry about
🟣 ◽️ FMC: New Upgrade modernized, potential 25%-time by Need only
Upgrades = proactive
Wizard – single landing reduction
recognition of patterns
page 🟣 FMC: Reduce Reboot Time –
or problems
◽️ Simple Target = -75% from 7.2.4
🟣 Swift 🟣 ◽️ Device - Direct pull of image
– 1 click
🔻 Success
🔻 Reduce Failures - Target
© 2025 Cisco and/or its affiliates. All rights reserved. BRKSEC-2236 99.5% success 30
Firewall Upgrade Dashboard FMC
7.7
BRKSEC-2236 35
Enforcement Policy
Cyber Vision
Center
Telemetry
Administration Network
1 5 1 5 DNS
AnyConnect
Employee Network NVM
Guest Network
Enforcement
NSX/Other
Container Bare Metal VM
Application Workloads
© 2025 Cisco and/or its affiliates. All rights reserved. BRKSEC-2236 37
© 2025 Cisco and/or its affiliates. All rights reserved.
Workload Segmentation with Nvidia DPU Workload
3.9
External Network
Autonomous Distributed
Segmentation Exploit Protection
• Deep understanding • Mitigate known and
of app behavior unknown
• Comprehensive inputs vulnerabilities
for policy creation • Surgical mitigating
• Constantly adapting to controls
changing apps • Protection within
minutes, while app
keeps running
Network Security
“I've been involved in many beta programs…I must say that this one has been the
best organized. This beta takes a very active, hands-on approach.”
Higher-Ed Beta Customer
Participating in design
research gives you a place to
share your thoughts and
experiences to influence the
future of Cisco Security
Products.
Complete a minimum of Earn 100 points per Level up and earn Complete your surveys
4 session surveys and survey completed exclusive prizes! in the Cisco Live
the Overall Event Survey and compete on the mobile app.
to be entered in a Cisco Live Challenge
drawing to win 1 of 5 leaderboard.
full conference passes
to Cisco Live 2026.
Visit the Cisco Book your one-on-one Attend the interactive Visit the On-Demand
Showcase for related Meet the Engineer education with DevNet, Library for more
demos meeting Capture the Flag, and sessions at
Walk-in Labs [Link]/
on-demand