Cisco Umbrella Master Class: From Modern ID Challenges to Full‑Scale Deployment

 5 min read

YouTube video ID: D-zon4NNin0

Source: YouTube video by SecureWireWatch original video

PDF

Introduction

The video introduces Cisco Umbrella as a cloud‑native security platform that protects users, devices, and applications wherever they connect. It is part of a larger Udemy course covering nine hours of content, including architecture, virtual appliance installation, best practices, and licensing.

Modern Identity & Access Challenges

  • Traditional hub‑and‑spoke model – Branch offices back‑haul traffic to a corporate data center for inspection before reaching the Internet.
  • Cloud adoption – IaaS, PaaS, SaaS (e.g., SAP, Microsoft 365, Salesforce) demand low‑latency, direct‑to‑cloud access.
  • Direct Internet Access (DIA) – Organizations use broadband circuits to connect sites directly to cloud providers, bypassing on‑prem firewalls and creating security gaps.
  • Mobile workforce – Laptops, smartphones, and tablets work from home, cafés, or conferences, making per‑site firewalls impractical.
  • Resulting need – A security framework that enforces policies regardless of user location.

Secure Access Service Edge (SASE)

Gartner’s SASE model combines networking and security functions (Zero‑Trust Network Access, Cloud Access Security Broker, Secure Web Gateway, Firewall‑as‑a‑Service, DNS security, etc.) into a single, cloud‑delivered service. Cisco Umbrella is one of the vendors that implements SASE.

How Cisco Umbrella Fits Into SASE

  • DNS Layer Security – The core service; all DNS queries are routed through Umbrella, which blocks malicious domains before resolution.
  • Multi‑layer inspection – After DNS resolution, Umbrella’s Secure Internet Gateway (SIG) adds Secure Web Gateway (SWG), Cloud‑Delivered Firewall (CDF), intrusion‑prevention, file‑malware inspection, and DLP.
  • Threat intelligence – Integrated with Cisco Talos, AMP, and other feeds; includes an Investigate API for programmatic look‑ups.

Architecture Overview

ComponentDescription
DNS Layer SecurityFirst line of defense; blocks malicious domains at resolution time.
Cloud‑Delivered Firewall (CDF)Layer 3/7 firewall in the cloud; inspects protocols, ports, and applications.
Secure Web Gateway (SWG)Full proxy that can perform SSL decryption, deep‑packet inspection, and file sandboxing.
CASB (Cloud Access Security Broker)Discovers and controls shadow IT, enforces cloud‑app policies.
Interactive Threat IntelligencePulls data from Talos, AMP, etc.; provides block/allow decisions and investigative APIs.
Virtual Appliance (VA)Linux‑based resolver deployed on‑premises to capture internal IP addresses and forward DNS to Umbrella.

Licensing Tiers

Four variants exist: 1. DNS Essentials – Core DNS security only. 2. DNS Advantage – DNS security + partial SWG (gray‑list proxy) and limited SSL decryption. 3. SIG Essentials – Full DNS security + optional add‑ons; basic firewall, URL filtering, custom URL blocks. 4. SIG Advantage – All‑features package: full CDF, full SWG with complete SSL decryption, IPS, DLP, CASB, remote browser isolation, and unlimited malware analytics.

Key differences include: * URL filtering and deep‑packet inspection require a SIG license. * Full‑layer IPS and DLP are only in SIG Advantage. * Remote Browser Isolation and advanced CASB are add‑ons for SIG Essentials or included in Advantage. * All tiers provide reporting, API access, and policy management.

Getting Started – Instance Creation & Network Definition

  1. Sign up for a free trial (DNS‑only) at umbrella.cisco.com or use a purchased subscription.
  2. Log in to dashboard.umbrella.com – The left pane shows Deployments, Identities, Policies, Reporting, etc.
  3. Add a Network – Provide a name, public IPv4 address, and subnet mask (e.g., 192.168.128.0/32). This tells Umbrella the source of DNS traffic.
  4. Configure DNS on the edge device – Replace existing DNS servers with Umbrella’s IPs (208.67.222.222 and 208.67.220.220) on routers/DHCP.
  5. Verify activity – Use the Activity Search report to see allowed/blocked DNS requests and their categories.

Why a Virtual Appliance?

When only the public IP is visible, you cannot identify which internal host generated a request. Deploying the VA provides a local DNS resolver that forwards queries to Umbrella while preserving the original internal IP address for logging and policy enforcement.

Installing the Virtual Appliance

  • Download the OVA/OVF from the Umbrella portal (choose VMware ESXi or Hyper‑V).
  • Deploy on your hypervisor – Assign a static IP (e.g., 192.168.128.4), set the gateway, and configure the local DNS forwarder to your AD/DNS server (e.g., 192.168.128.3).
  • Login with the default credentials umbrella<ORG_ID> and change the password.
  • Configure using commands such as config VA interface ens160 192.168.128.4 255.255.255.0 192.168.128.1 and config local DNS add 192.168.128.3.
  • Synchronize – The VA shows a green status once it registers with the Umbrella cloud.
  • Update edge DNS – Point all internal devices (via router or DHCP) to the VA’s IP instead of the public Umbrella resolvers.
  • Result – Activity reports now display the true internal IP, enabling precise threat hunting.

Site & Internal Network Mapping

  • Domain Management – Add internal domains (e.g., securewire.org) to bypass Umbrella for internal name resolution.
  • Internal Networks – Define each LAN/WLAN subnet and associate them with a logical Site (e.g., Secure South Office).
  • Site Association – Link the VA to its site so Umbrella can apply site‑specific policies.

Secure Internet Gateway (SIG) Overview

SIG extends Umbrella beyond DNS: * Side‑to‑Side IPSec Tunnel – Connects on‑prem routers (or SD‑WAN devices) to the Umbrella cloud. * Traffic Flow – DNS → CDF → SWG → optional DLP/IPS → Internet. * Egress IP – Umbrella provides a pool (e.g., 146.112.0.0/16). A static egress IP can be requested from Cisco support. * Policy Stack – DNS policies are evaluated first, followed by firewall rules, then SWG inspection, and finally DLP/CASB actions.

Practical Takeaways

  • Cisco Umbrella replaces traditional on‑prem security appliances with a cloud‑first, identity‑centric model.
  • Deploying the VA is essential for visibility into internal hosts.
  • Choose the licensing tier that matches your inspection depth: DNS‑only for basic protection, SIG Advantage for full Zero‑Trust enforcement.
  • Properly map networks, sites, and identities to enable granular policy control.
  • Leverage the Investigate API and threat‑intel feeds for automated response.

Next Steps (Course Roadmap)

The remaining modules cover: * Detailed policy creation (DNS, firewall, web, DLP). * Active Directory integration for user‑based policies. * Advanced SIG features such as remote browser isolation and custom block pages. * Integration with Cisco Meraki, ASA, and SIEM solutions. * Ongoing monitoring, reporting, and incident response workflows.

Cisco Umbrella delivers a comprehensive, cloud‑native SASE solution that secures DNS, web traffic, and cloud applications from any location; deploying the virtual appliance and selecting the appropriate licensing tier unlocks full visibility and Zero‑Trust protection across modern, distributed enterprises.

Frequently Asked Questions

Who is SecureWire on YouTube?

SecureWire is a YouTube channel that publishes videos on a range of topics. Browse more summaries from this channel below.

Does this page include the full transcript of the video?

Yes, the full transcript for this video is available on this page. Click 'Show transcript' in the sidebar to read it.

How Cisco Umbrella Fits Into SASE

* **DNS Layer Security** – The core service; all DNS queries are routed through Umbrella, which blocks malicious domains before resolution. * **Multi‑layer inspection** – After DNS resolution, Umbrella’s Secure Internet Gateway (SIG) adds Secure Web Gateway (SWG), Cloud‑Delivered Firewall (CDF), intrusion‑prevention, file‑malware inspection, and DLP. * **Threat intelligence** – Integrated with Cisco Talos, AMP, and other feeds; includes an Investigate API for programmatic look‑ups.

Why a Virtual Appliance?

When only the public IP is visible, you cannot identify which internal host generated a request. Deploying the VA provides a local DNS resolver that forwards queries to Umbrella while preserving the original internal IP address for logging and policy enforcement.

Helpful resources related to this video

If you want to practice or explore the concepts discussed in the video, these commonly used tools may help.

Links may be affiliate links. We only include resources that are genuinely relevant to the topic.

PDF