Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia.

Slides:



Advertisements
Similar presentations
Business Solutions Network Security Solutions Gateway Security
Advertisements

NetDefend UTM Firewall DFL-260E/860E DFL-1660/2560/2560G Sales Guide v1.2 D-Link HQ SSPD Team D-Link Confidential.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Guide to Network Defense and Countermeasures Second Edition
FIREWALLS Chapter 11.
Defining Network Infrastructure and Security
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Unified Services Router Sales Guide Apr, Content Unified Services Router Introduction Product Introduction and Market Status Performance Overview.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Virtual Private Network
Norman SecureSurf Protect your users when surfing the Internet.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
FortiGateAntivirusFirewallOverview. 2 Fortinet Technologies Network Security Network security can be viewed from three perspectives: t controlling access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
©2007 D-Link India Ltd. All rights reserved. UTM solution for a medium size Call Center Medium Size call center Both inbound and outbound.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security fundamentals Topic 10 Securing the network perimeter.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
UTM ( Unified Threat Management) Firewalls  Firewall Throughput: 150 Mbps  VPN Performance: 45 Mbps (3DES/AES)  1 x 10/100/1000 Ethernet WAN Port 
Defining Network Infrastructure and Network Security Lesson 8.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Security fundamentals
BUILD SECURE PRODUCTS AND SERVICES
3.1 Types of Servers.
Network Security Solution
TMG Client Protection 6NPS – Session 7.
Working at a Small-to-Medium Business or ISP – Chapter 8
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Instructor Materials Chapter 7 Network Security
UTM (Unified Threat Management) Firewalls
3.1 Types of Servers.
SPECIAL OFFER NetDefend UTM Firewall RRP€ 1063 SP€ 932 DFL-870
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Topic 12: Virtual Private Networks
Presentation transcript:

Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia

Firewall and UTM Overview What is Firewall ? A dedicated appliance, or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules What is UTM ? A term coined by Charles Kolodgy of International Data Corporation (IDC) in 2004 which is used to describe network firewalls that have many features in one box, including junk filtering, anti-virus capability, an intrusion detection (or prevention) system (IDS or IPS), and World Wide Web content filtering, along with the traditional activities of a firewall Refreshing Basic Concept for a While….

Server Client Guest Wireless Applications DHCP Switch Hackers Kiosk Mobile User Telecommuter Partner Thieves UNPROTECTED WAN Router Today Challenges DDOS, Key logger, Zero Day Attack, Trojan, Virus, Worm, SPAM, etc Outer Threats: Loop Connection, Rogue DHCP Server, IP/MAC Spoofing, Unauthorized Access, Overwhelming switch, Botnet, Worm, Trojan, DDOS, etc Inner Threats:

Enterprise Network Joint Security  Endpoint Security  Gateway Security D-Link presenting : E2ES (End-to-End Security) Solution

D-Link E2ES Solution Presenting Features Gateway Security – IPS – Anti-Virus – WCF – Anti-Spam Endpoint Security – Loopback Detection – Safeguard Engine – IMP Binding (IP-MAC-Port Binding) ‏ – MAC Joint Security – Microsoft NAP – D-Link ZoneDefense

D-Link Confidential Server Client Guest Wireless ERP / CRM Database DHCP Applications xStack Switch IPS (Intrusion Prevention Systems) Hackers Hacker Mobile User Telecommuter Malicious Web Site Thieves UNPROTECTED WAN NetDefend Unpatched Target the unpached machine, launch attack Take control, steal valuable information Sell valuable information to competitors, damage company’s competence, reputation and business Take control, turn the victim into zombie and flood the network Unpatched NetDefend IPS could block intrusion away!! NetDefend IPS NetDefend IPS Service: Powered by professional security vendor: Endeavor Security Comprehensive signature database, update frequency guaranteed

D-Link Confidential Server Client Guest Wireless ERP / CRM DHCP xStack Switch Hackers Malicious Web Site Mobile User Telecommuter Malicious FTP Site Thieves UNPROTECTED WAN NetDefend Anti-Virus (AV) Mail Server Applications Hacker infects files and turns them into malicious ones Malicious files downloaded, and user gets infected User connects to the Web site for downloading files Virus floods the whole network NetDefend AV could block virus away!! NetDefend AV NetDefend AV Service: Powered by professional security vendor: Kaspersky No file size limitation in file transferring HTTP, FTP, SMTP and POP3

D-Link Confidential Server Client Guest Wireless Applications DHCP xStack Switch Hackers Hacker Mobile User Forbidden Website Malicious Website Thieves UNPROTECTED WAN NetDefend Web Content Filtering (WCF) Remediation Applications User visits harmful website by curiosity or accident Malicious website could use ActiveX, JAVA Applet, XSS or other malicious code fragments to infect user User uses limited bandwidth within company visiting non-business-relevant websites, such like: chatting, finance, shopping, politics, sports, travel, stock trading and etc. It not only against company policy but also downgrade employee’s productivity NetDefend WCF could block any malicious/forbidden web access away!! Infected NetDefend WCF NetDefend WCF Service: Powered by professional security vendor: Content Keeper Instead of configuring URL one by one manually, simply select specific categories Millions of URL in database, real time update Trojan Virus Worm Hacker Gambling Pornography Malicious Sport

D-Link Confidential D-Link categorizes millions of URLs into 32 groups, enables network administrators a flexible configuration to block unwanted website access simply via add and remove action Web Content Filtering (WCF)

D-Link Confidential Server Client Wireless ERP/ CRM DHCP xStack Switch Hackers Hacker Mobile User Telecommuter Web Site Thieves UNPROTECTED WAN NetDefend Anti-SPAM Mail Server Applications Guest SPAM For advertising/malicious purpose, company/hacker would send bunch of s SPAM It would waste bandwidth and time to receive useless but malicious s User checks SPAM When receiving SPAM, NetDefend Anti-SPAM could do: NetDefend Anti-SPAM SPAM 1. Block it out 2. Tag and forward it Mail server storage and inbound bandwidth could be overwhelmed NetDefend Anti-SPAM Service: Leverage open source: DNSBL When receiving SPAM, NetDefend Firewall could: block it out, or tag a customized string in subject field and forward it

D-Link Confidential D-Link ZoneDefense Self-Defense Network with Collaboration of Switch and Firewall The growth of network communication is business is increasing rapidly. It is a challenge for enterprise to protect the network from attacks and virus threats from hackers. Enterprise uses a single device to reject the network connection based on the access rules defined by the network administrator. However, this device does not detect illegal spreading of virus and worms within the network. D-Link ZoneDefense that raises the network security can resolve this issue.

D-Link Confidential  Whenever there’s an infected user  It will try to broadcast to all networks  Further, when Firewall detects virus/ worm activities, it will notify the access layer switches to block the suspected host to effectively stop the mutual infection or virus/ worm outbreak in time D-Link ZoneDefense (Patent Pending) xStack Switch D-Link ZoneDefense Server Farm NetDefend

D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) What is VPN? A Virtual Private Network (VPN) is a private network connection that occurs through a public network. VPNs can be used to connect LANs together across the Internet or other public networks. With a VPN, the remote end appears to be connected to the network as if it were connected locally. VPN has attracted the attention of many organizations looking to both expand their networking capabilities and reduce their costs.

D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) The Benefits of VPN Encryption : Cryptography provides the means to create VPNs across the Internet with no additional investments in connectivity. Cryptography is an umbrella expression covering 3 techniques and benefits: Confidentiality Authentication and Integrity Non-repudiation VPNs are normally only concerned with confidentiality and authentication. Non-repudiation is normally not handled at the network level but rather on a transaction (document-by-document) basis.

D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) Internet Local Network Branch Office 1 Client Local Network Head Office Hub Local Network Client Branch Office 2 Spoke A Typical Scenario of VPN Solutions Road Warriors Tunneling Protocol: L2TP PPTP IPSec

D-Link Confidential Small Business Enterprise Medium Business Branch Office Performance DFL-800 / 860 DFL-1600 / 1660* DFL-2500 / 2560* DFL-210 / Mbps 150 Mbps320/400 Mbps 600/700 Mbps In Development DFL-160(W)* SOHO 80 Mbps Ideal for 30 users Ideal for 50 users Ideal for 150 users Ideal for 300 users Ideal for 600 users D-Link NetDefend Product Line

D-Link Confidential Stemming from NetDefendOS Target SMB to Enterprise Markets Sufficient Security Features High Firewall and VPN Performance Hardware-based VPN Acceleration Unrestricted User Support Interface Network Drivers Device handler Modified TCP/IP Stack Firewall Software Windows/Linux based OS Proprietary NetDefendOS StructureTraditional Firewall Structure D-Link NetDefendOS

D-Link Confidential ¹ Only available in DFL-1600/2500 ² Firmware upgraded feature. 3 UTM only Integrated Functions Content Filtering Fault Tolerance Bandwidth Management and Routing 802.1p QoS, Map IP DSCP (ToS) Traffic Load Sharing Outbound Traffic Load Balancing ² Policy-Based Routing Server Load Balancing Support IPSec/ PPTP/ L2TP VPN Security Static DHCP assignment ZoneDefense for Joint Security Content Filtering/Intrusion Detection Layer 2 Transparent mode OSPF Dynamic Routing Protocol Support IGMP v1/ v2/ v3 Web-based User Authentication Instant Message/P2P Blocking SIP ALG Anti-Spam (FREE) Anti-Virus 3 Web-Content Filtering 3 URL/ Filtering Java Script/Active X/Cookie Filtering IM/P2P Program Filtering Route Fail-Over Active/Passive Modes for High Availability ¹ D-Link NetDefendOS Features :

D-Link Confidential Question ??

D-Link Confidential Thanks !!