Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Firewall Configuration Strategies
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
Firewalls and Intrusion Detection Systems
MSIT 458: Information Security & Assurance By Curtis Pethley.
Firewall Ercan Sancar & Caner Sahin. Index History of Firewall Why Do You Need A Firewall Working Principle Of Firewalls Can a Firewall Really Protect.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Firewalls: General Principles & Configuration (in Linux)
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Firewall Slides by John Rouda
Copyright © 2002 ACNielsen a VNU company Key Features and Benefits of the 3CX PBX for Windows Server.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
1 Firewalls Types of Firewalls  Screening router firewalls  Computer-based firewalls  Firewall appliances  Host firewalls (firewalls on clients and.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Cisco PIX 515E Firewall. Overview What a PIX Firewall can do Adaptive Security Algorithm Address Translation Cut-Through Proxy Access Control Network.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Sales Kickoff - ARCserve
Chapter 9: Novell NetWare
Honeypot and Intrusion Detection System
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Endian Firewall Community Edition Roy Hickman Technology Director Peck Community Schools #
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Firewall Security.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Module 7: Advanced Application and Web Filtering.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Copyright ©2016 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Security fundamentals
CLOUDENTIFY.
CONNECTING TO THE INTERNET
Firewalls.
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Welcome To : Group 1 VC Presentation
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Digital Pacman: Firewall Edition
Firewalls Purpose of a Firewall Characteristic of a firewall
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Presentation transcript:

Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas

Disclaimer Product names contained within are the copyright and trademark of their respective companies. For company names, please see the last slide of this presentation.

Agenda What is an appliance firewall? What technologies do they employ? What were we looking for? The successes we had The problems we discovered The future of network appliances Summary of information

What is an appliance firewall? Integrated hardware solution All software, including OS comes pre-loaded on the platform Network “black box” approach to security

Evolution Originated as firewall features added to routers Basic packet filtering –Source, Dest., Protocol Application specific proxies “Stateful Inspection” Appliance firewalls

What technologies do they employ? Network Address Translation (NAT) Most use packet filtering rules to determine packet access Some use “stateful inspection” to manage connections Some application proxy support –A few allow custom proxy creation *BONUS*

Some Have Other Helpful Features Built in application servers - mail, web, ftp DHCP support Built-in VPN capability - p2p and client based Strong authentication support URL/content blocking DMZ configuration alerting SNMP support

Management Functions Web based was easiest to use and allowed greatest flexibility Custom applications provided some ease, but lacked true remote management ability Direct cable solutions were poor and inflexible Worst case was a direct custom cable via SLIP

Our Mock Deployment Goal: Locate an appliance firewall that could protect our medium size business (500 users) from the Internet –Ease of deployment and management –Provide adequate security for internal systems –Allow external access to our mail and web servers –Alert us in the event of an attack

“Bonus” Features Good documentation Ease of maintenance Real time reports Content blocking SNMP alerting VPN between branches Failure recovery

Our Security Desires Extensive logging of successful connections, rejected packets and suspected attacks Immunity to Denial of Service attacks Protection against information gathering probes Initial deny all ruleset for access

The Starting Field Located 23 vendors whose products were appliances as defined by our process

Our Successes In no particular order... Phoenix Adaptive Firewall SonicWALL/DMZ PIX Firewall Firebox II Interceptor

Phoenix Adaptive Firewall Pros: –Excellent setup process using front panel –Management via web based JAVA applet –Many logging options –Alternate command interface allows access to underlying Linux OS Cons: –Crashed twice during rule application and changes –Access control ruleset management is a bit confusing

SonicWALL/DMZ Pros: –Excellent management interface –Integrated DHCP server –Predefined ruleset for most common applications –Good documentation Cons: –Cheap, lightweight feel and package design, afraid we were going to break it –Logging could be more robust, and sometimes misses events –Upgrade process is firewall replacement

Interceptor Pros: –Easy setup and management –Includes security auditing software –Excellent reliability and resistance to Denial of Service attacks Cons: –Nmap determined underlying OS –Logging failed to notice port scans –No ability to build custom application proxies

PIX Firewall Pros: –Configurable and useable logs –Great documentation –Amazing failover capability –Stable and resistant to Denial of Service attacks Cons: –Setup and configuration is very complex –Initial setup is serial cable only –Requires Windows NT to administer via GUI –No application proxies

Firebox II Pros: –Configuration and management is easy –Robust security and Denial of Service attack resistance –Adequate logging –Visual status determination is excellent Cons: –Management is via a dedicated application –Documentation was a bit unclear

Some Discoveries Several products were significantly less than what we considered a firewall –Some performed only NAT with no logging or access controls –Some were only point to point encryptors Logging, in general, was poor compared to other firewall platforms

Other Issues Most of the devices featured management that was difficult to use or “kludgy” at best Most of the devices had no automated system to manage failure Most of the devices did not notice or log attempted attacks in any format other than rejected packet information

Long Term Issues Upgrade process for most products is replacement Most appliances do not offer high speed connectivity options

The Future of Network Appliances Better management and configuration processes More configurable logging Integrated intrusion detection software Improvements in alerting methods

Summary of Findings Appliance firewalls can serve as a good resource for small and medium size businesses They can provide adequate security with ease of deployment and management They possess excellent width of product options but may lack in product depth

Companies and Products Phoenix Firewall by Progressive Systems SonicWALL/DMZ by Sonic Systems Interceptor by Technologic, Inc. PIX Firewall by Cisco Systems Firebox II by WatchGuard Technologies Please Contact Vendors Directly for Product Information

Thank You! Thank you for attending today, please contact me if you have any questions or comments at This presentation is copyright MicroSolved, Inc., All rights reserved. Complete results whitepaper will be available at