FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.

Slides:



Advertisements
Similar presentations
Express5800/ft series servers Product Information Fault-Tolerant General Purpose Servers.
Advertisements

Chapter 3: Planning a Network Upgrade
Business Solutions Network Security Solutions Gateway Security
UTC-N Overview of Campus Networks Design.
Sonus SBC1000, SBC 2000 Competitive Positioning
Guide to Network Defense and Countermeasures Second Edition
End to End Uptime Monitoring
Saving Money by Recycling Existing Computers with LTSP Peter Billson Linux Terminal Server Project (LTSP.org) Linux User Group in Princeton LUG/IP July.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Transparent Caching The art of caching network traffic without requiring user / browser side configuration.
Module 8: Concepts of a Network Load Balancing Cluster
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Lesson 1: Configuring Network Load Balancing
M2M Gateway Features Jari Lahti, CTO
A Guide to major network components
Understanding Network Failures in Data Centers: Measurement, Analysis and Implications Phillipa Gill University of Toronto Navendu Jain & Nachiappan Nagappan.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Diploma in Information Technology Principles of Information Systems and Data Management Classroom Local Area Network & Internet.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
1 Firewalls Types of Firewalls  Screening router firewalls  Computer-based firewalls  Firewall appliances  Host firewalls (firewalls on clients and.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
F5’s BIG-IP Blade Controller - The Essential Software for Blade Server Systems May 2002 John Bigelow Vice President & General Manager, Software Business.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Jamel Callands Austin Chaet Carson Gallimore.  Downloading  Recommended Specifications  Features  Reporting and Monitoring  Questions.
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
CH2 System models.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
An automated diagnostic system to streamline DSM project maintenance Johan du Plessis 15 August 2012.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
The Role of High Availability Software in Quality of Service Joe McFadden Vice President, Marketing, Nuasis.
Page 1 of 9 NFS Vendors Conference October 25, 2000 PC Solutions to Network File Systems.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Networking Components Starla Wachsmann. COMPUTER NETWORKING COMPONETS Today’s wireless and enterprise networks are more complex than ever, delivering.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Components of wireless LAN & Its connection to the Internet
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
 Load balancing is the process of distributing a workload evenly throughout a group or cluster of computers to maximize throughput.  This means that.
NETWORKING COMPONENTS BY: TRAVIS MARSHALL. HUBS A hub is a device within a network that has multiple Ethernet ports that devices can plug into. The hub.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Virtual Machine Movement and Hyper-V Replica
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Cluster computing. 1.What is cluster computing? 2.Need of cluster computing. 3.Architecture 4.Applications of cluster computing 5.Advantages of cluster.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Managed IT Solutions More Reliable Networks Are Our Business
Intro. to Telecommunications
Lab A: Planning an Installation
CONNECTING TO THE INTERNET
Network Load Balancing
Chapter 15: Networking Services Design Optimization
IS4680 Security Auditing for Compliance
Presentation transcript:

FireProof

The Challenge

Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge

Firewall concerns CPU intensive First line of defense - hacker prone Single Firewall is not an option – Due to its importance in the network, you must have an additional back up Firewall – Single point of failure – Limited performance growth – Service interruption during maintenance and upgrade The Challenge

Firewall fault tolerance No Internet access in case of firewall failure The Challenge Access router Firewalls

Optimal firewall performance Limited to single Firewall performance Static load distribution Expensive performance improvement The Challenge Access router Firewalls

Requirements Downtime is not an option – Continuously available systems – Transparent Recovery – Consistent service – Reliable Optimize Security Resources – Manageable – Efficient use of network The Challenge

Security ITM Solutions

FireProof High availability for all firewalls (transparent and non-transparent) Hardware based- no additional software installed on the firewall Compatible with any OS Compatible with multiple firewall vendors All firewalls are active Firewall resource optimization Security Solutions

Defacto standard Recognized leader by NAI, Secure Computing, Axent, Netscreen, Checkpoint (OPSEC certified) for Firewall load balancing and HA Security Solutions

FireProof - the solution FireProof assures that your security resources are always available and optimized Security Solutions Local clients Firewalls Access router FireProof

Non-stop service Health monitoring – Monitor Firewalls health Monitor physical servers Monitor full data path – In case of failure, clients are directed to alternate Firewall Redundancy – 2 Units can work in a redundant configuration – If one fails the other takes over Resilience – Recovery and warm-up period Security Solutions

Full path health monitoring Security Solutions Local clients Firewalls FireProof Ping TCP Port

Traffic redirection FireProof takes into account both incoming and outgoing traffic Load balancing algorithms – Cyclic – Least number of users – Least number of bytes – Least number of packets – Customized algorithm Firewall weights Security Solutions

Traffic redirection Firewall grouping by application Security Solutions Firewalls filtering FireProof Application?

Application Switch Security Solutions Multi-layer switching architecture Gigabit connectivity Switching Asics per port PPC 750 RISC processor 1U box

Conclusion

FireProof provides certainty through non-stop service of your security environment FireProof ensures the best service by optimizing your security resources Conclusion

Awards Conclusion

thank you