Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.

Slides:



Advertisements
Similar presentations
Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Advertisements

Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Business Solutions Network Security Solutions Gateway Security
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
MSIT 458: Information Security & Assurance By Curtis Pethley.
© 2011 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco Connected Energy Vision Utility Operations Connected Buildings.
Net Optics Confidential and Proprietary Director xStream Intelligent Access and Monitoring Architecture Solutions.
It’s What You Can’t See That Will Sink You
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Department Of Computer Engineering
Troubleshooting Software Tools vs. Professional Test Equipment.
Solutions for Network Monitoring Access Performance Challenges Load Balancing Monitoring Access.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Net Optics Confidential and Proprietary 1 High-Availability Security Monitoring using Bypass Switches August, 2011 Intelligent Access and Monitoring Architecture.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design LAN Switching and Wireless – Chapter 1.
Net Optics Confidential and Proprietary 1 iLink Agg.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
SHARKFEST '09 | Stanford University | June 15–18, 2009 Fundamentals of Passive Monitoring Access June 16, 2009 Dennis Carpio Director of Product Innovation.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Net Optics Confidential and Proprietary iLink Agg xStream Intelligent Access and Monitoring Architecture Solutions.
Smart Switches FS526T / FS750T / GS748T / GS724T
Challenges Facing IT Professionals Flat Budgets: “More with Less” Lack of Skilled Resources Expansion, Mergers & Acquisitions SLA’s and Uptime Requirements.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Chapter 5: Implementing Intrusion Prevention
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
March 2010 Gig Zero Delay Tap. TP-CU3-ZD The Gig Zero Delay Tap is TP-CU3 enhanced with the industry’s first TRUE Zero Delay technology for 10/100/1000.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Access Network Devices Remotely— Even if the Network is Down— with Out-of-Band Management.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
FireEye NX In line Solution
1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | REFERENCE ARCHITECTURE GUIDE ADDING SCALE & RESILIENCY TO YOUR FIREEYE NX DEPLOYMENTS.
IXIA + FIREEYE SECURITY BATTLECARD
CompTIA Security+ Study Guide (SY0-401)
1+1 Ethernet Failover & Network Protection Switches
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Intrusion Prevention Systems
DS3 Fail-over Protection Switch
Living in a Network Centric World
Living in a Network Centric World
CompTIA Security+ Study Guide (SY0-401)
Borderless Networks Services Supported
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Intrusion Detection system
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
What’s New In WatchGuard Wi-Fi Cloud v8.6
Living in a Network Centric World
Presentation transcript:

Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions

Net Optics Confidential and Proprietary 2 Network Security Trends Threats Intrusions escalating in Sophistication Severity Frequency Malware and spam proliferating Insider attack vectors growing Responses IPS Systems Firewalls DLP Systems UTM Systems

Net Optics Confidential and Proprietary 33 The Security Monitoring Access Challenge Deploy today’s sophisticated security and compliance monitoring tools in-line in the network while minimizing the risk of downtime IPS DLP WAF DAM APM NGF

Net Optics Confidential and Proprietary 44 The Bypass Switch Solution Bypass switches provide fail-safe ports for in-line security devices. When security devices fail, the Bypass switch can automatically restore connectivity by bypassing the security devices. Provides peace of mind when deploying new technology in-line Protects against power, link, and application failure Flexibility for testing, upgrades, and moves Fully passive –when Bypass Switch loses power, the link is still up Normal Operation (Bypass Off)

Net Optics Confidential and Proprietary 55 Key Features Supports speeds from 10Mbps to 10Gbps Bypass switch configurations:  Basic - 4 Ports  High Density – up to 32 Ports Heartbeat and Link Fault detection  Identify application failure  Identify device failure  Detect link anomalies RMON statistics Remote management via CLI and Web GUI (on select models)

Net Optics Confidential and Proprietary 6 Bypass Switch Interface 10GigaBit iBypass Switch

Net Optics Confidential and Proprietary 77 Bypass Function Triggers Loss of link between Bypass Switch and tool o Tool maintenance or redeployment Power loss to the Bypass Switch Heartbeat failure o Power loss to the tool o Tool dropping packets due to oversubscription o Tool processing packets too slowly o Tool software hung o Tool hardware failure Supports Fail Open and Fail Closed

Net Optics Confidential and Proprietary 88 Fail Open vs. Fail Closed Bypass switches provide fail-safe ports for in-line security devices IPS Failure (Bypass On – Fail OPEN) IPS Failure (Bypass On – Fail CLOSED)

Net Optics Confidential and Proprietary 99 The Need for High Availability Monitoring If Bypass Switch fails OPEN to traffic, can you tolerate passing traffic without monitoring while a tool is down? –Intrusions and other attacks –Data loss –Compliance issues If Bypass Switch fails CLOSED to traffic, can you tolerate link down while a tool is down? –Loss of mission-critical applications –Customers cannot be serviced –$$$$$ impact

Net Optics Confidential and Proprietary 10 Tap Mode While Bypassing Bypass Switch acts as a full-duplex breakout Tap while in Bypass ON mode (can be set via trigger or manually) – Use IPS as IDS to test new signature sets – Use as Tap when you don’t need a Bypass Switch FiberCopper Half-duplex mirrored traffic

Net Optics Confidential and Proprietary 11 Redundant Tools Protect Against Tool Failure Traffic flows through primary IPS If primary IPS fails, traffic is routed through backup IPS When primary IPS recovers, traffic returns to it If both IPSs fail, traffic passed directly through the link

Net Optics Confidential and Proprietary 12 Redundant Links Protect Against Link Failure Traffic flows through the primary link and the IPS If the primary link fails, traffic from the backup link is routed through the IPS When primary link recovers, its traffic returns to the IPS The link traffic that is not being routed through the IPS is open to traffic flow Fault mirroring across the links is required so both endpoints are aware of any fault

Net Optics Confidential and Proprietary 13 Redundant Tools and Links Together Traffic flows through primary link and primary IPS If primary IPS fails, traffic from the active link is routed through backup IPS If the primary link fails, traffic from the backup link is routed through the active IPS

Net Optics Confidential and Proprietary 14 iBypass HD – Redundant Links & Tools Net Optics iBypass HD — High Density, eight Bypass Switches in a 1U appliance Four Dual Bypass Modules (DBMs) o Configure DBM as two independent Bypass Switches o Configure DBM as a single HA Bypass Switch with Tool redundancy and/or Link redundancy o Configure as a Bypass Switch plus a Tap

Net Optics Confidential and Proprietary 15 iBypass HD Features Manual (forced) Bypass On mode – Take tool offline immediately in case of emergency Acts as a Tap when traffic is bypassing the tool – Test signature set out in IDS mode Dual Heartbeat packets check both directions of data flow Link Fault Detection (LFD) — fault mirroring across Link Bypass Detection — signals tool that bypass is engaged Fail-open and fail-closed modes Remote monitoring (RMON) traffic statistics RADIUS and TACACS+ authentication and authorization Dual hot-swappable AC or DC redundant power supplies FiberCopper

Net Optics Confidential and Proprietary 16 Summary - Bypass Switch Benefits Protects links with IPSs and other in-line security monitoring tools against –Power failure (IPS or bypass switch) –Tool failure (hardware, software hangs or slowdowns) Increases solution reliability by independently checking the IPS and supporting High Availability (HA) network architectures Provides capability to take tools offline instantly when problems occur Provides flexibility to remove IPSs without interrupting link traffic; also flexibility to use as Taps Increases traffic visibility with RMON traffic statistics and remote manageability 10GigaBit iBypass Switch

Net Optics Confidential and Proprietary 17 Net Optics, Inc Thank You!