Download presentation
Presentation is loading. Please wait.
Published byReynold Hampton Modified over 8 years ago
1
Confidential DrayTek Corp. VigorPro100 Unified Security Firewall
2
Confidential Agenda UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo
3
Confidential VigorPro100 Dual WAN Up to 2 DMZ ports (share with LAN ports) Up to 4 LAN Ports Printer Server Anti-Virus Alert IDP Alert Wireless 802.11b/g
4
Confidential Threats and Solutions Damage Firewall: DDoS, Sync flood… Host-base Anti-virus Anti-spy ware Host-based web filter IDS, IPS Anti-Spam IM/P2P
5
Confidential Firewall Restrict access to certain, IP, ports or services that administrator does not want unauthorized people do –Packet filter Network level Source/destination IP, source/destination port(TCP/UDP) (L3/L4) –Application gateway (proxy server) Host using various forms of proxy servers to proxy traffics instead of routing it Capable of inspect the content(L7)
6
Confidential NIDS
7
Confidential NIDS NIDS can detect unsuccessful attack by anomalous protocol or traffic behavior Signature: specific patterns base on known vulnerabilities or exploits
8
Confidential IPS Intrusion Prevention System Intrusion Detection and Prevention IPS(IDP) = in-line mode IDS
9
Confidential IDS v.s. IPS Firewall
10
Confidential IDS v.s. IPS IDSIPS StructureSniffer modeIn-line mode ActionCo-work with firewall to reset traffic connection Reset connection or drop packet
11
Confidential Hacking Steps
12
Confidential Source: CERT Attack Sophistication Attack Sophistication Intruder Knowledge Dos, DDOS Buffer overflow SQL injection Trojan, backdoor Virus, worm, spyware Spoofing Phishing
13
Confidential UTM Unified Threat Management Gateway/firewall integrated with multiple security functions –Feature integration Intrusion detection/intrusion protection Anti-virus Application filters Content filters VPN –Converged Voice/Data IP voice: security and QoS
14
Confidential Why UTM More add-on value –Integrated functionality, all-in-one –Network level protection Reduce management efforts –Separate device: independent logging and multiple GUI –Easy configuration & management –Easy troubleshooting –……… ……..
15
Confidential UTM Market Trend Total Revenue of security firewall 2003: $1.6B –UTM=$105M –Legacy VPN Firewall=$1.5B Total revenue will reach $3.45B(AVG +17% growth rate/yr) by 2008. –The sales from UTM will exceed that of legacy VPN firewall 20032008 6%: 94% 57%: 43% UTM VPN Firewall Source: IDC UTM v.s. VPN Firewall
16
Confidential UTM Market Share FortiNet (29.5%) Symantec (22.9%) Secure Computing (21.7%) ServGate (9.5%) NetScreen (5.0%) Others (9.5%) UTM market share 2003 world-wide, Source: IDC
17
Confidential UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo
18
Confidential Unified Security Solution DrayOS CICP Scan Engine VPN DES Engine VPN QoS IM/P2P Blocking CPA Anti-Intrusion Anti-Virus VigorView/ WEB UI / CLI Telnet / Syslog D-SWAT Supporting level Management level Application level Kernel level Board level
19
Confidential Network-level Protection Block viruses/IDP at the point of network entry –Provide protection of all hosts inside network edge before threats intrude
20
Confidential Content-based Protection Scan all major network applications –POP3/SMTP/IMAP4 –FTP –HTTP –ZIP/GZIP/BZIP2 –VPN tunnel
21
Confidential MSSI MSSI™(Multi-Stack Stateful Inspection) –The patent-pending technology developed by DrayTek –Inline scanning –No proxy: scan on the fly, real-time response –Cross packets inspection –No file size limitation ** The methodology of proxy-based virus scanning is a patent of TrendMicro http://www.trendmicro.com/en/about/news/pr/archive/2005/pr080905.htm
22
Confidential victim Format Parser Stack Decoder Stack Decompression Stack
23
Confidential High Performance Hardware-accelerated scan engine –CICP: Content Inspection Co-Processor –High throughput, low latency
24
Confidential IM/P2P IM(Instant Message)/P2P(Peer-to-Peer) –Application to deliver text, document, picture, audio, web-phone, conference… through internet IM: MSN, Yahoo messenger, ICQ… P2P: eMule, Edonkey, KazaA, Bit Torrent, Skype
25
Confidential IM/P2P in Business Pros –Instant and efficient communication or conference –Freeware, free rate Cons –Reduce productivity: employees use it for personal purpose during business hour –Security hole Virus, worms, spyware Confidential material or information could be easily disclosed –P2P file-sharing ware against law in some countries –Waste bandwidth
26
Confidential Manage IM/P2P Allow or block Time scheduled
27
Confidential Web Content Filter Manage internet access, prevent internet misuse –Make the network away from gaming, chat room, porno, file-sharing … website –Improve employee productivity –Reduce the risk of legal liability as result of improper internet activity
28
Confidential Web Content Filter Category Website: 4 groups, 41 categories Time scheduled Powered by SurfControl
29
Confidential Dual WAN Load balance: share the internet traffic Bandwidth fail-over Bandwidth On Demand Configurable internet access mode: PPPoE, DHCP client, Static IP and PPTP
30
Confidential Lower TCO Total Cost of Ownership –The all-in-one unified security firewall –Multi-functionality, single IP management Too complicated to manage discrete network components All functionality can be managed and trouble- shooting remotely no IT personnel truck-roll required –D-SWAT
31
Confidential UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo
32
Confidential VigorPro, D-SWAT and Service
33
Confidential D-SWAT The D rayTek S ecurity W arning and A nti-attack T eam Research –Hacking technique analysis –Virus sample collection & analysis –Exploit collection & analysis Service –Security portal website –Virus signature update –Security advisories –News letter Training –Hacking Techniques –Incident handling
34
Confidential Step 1. End user purchases VigorPro100 From DrayTek’s reseller Step 2. Log on www.vigorpro.com, become MVP www.vigorpro.com Step 3. Activate or extend AV/IDP services Service Flow: AV/IDP DrayTek Service portal Distributor/ reseller Internet Step 1 Step 2 Residential SOHO SMB users Step 3
35
Confidential www.vigorpro.com visitor Product registration news alert subscription Service Activation/ Extension Registration User User profile update Virus/IDP signature download D-SWAT business hour tech support Product maintenance delete/reinstall/rename/transfer Submit virus to DT Lab D-SWAT online advisory New signature alert M ember of V igor P rotection
36
Confidential Member of Vigor Protection Want to Become DrayTek’s MVP ?? Visit www.vigorpro.com and registrationwww.vigorpro.com
37
Confidential Get Your Network Protected by Becoming DrayTek’s MVP Knowledge Center for network threat –Online threat advisory by D-SWAT –Online virus, exploit analysis –Most updated news alert Extended service: AV/IDP/Web Content Filter –Product registration and maintenance –Service activation –Service extension –Dedicated tech support by D-SWAT
38
Confidential Product Registration Product serial number Product’s nick name Authentication code (MAC address)
39
Confidential Product Maintenance
40
Confidential Service Maintenance Product delete Product rename Product & service is transferred RMA, service is transferred
41
Confidential Beta Program Beta sample availability: now Firmware: v2.6.0_rc6 or above Signature: DrayTek in house www.vigorpro.com MVP beta: www.vigorpro.com –Provide AV/IDP license key for beta signature download –The MAC address needs to be stored in DrayTek’s server prior to get VigorPro100 registered Beta issue: vigorpro100-beta@draytek.comvigorpro100-beta@draytek.com
42
Confidential License Key Projection Type AB IDPDrayTek Anti-VirusDrayTek-- KL D-SWAT business hour technical support VV
43
Confidential UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo
44
Confidential Market Segment vs Requirement Host Number -- 50 -- 500 Branding Sensitive Non-stop networking 24/7/365 support On-site Installation & Maintenance EMS for Integrated Mgmt/log/report Price Sensitive Business hour support Technical consult CMS for easy mgmt Price Sensitive PnP or limited configuration Office hour technical support -- 20 -- 5 Medium Business Small Business SOHO/Branch/ Teleworker Enterprise
45
Confidential
46
Interface Comparison against FortiGate 50A Dual WAN failover/LB Wireless SuperG 108Mbps USB Printer Server CICP + MSSI inline scan All ports front access, Rack-mountable DMZ Two USB ports Local RS-232 console Proxy-based scan architecture
47
Confidential Interface Comparison against TZ 170 series Dual WAN failover/LB, DMZ TZ170 needs to upgrade to enhanced OS$ Wireless SuperG108Mbps TZ170 wireless 802.11b/g USB Printer Server CICP + MSSI inline scan All ports front access, Rack-mountable Dual WAN/analog failover/LB/failback, enhanced OS$ Gateway-enforced AV client, SMTP/POP3, limited node
48
Confidential Interface Comparison against ZyWALL 5 Dual WAN failover/LB Wireless SuperG 802.11b/g cardbus USB Printer Server CICP + MSSI inline scan All ports front access, Rack-mountable DMZ Analog dial back up Local RS-232 console Optional cardbus slot
49
Confidential Key Feature Comparison
50
Confidential Renewal Fee For EMEA area Renewal fee depends on PERFORMANCE of security gateway, no matter AV/IDP or web content filter function VigorPro 100 FortiGate 50A TZ 170 /SonicWALL ZyWALL 5 /ZyXEL
51
Confidential TCO: Take TZ170 as Example
52
Confidential TCO Index –Host number supported –Feature enhancement via OS update –Signature: AV, IDP –Web content filter –VPN client –Supporting and maintenance
53
Confidential Attacker 192.168.1.10 Victim 172.16.3.136
54
Confidential END
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.