Presentation is loading. Please wait.

Presentation is loading. Please wait.

Confidential DrayTek Corp. VigorPro100 Unified Security Firewall.

Similar presentations


Presentation on theme: "Confidential DrayTek Corp. VigorPro100 Unified Security Firewall."— Presentation transcript:

1 Confidential DrayTek Corp. VigorPro100 Unified Security Firewall

2 Confidential Agenda UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo

3 Confidential VigorPro100 Dual WAN Up to 2 DMZ ports (share with LAN ports) Up to 4 LAN Ports Printer Server Anti-Virus Alert IDP Alert Wireless 802.11b/g

4 Confidential Threats and Solutions Damage Firewall: DDoS, Sync flood… Host-base Anti-virus Anti-spy ware Host-based web filter IDS, IPS Anti-Spam IM/P2P

5 Confidential Firewall Restrict access to certain, IP, ports or services that administrator does not want unauthorized people do –Packet filter Network level Source/destination IP, source/destination port(TCP/UDP) (L3/L4) –Application gateway (proxy server) Host using various forms of proxy servers to proxy traffics instead of routing it Capable of inspect the content(L7)

6 Confidential NIDS

7 Confidential NIDS NIDS can detect unsuccessful attack by anomalous protocol or traffic behavior Signature: specific patterns base on known vulnerabilities or exploits

8 Confidential IPS Intrusion Prevention System Intrusion Detection and Prevention IPS(IDP) = in-line mode IDS

9 Confidential IDS v.s. IPS Firewall

10 Confidential IDS v.s. IPS IDSIPS StructureSniffer modeIn-line mode ActionCo-work with firewall to reset traffic connection Reset connection or drop packet

11 Confidential Hacking Steps

12 Confidential Source: CERT Attack Sophistication Attack Sophistication Intruder Knowledge Dos, DDOS Buffer overflow SQL injection Trojan, backdoor Virus, worm, spyware Spoofing Phishing

13 Confidential UTM Unified Threat Management Gateway/firewall integrated with multiple security functions –Feature integration Intrusion detection/intrusion protection Anti-virus Application filters Content filters VPN –Converged Voice/Data IP voice: security and QoS

14 Confidential Why UTM More add-on value –Integrated functionality, all-in-one –Network level protection Reduce management efforts –Separate device: independent logging and multiple GUI –Easy configuration & management –Easy troubleshooting –……… ……..

15 Confidential UTM Market Trend Total Revenue of security firewall 2003: $1.6B –UTM=$105M –Legacy VPN Firewall=$1.5B Total revenue will reach $3.45B(AVG +17% growth rate/yr) by 2008. –The sales from UTM will exceed that of legacy VPN firewall 20032008 6%: 94% 57%: 43% UTM VPN Firewall Source: IDC UTM v.s. VPN Firewall

16 Confidential UTM Market Share FortiNet (29.5%) Symantec (22.9%) Secure Computing (21.7%) ServGate (9.5%) NetScreen (5.0%) Others (9.5%) UTM market share 2003 world-wide, Source: IDC

17 Confidential UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo

18 Confidential Unified Security Solution DrayOS CICP Scan Engine VPN DES Engine VPN QoS IM/P2P Blocking CPA Anti-Intrusion Anti-Virus VigorView/ WEB UI / CLI Telnet / Syslog D-SWAT Supporting level Management level Application level Kernel level Board level

19 Confidential Network-level Protection Block viruses/IDP at the point of network entry –Provide protection of all hosts inside network edge before threats intrude

20 Confidential Content-based Protection Scan all major network applications –POP3/SMTP/IMAP4 –FTP –HTTP –ZIP/GZIP/BZIP2 –VPN tunnel

21 Confidential MSSI MSSI™(Multi-Stack Stateful Inspection) –The patent-pending technology developed by DrayTek –Inline scanning –No proxy: scan on the fly, real-time response –Cross packets inspection –No file size limitation ** The methodology of proxy-based virus scanning is a patent of TrendMicro http://www.trendmicro.com/en/about/news/pr/archive/2005/pr080905.htm

22 Confidential victim Format Parser Stack Decoder Stack Decompression Stack

23 Confidential High Performance Hardware-accelerated scan engine –CICP: Content Inspection Co-Processor –High throughput, low latency

24 Confidential IM/P2P IM(Instant Message)/P2P(Peer-to-Peer) –Application to deliver text, document, picture, audio, web-phone, conference… through internet IM: MSN, Yahoo messenger, ICQ… P2P: eMule, Edonkey, KazaA, Bit Torrent, Skype

25 Confidential IM/P2P in Business Pros –Instant and efficient communication or conference –Freeware, free rate Cons –Reduce productivity: employees use it for personal purpose during business hour –Security hole Virus, worms, spyware Confidential material or information could be easily disclosed –P2P file-sharing ware against law in some countries –Waste bandwidth

26 Confidential Manage IM/P2P Allow or block Time scheduled

27 Confidential Web Content Filter Manage internet access, prevent internet misuse –Make the network away from gaming, chat room, porno, file-sharing … website –Improve employee productivity –Reduce the risk of legal liability as result of improper internet activity

28 Confidential Web Content Filter Category Website: 4 groups, 41 categories Time scheduled Powered by SurfControl

29 Confidential Dual WAN Load balance: share the internet traffic Bandwidth fail-over Bandwidth On Demand Configurable internet access mode: PPPoE, DHCP client, Static IP and PPTP

30 Confidential Lower TCO Total Cost of Ownership –The all-in-one unified security firewall –Multi-functionality, single IP management Too complicated to manage discrete network components All functionality can be managed and trouble- shooting remotely no IT personnel truck-roll required –D-SWAT

31 Confidential UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo

32 Confidential VigorPro, D-SWAT and Service

33 Confidential D-SWAT The D rayTek S ecurity W arning and A nti-attack T eam Research –Hacking technique analysis –Virus sample collection & analysis –Exploit collection & analysis Service –Security portal website –Virus signature update –Security advisories –News letter  Training –Hacking Techniques –Incident handling

34 Confidential Step 1. End user purchases VigorPro100 From DrayTek’s reseller Step 2. Log on www.vigorpro.com, become MVP www.vigorpro.com Step 3. Activate or extend AV/IDP services Service Flow: AV/IDP DrayTek Service portal Distributor/ reseller Internet Step 1 Step 2 Residential SOHO SMB users Step 3

35 Confidential www.vigorpro.com visitor Product registration news alert subscription Service Activation/ Extension Registration User User profile update Virus/IDP signature download D-SWAT business hour tech support Product maintenance delete/reinstall/rename/transfer Submit virus to DT Lab D-SWAT online advisory New signature alert M ember of V igor P rotection

36 Confidential Member of Vigor Protection Want to Become DrayTek’s MVP ?? Visit www.vigorpro.com and registrationwww.vigorpro.com

37 Confidential Get Your Network Protected by Becoming DrayTek’s MVP Knowledge Center for network threat –Online threat advisory by D-SWAT –Online virus, exploit analysis –Most updated news alert Extended service: AV/IDP/Web Content Filter –Product registration and maintenance –Service activation –Service extension –Dedicated tech support by D-SWAT

38 Confidential Product Registration Product serial number Product’s nick name Authentication code (MAC address)

39 Confidential Product Maintenance

40 Confidential Service Maintenance Product delete Product rename Product & service is transferred RMA, service is transferred

41 Confidential Beta Program Beta sample availability: now Firmware: v2.6.0_rc6 or above Signature: DrayTek in house www.vigorpro.com MVP beta: www.vigorpro.com –Provide AV/IDP license key for beta signature download –The MAC address needs to be stored in DrayTek’s server prior to get VigorPro100 registered Beta issue: vigorpro100-beta@draytek.comvigorpro100-beta@draytek.com

42 Confidential License Key Projection Type AB IDPDrayTek Anti-VirusDrayTek-- KL D-SWAT business hour technical support VV

43 Confidential UTM VigorPro100: Unified Security Firewall Web Portal and Service Flow Competition Analysis Live Demo

44 Confidential Market Segment vs Requirement Host Number -- 50 -- 500 Branding Sensitive Non-stop networking 24/7/365 support On-site Installation & Maintenance EMS for Integrated Mgmt/log/report Price Sensitive Business hour support Technical consult CMS for easy mgmt Price Sensitive PnP or limited configuration Office hour technical support -- 20 -- 5 Medium Business Small Business SOHO/Branch/ Teleworker Enterprise

45 Confidential

46 Interface Comparison against FortiGate 50A Dual WAN failover/LB Wireless SuperG 108Mbps USB Printer Server CICP + MSSI inline scan All ports front access, Rack-mountable DMZ Two USB ports Local RS-232 console Proxy-based scan architecture

47 Confidential Interface Comparison against TZ 170 series Dual WAN failover/LB, DMZ  TZ170 needs to upgrade to enhanced OS$ Wireless SuperG108Mbps  TZ170 wireless 802.11b/g USB Printer Server CICP + MSSI inline scan All ports front access, Rack-mountable Dual WAN/analog failover/LB/failback, enhanced OS$ Gateway-enforced AV client, SMTP/POP3, limited node

48 Confidential Interface Comparison against ZyWALL 5 Dual WAN failover/LB Wireless SuperG  802.11b/g cardbus USB Printer Server CICP + MSSI inline scan All ports front access, Rack-mountable DMZ Analog dial back up Local RS-232 console Optional cardbus slot

49 Confidential Key Feature Comparison

50 Confidential Renewal Fee For EMEA area Renewal fee depends on PERFORMANCE of security gateway, no matter AV/IDP or web content filter function VigorPro 100 FortiGate 50A TZ 170 /SonicWALL ZyWALL 5 /ZyXEL

51 Confidential TCO: Take TZ170 as Example

52 Confidential TCO Index –Host number supported –Feature enhancement via OS update –Signature: AV, IDP –Web content filter –VPN client –Supporting and maintenance

53 Confidential Attacker 192.168.1.10 Victim 172.16.3.136

54 Confidential END


Download ppt "Confidential DrayTek Corp. VigorPro100 Unified Security Firewall."

Similar presentations


Ads by Google