Download presentation
Presentation is loading. Please wait.
Published byHorace Kennedy Modified over 8 years ago
1
Firewall requirements to secure IPv6 networks – finished playing! LANCom seminar, Maribor Ides Vanneuville, Palo Alto Networks – Next-Generation firewall Sr. Director Systems Engineering EMEA © 2011 Palo Alto Networks. Proprietary and Confidential.
2
About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and networking experience - Founded in 2005, first customer July 2007, top-tier investors Builds next-generation firewalls that identify / control 1,300+ applications - Restores the firewall as the core of enterprise network security infrastructure - Innovations: App-ID™, User-ID™, Content-ID™ Global momentum: 5,300+ customers August 2011: Annual bookings run rate is over US$200 million*, cash-flow positive last five consecutive quarters (*) Bookings run rate is defined as 4 (four) times the bookings amount of the most recently finished fiscal quarter. Bookings are defined as non-cancellable orders received during the fiscal period. Palo Alto Networks’ fiscal year runs from August 1st until July 31st. © 2011 Palo Alto Networks. Proprietary and Confidential.
3
2011 Magic Quadrant for Enterprise Network Firewalls Please get a copy of the report from this link: http://www.paloaltonetworks.com/cam/gartner/index.php © 2011 Palo Alto Networks. Proprietary and Confidential.
4
Applications Have Changed; Firewalls Have Not © 2011 Palo Alto Networks. Proprietary and Confidential. Need to restore visibility and control in the firewall BUT…applications have changed Ports ≠ Applications IP Addresses ≠ Users Packets ≠ Content The firewall is the right place to enforce policy control Sees all traffic Defines trust boundary Enables access via positive control
5
Applications Carry Risk © 2011 Palo Alto Networks. Proprietary and Confidential. Applications can be “threats” P2P file sharing, tunneling applications, anonymizers, media/video Applications carry threats Qualys Top 20 Vulnerabilities – majority result in application-level threats Applications & application-level threats result in major breaches – RSA, Comodo, FBI
6
Enterprise 2.0 Applications and Risks Widespread © 2011 Palo Alto Networks. Proprietary and Confidential. Palo Alto Networks’ latest Application Usage & Risk Report highlights actual behavior of 1M+ users in 1253 organizations - More enterprise 2.0 application use for personal and business reasons. - Tunneling and port hopping are common - Bottom line: all had firewalls, most had IPS, proxies, & URL filtering – but none of these organizations could control what applications ran on their networks
7
Technology Sprawl & Creep Are Not The Answer “More stuff” doesn’t solve the problem Firewall “helpers” have limited view of traffic Complex and costly to buy and maintain © 2011 Palo Alto Networks. Proprietary and Confidential. Internet Putting all of this in the same box is just slow
8
New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation The Right Answer: Make the Firewall Do Its Job © 2011 Palo Alto Networks. Proprietary and Confidential.
9
Why Visibility & Control Must Be In The Firewall © 2011 Palo Alto Networks. Proprietary and Confidential. Port Policy Decision App Ctrl Policy Decision Application Control as an Add-on Port-based FW + App Ctrl (IPS) = two policies Applications are threats; only block what you expressly look for Implications Network access decision is made with no information Cannot safely enable applications IPS Applications Firewall PortTraffic Firewall IPS App Ctrl Policy Decision Scan Application for Threats Applications ApplicationTraffic NGFW Application Control Application control is in the firewall = single policy Visibility across all ports, for all traffic, all the time Implications Network access decision is made based on application identity Safely enable application usage
10
What You See…with Port-Based FW + Application Control Add-on © 2011 Palo Alto Networks. Proprietary and Confidential.Page 10 |
11
What You See with a True Next-Generation Firewall © 2011 Palo Alto Networks. Proprietary and Confidential.Page 11 |
12
Your Control With Port-based Firewall Add-on © 2011 Palo Alto Networks. Proprietary and Confidential.Page 12 |
13
Your Control With a Next-Generation Firewall » The ever-expanding universe of applications, services and threats » Traffic limited to approved business use cases based on App and User » Attack surface reduced by orders of magnitude » Complete threat library with no blind spots Bi-directional inspection Scans inside of SSL Scans inside compressed files Scans inside proxies and tunnels Only allow the apps you need Safely enable the applications relevant to your business Page 13 |
14
Transforming The Perimeter and Datacenter © 2011 Palo Alto Networks. Proprietary and Confidential. Page 14 | Perimeter Datacenter Same Next-Generation Firewall, Different Benefits…
15
© 2011 Palo Alto Networks. Proprietary and Confidential. Page 15 | PAN-OS Core Firewall Features Strong networking foundation –Dynamic routing (BGP, OSPF, RIPv2) –Tap mode – connect to SPAN port –Virtual wire (“Layer 1”) for true transparent in-line deployment –L2/L3 switching foundation –Policy-based forwarding VPN –Site-to-site IPSec VPN –SSL VPN QoS traffic shaping –Max/guaranteed and priority –By user, app, interface, zone, & more –Real-time bandwidth monitor Zone-based architecture –All interfaces assigned to security zones for policy enforcement High Availability –Active/active, active/passive –Configuration and session synchronization –Path, link, and HA monitoring Virtual Systems –Establish multiple virtual firewalls in a single device (PA-5000, PA- 4000, and PA-2000 Series) Simple, flexible management –CLI, Web, Panorama, SNMP, Netflow, email, Syslog, Netflow Visibility and control of applications, users and content complement core firewall features PA-500 PA-2020 PA-2050 PA-4020 PA-4050 PA-4060 PA-5060 PA-5050 PA-5020 PA-200
16
IPv6 deployment options Datacenter UsersBranch Email Internet Gateway Internal Segmentation Datacenter Protection Branch gateway Road warriors
17
IPv6 requirements for firewalls Focus on dual-stack functionality on the data processing part –Transparent for IPv4 and IPv6 Focus on networking functionality –Native IPv6 –IPv4 to IPv6 to IPv4 gateway functionality Focus on IPv6 services –Native support for DNS, Syslog, NTP, RADIUS, LDAP, …
18
IP stack can change but …Malware is the same
19
it’s time to fix the traditional IPv6 firewall
20
it’s time to fix malware protection !
21
the new attacker
22
the attacker is not a bored geek
23
nation states and organized crime
24
data breaches in 2011
25
step one: bait an end-user
26
spear phishing step one: bait an end-user
28
step two: exploit a vulnerability
29
step three: download a backdoor
30
step four: establish a back channel
31
step five: explore and steal
32
Why App, User and Content-ID?
33
Identification Technologies Transform the Firewall App-ID™ Identify the application User-ID™ Identify the user Content-ID™ Scan the content
34
needs to work across all applications
35
Control known applications and block the unknown
36
needs high-speed IPS and AV
37
The Strategic Role of Modern Malware Infection Escalation Remote Control Malware provides the internal foothold to control and expand a sustained attack
38
Unreliable enforcement Sandboxes lack enforcement, while enforcement points lack sandbox intelligence Lack of outbound traffic controls Lack of actionable information Industry Challenges in Controlling Malware Inability to recognize files as malware Targeted malware New and refreshed malware Long windows to protection Infecting files are hidden Inside applications Encrypted traffic, proxies Non-standard ports Drive-by-downloads
39
exploit protection many months pass between black-hat discovery, white hat discovery, and protection being available
40
Introducing WildFire Architecture © 2011 Palo Alto Networks. Proprietary and Confidential. Unknown Files From the Internet Coming into the Enterprise Compare to Known Files Sandbox Environment Signature Generator Admin Web Portal Firewall Submits File to WildFire Cloud New Signatures Delivered to ALL Firewalls via regular threat updates. Portal provides malware forensics
41
solution has to be enterprise-wide
42
IPv6 firewall needs…continued Seamless Next-Generation firewall operations across IPv6 and IPv4 –Application detection –Interface with user-directories and user-identification methods (e.g. captive portal, API, etc…) –Content-scanning and (SSL/SSH) decryption is seamless on both stacks –Focus on IPv6 security specifics (e.g. IPv6 headers, DoS detection & prevention)
43
IPv6 firewall needs…continued Secure connectivity –SSL-VPN and IPsec for roaming users and branch offices –Mix & match IPv6 and IPv4 Integrated security policy management for both IPv6 and IPv4 Integrated reporting and visualization of ‘events’
44
Summary Need to ‘secure’ IPv6 networks and services –IPv6 becomes more widespread… Next-Generation firewall plays a very important role in ‘transitioning’ networks and managing both worlds Go IPv6!!……..Go Palo Alto Networks NGFW!!
45
modern malware protection belongs in a next generation firewall
46
thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.