Download presentation
Presentation is loading. Please wait.
Published byWilfred McDowell Modified over 9 years ago
1
Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia
2
Firewall and UTM Overview What is Firewall ? A dedicated appliance, or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules What is UTM ? A term coined by Charles Kolodgy of International Data Corporation (IDC) in 2004 which is used to describe network firewalls that have many features in one box, including junk e-mail filtering, anti-virus capability, an intrusion detection (or prevention) system (IDS or IPS), and World Wide Web content filtering, along with the traditional activities of a firewall Refreshing Basic Concept for a While….
3
Server Client Guest Wireless Applications DHCP Switch Hackers Kiosk Mobile User Telecommuter Partner Thieves UNPROTECTED WAN Router Today Challenges DDOS, Key logger, Zero Day Attack, Trojan, Virus, Worm, SPAM, etc Outer Threats: Loop Connection, Rogue DHCP Server, IP/MAC Spoofing, Unauthorized Access, Overwhelming switch, Botnet, Worm, Trojan, DDOS, etc Inner Threats:
4
Enterprise Network Joint Security Endpoint Security Gateway Security D-Link presenting : E2ES (End-to-End Security) Solution
5
D-Link E2ES Solution Presenting Features Gateway Security – IPS – Anti-Virus – WCF – Anti-Spam Endpoint Security – Loopback Detection – Safeguard Engine – IMP Binding (IP-MAC-Port Binding) – MAC Joint Security – Microsoft NAP – D-Link ZoneDefense
6
D-Link Confidential Server Client Guest Wireless ERP / CRM Database DHCP Applications xStack Switch IPS (Intrusion Prevention Systems) Hackers Hacker Mobile User Telecommuter Malicious Web Site Thieves UNPROTECTED WAN NetDefend Unpatched Target the unpached machine, launch attack Take control, steal valuable information Sell valuable information to competitors, damage company’s competence, reputation and business Take control, turn the victim into zombie and flood the network Unpatched NetDefend IPS could block intrusion away!! NetDefend IPS NetDefend IPS Service: Powered by professional security vendor: Endeavor Security Comprehensive signature database, update frequency guaranteed
7
D-Link Confidential Server Client Guest Wireless ERP / CRM DHCP xStack Switch Hackers Malicious Web Site Mobile User Telecommuter Malicious FTP Site Thieves UNPROTECTED WAN NetDefend Anti-Virus (AV) Mail Server Applications Hacker infects files and turns them into malicious ones Malicious files downloaded, and user gets infected User connects to the Web site for downloading files Virus floods the whole network NetDefend AV could block virus away!! NetDefend AV NetDefend AV Service: Powered by professional security vendor: Kaspersky No file size limitation in file transferring HTTP, FTP, SMTP and POP3
8
D-Link Confidential Server Client Guest Wireless Applications DHCP xStack Switch Hackers Hacker Mobile User Forbidden Website Malicious Website Thieves UNPROTECTED WAN NetDefend Web Content Filtering (WCF) Remediation Applications User visits harmful website by curiosity or accident Malicious website could use ActiveX, JAVA Applet, XSS or other malicious code fragments to infect user User uses limited bandwidth within company visiting non-business-relevant websites, such like: chatting, finance, shopping, politics, sports, travel, stock trading and etc. It not only against company policy but also downgrade employee’s productivity NetDefend WCF could block any malicious/forbidden web access away!! Infected NetDefend WCF NetDefend WCF Service: Powered by professional security vendor: Content Keeper Instead of configuring URL one by one manually, simply select specific categories Millions of URL in database, real time update Trojan Virus Worm Hacker Gambling Pornography Malicious Sport
9
D-Link Confidential D-Link categorizes millions of URLs into 32 groups, enables network administrators a flexible configuration to block unwanted website access simply via add and remove action Web Content Filtering (WCF)
10
D-Link Confidential Server Client Wireless ERP/ CRM DHCP xStack Switch Hackers Hacker Mobile User Telecommuter Web Site Thieves UNPROTECTED WAN NetDefend Anti-SPAM Mail Server Applications Guest SPAM For advertising/malicious purpose, company/hacker would send bunch of emails SPAM It would waste bandwidth and time to receive useless but malicious emails User checks email SPAM When receiving SPAM, NetDefend Anti-SPAM could do: NetDefend Anti-SPAM SPAM 1. Block it out 2. Tag and forward it Mail server storage and inbound bandwidth could be overwhelmed NetDefend Anti-SPAM Service: Leverage open source: DNSBL When receiving SPAM, NetDefend Firewall could: block it out, or tag a customized string in subject field and forward it
11
D-Link Confidential D-Link ZoneDefense Self-Defense Network with Collaboration of Switch and Firewall The growth of network communication is business is increasing rapidly. It is a challenge for enterprise to protect the network from attacks and virus threats from hackers. Enterprise uses a single device to reject the network connection based on the access rules defined by the network administrator. However, this device does not detect illegal spreading of virus and worms within the network. D-Link ZoneDefense that raises the network security can resolve this issue.
12
D-Link Confidential Whenever there’s an infected user It will try to broadcast to all networks Further, when Firewall detects virus/ worm activities, it will notify the access layer switches to block the suspected host to effectively stop the mutual infection or virus/ worm outbreak in time D-Link ZoneDefense (Patent Pending) xStack Switch D-Link ZoneDefense Server Farm NetDefend
13
D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) What is VPN? A Virtual Private Network (VPN) is a private network connection that occurs through a public network. VPNs can be used to connect LANs together across the Internet or other public networks. With a VPN, the remote end appears to be connected to the network as if it were connected locally. VPN has attracted the attention of many organizations looking to both expand their networking capabilities and reduce their costs.
14
D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) The Benefits of VPN Encryption : Cryptography provides the means to create VPNs across the Internet with no additional investments in connectivity. Cryptography is an umbrella expression covering 3 techniques and benefits: Confidentiality Authentication and Integrity Non-repudiation VPNs are normally only concerned with confidentiality and authentication. Non-repudiation is normally not handled at the network level but rather on a transaction (document-by-document) basis.
15
D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) Internet Local Network Branch Office 1 Client Local Network Head Office Hub Local Network Client Branch Office 2 Spoke A Typical Scenario of VPN Solutions Road Warriors Tunneling Protocol: L2TP PPTP IPSec
16
D-Link Confidential Small Business Enterprise Medium Business Branch Office Performance DFL-800 / 860 DFL-1600 / 1660* DFL-2500 / 2560* DFL-210 / 260 50 Mbps 150 Mbps320/400 Mbps 600/700 Mbps In Development DFL-160(W)* SOHO 80 Mbps Ideal for 30 users Ideal for 50 users Ideal for 150 users Ideal for 300 users Ideal for 600 users D-Link NetDefend Product Line
17
D-Link Confidential Stemming from NetDefendOS Target SMB to Enterprise Markets Sufficient Security Features High Firewall and VPN Performance Hardware-based VPN Acceleration Unrestricted User Support Interface Network Drivers Device handler Modified TCP/IP Stack Firewall Software Windows/Linux based OS Proprietary NetDefendOS StructureTraditional Firewall Structure D-Link NetDefendOS
18
D-Link Confidential ¹ Only available in DFL-1600/2500 ² Firmware upgraded feature. 3 UTM only Integrated Functions Content Filtering Fault Tolerance Bandwidth Management and Routing 802.1p QoS, Map IP DSCP (ToS) Traffic Load Sharing Outbound Traffic Load Balancing ² Policy-Based Routing Server Load Balancing Support IPSec/ PPTP/ L2TP VPN Security Static DHCP assignment ZoneDefense for Joint Security Content Filtering/Intrusion Detection Layer 2 Transparent mode OSPF Dynamic Routing Protocol Support IGMP v1/ v2/ v3 Web-based User Authentication Instant Message/P2P Blocking SIP ALG Anti-Spam (FREE) Anti-Virus 3 Web-Content Filtering 3 URL/E-Mail Filtering Java Script/Active X/Cookie Filtering IM/P2P Program Filtering Route Fail-Over Active/Passive Modes for High Availability ¹ D-Link NetDefendOS Features :
19
D-Link Confidential Question ??
20
D-Link Confidential Thanks !!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.