Download presentation
Presentation is loading. Please wait.
Published byCuthbert Bridges Modified over 9 years ago
1
SonicWALL UTM Firewall Overview November 2010 Andy Barrow SonicWALL Product Manager +44 1753 797944
2
Who are SonicWALL? SonicWALL was founded in February 1991 to develop standards-based, network infrastructure products to meet the needs of the small to medium business and education markets. Today, SonicWALL’s Internet security and transaction security solutions are leading the way for a more diverse and secure Internet experience for small, medium and large enterprises. 8/23/2015 2 CONFIDENTIAL All Rights Reserved
3
United States Belgium United Kingdom Germany France Spain Italy Russia Dubai Switzerland Sweden Canada Japan Korea China Hong Kong Singapore Australia Brazil Mexico India The SonicWALL Global Presence 25 offices around the world Conducting business in over 50 countries 8/23/2015 3 CONFIDENTIAL All Rights Reserved
4
Policy and Management Business Continuity Network Security Network Security Content Security Content Security Market Convergence Vendor / Technology Convergence End User / Channel Convergence Content Security Network Security Business Continuity Policy and Management Inbound & Outbound Content Filtering Anti—Virus Anti-Spyware Anti-SPAM Unified Threat Management (Gateway AV, Anti-Spy, IPS) SSL-VPN Secure Backup and Recovery Compliance Patch Management Policy Creation Monitoring Reporting Management Comprehensive & Continuous Protection for our End-Users Predictable & Profitable Growth for our Channel Partners Comprehensive & Continuous Protection for our End-Users Predictable & Profitable Growth for our Channel Partners Keep Businesses Running Increase IT Productivity Manage Risks How it all fits together
5
Recent 5 Star Awards – Across 4 Major Product Categories UTM – Network Security SSL VPN – Remote Access Email Security Management 8/23/2015 5 CONFIDENTIAL All Rights Reserved
6
Gartner Magic Quadrant - 2010 © 2005 SonicWALL, Inc. All Rights Reserved - Confidential 6 Source: Gartner October 2010 Magic Quadrant for Unified Threat Management Appliances
7
CONFIDENTIAL All Rights Reserved 7 What’s a firewall? A firewall is a dedicated appliance which inspects network traffic passing through it, and denies or permits passage based on a set of rules. Wikipedia 8/23/2015
8
Typical Deployment 8/23/2015 8 CONFIDENTIAL All Rights Reserved
9
9 Why do I need a firewall? To stop the wrong people getting into your network? Identity theft is big business Cabinet Office study – Cost of ID fraud to UK = £1.7Bn every year FBI – 27.3 Million Americans have been victims costing $48Bn! Personal data is everywhere DOB+ Address + fake utility bill = You 2.0 C/Card details – Traded world wide New standards like PCI require you to have one 8/23/2015
10
SonicWALL CONFIDENTIAL All Rights Reserved Networking Drivers & Trends 10 Technology Trends Growth in real-time & Internet based applications & communication SaaS / Web 2.0 Virtualization of services Employees increasing utilize network services – productive and unproductive High speed and available information sharing is critical Increases in bandwidth and volume of traffic Business Drivers Reduction in operating costs Focus on TCO Mobilization of the workforce Compliance Outsourcing growth Gaining competitive advantage The Communications Landscape Is Rapidly Evolving
11
The Facts at Work 25% of employees do peer-to-peer file sharing at work Equifax, 2007 16% of men and 8% of women admit viewing pornography at work USA Today, 2007 25% of office internet traffic is non-business related Burst Media Survey, 2008 8/23/2015 11 CONFIDENTIAL All Rights Reserved
12
Networks Exposed to New Threats 130% – The increase in unique malware found in the wild from July to November of 2008 (Kaspersky Labs) 4.2 million – The number of URLs around the world that harbor Malware (Source: IT Pro, 2007) Result – Trojans and malware now outnumber viruses in terms of risk to a network (Kaspersky Labs) 8/23/2015 12 CONFIDENTIAL All Rights Reserved
13
Why do I need a new type of Firewall? Because the Cyber criminals have got smarter. New and sneakier ways of getting in: Trojans Worms Spyware Botnets Applications like Instant Messenger and Skype create a hole in your firewall. Recently, the FBI noted that 98% of organizations use firewalls, but that 56% of them had still experienced unauthorized network access. 8/23/2015 13 CONFIDENTIAL All Rights Reserved
14
What Are Employees Doing? Web surfing Twitter, Facebook Downloading files Instant messaging Streaming video Web 2.0 applications Playing games Personal email 8/23/2015 14 CONFIDENTIAL All Rights Reserved
15
…and More Non-Traditional Malware The Prediction Malware specifically disguised as "benign social networking links" will be the top threat to data security in 2009. (Georgia Tech's Information Security Center Emerging Cyber Threats Report for 2009) The Reality Target: LinkedIn Set-up: Create bogus celebrity LinkedIn profiles Lure: Place link to celebrity “videos” in profile Attack: Download of “codec” required to view video Infect:Codec is actually Malware Result: System compromised (Gregg Keizer, Computerworld Jan 7, 2009) Beyonce Kirsten Dunst Christina Ricci Kate Hudson 8/23/2015 15 CONFIDENTIAL All Rights Reserved
16
SonicWALL CONFIDENTIAL All Rights Reserved New Risks The New Paradigm of Network Communications Brings New Risk
17
SonicWALL CONFIDENTIAL All Rights Reserved 2010 Challenges User Population Expanding App Usage Open Access to Internet Increase in “Unknown” Traffic Limited Control Over Content Security Required By Application Threats Aren’t Decreasing Increases in malware and malcode Threats go invisible Poor Application Visibility Abundance of unknown application use Ports are ineffective at blocking application use Network misuse is rampant Increased Network Complexity Bandwidth efficiency is a top concern Admins want to manage and control network traffic based on identity Ever-increasing thirst for Bandwidth Ever-increasing thirst for Bandwidth Network Use
18
SonicWALL CONFIDENTIAL All Rights Reserved Current Solutions Present Challenges Network safeguards are changing with threats; As threats move up the OSI model, inspection must be more complete and scalable Application visibility is paramount to overcome the next generation of threats and productivity issues Siloed solutions are the current response due to performance but multi- layered protection is the future Current Traditional Firewall Threats Legacy System Access IDS/IDP Basic Applications Worms Application Access Application Layer Threats Proxy Software Vulnerabilities 1 1 2 3 Required Complete Inspection must span the communication spectrum
19
SonicWALL CONFIDENTIAL All Rights Reserved Next Generation Security Requirements 1. Consolidated & Integrated Security Technology Covering a Wide Spectrum of Content-based, File-based & Application Layer Attacks 2. Application Visibility Inspection of Real-time & Latency Sensitive Applications/Traffic 3. Scalable & High Performing High Speed Protection Against Perimeter and Internal Network Challenges Solutions Multi-Tiered Protection Threats Legacy System Access Basic Applications Worms Application Access Application Layer Threats Software Vulnerabilities DPI Firewall IDP/IPS/File App Layer Real-time Prot. What Is the Ideal Solution for Next Generation Protection? Content Filter
20
Introducing SonicWALL’s UTM Firewall Appliances
21
SonicWALL CONFIDENTIAL All Rights Reserved Next Generation NSA Architecture 21 SonicWALL Solution Features 1. Consolidated & Integrated Security Technology 2. Application Visibility - Inspection of Real-time & Latency Sensitive Applications/Traffic 3. Scalable & High Performing Enough to Protect Against Perimeter and Internal Network Challenges Multi-Tiered Protection Technology 2010 Security Requirements Re-Assembly Free DPI (RFDPI) Multi-Core High Perf. Architecture
22
SonicWALL CONFIDENTIAL All Rights Reserved Next-Generation Unified Threat Management Application Visibility & Awareness with ReAssembly-Free DPI (RFDPI) Revolutionary Multi-Core Performance for Ultimate Scalability Best-In-Class Performance and Protection Introducing the SonicWALL NSA and NSA E-Class Series The SonicWALL® Network Security Appliance (NSA) Series - the first multi- core Unified Threat Management (UTM) platform that delivers application aware Unified Threat Management without compromising performance RFDPI Engine Architecture From the NSA240 through to the award winning E-Class E8500 with multi-Gigabit throughput
23
© 2005 SonicWALL, Inc. All Rights Reserved - Confidential 23 SonicWALL Network Security Appliance Features 23 2. Ultimate Connectivity Secure IPSec Site-to-Site VPN Connectivity Exceptional User Policy Control and Access to Resources Wireless Mobility Network Availability 1. Security Integration Complete UTM Protection with Gateway Anti-Virus, Anti-Spyware and IDP Next Generation Application Firewall Content & Application Filtering “Clean VPN” Protection 3. Reliability & Optimization Highly Redundant Hardware – Power/Fans One Point of Network Control Business Application Prioritization & QoS Integrated Server Load Balancing Feature-set 4. Flexible Deployments Data Center, Campus & Department Network Applications Transparent L2 Bridge Mode Integrated Wireless Switch Deployment Ease of Deployment & Management
24
SonicWALL Network Security Appliance Features Multi-Function Security Integration Complete Threat Protection with Intrusion Prevention & Anti- Malware/Virus/Spyware Content Control & URL Filtering Full “Enterprise” quality Integrated Anti-SPAM Protect whole infrastructures such as StoneWare Access Application Visibility Integrated Application Firewall Policy control over Applications, Application use & File Types Ultimate Connectivity “Clean VPN” Secure IPSec Site-to-Site VPN Connectivity, Clean Wireless, Wireless Switch / Controller Exceptional User Policy Control and Access to Resources Integrated Wireless Switch offer “Clean Wireless” Reliability, Optimization & Flexibility Highly Redundant Hardware – Power/Fans Business Application Prioritization & QoS Integrated Server Load Balancing Feature-set Flexible Deployments branch office, corporate & department network Applications Award winning: Deployment & Management Deep Packet Firewall Clean VPN Intrusion Prevention Anti-Malware Content Filtering Bandwidth Management Application Firewall Full Ant-SPAM Clean Wireless 8/23/2015 24 CONFIDENTIAL All Rights Reserved
25
SonicWALL CONFIDENTIAL All Rights Reserved Introducing SonicOS 5.8 25 SonicOS 5.8 Redefines Deployment & Management Simplicity and Functionality Application Firewall Feature Set High Availability with statesync Integrated Load Balancing Application Bandwidth Management Single Sign On Fully Dynamic GUI And more…
26
True L7 Application Intelligence SonicWALL CONFIDENTIAL All Rights Reserved Standard with CGSS on all models from TZ210 upwards Real time application visibility and control of users / apps Fully customisable Fully integrated into UTM appliance Simple to manage
27
The answer is…Application Intelligence Intelligence Reassembly Free Deep Packet Inspection Identify & categorise traffic by source / destination Identify & categorise traffic by application (not just port / protocol) Identify & categorise traffic by user / group (not just IP ) Control Intelligence based policy enforcement Application & content control with 3000+ applications Application level bandwidth management Visualisation View network threats & trends in real time View application traffic by users View application bandwidth useage (ingress / egress) 8/23/2015 27 CONFIDENTIAL All Rights Reserved
28
The answer is… DPI – Reassmbly Free Reassembly Free Deep Packet Inspection Avoid Latency (no buffering) Unique to SonicWALL Deep packet Inspection Doesn’t just check the list It searches…Deep inside …the data packet All SonicWALL firewalls are Deep Packet inspection Firewalls 8/23/2015 28 CONFIDENTIAL All Rights Reserved
29
Layer 7 Application Visibility and Control © 2010 SonicWALL, Inc. All Rights Reserved - Confidential 29
30
SonicWALL CONFIDENTIAL All Rights Reserved Deployment Flexibility Deployments: Central Site, Distributed Networks, Layer 2 Bridge, Wireless Switch, Real-Time Application Protection
31
SonicWALL CONFIDENTIAL All Rights Reserved Data Collection Protection Development Deployed Protection Data Collection 010101010101010010 101010101001010101 010010101010100101 010101010100101010 101010010101001010 10100 24x7 Security Team UTM Appliances NSA Series SonicWALL GRID Network SonicWALL’s Global Response Internet Defense (GRID) Network works 24x7 by gathering and sharing security intelligence across all product platforms
32
Product Specifications
33
SonicWALL UTM product range No. of users 0 to 1010 to 2525 to 50 Model TZ 100/wTZ 200/wTZ 210/w Interfaces5 Ethernet 2 Gigabit/E + 4 Ethernet Throughput90 Mbps200 Mbps UTM Through25 Mbps35 Mbps50 Mbps VPN Site toSite 51015 Client IPSEC (max) 1 (25)2 (10)2 (25) Client SSL (max) 0 (5)2 (10) 50 to 7575 to 150150 to 300300 to 700 NSA 240NSA 2400NSA 3500NSA 4500 3 Gigabit/E + 6 Ethernet 6 Gigabit/E 600 Mbps775 Mbps1,5 Gbps2,75 Gbps 110 Mbps150 Mbps240 Mbps600 Mbps 25758001 500 2 (25)10 (250)50 (1 000)500 (3 000) 2 (15)2 (25)2 (30) 700 to 1000 1000 to 1500 1500 to 5000 NSA E5500NSA E6500NSA E7500 8 Gigabit/E 4 Gigabit/E + 4 Gigabit Fibre 4 Gbps4,5 Gbps5,6 Gbps 850 Mbps1,6 Mbps1,7 Gpbs 4 0006 00010 000 2 000 (4 000)2 000 (6 000)2 000 (10 000) 2 (50) SMB Mid-Market Enterprise 8/23/201533
34
SonicWALL NEW UTM Appliance 8/23/2015 34 CONFIDENTIAL All Rights Reserved Featuring : 4 Gigabit/E + 4SFP Interfaces 8 GB Stateful Inspection throughput 2.2GB UTM throughput SonicWALL NSA E8500 UTM Appliance
35
SonicWALL CONFIDENTIAL All Rights Reserved 35 NSA Series NSA 5000NSA 4500NSA 3500NSA 2400 MXNSA 2400NSA 240 SonicOS Version Enhanced 5.8 Interfaces 6GE 16 GE6GE Stateful Firewall Throughput 1.8 Gbps2.75 Gbps1.5 Gbps775 Mbps 600 Mbps UTM Throughput 1.2 Gbps600 Mbps240 Mbps150 Mbps 110 Mbps UTM GAV Throughput 500 Mbps690 Mbps350 Mbps160 Mbps 115 Mbps UTM IPS Throughput 680 Mbps1.4 Gbps750 Mbps275 Mbps 195 Mbps 3DES / AES VPN Performance 350 Mbps1.0 Gbps625 Mbps300 Mbps 150 Mbps RAM 1GB512 MB 1GB SSL-VPN Future SonicOS HA A/P w/Statesync
36
E-Series Solution Statistics NSA E8500*NSA E7500*NSA E6500*NSA E5500* Node CountUnrestricted SonicOS VersionSonicOS Enhanced 5.8 Multi-Core16 Core16 Core 600Mhz16 Core 550Mhz8 Core 550Mhz Interfaces (4) 10/100/1000 Copper Gigabit Ports, (4) SFP Ports, 1 Gbe HA port (8) 10/100/1000 Copper Gigabit Ports, 1Gbe HA port Stateful Firewall Throughput8 Gbps5.6 Gbps5 Gbps3.9 Gbps UTM Throughput 2.2 Gbps1.7 Gbps1.59 Gbps850 Mbps UTM GAV Throughput2.25 Gbps1.84 Gbps1.69 Gbps1.0 Gbps UTM IPS Throughput3.7 Gbps2.58 Gbps2.3 Gbps2.0 Gbps 3DES/ AES VPN Performance4 Gbps3 Gbps2.7 Gbps1.7 Gbps Power SuppliesDual Hot Swappable Single Power Supply Cooling System (Fans)Dual Hot Swappable Visual Information DisplayYes Console PortYes Modular ExpandabilityYes (Future Use) * These are preliminary numbers subject to change // UTM, GAV, IPS tests performed using industry standard Spirent WebAvalance HTTP performance test
37
SonicWALL CONFIDENTIAL All Rights Reserved Next Generation Protection, Today 1. The NSA and E-Class Series Integrates Security To Cover The Widest Spectrum of Content-based, File-based & Application Layer Attacks 2. The NSA and E-Class Series Is Designed to Increase Application Visibility - Delivering Real-time & Latency Sensitive Applications/Traffic For Future Proofed Investment 3. The NSA and E-Class Series Is the Most Highly Performing & Scalable Solution In Class The Industry’s First Multi-core UTM Appliance delivering application visibility & deep packet inspection without significantly impacting network throughput
38
Competition
39
SonicWALL CONFIDENTIAL All Rights Reserved Better Protection & Performance Solutions Are Not Created Equal Deeper Inspection & Greater Performance * Competitive data obtained from vendor datasheet.
40
Better Protection & Performance Solutions Are Not Created Equal Deeper Inspection & Greater Performance
41
General USP’s Total-protection – (GAV/IPS/Anti-Spyware) + AppF Connectivity Fail-Over (W/W – UMTS) Certified & Standards based – EAL4+ Price/Quality! Distributed environments (many locations) 10% extra discount for government / schools Secure Wireless Connectivity Filtering on internet use (Content Filtering) Offer support and licenses included
42
WHAT TO FIND – WHERE? 3 main resources: www.sonicwall.com www.sonicwall.com https://partnerlink.sonicwall.com/emea/ https://partnerlink.sonicwall.com/emea/ www.mysonicwall.com www.mysonicwall.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.