Top Banner
Palo Alto Networks Just another Firewall? Matthias J. Canisius Regional Manager DACH [email protected]
27

Palo Alto Networks - Just another Firewall

Jul 05, 2015

Download

Business

pillardata

Presentation held at Pillar onTour! 16th November 2010 in Hamburg by Matthias Canisius, Regional Manager DACH at Palo Alto Networks.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Palo Alto Networks - Just another Firewall

Palo Alto Networks Just another Firewall?

Matthias J. Canisius

Regional Manager DACH

[email protected]

Page 2: Palo Alto Networks - Just another Firewall

Evolution

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 2 |

•Packet Filter

•StatefulInspection

•Proxy Firewall

•Deep Packet Inspection

Next Generation Firewall

•Statische Anwendungen

•Web-Anwendungen

•„SocialNetwork/Medi

a“

•Enterprise 2.0•Web 2.0

Page 3: Palo Alto Networks - Just another Firewall

Fakten...

• Facebook 100 mio . neue User innerhalb von 9 Monaten (TV brauchte 13 Jahre für 50 Mio.)

• 80% aller Unternehmen nutzen LinkedIn oder Xing als Quelle neue Mitarbeiter zu finden

• YouTube ist die 2. größte Suchmaschine der Welt mit über 100 mio. Videos

• Wikipedia über 13 Millionen Artikel und gilt als umfassender als die Encyclopeda Britannica(78% der Artikel sind nicht in englischer Sprache)...

• (R)evolution!?

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 3 |

Page 4: Palo Alto Networks - Just another Firewall

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 4 |

Warum eine Next Generation Firewall?

Need to Restore Visibility and Control in the Firewall

Firewalls sollten

Anwendungen, User und

Angriffe erkennen und

kontrollieren . . .

• . . . doch sie kontrollieren nur

Ports, Protokolle und IP-

Adressen – bedeutungslos.

Page 5: Palo Alto Networks - Just another Firewall

© 2007 Palo Alto Networks. Proprietary and ConfidentialPage 5 |

Das Ende der Kontrolle?

• Intelligente Anwendungen umgehen Ihre Security (Evasive Attacks)

- Port Hopping, “non-standard” Ports, Tunneling (Port 80), …

• Bedrohungen finden auf Anwendungsebene statt (SANS TOP 20)

• Benutzer und Anwender werden kreativer

- Aktive Umgehung von Sicherheitsrichtlinien (Bypassing via Ultrasurf, …)

• Oder die Anwendung selbst transportiert das Risiko

- P2P Fileshare, Tunneling, Videos,…

Page 6: Palo Alto Networks - Just another Firewall

Internet

Bisher – Viel hilft viel?

• Komplex und teuer in Anschaffung und Betrieb

• Nicht sonderlich performant

• Keine wirkliche Transparenz und Kontrolle

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 6 |

Page 7: Palo Alto Networks - Just another Firewall

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 7 |

Page 8: Palo Alto Networks - Just another Firewall

•Page 8 |

Neue Anforderungen

1. Identifizierung von Anwendungen unabängigvon Port, Protokoll, SSL-Tunnel …

2. Identifizierung von Benutzern unabhängig von IP-Adressen

3. Granulare Darstellung und Kontrolle überZugriff und Funktion von Anwendungen

4. Schutz in Echtzeit vor in Anwendungeneingebetteten Angriffen

5. Multi-Gigabit, In-Line Implementierung ohnePerformance-Einbußen

Next Generation Firewall™

Page 9: Palo Alto Networks - Just another Firewall

Die Lösung

•App-ID

•Identifikation der Anwendung

Page 10: Palo Alto Networks - Just another Firewall

Application Identification Components

• Detect Protocol in Protocol

• Provide context for signatures

Protocol Decoders

• Man in the middle SSL decryption

Protocol Decryption

• Detect applications initiating

Application Signatures

• Uses patterns of communication

Heuristics

© 2009 Palo Alto Networks. Proprietary and Confidential 2.1-bPage 10 |

Page 11: Palo Alto Networks - Just another Firewall

Application Identification - Signatures

© 2009 Palo Alto Networks. Proprietary and Confidential 2.1-bPage 11 |

•Protocol Decoders

•Decryption

•Application Signatures

•SSL

•Forward proxy

•HTTP

•webex

•Webex desktop sharing

•Mode shift

Page 12: Palo Alto Networks - Just another Firewall

Application identification - Heuristics

© 2009 Palo Alto Networks. Proprietary and Confidential 2.1-bPage 12 |

•Unknown

•Encrypted Bittorrent

•Azureus

•Heuristics

•Protocol Decoders

•Examine communications

Page 13: Palo Alto Networks - Just another Firewall

Die Lösung

•App-ID

•Identifikation der Anwendung

•User-ID

•Identifikation der Benutzer

•Content-ID

•Untersuchung des Inhalts

Page 14: Palo Alto Networks - Just another Firewall

Bisheriger Ansatz

•Port/Protocol-based ID

•HTTP Decoder

•L2/L3 Networking, HA, Config Management,

Reporting

•URL Filtering Policy

•Port/Protocol-based ID

•L2/L3 Networking, HA, Config Management,

Reporting

•Firewall Policy

•Port/Protocol-based ID

•IPS Signatures

•L2/L3 Networking, HA, Config Management,

Reporting

•IPS Policy

•IPS Decoder

•Port/Protocol-based ID

•AV Signatures

•L2/L3 Networking, HA, Config Management,

Reporting

•AV Policy

•AV Decoder & Proxy

•Page 15 | •© 2008 Palo Alto Networks. Proprietary and Confidential

Page 15: Palo Alto Networks - Just another Firewall

Parallel nicht sequentiel!

•L2/L3 Networking, HA, Config Management, Reporting

•App-ID

•Content-ID

•Policy Engine

•Application Protocol Detection and Decryption

•Application Protocol Decoding

•Heuristics

•Application Signatures

•URL Filtering

•Real-Time Threat Prevention

•Data Filtering

•Page 16 | •© 2008 Palo Alto Networks. Proprietary and Confidential

•User-ID

Page 16: Palo Alto Networks - Just another Firewall

© 2009 Palo Alto Networks. Proprietary and Confidential 2.1-bPage 17 |

Single-Pass Parallel Processing Architectur

Page 17: Palo Alto Networks - Just another Firewall

© 2009 Palo Alto Networks. Proprietary and Confidential 2.1-bPage 18 |

System-Architektur (PA-4000)

Flash Matching HW Engine

• Palo Alto Networks’ einheitlicheSignaturen

• Erweiterbarer Speicher – Speicher skaliertLeistungsfähigkeit

Multi-Core Security Prozessor

• Flexible Sicherheitsfunktionalität

• Hardware-Beschleunigung von komplexen, standardisierten Funktionen (SSL, IPSec,

Dekomprimierung)

Dedizierte Management Plattform:

• Hochverfügbarkeit

• Hochperformant :

• Logging

• Routing

• …

Flash Matching

Engine

RAM

RAM

RAM

RAM

Dual-Core

CPURAM

RAM

HDD

10 Gig Netzwerk Prozessor

• Front-End etzwerkprozessor entlastetSecurity Prozessor

• Hardware-beschleunigts QoS, Route Lookup, MAC Lookup, NAT

CPU

16

. .

SSL IPSecDe-

Compression

CPU

1

CPU

2RAM

RAMCPU

3

QoS

Route, ARP, MAC

lookup

NAT

Page 18: Palo Alto Networks - Just another Firewall

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 19 |

PAN-OS Core Firewall Features

• Strong networking foundation- Dynamic routing (OSPF, BGP,

RIPv2)

- Tap mode – connect to SPAN port

- Virtual wire (“Layer 1”) for true transparent in-line deployment

- L2/L3 switching foundation

• VPN- Site-to-site IPSec VPN

- SSL VPN

• QoS traffic shaping- Max/guaranteed and priority

- By user, app, interface, zone, and more

• Zone-based architecture- All interfaces assigned to security

zones for policy enforcement

• High Availability- Active / passive

- Configuration and session synchronization

- Path, link, and HA monitoring

• Virtual Systems- Establish multiple virtual firewalls in a

single device (PA-4000 and PA-2000 Series only)

• Simple, flexible management- CLI, Web, Panorama, SNMP, Syslog

Visibility and control of applications, users and content complement core firewall features

PA-500

PA-2020

PA-2050

PA-4020

PA-4050

PA-4060

Page 19: Palo Alto Networks - Just another Firewall

© 2009 Palo Alto Networks. Proprietary and Confidential 2.1-bPage 20 |

Flexibel einsetzbar!

Visualisierung Transparent In-Line Primäre Firewall

• Applikation

• Benutzer

• Content

• Ohne Inline Einbindung

• IPS mit Applikations-Darstellung und -Kontrolle

• Konsolidierung von IPS & URL Filter

• Primäre Firewall mit Applikations-Darstellung und Kontrolle

• Firewall + IPS

• Firewall + IPS + URL-Filter

Page 20: Palo Alto Networks - Just another Firewall

Application Visibility and Risk Report

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 21 |

Einfache Auswertung

Ihrer Daten

• Top Application Usage

• High Risk Applications

• Http Applications

• Top Threats

•AVR

Page 21: Palo Alto Networks - Just another Firewall

Palo Alto Networks Next-Generation Firewalls

© 2010 Palo Alto Networks. Proprietary and Confidential.Page 22 |

PA-4050

• 10 Gbps FW

• 5 Gbps threat prevention

• 2,000,000 sessions

• 16 copper gigabit

• 8 SFP interfaces

PA-4020

• 2 Gbps FW

• 2 Gbps threat prevention

• 500,000 sessions

• 16 copper gigabit

• 8 SFP interfaces

PA-4060

• 10 Gbps FW

• 5 Gbps threat prevention

• 2,000,000 sessions

• 4 XFP (10 Gig) I/O

• 4 SFP (1 Gig) I/O

PA-2050

• 1 Gbps FW

• 500 Mbps threat prevention

• 250,000 sessions

• 16 copper gigabit

• 4 SFP interfaces

PA-2020

• 500 Mbps FW

• 200 Mbps threat prevention

• 125,000 sessions

• 12 copper gigabit

• 2 SFP interfaces

PA-500

• 250 Mbps FW

• 100 Mbps threat prevention

• 50,000 sessions

• 8 copper gigabit

Page 22: Palo Alto Networks - Just another Firewall

•. •Page 24 |

Vertrauen

• Gegründet 2005 von Security Visionär Nir Zuk

• Entwickelt von Security-Experten von CP, Netscreen,

Juniper, McAfee, BlueCoat, Cisco, …

• $65 Million “Funding” der Top Venture Capital Unternehmen

(Sequoia Capital, Greylock Partners, Globespan Capital

Partners, …)

• Mittlerweile über 1800 Kunden weltweit

• 9000 gelieferte Maschinen

• Gartner: Top Visionary in Gartner Quadrant!

Page 23: Palo Alto Networks - Just another Firewall

2010 Magic Quadrant for Enterprise Network Firewalls

© 2010 Palo Alto Networks. Proprietary and Confidential.Page 25 |

Source: Gartner

Palo Alto Networks

Check Point Software Technologies

Juniper Networks

Cisco

Fortinet

McAfee

Stonesoft

SonicWALL

WatchGuard

NETASQ Astarophion

3Com/H3C

completeness of vision

visionaries

ab

ilit

y t

o e

xe

cu

te

As of March 2010niche players

Page 24: Palo Alto Networks - Just another Firewall

Proven IPS Quality

Testing performed by NSS Labs, Summer 2010

- Recognized industry leaders for IPS testing

- Tests based on established NSS IPS methodology

- Tested against a battery of 1,179 live exploits using real world traffic patterns

© 2009 Palo Alto Networks. Proprietary and Confidential.

Criteria Results

Overall Rating Recommended

IPS Block Rate 93.4% (at 2.3 Gbps)

Performance 2.3 Gbps (115% of

stated performance)*

IPS Evasion 100% Resistance

Simple Tuning and

Management

“Tuning consisted of

changing just three

settings within the

policy”

Review the full NSS Report at http://www.paloaltonetworks.com/literature/forms/nss-report.php

*Testing performed on a Palo Alto Networks PA-4020 which is rated at 2 Gbps of Threat Prevention

Page 25: Palo Alto Networks - Just another Firewall

Sehen heißt glauben...

•... Live Demonstration

Page 26: Palo Alto Networks - Just another Firewall

Kurz und knapp

• Verbesserte Sicherheit

- Applikationserkennung: Transparenz führt zu Kontrolle, Kontrolle führt zu Sicherheit

- Intelligente zentrale Content Inspection (AV, IPS, URL,...)

- Aussagekräftiges Monitoring

• Erhöhte Performance

- Parallelverarbeitung mittels Single Pass-Architektur (PANOS) + angepasste Hardware

• Produktivität

- Granulare Applikationskontrolle

• Einsparungspotential

- Einsparung durch Konsolidierung bestehender Insellösungen (Proxy, AV, IPS, URL, ...)

- Niedrigere Betriebskosten

Lizenzierung („flat rate“, nicht per user, ...)

Management + Konsolidierung

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 28 |

Page 27: Palo Alto Networks - Just another Firewall

Thank You