1 White Paper Juniper s Deep Inspection Firewall Making Application-Level Attack Protection Pervasive Sarah Sorensen Product Marketing Manager Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA or 888 JUNIPER Part Number:
2 Contents Introduction...3 Juniper s Deep Inspection Implementation...4 How The Deep Inspection Firewall Protects Against Attacks...5 Protocol Conformance Verification for Day-Zero Defense...5 Service Field Attack Pattern Matching for Known Attacks...8 Granular Control Over Juniper s Deep Inspection...10 Deployment Strategies...12 Conclusion...15 Copyright 2004, Juniper Networks, Inc.
3 Introduction As data-driven, application-layer attacks have proliferated in recent years, it has become increasingly clear that the existing solution set is not adequate to counter these threats in a cost-efficient manner. Implementing effective security to address the myriad of threats aimed at an organization s network is difficult without the right tools. The primary tool that most enterprises use to protect their networks is a Stateful inspection firewall. While effective at enforcing access policies and protecting against exploits at the network level, such as Denial of Service attacks, these solutions are not designed to protect against intrusions that target the application. It is these application-level attacks that are making headlines and costing enterprises millions of dollars in lost intellectual property, revenue and productivity. In 2002, intrusion prevention systems (IPS) were introduced to provide application-level attack protection, inspecting and then preventing the attacks in the traffic allowed by the firewall. The early adoption of intrusion prevention technology has mainly been focused on securing sensitive resources in the corporate headquarters and large regional offices. Generally, customers deploy IPSes behind a Stateful inspection firewall and in front of critical servers, where protecting application-level data from both internal and external attacks is a primary concern. NOTE For more information on Intrusion Prevention Technology, please see Juniper Network s white paper Intrusion Detection and Prevention: Protecting Your Network from Attacks. It is important to deploy this application-level protection throughout the network, since an organization s ability to protect any network resources can be compromised by a single weak link. Small remote and branch offices and telecommuters with home networks also need application-level attack protection. Recognizing that these network segments probably do not have the resources or variety of protocols running through them that the regional offices and large central sites do, the need is to add the appropriate application-level protection for the resources found at these sites, i.e. a Web server, server, etc. The logical place to add this protection is at the perimeter of these smaller network segments, where the firewall usually sits. Adding deeper protection to the firewall for the types of attacks that threaten these network segments would enable the organization to prevent these threats at the edge and strengthen their overall security. Such a strategy would meet the security goals at minimal cost to management overhead and complexity. This is what Juniper Network s Deep Inspection (DI) firewall is designed to provide, enabling enterprises to easily deploy application-level attack protection throughout their extended network to mitigate the risks posed by these traditionally weaker links. Juniper s DI firewall represents the next generation in firewall technology. This paper describes the implementation of Juniper s DI firewall, explains how DI protects against application attacks, demonstrates how customers can control and manage the applicationlevel protection, and discusses various deployment strategies to illustrate how to most effectively use DI firewall. Copyright 2004, Juniper Networks, Inc. 3
4 NOTE For more information on traditional technologies and the requirements for application-level protection, please read Juniper s white paper The Need for Pervasive Application-Level Attack Protection: How Deep Inspection Technology Meets the Requirements for Network and Application Attack Protection. Juniper Network s Deep Inspection Implementation Juniper s Deep Inspection firewall provides both network and application-level protection to strengthen the overall security stance of the network. The DI firewall integrates the strengths of both Stateful inspection and intrusion prevention technologies to efficiently process network traffic and insulate network resources from many of the sophisticated attacks targeting Internet protocols. With all of the benefits of Stateful inspection, the DI can quickly perform network-level analysis to make access control decisions on the traffic and then, for the traffic that is accepted, look deeper in the traffic to make additional decisions based on the application-level information. Deep Inspection Stateful Inspection Packet Filter Protocol conformance Application Attack Reassemble, normalize, eliminate ambiguity Track sessions Packets Application Traffic Application Traffic Deny Some Attacks Deny Traffic Juniper s Deep Inspection firewall is designed to provide the application layer protection for the most prevalent Internet-facing protocols, such as HTTP, SMTP, IMAP, POP, FTP and DNS, with the ability to easily add protocols in the future. For these protocols, the Deep Inspection Firewall interprets application data streams in the form that a recipient would act upon. To accurately interpret the intent of the traffic at the application level, the DI firewall performs de-fragmentation, reassembly, scrubbing and normalization. Once the DI firewall has reconstructed the network traffic, utilizing the aforementioned processes, it employs protocol conformance verification and service-field attack pattern matching to protect against attacks within that traffic. The DI firewall utilizes an Attack Object Database to store protocol anomalies and attack patterns (sometimes referred to as signatures), grouping them by protocol and security level (severity), to perform both its Stateful Inspection and Deep Inspection duties. The firewall s analysis engine extracts the relevant attack objects that it needs from its local database at runtime to effectively analyze the traffic. 4 Copyright 2004, Juniper Networks, Inc.
5 The initial release will protect against over 250 application attacks. Of course, the Attack Object Database may be updated, either automatically or manually, as depicted in the figure below. The update process entails connecting to the Juniper Attack Object Database Server, which will be updated regularly with new attacks and updates to preexisting attacks. Emergency updates will also be provided to protect against key attacks as necessary. Customers must have a software subscription and subscribe to the Target Attack Update Service to receive these new attack protection enhancements. How The Deep Inspection Firewall Protects Against Attacks Once Juniper s Deep Inspection firewall reconstructs the packets on the network to the application message, it then performs application specific analysis to determine whether the intent of the traffic is malicious or benign. First, it analyzes the data based on the protocol specifications. If the data deviates from the specifications, it represents an anomaly. Highimpact anomalies that represent malicious intent, such as trying to overflow a memory buffer to take control over a system, are identified as attacks. Granular control of how and where to look for anomalies allows non-conforming systems to be supported. The DI then uses its knowledge of the protocol to identify the application communication service fields and perform specific pattern matches against the relevant fields to identify attacks. Service Fields are portions of the traffic that relate to specific functions, such as addresses, URLs, file names, etc., that the DI firewall applies attack pattern matches to in order to identify an attack. These service fields represent the application message and enable the DI firewall to understand the communication to look for attack patterns in the right fields. Protocol Conformance Verification for Day-Zero Defense Because Juniper s DI can apply protocol conformance to the traffic, it is able to protect against entire classes of exploits, such as buffer overflow attacks, without needing to know about a specific exploit. This means that the solution can potentially provide day zero protection against brand new attacks as they emerge. It is also a mechanism that can protect against some of the more sophisticated attacks that cannot be characterized by a simple pattern. The DI firewall s analysis engine compares the message content with the RFCs that govern protocol behavior that is, comparing the format of the transmitted protocol with the standards specified in the RFCs and RFC extensions for that particular protocol or in Internet Drafts and source code, when applicable. Copyright 2004, Juniper Networks, Inc. 5
6 Let s look at exactly how the DI firewall uses protocol conformance verification to protect against attacks, using a directory traversal attack as an example. With IIS Web servers, the default location for public web server files on the Microsoft file-system is C:\INETPUB\WWWROOT. A directory traversal attack, targeting the Microsoft Windows operating system running IIS, will attempt to fool the web server into allowing clients to access files and system resources outside of WWWROOT. The following HTTP GET request is an example of an attacker who has sent a deliberately crafted message designed to fool the host machine into granting access to critical resources to the client: GET /USsales/revenues/../../../../WINNT/SYSTEM32/CMD.EXE?/C+dir+C:\+/S Here the attacker has used the GET command to gain access to the cmd.exe program, which is the access point to the Windows shell. Instead of a CGI program, the URL contained within this HTTP request directs the IIS server to invoke CMD.EXE. The DI firewall, upon receiving and parsing this message, will transform the original application layer message shown above into the form that the host machine will see: \WINNT\SYSTEM32\CMD.EXE /C dir C:\ /S This command issues a directory listing of the entire hard drive, and the IIS server will respond by passing this information back to the client in the HTTP response. Without Juniper s DI firewall to stop this attack before the Web server processes this command, the attacker will have succeeded in using a malformed URL to breach network security. To get to the point where the DI firewall is able to analyze the HTTP GET message to detect and stop the security breach, the firewall must reconstruct the application layer traffic. The first step is to reassemble the TCP packets belonging to this particular communication session back into their original sequence. If the original HTTP GET command, after having been encapsulated as a TCP stream, is fragmented into 10-byte packets the message will be transmitted as shown below: Ideal transmission of malicious HTTP GET message GET /USsales/revenues/../../../../WINNT/SYSTEM32/CMD.EXE?/C+dir+C:\+/S Transmit Order Packet Payload 1 GET /USsal 2 es/revenue 3 s/../../.. 4 /../WINNT/ 5 SYSTEM32/C 6 MD.EXE?/C+ 7 dir+c:\+/s Of course, this is an idealized scenario. Often the host machine, and by extension the DI firewall, will receive the packets out of sequence. The problem is compounded due not only to network infrastructure, which can force packets to be further decomposed and resequenced, but also attackers who deliberately alter packets in order to try to fool security solutions. For example, the intruder could force packets to be needlessly fragmented at the IP 6 Copyright 2004, Juniper Networks, Inc.
7 layer (possibly into different sizes), transmit them out-of-sequence, send duplicate packets, overlap content across packet boundaries, or any combination of the above. It should be noted that all of these occurrences could very well occur even without an attacker attempting to breach the network, just due to the vagaries of the network s infrastructure. Thus, the DI firewall can handle a potentially scrambled message stream, resolve the ambiguities present within the data stream, and reconstruct the message in order to analyze it s content. An example of such scrambled network traffic, using the same HTTP GET message is shown below: Deep Inspection Firewall ues/../../ GET /USsale enue s/../../.. es/rev SYST /../WINNT/ SYST EM32?/C+ MD.EXE/?C+ dir+c:\+/s GET /USsale enue Deep Inspection Firewall Removes Ambiguities: e.g.overlapping or duplicated packets es/rev s/../../.. ues/../../ /../WINNT/ SYST Deep Inspection Firewall Defragments and Reassembles the Traffic EM32?/C+ MD.EXE/?C+ SYST dir+c:\+/s The DI firewall, upon caching the received packets, will proceed to analyze the TCP sequence numbers and reorder the packets such that they appear in their original order. The above example illustrates how performing the TCP reassembly is necessary, but not sufficient, in order to analyze the message content, for the reassembled network packets cannot be used for analysis in their raw form. The DI firewall s primary goal is to treat the message content in exactly the form that the host machine will interpret the data, and this entails resolving the potential ambiguities that arise from actual network transmission. The ambiguities will be resolved during the normalization phase. For example, in the above example notice the duplicate packet with the payload SYST clearly the duplicate must be flagged and dropped from the message stream. In addition, there may be packets with overlapping data, like the packets that contain es/rev and ues/../../. In the case of the ues/../../ packet, it must be dropped because it contains overlapping data that is duplicated amongst other packets. However, the other packet containing overlapping data Copyright 2004, Juniper Networks, Inc. 7
8 contains message content that must be preserved in order to reconstruct the original HTTP message. Through careful analysis of the offset value contained in the IP headers, the DI firewall is able to transform the fragmented content into packets that are temporally adjacent and contiguous. This comparatively simple example illustrates the importance of resolving the ambiguities present within the individual packets without this ability no firewall has any hope of catching this directory traversal attack. Finally, the normalization phase also handles different encoded representations for example the application layer message may be transmitted in unicode format instead of ASCII text, and hence the firewall will transform unicode-encoded text into ASCII before moving onto the final analysis stage. Stopping this attack required a different technique than that of the IIS DoS attack. An attack signature that contains the string /../../../../ will not work, as there are URLs where this string is valid (referencing image files in HTTP is one such case) thus one would be susceptible to numerous false positives should the pattern matching approach be employed here. Similar examples include referencing the path /winnt/././ which is the same as /winnt, and relying on a signature approach here would be inviting trouble as an attacker could obfuscate the path statement in countless other forms, or even replace the slashes with their Unicode equivalent in order to evade a pure signature scanning approach. However, because the DI firewall is able to interpret the application layer message content as the host machine will be, the system is able to use analytical techniques to flag patterns of use that invalidate a protocol s intended use. Service Field Attack Pattern Matching for Known Attacks While protocol conformance verification is able to protect against some unknown and more sophisticated attacks, there are many attacks out there that are known and most efficiently protected against by matching known attack patterns to relevant areas of the traffic. Juniper s DI firewall performs application analysis to understand the intent of the message and then maps different portions of the traffic to their appropriate service fields. Service fields are predefined header values that come from the definition of the protocol in question and represent the intended purpose/use of that specific place in the traffic. For example, in SMTP, some of the service fields are: command-line (a command from the client to the server), data-line (a line of the message itself), From: (sender s address), etc. The DI firewall then applies the known patterns, which correspond to predefined Attack objects that reside in a database contained within the device, to the relevant portion of traffic where a match can do damage. Juniper s pattern matching conserves resources, focusing its energies on the relevant traffic where attacks are perpetrated, to efficiently protect against known attacks. As an example of how service field attack pattern matches (sometimes referred to as Stateful Signatures) can protect network resources, consider the case of preventing against an attack that exploits a known vulnerability in the Microsoft Internet Information Services (IIS) Web server. Like many other Denial of Service (DoS) attacks, this attack uses deliberately malformed data, which due to an implementation bug, causes the system to slow down, with 100% CPU utilization. If the Microsoft IIS Web server [version , 5.1] encounters a series of forward slashes inside of the Host: header of an HTTP request, it will crash. The client machine initiates communication with the web server by establishing a TCP connection to the web server using the three-way SYN/SYN+ACK/ACK handshake. A Stateful inspection firewall is generally configured to allow incoming connections on TCP port 80 and will let the connection through. The client machine has now established a TCP connection to the Web 8 Copyright 2004, Juniper Networks, Inc.
9 server and the connection is added to the firewall s state table. Now, the HTTP client sends an HTTP request message to the Web server. HTTP request headers are in RFC-822 format and contain the specific HTTP query (e.g., GET, POST, or HEAD), along with header lines containing the header data and finally an extra carriage return and line feed indicating the end of the request. The POST HTTP request specifies an URL indicating a CGI program to run, along with some other data that the web server will process by invoking a CGI program. Consider the following diagram, which depicts client/server communication where a malicious client has corrupted the Host: portion of the HTTP request, which if not detected and stopped will crash an IIS web server: Attacker Web Server SYN SYN + ACK ACK TCP connection established, firewall adds to session table. HTTP POST Request POST /cgi-bin/register-user HTTP/1.1 HOST: someplace.net//////////////////////////// From: User-Agent: Internet Explorer Content-Type: application/x-www-form-urlencoded Content-Length: 132 name=joe Hacker&address=13+Main+Street&... <CR><LF><CR><LR> A Stateful Inspection firewall s job is done after it adds the TCP connection to its state table. It cannot search for the offending series of slashes because it is only designed to analyze information contained in the raw IP/TCP/UDP/ICMP/etc. datagrams it does not search the payload of these datagrams, other than to look for auxiliary flows, such as those required by FTP or multi-media protocols. Thus, without more information the firewall has left the IIS web server open to attack. In contrast, Juniper s Deep Inspection firewall is capable of analyzing the HTTP protocol content in real-time and, as such, is able to identify the attack pattern and drop the malformed HTTP request. The security manager can direct the DI firewall to use the following regular expression to search through every host field in each incoming HTTP request: Pattern:.*////////////////////////.* Copyright 2004, Juniper Networks, Inc. 9
10 The DI firewall will identify the attack by comparing the data contained within the application service fields with the Attack Object Database s library of signatures. For this particular HTTP example, some of the service fields the DI firewall will identify are the HOST:, From,: User-Agent, Content-Type, and Content-Length portions of the HTTP request. An attack response will only be triggered if a series of slashes appears in the HOST service field. The DI firewall will not look for or trigger an attack response if the pattern is anywhere else in the HTTP request message, since the vulnerability only manifests itself if the pattern appears within the Host: field. Juniper uses regular expressions to enable the DI firewall to protect against multiple possible representations with a single attack pattern match. Juniper s use of regular expressions to specify attack patterns provides a means by which administrators can easily add additional Attack Objects as new attack patterns become known. This flexibility and configurability are important, as this allows administrators to customize the firewall s capabilities to suit the needs of the organization. For example, if an organization s Web site does not use the POST command, then a signature that flags incoming POST commands can be used to stop any such suspicious activity. Of course, Juniper s in-depth knowledge of application layer content and ability to perform service field classification is a prerequisite to such functionality, since the string POST could easily appear in the body of an , in an attachment, or in countless other places. Organizations can pinpoint, using the given service fields, where in the traffic to look for their customized attack pattern matches for the protocols supported to efficiently protect their network resources. Granular Control Over Juniper s Deep Inspection It is important to be able to tailor any security solution so that it meets the unique needs of each organization. Juniper s Deep Inspection firewall was designed to give customers granular control, while simplifying the deployment, management and ongoing maintenance of the solution. Juniper offers customers the flexibility to interact with the Deep Inspection firewall via a command line interface, Web UI, or the Juniper Networks NetScreen-Security Manager. All three of these methods perform essentially the same task, that of setting up the analysis engine to perform whatever the organization needs the device to do. Combined with a flexible analysis engine, Juniper gives administrators the functionality necessary to deploy Deep Inspection effectively throughout the enterprise network. It is of fundamental importance to ensure that you are applying application layer protection at the appropriate places, in the most efficient manner, per the network s topology. An office with an FTP server, Web site, SMTP gateway and some VPN users will require a different configuration than an office that only has a Web site. So it is important to have the flexibility to apply Deep Inspection to only the relevant traffic that poses a risk to that network segment. For example, in a remote office, where outgoing traffic is trusted, an administrator may opt to protect just the incoming traffic. Or, if this remote office doesn t have an or Web server, then the administrator doesn t need to inspect the traffic for attacks in those protocols. 10 Copyright 2004, Juniper Networks, Inc.
11 Juniper offers administrators complete control over exactly how the Deep Inspection capabilities are applied. Juniper does not force an administrator to make an all or nothing decision. With Juniper s DI firewall, administrators have the flexibility to choose what traffic to apply Deep Inspection to, which attacks to look for in that traffic- from a single attack to a group of attacks-, and where in the network to apply that rule. Stateful Inspection Deep Inspection (App Attack Protection) The above screen shot of NetScreen-Security Manager shows this process in action. There are two policies shown here, illustrating how the firewall is configured on a per-rule basis. The DI firewall policies are rule-sets that allow an administrator to control, first, what traffic is allowed in and out of the network stateful inspection - and then how Deep Inspection is applied to that traffic. Individual attack objects and groups can be toggled on or off and can also be edited to provide granular control over the application attack protection. Moreover, administrators can add new customized attack objects to their policies, applying attack pattern matches to relevant service fields for certain protocols. Customization of the attack objects in the attack object database means the tradeoffs between Deep Inspection and just Stateful Inspection will be managed in the most effective manner possible. When Deep Inspection is added to a policy, the Juniper device will inspect the application message in the network traffic that the policy permits for any patterns matching those in the reference attack object. Copyright 2004, Juniper Networks, Inc. 11
12 The figure below shows this process in action: When a match occurs, an attack response will be taken depending on the instructions contained in the applicable policy. There are seven possible responses, ranging from just logging to actively closing the session between client and server. This particular HTTP permit attack, which is reminiscent of the HTTP post attack described earlier, shows how the DI firewall s analysis engine uses this information to construct a regular expression that is applied to the HTTP message data, in order to thwart an attack against the Web server. By giving the end user the ability to define exactly what attacks to look for and how to respond when those attacks are identified, DI firewall makes constructing robust network protection strategies feasible and intuitive. Deployment Strategies Securing a heterogeneous enterprise network from application-layer attacks requires both advanced protection devices, along with the flexibility to configure such devices to meet your specific needs. Flexibility and increased application-layer protection must be weighed against maintenance costs, but by moving Deep Inspection into the firewall Juniper has minimized this impact. IT administrators can utilize various Juniper products to implement a security strategy that matches their particular network topology, thus enhancing the security stance throughout the entire network. One technology that has not been covered but is an essential component of any application-layer protection strategy is antivirus. Antivirus is a complementary technology that looks for attack pattern matches in files, while Deep Inspection looks for attack patterns in the application message. Through its partnership with Trend Micro, Juniper offers an integrated AV solution for some of its products. This section will cover specific deployment strategies, and show how to pick and choose amongst the various devices to maximize security while minimizing maintenance costs. 12 Copyright 2004, Juniper Networks, Inc.
13 NOTE For more information on the differences, please see Juniper s Comparison of Firewall, Intrusion Prevention and Antivirus Technologies white paper. Central Site Performance & IT resource Remote Site Deep Inspection Stateful Inspection Stand-alone IDP Deep Inspection Firewall Stateful Inspection Firewall Low Number of Sites Importance of integration High A typical enterprise network will be comprised of many nodes, varying in size from small branch offices or telecommuters to large centralized sites with many servers and internet gateways. The above graphic illustrates the interplay between network infrastructure, IT maintenance, and the need for integration in order to attain robust application-level protection. At central sites and large regional offices, the need for scalability, performance, and total application-layer protection is tantamount. These sites generally have a lot of different resources, representing a lot of different applications and users. A typical configuration at a central site or headquarters will most likely include deployment of a Stateful Inspection firewall in tandem with an IDP device, as this particular strategy meets the need for scalability, sophisticated attack protection and the utmost in performance. The Juniper integrated Stateful inspection firewall and VPN product line will validate session data, protecting against Layer 3 and 4 attacks, and pass large volumes of data through, given that the bandwidth at the central site is most likely of a magnitude higher than that of smaller remote offices. It may also be needed to support hundreds/thousands of VPN connections. The organization will most likely forgo enabling Deep Inspection on the central site firewall, in favor of a stand-alone IDP device to inspect both internal and external traffic. This will enable the organization to take advantage of Juniper IDP s Multi-Method Detection, which goes beyond protocol conformance and attack pattern matching, and advanced logging and investigative capabilities. Maintaining multiple devices does increase network complexity and support costs, but at a central site there should be sufficient IT resources available. But what happens as you begin to deal with some of the smaller nodes in the enterprise network? Given the distributed nature of today s computing environment, more often than not you will have numerous smaller sites that also require application-level protection. This is where Deep Inspection is perfectly positioned to enhance the organization s security stance. These smaller nodes are at the edge of your network, where there most likely will be far less IT resources available for maintenance and upkeep. Using multiple devices is not a costeffective strategy, thus by moving application-level protection into the firewall, via Deep Inspection, it is possible to add the necessary protection at these sites. While stand-alone IDP Copyright 2004, Juniper Networks, Inc. 13
14 protects against more than 50 different application layer protocols, Deep Inspection adds application layer protection for those protocols that will typically be used at the remote sites (Web, , file transfer, DNS). Moreover, if only a subset of these protocols is needed in a particular location, Juniper s DI firewall can be configured appropriately, as described in the previous section. Finally, the automatic upgrade feature of ScreenOS means that IT maintenance costs are brought down even further, making rich application layer protection a reality at the edge of enterprise networks. Stand-alone IDP Deep Inspection Firewall Stateful Inspection Firewall DMZ Headquarters Files Servers Intranet HR Dept Engr Dept Mktg Dept Finance Dept Branch / Tele Branch Worker / Teleworker Branch / Tele Branch Worker / Teleworker Users DMZ Regional Office The above graphic is a simplified diagram of an entire topology, illustrating the overall range of scenarios that the Juniper product line is designed to protect. At a remote site or telecommuter s office, you could choose configure either a Juniper firewall with Deep Inspection enabled, or just use Juniper s Stateful Inspection, as the situation warrants. Here the integrated capabilities of ScreenOS are truly brought to bear. If for example this site is just an office with possibly just a print server and little or no IT support, it may be sufficient to just use Stateful Inspection. But there are other scenarios where it is prudent to use Deep Inspection. A telecommuter s machine is an unknown quantity in some respects, which bears the question, how much traffic is work-related and how much is home use? Does the organization really know what is transpiring on these machines? A security strategy may be to split this network node between the home and work user, and to enable Deep Inspection for the work user to protect critical network resources. 14 Copyright 2004, Juniper Networks, Inc.
15 As shown in the below graphic attackers may choose any number of routes to breach the network, so your IT staff needs this integrated capability to adjust your organization s security strategy based on the current security posture. Branch Office NetScreen-IDP DMZ Headquarters Central Management Deep Inspection Firewall Stateful Inspection Firewall By layering the Juniper integrated firewall/ipsec VPN systems and appliances and IDP solutions throughout the enterprise network, organizations can maximize their security while minimizing their overhead. Obviously the most critical resources must be protected at all costs, so by layering the firewall functionality in this manner increases an organizations ability to mitigate both network and application-layer attack. Conclusion Pervasive application-level protection is critical when securing enterprise networks. The distributed nature of today s computing environment has left the perimeter of the network vulnerable to attack, as the firewalls prevalent today do not protect against application-level attacks, simply because they do not have the means available to do so. With the introduction of Juniper s Deep Inspection firewall, IT administrators have at their disposal an easy-tomanage solution that provides protection to the application-layer protocols that are typically used in the smaller nodes (remote, branch, and regional offices). It is at these locales where Deep Inspection is most appropriate, and the combination of this new firewall technology in conjunction with function-specific devices like stand-alone IDP means that security personnel can rest assured that their entire network has protection against application attacks. Copyright 2004, Juniper Networks, Inc. 15
16 Blank Page Copyright 2004 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, GigaScreen, NetScreen-Global PRO, NetScreen-Remote, NetScreen ScreenOS and the NetScreen logo are trademarks and registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks and registered trademarks are the property of their respective companies. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without receiving written permission from Juniper Networks, Inc. 16 Copyright 2004, Juniper Networks, Inc.
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
White Paper Virus Protection Across The Enterprise How Firewall, VPN and /Content Security Work Together Juan Pablo Pereira Sr. Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda Avenue
APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Announcement Frequently Asked Questions (FAQ) Q: What is the? A: The is a high performance network security appliance targeted to small or remote offices in distributed enterprises, including telecommuters,
Juniper Networks Integrated Firewall and IPSec VPN Evaluators Guide How to configure and test firewall, VPN and Deep Inspection functionality Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
White Paper Intrusion Detection and Prevention Protecting Your Network From Attacks Sarah Sorensen Product Marketing Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
UNDERSTANDING FIREWALLS TECHNICAL NOTE 10/04 REVISED 23 FEBRUARY 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...
Ch.9 Firewalls and Intrusion Prevention Systems Firewalls: effective means of protecting LANs Internet connectivity is essential for every organization and individuals introduces threats from the Internet
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Essential Intrusion Prevention System (IPS) & DoS Protection Knowledge for IT Managers October 2006 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel: (888) 234-5763 International
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
2010 White Paper Series Layer 7 Application Firewalls Introduction The firewall, the first line of defense in many network security plans, has existed for decades. The purpose of the firewall is straightforward;
Protecting a Corporate Network with ViPNet Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Introduction Scope ViPNet technology protects information systems by means
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University email@example.com
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
IDP Series Intrusion Detection and Prevention Appliances PRODUCT CATEGORY BROCHURE Staying One Step Ahead With the accelerating number of applications allowed in from the Internet and the higher frequency
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Gateway AntiVirus WatchGuard Gateway AntiVirus Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Malware Continues to Grow New and ever-changing threats appear with alarming regularity,
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Endpoint Based Policy Management: The Road Ahead Introduction In a rapidly growing and crowded security solutions market, organizations need to deploy the most effective technologies taking into consideration
This Learn About introduces the fundamentals of security virtualization and explains how a virtual security appliance can provide security and networking services in virtualized private or public cloud
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Karen Kent Frederick (firstname.lastname@example.org) is a senior security engineer for the Rapid Response Team at NFR Security. She is a graduate of the University of Wisconsin- Parkside and is currently completing
Your consent to our cookies if you continue to use this website.