1 WAN Beschleunigung und Applikationskontrolle, mit SonicWALL alles aus einer Hand Thomas Bürgis SE Manager Central Europe 1
2 Daily Challenges Streaming video is killing my network performance Who uses the most bandwidth in our company? My employees keep going to shopping & sports web sites I want to stop our users from using P2P applications 2 Copyright 2010 SonicWALL Inc. All Right Reserved.
3 Daily Challenges Streaming video is killing my network performance Someone opened the wrong EXE attachment Who uses the most bandwidth in our company? My employees keep going to shopping & sports web sites I want to stop our users from using P2P applications Some employees use web mail accounts to send home company files to work on Employees and contractors need to connect to my network from anywhere! 3 Copyright 2010 SonicWALL Inc. All Right Reserved.
4 Daily Challenges Someone opened the wrong EXE attachment Streaming video is killing my network performance I need to implement Quality of Service to run our Business Critical Applications Who uses the most bandwidth in our company? My employees keep going to shopping & sports web sites How many times we were attacked last month? Some employees use web mail accounts to send home company files to work on Are all my network clients up to date with anti-virus? I want to stop our users from using P2P applications Employees and contractors need to connect to my network from anywhere! 4 Copyright 2010 SonicWALL Inc. All Right Reserved.
5 What Are Your Employees Doing? Blogging Facebook Twitter IM Streaming video Streaming audio Downloading files Playing games Webmail Wikis 25% of office Internet traffic is non-business related (Burst Media Survey, 2008) 50% of surveyed companies said at least 30% of their bandwidth is being consumed by social networking traffic (Forrester, Feb 2009) 5 Copyright 2009 SonicWALL Inc. All Right Reserved.
6 Malware propaga+ng at Applica+on Layer Vulnerabilities in the software everyone uses everyday It s Human Nature Programmers make mistakes Malware exploits mistakes 6 Copyright 2010 SonicWALL Inc. All Right Reserved.
7 Malware loves Social Networking Too Set-up: Create bogus celebrity LinkedIn profiles Lure: Place link to celebrity videos in profile Attack: Download of codec required to view video Infect: Codec is actually Malware Result: System compromised (Gregg Keizer, Computerworld Jan 7, 2009) 7 Copyright 2010 SonicWALL Inc. All Right Reserved.
8 Streaming Video Business Use 8 Copyright 2010 SonicWALL Inc. All Right Reserved. Recreational Use
9 Tradi+onal Firewalls Completely Outclassed Stateful Firewall Web Traffic 80 = HTTP 443 = HTTPS 21 = FTP 3389 =RDP Firewall Report - Some Web Traffic - Some Secure Web Traffic - Some WRONG!! FTP Traffic - Some RDP Traffic Everything s OK! 9 CONFIDENTIAL All Rights Reserved
10 Challenges in a Web 2.0 Environment HOW TO Allow use of Social Networking but protect it and control who s using it Allow use of Streaming Video but control its usage At the same time Restrict P2P Applications Restrict File Sharing Restrict Gaming Prioritize VoIP 10 Copyright 2010 SonicWALL Inc. All Right Reserved.
11 Today s Network Security Requirements Situational Visibility & Awareness Application Intelligence, Control with Visualization Scanning of all out- and inbound traffic Protection & Risk Management Security effectiveness for max. catch rates Zero-day protection Secure Access and Manageability Flexible, yet granular controls Multi-vendor interoperability Physical and virtualized assets Distributed networks Users and Applications Mobile devices Embedded sensors Scalability Technology and Solutions Network Performance & Administration Compliance Regulations and Standards 11 Copyright 2010 SonicWALL Inc. All Right Reserved.
12 Sorting Through the Traffic Making Your Next Generation Firewall work for YOU 12 Copyright 2010 SonicWALL Inc. All Right Reserved.
13 SonicWALL Next-Generation Firewall Identify Control Categorize Policy Users/Groups Application Chaos Critical Apps So many on Port 80 Prioritized Bandwidth Patented Reassembly-Free Deep Packet Inspection Ingress Acceptable Apps Managed Bandwidth Egress Unacceptable Apps Cloud-Based Extra-Firewall Intelligence Malware Blocked Visualization Blocked
14 Application Intelligence & Control Next Generation Firewall Platform Identify By Application By User/Group By Content Inspection Categorize Control By Application By Application Category By Destination By Content By User/Group Prioritize Manage Block Prevent Malware Prevent Intrusion Attempts 14 Copyright 2010 SonicWALL Inc. All Right Reserved.
15 Visualization for better Network Intelligence 15 CONFIDENTIAL All Rights Reserved
16 Visualization for Quick Analysis 16 CONFIDENTIAL All Rights Reserved
17 Track Suspicious Traffic 17 CONFIDENTIAL All Rights Reserved
18 Dig Deeper into Suspicious Traffic 18 CONFIDENTIAL All Rights Reserved
19 Capture Packets for Further Analysis 19 CONFIDENTIAL All Rights Reserved
20 Combine filters for Powerful Network Intelligence Cross-Filter for a deeper dive into real-time traffic 20 CONFIDENTIAL All Rights Reserved
21 CONTROL the application traffic 21 CONFIDENTIAL All Rights Reserved Available Today since SonicOS 5.0
22 SonicWALL Next Generation Firewall Technology Today Application Intelligence Network Troubleshooting Tools Network Efficiency Tools Control Application Chaos Control SSL Traffic Powerful Content Filtering Forget Ports & Protocols Massively Scalable Performance Patented RFDPI 22 SonicWALL CONFIDENTIAL All Rights Reserved
23 Accelerate and Optimize the Traffic Making Your Next Generation Firewall work for YOU 23 Copyright 2010 SonicWALL Inc. All Right Reserved.
24 What Does WAN Acceleration Do? WAN Acceleration Technology helps to Improve Performance of Business Applications Optimize Response Times for Critical Applications Reduce Bandwidth Consumption Reduce associated Bandwidth Costs Make the network appear faster! 24
25 The Need for WAN Acceleration Outpaced by Growing Bandwidth Requirements Traditional QoS Ineffective Application Latency Redundant Traffic Consuming Bandwidth 25
26 WAN Acceleration Methods WAN Accelera+on Traffic Shaping (Priori+ze Good vs. Bad) De- duplica3on Protocol Op+miza+on Local Caching (Internet Specific) Three approaches to make the WAN faster Prioritize Important Traffic Optimize Traffic Byte Caching Protocol Optimization Cache Files Locally 26
27 WAN Acceleration Methods WAN Accelera+on Traffic Shaping (Priori+ze Good vs. Bad) De- duplica3on Protocol Op+miza+on Local Caching (Internet Specific) SonicWALL NGFW App Intelligence and Control SonicWALL WXA N/A 27
28 Traffic Shaping Get Good Traffic WAN Acceleration Step 1 Bandwidth manage and control applications SonicWALL Application Intelligence, Control and Visualization Application signatures Identify Applications Prioritize important traffic Block or restrict unimportant traffic Goal: Allow Good Traffic at the gateway with Application Intelligence & Control 28
29 Good Traffic Acceleration WAN Acceleration Step 2 Extremely Effective on: , PowerPoint, Excel spreadsheets, Word docs, PDF SharePoint, Collaboration sites Files between 20Kb-100 s of MB+ Small Localized Changes Benefits (For Good Traffic) Eliminate redundant traffic Increase responsiveness Improve user experience 29
30 WXA Series Technology Three Key Technologies for Accelerating Good Traffic 1) Protocol Op3miza3on 2) WFS Accelera3on 3) Byte- Caching & De- duplica3on Reduce Latency Reduce Latency Increase Speed Reduce Latency Increase Speed Reduce Bandwidth Consumption 30
31 WAN Acceleration Technology Protocol Optimization Benefit: Reduces the chattiness of certain protocols like (WFS) Optimizes protocols like Windows File Sharing (WFS), FTP, Makes an intelligent decision about the nature of the traffic to eliminate latency Decreases round-trips and chattiness of certain protocols Before: WAN Acceleration With: WAN Acceleration 31
32 WAN Acceleration Technology WFS Acceleration Benefit: Improves response times and transfer speeds when copying files between remote locations (by decreasing the amount of data needing to be sent across the WAN) Acceleration for Windows File Copy protocols CIFS & SMB: Protocol names for file transfer File caching/de-duplication Metadata caching (File directory information) Active Directory Integration (The WXA becomes part of the domain) CIFS = Common Internet File System SMB = Server Message Block 32
33 WAN Acceleration Technology Byte Caching Byte Caching Process 1. The WXA appliance builds and maintains dictionaries based on most commonly passed traffic 2. Data is replaced with tokens that the remote WXA can use to recognize and reconstruct data 3. WXA Series CONVEYS data across the WAN link Performance Increases with Round-trips of the same content Frequent document access Document Collaboration Forwarding Benefit: Decreases the amount of data sent over the WAN 33
34 Technology Summary Protocol Optimization Reduce Chattiness of protocols over slow links Reduce latency WFS Acceleration Optimize windows file sharing operations Increase perceived file transfer speed and access Byte Caching Eliminate redundant traffic Increase file transfer speed Reduce bandwidth consumption 34
35 Multi-Site VPN Deployment Multiple Remote Offices connecting back to a Central Office Solution Requirements TZ/NSA appliances WXA appliances Site-to-site VPN Tunnels Results: Traffic between the sites is optimized with minimal configuration 35
36 Unified Management Interface WXA Management through host firewall interface. Firewall Takes Care of Auto-provisioning of the WXA hardware or software solution (similar to SonicPoints) WXA license management (Support) Firmware and configuration managed of the WXA appliance Health check probes of the WXA appliance Consolidated management Application Control Deep Packet Inspection WAN Acceleration 36
37 Enabling TCP Acceleration Simple Process for Easy Deployment Firewall decides what traffic needs to be accelerated Default is everything that we can accelerate Benefit: Decreases the amount of data sent over to the WXA for processing 37
38 WFS Acceleration Configure the WXA to become part of the domain Map the Shares 38
39 Demonstrating and Quantifying the Benefits of WAN Acceleration Visualizes the benefits of using WAN Acceleration 39
40 Why SonicWALL WAN Acceleration? Other WAN Accelera3on Products SonicWALL WXA Series Deployment In- Line = Point of failure One- Arm Mode = Un- intrusive Security Destroys DPI Effec+veness Cooperates with DPI Firewall " " " Management Separate Management Interface Integrated Management " " " Configura3on Complex, high chance of error Auto- provisioned by the firewall " " " Cost Rela+vely High for most SMB/SME Decreased TCO " " " Compa3bility Any Firewall SonicWALL Firewalls 40
41 Doesn t Compromise Security SonicWALL Solution Sits inside of the security boundary Provides comprehensive scanning for intrusions and malware Leverages SonicWALL DPI providing IPS/GAV/AS/App Intelligence NSA Traditional Solution Sits behind or outside of the security boundary Data coming out of the WAN Acceleration device can t be inspected by the security device Potential for malware propagation WAN Acceleration Firewall Ingress/Egress traffic Ingress/Egress traffic WXA 41
42 Improving Network Efficiencies Benefits of the SonicWALL Solution Reduce the amount of data sent between remote and branch offices Easily block undesirable applications on the network Bandwidth manage applications such as P2P and streaming audio/video Increase security through DPI scanning of all traffic Identify network inefficiencies through real-time traffic visualization Consolidated management interface App Intelligence, DPI security, WAN Acceleration, VPN, etc. 42
43 SonicWALL WXA Series WXA 500 Live CD WXA 2000 WXA 4000 WXA
44 About the WXA Series Provided as a software or hardware solution Software: WXA 500 Live CD, WXA 5000 VM Hardware: WXA 2000, WXA 4000 Requires a SonicWALL Next-Generation Firewall (NGFW) to provide integrated management Acceleration Options: TCP based Acceleration Windows File Services (WFS) Visualization shows the benefits of WAN Acceleration 44
45 SonicWALL WXA Series Overview WXA 500 WXA 2000 WXA 4000 WXA 5000 Min. SonicOS Version Recommended Users Max WAN Accel Flows ,800 Byte Caching Yes Yes Yes Yes TCP Acceleration Yes Yes Yes Yes Compression Yes Yes Yes Yes WFS Acceleration Yes 2 Yes Yes Yes Visualization TCP/WFS TCP/WFS TCP/WFS TCP/WFS 45
46 Thank You SonicWALL 46 CONFIDENTIAL All Rights Reserved
47 Appendix SonicWALL 47 CONFIDENTIAL All Rights Reserved
48 Opportunities for WAN Acceleration Target Customers for the solution: 1. SonicWALL NGFW deployments using VPN connectivity or dedicated WAN (MPLS) links Providing connectivity for single or more remote offices 2. Have insufficient bandwidth capacity Increasing bandwidth may not be an option Cost or infrastructure limitations 3. Security challenges or concerns with existing WAN Acceleration solutions Don t want to place the WAN Acceleration inside or outside of the firewall 48
49 Opportunities for WAN Acceleration Cont. Target Customers for the solution: 1. Concentration of corporate data at a central site 2. Large amounts of redundant data is being transferred between office locations Companies that rely on: SharePoint Windows File Sharing (WFS) Internal Web applications Database applications (Oracle, SQL) FTP transfers Etc..
50 Learn More Content: Datasheet Solutions Briefs White Papers Compare Models Etc.. 50
51 WAN Acceleration Terms Compression: Provides the ability for data in flight to be compressed in one location by a WAN OPT appliance, sent across a VPN tunnel and then decompressed by another WAN OPT appliance, so it can then be forwarded on to its end point on the Local Area Network (LAN). TCP Optimization: Include the ability to maximize the amount of data that is sent at a time, reduce the chattiness and enhance the error avoidance and correction being done for the TCP traffic. File caching: Provides the ability to cache files locally on the WAN Optimization appliances. File de-duplication: Provides the building of and maintaining of data dictionaries that are specific to your organization. Directory info caching: Provides the ability for the local or remote WAN Optimization appliances to cache the file directory information including icons, folder names and other information needed to render the file directory when a request is made to browse the directory. Active Directory Integration: Allows the WAN Optimization appliance to become part of the domain of the company domain. 51