Next Generation Firewall Evaluation Report. E-Class NSA Series

Size: px
Start display at page:

Download "Next Generation Firewall Evaluation Report. E-Class NSA Series"

Transcription

1 Next Generation Firewall Evaluation Report E-Class NSA Series 17 July 2012 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA

2 Table of Contents Executive Summary... 1 System Components... 3 Test Topology... 4 Product Deployment... 5 Basic Firewall Functionality High Availability Functionality User-Based Authentication Application Identification and Control User Protection Server Protection Miscellaneous Notes Summary Partners and Resources Testing Information Page i of i 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050

3 Executive Summary About Next Generation Firewalls Traditional firewalls inspect network communications at the network layer making decisions based on IP addresses, protocols and port numbers. As computer networks have become more sophisticated and applications are being pushed into the cloud, more controlled / granular access policies are needed to monitor and secure today s corporate and enterprise networks. Next Generation Firewalls provide this extended level of access control by monitoring network communications at the application layer including granular application identification and control and user-based authentication / identification as well as protecting users from modern day threats like botnets and sophisticated malware. These additional features must function properly while still providing the tried and true protection known in traditional firewall products. Product Overview The Dell SonicWALL E-Class Network Security Appliance (NSA) Series is an industry first using patented* Reassembly-Free Deep Packet Inspection (RFDPI) technology in combination with multi-core specialized security microprocessors to deliver gateway anti-virus, anti-spyware, intrusion prevention and Application Intelligence at high speed without sacrificing network performance. *U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361; 7,991,723 Areas of Evaluation Dell SonicWALL contracted ICSA Labs to evaluate the E-Class NSA Series ability to: Provide Basic Network Firewall Functionality Provide High-Availability Functionality User-Based Authentication o o Maintain own user authentication information or integrate with a third-party solution Make access control policy decisions based on user s identity Application Identification and Control o o o o o Identify a breadth of applications such as popular websites, P2P applications, chat tools, VoIP applications, etc. Identify a depth of applications such as specific components / apps of popular social media websites Maintain metadata about applications (categories, ratings, locations, etc.) Make access control policy decisions for identified applications using a combination of user identity and application metadata Make bandwidth management decisions based off of application metadata and user identification User Protection o Mitigate attacks targeting users (such as malware, botnets, application flaws / vulnerabilities, etc.) Page 1 of 31

4 o o Restrict user access to undesired locations (such as by country, network, reputational metric, etc.) Make an override / whitelist for known good IP addresses in undesired location subset ranges Server Protection o Mitigate inbound attacks targeting hosted services (SMTP, HTTP, HTTPS, SIP, etc.) False Positives o o o Mitigate attacks without negatively impacting legitimate communications Prevent user access to undesired locations without misidentification Make application-based policy decisions without misidentifying applications Summary of Findings During the course of this evaluation, Dell SonicWALL submitted signature updates which provided additional security and application identification coverage for the items listed above. The E-Class NSA Series completed this evaluation with the following functional and security effectiveness: Area of Evaluation Effectiveness User-Based Authentication % Application Identification and Control % User Protection 98.34% Server Protection 94.60% Dell SonicWALL was able to provide the above effectiveness while not impacting normal / legitimate traffic thus causing false positives. About ICSA Labs The goal of ICSA Labs is to significantly increase user and enterprise trust in information security products and solutions. For more than 20 years, ICSA Labs, an independent division of Verizon, has been providing credible, independent, 3rd party security product testing and certification for many of the world s top security product developers and service providers. Enterprises worldwide rely on ICSA Labs to set and apply objective testing and certification criteria for measuring product compliance and performance. For more information, visit. About Dell SonicWALL Guided by its vision of Dynamic Security for the Global Network, Dell SonicWALL develops advanced intelligent network security and data protection solutions that adapt as organizations evolve and as threats evolve. Trusted by small and large enterprises worldwide, Dell SonicWALL solutions are designed to detect and control applications and protect networks from intrusions and malware attacks through award-winning hardware, software and virtual appliance-based solutions. For more information, visit Page 2 of 31

5 System Components Introduction ICSA Labs requires that vendors submit for evaluation at ICSA Labs all hardware, software, and documentation that comprise the product under test. For the purposes of this document, the term product refers to the complete system submitted by the vendor to ICSA Labs to be evaluated during testing. This includes any and all documentation, hardware, firmware, software, host operating systems, management stations, etc. used during testing. Servers providing common management services such as syslog and NTP are provided by ICSA Labs and are not considered part of the product under test. This section details the components of the product (or product family) submitted by Dell SonicWALL for evaluation. All items not listed in this section, as well as any relevant components, were provided by ICSA Labs. Hardware Dell SonicWALL submitted the following hardware to ICSA Labs for this evaluation: NSA E5500 The NSA E5500 had an 8 core 550Mhz Octeon CPU from Cavium Networks with 1GB RAM and 512MB Flash. The NSA E5500 had eight 10/100/1000Base-T ports, one RJ-45 Serial port, 2 USB ports, and a dedicated HA link port. NSA E7500 The NSA E7500 had a 16 core 600Mhz Octeon CPU from Cavium Networks with 2GB RAM and 512MB Flash. The NSA E7500 had four 10/100/1000Base-T ports, four mini-gbic ports, one RJ-45 Serial port, 2 USB ports, and a dedicated HA link port. Software Dell SonicWALL submitted the following software and/or firmware to ICSA Labs for this evaluation: SonicOS Enhanced Base operating system of the product. Testing began with SonicOS Enhanced version o and concluded with version o Dell SonicWALL Security Services Dynamic security updates for Intrusion Prevention, Gateway Anti-Virus, Content Filter, Anti-Spyware. Throughout testing the Security Services were updated before each test round. Testing completed with signatures dated on or before 20 April Documentation Dell SonicWALL submitted the following documentation to ICSA Labs for this evaluation: SonicOS Administrator s Guide Rev. D December 21, 2011 SonicOS 5.8 Application Control Feature Module January 10, 2011 SonicOS Log Events Reference Guide June 28, 2011 Product Family Description As this testing is not a certification engagement, there is no certified family. However, Dell SonicWALL chose to submit the E-Class NSA Series to the same rigorous selection process as performed for their ICSA Labs Network Firewall Enterprise Certification. A representative set of models was submitted for Page 3 of 31

6 testing and listed in the Hardware section above. In order to submit a family of products for certification, the vendor must attest that: The relevant components of the vendor software, including the functional software and the operating system software, are consistent across all members of the product family The components of the management interface(s) are consistent across all members of the product family Each member in the product family has an equivalent set of functionality Differences within the product family will in no way impact the testing differently among the product family members Any changes made to any members of the Product Family must be communicated to ICSA Labs in writing via or hardcopy when the said changes become applicable to the generally available product Family Members NSA E5500 NSA E6500 NSA E7500 NSA E8500 NSA E8510 Test Topology Introduction ICSA Labs designs individual test plans for each custom test in order to simulate a realistic deployment of products in a typical end user environment. Since products submitted for testing can often be configured many different ways, ICSA Labs frequently confronts many configuration-related decisions both before and after installing products under test. For the purposes of this engagement, ICSA Labs installed and configured the products as a typical end user would and according to their intended use. The provided documentation was used to assist with all configuration decisions. The final configuration used for testing is detailed within the Product Deployment section of this evaluation report. Test Description ICSA Labs deployed both products in the test infrastructure. This test infrastructure was designed to simulate an enterprise network deployment with an untrusted segment with potentially unknown users connected to services hosted on a trusted or protected segment as well as trusted users connecting outbound through another protected segment to services / applications on an untrusted segment (i.e. the Internet). Page 4 of 31

7 Test Bed Diagram Product Deployment Introduction Products can often be configured many different ways. Therefore, ICSA Labs frequently confronts many configuration-related decisions before ever adding a single security policy rule on a product in the lab. Decisions that ICSA Labs must make often include whether or not to use: Bridge versus router mode Proxied versus filtered network services NAT versus straight-thru (non-nat) mode for outbound services Straight-thru, port forwarding, or 1-to-1 public-to-private IP mapping for inbound services DNS servers on the product itself rather than at a separate host or ISP Additional network interfaces for server protection and network segregation Detailed Findings The E-Class NSA Series was previously configured for ICSA Labs Enterprise testing. The interface IP address configuration, DNS, WINS and syslog settings were updated to conform to changes made to the test bed to help with next generation firewall Page 5 of 31

8 testing. The diagnostics configuration was accessed by browsing to a specified URL and selecting Internal Settings. Under DHCP Settings the Enable DHCP Server Network Pre-Discovery setting was enabled. Under the Firewall Settings section, the Enable Tracking Bandwidth Usage for default traffic and Protect against TCP State Manipulation DoS settings were enabled. Under the Security Services Settings section the Apply IPS Signatures Bidirectionally setting was enabled. Under the Management Settings section the Allow SonicWALL Global Management System (SGMS) to preempt a logged in administrator setting was enabled. Under the Flow Reporting section the Enable Flow Reporting and Visualization, Enable Visualization UI for Non-Admin/Config users and Allow launching of AppFlow Monitor in a stand-alone browser frame settings were enabled. After these settings were updated they were saved by clicking Apply. The Internal Settings page was then closed by clicking the Close button and the admin user was returned to the main web UI. The next Page 6 of 31

9 step was to configure the device for logging under the Log -> Categories section. The Logging Level was set to Informational and the Alert Level was set to Error. The three logging methods were enabled for all categories by clicking the topmost checkboxes in each of the Log, Alerts and Syslog columns. Two syslog servers were then added by clicking on the Syslog section and clicking Add The IP addresses were added and the syslog port was left at its default setting of UDP port 514. Page 7 of 31

10 Flow reporting was then configured by clicking on the Flow Reporting section. The Send AppFlow and Real-Time Data To EXTERNAL Collector setting was enabled and the External Flow Reporting Format dropdown box was set to IPFIX with extensions. The IP address for the external collector was entered and the rest of the settings were left at their defaults. The settings were saved by clicking Accept on the top of the page. The product was then configured so all management functions needed would be available. Under System -> Administration -> Advanced Management, the Enable SNMP setting was enabled and then the Configure button was clicked. The desired SNMP settings were then entered and the OK button was clicked. Page 8 of 31

11 The Advanced Firewall features Enable Stealth Mode, Randomize IP ID, and Decrement IP TTL were enabled under Firewall Settings -> Advanced. The Accept button was then clicked to save the settings. The Dell SonicWALL E-Class NSA Series provided three methods to authenticate users which were a Local User database, a RADIUS server or an LDAP server. For this engagement, LDAP authentication was chosen so users could be authenticated using an existing Microsoft Active Directory configuration. When a user browsed to an Internet website, the connection was intercepted by the E-Class NSA device and the user was required to supply their Microsoft Windows credentials. This method would work well, however would require users to enter their credentials more than once. The E-Class NSA device supported a method that requires the user to enter their credentials only once and it was called Single Sign On (SSO). The Dell SonicWALL SSO solution consisted of two separate components, a software agent installed on a Microsoft Windows Domain Controller (DC) and an E-Class NSA device. The software agent was called the SonicWALL Directory Connector and version was installed on the DC. Detailed installation instructions were found in the vendor supplied documentation. Configuration continued after launching the SonicWALL Directory Connector as a user in the Administrator user group. The tree in the left windows pane was expanded and the SonicWALL Appliances section was clicked. To add a new appliance the green plus image was clicked. The appliance IP address, port and friendly name were entered followed by clicking on the Generate Key button to create a random shared key. This key must be entered into the appliance to complete the configuration. The settings were saved by clicking the OK button. The next step was to configure the Dell SonicWALL E-Class NSA appliance to query the Microsoft Windows Active Directory server (AD) under the Users -> Settings section. The Authentication method for login dropdown was set to LDAP and the Configure button was clicked to open the LDAP Page 9 of 31

12 Configuration dialog. The IP address was set to the DC, the port number was set to 389 and LDAP version 3 was selected. The Give login name/location in tree radio box was clicked and a username and password of a schema administrator was entered in the appropriate text boxes. The Test tab was clicked, the credentials listed above were entered and the Test button was clicked. The test was successful so the Test Status status field indicated LDAP authentication succeeded. The final step was to configure the Dell SonicWALL appliance to communicate with the SSO Agent installed on the DC. After returning to Users -> Settings, the drop-down labeled Single-sign-on method was clicked and SSO Agent was selected. The Configure button next to this drop-down was clicked. The Add button in the SonicWALL SSO Authentication Configuration dialog was clicked to add an authentication agent. The IP address and the port number that was previously configured when installing the SSO agent on the DC were entered. Note that this is not the same as the LDAP (389) port. Page 10 of 31

13 The shared key generated when adding the Dell SonicWALL appliance to the SSO agent on the DC was entered and the OK button was clicked. The SonicWALL SSO Authentication Configuration dialog was reopened to test the configuration. The Test tab was clicked and the Test button was clicked to check the connectivity between the Dell SonicWALL appliance and the SSO agent on the DC. The test was successful so the Test Status field indicated Agent is ready. Page 11 of 31

14 After these steps were completed, security policies could be applied to users or groups of users according to their membership in an Active Directory server. The App Rules functionality was the enabled under the Firewall -> App Rules section by clicking the Enable App Rule checkbox and clicking the Accept button. The App Control setting was also verified to be enabled under the Firewall -> App Control Advanced section. After the App Control feature was enabled, an App Rule Policy was created to control what applications users in the Marketing user group could access. A policy consists of a Match Object, an Action Object and Users/Groups. The Match Object was created under the Firewall -> Match Objects by clicking Add New Match Object. Applications that the policy was configured to match were added to the list in addition to a subset of individual functions of some applications. Page 12 of 31

15 When an application defined in the Match Object is detected the device will perform some action on the traffic. Which action is performed is determined by applying an Action Object, several of which are preconfigured and can be viewed under the Firewall -> Action Objects. The device was also configured to block websites with IP addresses registered in certain countries using the Geo-IP Filter security service. Under the Security Services -> Geo-IP Filter section the Block connections to/from following countries setting was enabled. The Enable Logging checkbox was clicked and the Russian Federation IP address space was selected for blocking. Page 13 of 31

16 There was an exception added for the IP address of St. Petersburg University s website by first creating the object under the Firewall -> Address Objects by clicking Add and selecting it as a Geo-IP Exclusion Object. The Accept button was then clicked to apply the newly configured Geo-IP Filter. The Content Filtering Service was configured next under the Security Services -> Content Filter section. The Configure button was then clicked to access the configuration dialog. The Policy tab was clicked followed by clicking the Edit icon next to the default policy. In the Edit CFS Policy dialog the URL List tab was clicked. A selection of categories was chosen by clicking their corresponding checkboxes and the settings were saved by clicking the OK button in the Edit CFS Policy dialog and the configuration dialog. Page 14 of 31

17 The Gateway Anti-Virus service was configured next under the Security Services -> Gateway Anti- Virus section. The Enable Gateway Anti-Virus setting was checked as well as all the checkboxes in the protocol inspection table. The settings were saved by clicking the Accept button. The Intrusion Prevention service was configured under the Security Services -> Intrusion Prevention section. The Enable IPS setting was checked as well as all the checkboxes in the signature group table. The settings were saved by clicking the Accept button. The next step was to configure the Intrusion Prevention settings and apply the service to a zone under the Security Services -> Intrusion Prevention section. The Enable IPS checkbox was clicked as well as the Prevent All and Detect All checkboxes for the High, Medium and Low categories of attacks. The settings were then applied under the Network -> Zones section by clicking the Configure button for the LAN. In the Edit Zone dialog the Enable IPS, Enable Gateway Anti-Virus Service, Enable Anti-Spyware Service and Enable App Control Service checkboxes were clicked and the settings were saved by clicking the OK button. After all configuration settings were applied, testing commenced. Page 15 of 31

18 Basic Firewall Functionality Introduction Basic or traditional firewall functionality is the first line of defense for next generation firewalls. Blocking network layer denial-of-service attacks and properly enforcing TCP state are just some of the many functions a traditional firewall can offer. Basic Firewall Functionality is covered by ICSA Labs Network Firewall Enterprise Module Certification. This certification program is the first of its kind combining the ICSA Labs Network Firewall Corporate Module Certification requirements with additional requirements such as High Availability functionality, Voice-over-IP functional security and IPv6 requirements. The Administrative and Logging requirements are also expanded upon along with making Time and Date Acquisition requirements mandatory to provide a full feature deployment scenario allowing for a higher level of real world testing. All requirements must be met with a single configuration making it one of the hardest certifications to achieve at the writing of this evaluation report. Detailed Findings This section of the evaluation was covered by the Dell SonicWALL E-Class NSA Series Network Firewall Enterprise Module Certification. For more information on this certification, please visit: /product/sonicwall-e-class-network-security-appliance-nsa-series High Availability Functionality Introduction Network firewalls have become a critical part of the infrastructure of almost every business, small/medium business to enterprise, today. A common deployment is at the network edge making firewalls the first line of defense as well as an integral part of Internet connectivity. To provide maximum uptime, network firewalls vendors offer high availability functionality. With high availability functionality, two (or more) network firewalls work together to allow the maximum uptime possible. ICSA Labs offers High Availability Functionality testing as an optional add-on module for Network Firewall Certification, as part of the Network Firewall Enterprise Module Certification and through custom testing engagements like this one. Detailed Findings This section of the evaluation was covered by the Dell SonicWALL E-Class NSA Series Network Firewall Enterprise Module Certification. For more information on this certification, please visit: /sites/default/files/sw_enterprise_ha.pdf Page 16 of 31

19 User-Based Authentication Introduction Granular access policies have existed since the birth of network firewalls. However, as more services have moved to the Internet, it has become important to improve upon granular access control from just source IP addresses / ports, destination IP addresses / ports and services / protocols. Also, to simplify network deployment strategies, enterprise networks have employed thin client environments leveraging technologies like Microsoft Terminal Services, Citrix Xen Desktop or VMware View allowing multiple concurrent users originating from a single host in a server room or data center. To apply a granular access policy in today s enterprise environment a new solution was needed. User-Based Authentication allows for this level of granularity and can be implemented in many different ways. All access requests are first authenticated to confirm the user requesting access. Once the identity of the user is validated, a custom access policy for this user (or a security group this user is a member of) is applied. With User-Based Authentication, an employee in the marketing department can have a different access policy than an employee in accounting or human resources allowing the enterprise to have better control over Internet access and a better overall view of network activity. Detailed Findings To test User-Based Authentication, the test infrastructure was expanded to include a Microsoft Windows Active Directory environment including multiple domain controllers for the E-Class NSA Series to connect to. As every enterprise network is different and can contain more than just one client operating system, multiple operating systems were used. For a full list of operating systems tested, please see below. To continue to simulate the enterprise, users were divided into three unique groups each having their own access policies. These users made access requests from multiple operating systems. Also, multiple users made access requests originating from a single operating system to confirm the E7500 could differentiate access requests originating from a single IP address. As outlined in the Product Deployment section of this evaluation report, the E-Class NSA Series was configured to use Dell SonicWALL s SSO Agent. This agent, at the time of this evaluation, worked primarily with Microsoft Windows operating systems. This allowed users on Windows 7 or Window XP making access requests to have a seamless authentication experience. To allow users to authenticate where the SSO Agent could not be installed, the E-Class NSA Series was configured to provide a captive portal. At this captive portal, users were prompted to enter their credentials so that the correct access policy could be applied. Below is a screenshot of the captive portal a user on Ubuntu was greeted with: Page 17 of 31

20 Once the user was authenticated, an additional popup window appeared outlining the time remaining in their authenticated session as well as offering the user the ability to extend their time remaining as well as logout of their authenticated session early. The E-Class NSA Series offered an interface inside the web UI where an administrative user could view the currently authenticated users. This also allowed for the administrative user to de-authenticate any currently authenticated user. Below is a screenshot showing the web UI outlining the currently authenticated users. Note the Logout column on the right. Page 18 of 31

21 Conclusion Dell SonicWALL E-Class NSA Series The E-Class NSA initially met and continued to meet all of the requirements outlined for this evaluation with respect to User-Based Authentication without improperly categorizing legitimate requests or causing false positives. Application Identification and Control Introduction Traditional firewall functionality inspected network communications at the network layer making decisions based on IP addresses, protocols and port numbers. As computer networks have become more sophisticated and more applications have been pushed into the cloud, more controlled / granular access policies are needed to monitor and secure today s corporate and enterprise networks than ever before. Traditionally, network communications over TCP port 80 and TCP port 443 were strictly for HTTP and HTTPS respectively however this is no longer true. Today s Internet uses these ports for everything from streaming media to instant messaging to file transfers as well as Web 2.0 applications making traditional firewalling unable to apply the granular access needed to secure enterprise networks. Using User-Based Authentication to identify users, granular access policy decisions can be made at the application layer to identify and control access to online applications. Restricting user access by identity to online applications allows enterprises to allow their marketing teams to social media without needing to allow the whole enterprise. Combining bandwidth management mechanisms, enterprises identify applications consuming large amounts of Internet bandwidth and limit their impact on business critical applications. Application Identification and Control puts the power back in the hands of the enterprise and allows a complete picture of network usage while applying granular access control to allow applications that are needed while limiting, or preventing, the ones that aren t. Detailed Findings To test Application Identification and Control, a test set was created to simulate enterprise user activity. This test set included hundreds of Internet based applications / websites that were accessed to measure the E-Class NSA Series ability to identify the application or website and control access to it based on the configured access policy. As outlined in the Product Deployment section of this report, the E-Class NSA Series was configured to authenticate users and apply a security policy, based on their identity, to limit access to categories of online applications as well as provide granular control functionality of allowed applications. Based on the user s identity, they were configured to be in one of three user groups (Finance, Marketing or IT). The Finance user group was only allowed access to business related websites and applications. The Marketing user group was allowed to everything Finance was allowed to as well as to social media websites and applications. However, the Marketing group was not allowed to use all features of popular social media websites and applications. As an example, the Marketing users were allowed to access Facebook to post status updates and use messaging to communicate with customers. However these users were not allowed to play the online games Facebook offers. The IT user group was allowed access to everything Finance and Marketing could access and there was no restriction on their Internet access. Page 19 of 31

22 As such, they were allowed to access online gaming, streaming media such as Pandora and Grooveshark, instant messaging such as Google Talk and web mail such as Yahoo and Gmail. IT users application utilization was still identified however no access, including items like Facebook games and Twitter posts, was prevented. A common way to help prove, or confirm, an online identity to a user is to employ SSL certificates. SSL certificates provide a way to communicate securely between a client and server as well as when signed by a trusted Certificate Authority, or CA, a user can validate the identity of the website or application attempting to communicate securely. However, a common practice to evade security access policies is to use encrypted communications to avoid inspection. Without the security product having an ability to decrypt this traffic and compare it to the configured security policy, a user who is to be protected or restricted to a location could use this technique to bypass the configured protection. To avoid detection and use Facebook, a Finance user could go to instead of To prevent this evasion, the E-Class NSA Series was configured to act as a man-in-the-middle for SSL connections. This meant that the client issuing the SSL connection would initiate a connection with the E-Class NSA Series, instead of the actual application it is trying to connect to, and the E-Class NSA Series would initate its own connection with the destination application. Using the DPI-SSL configuration, the E-Class NSA Series was configured to inspect all SSL client connections. Page 20 of 31

23 This allowed the E-Class NSA Series to decrypt all SSL connections, inspect the content, and compare it to the enforced security access policy. With the E-Class NSA Series in the middle of the SSL connections, users would receive SSL certificate errors. To adddress this, the E-Class NSA Series included a CA certificate that could be used and was added to the browsers and operating systems of the protected users. With the E-Class NSA configured as a trusted CA on the user computers, users could access applications using SSL without SSL certificate errors. Once configured, users protected by the E-Class NSA began to access the Internet from the operating systems identified in the User-Based Authentication section of this report. Users in all groups attempted to access applications and websites that they were allowed to as well as were denied to by the configured security policy. For example, Finance users attempted to access Facebook while Marketing users attempted multiple ways to access Mafia Wars and Farmville. While the Finance and Marketing users attempted to bypass the enforced policy, IT user access was confirmed to be identified however not improperly blocked. Also, bandwidth management was applied to certain categories of applications, such as peer-to-peer applications, limiting the amount of bandwidth they were allowed to consume. The E-Class NSA Series also included metadata about applications tested during this evaluation. Below is a screenshot of the metadata about YouTube. The E-Class NSA contained several different options for viewing application utilization other than viewing log events. One of these was the built-in AppFlow Monitor. This was located inside of the E-Class NSA Series web UI and allowed the administrative user to view current application usage by application or by user. An administrative user could also continue to drill down using the menu to select utilization of a specific user. Page 21 of 31

24 Conclusion The initial round of testing, noted by a 1 in the graph below, found the E-Class NSA Series initially 83.02% effective at identifying and controlling access to applications. This was accomplished without improper categorization of any applications tested. In general, the initial round of testing showed that the E- Class NSA Series was able to detect the majority of the applications tested however issues were discovered around identifying and controlling components of social media applications / websites thus impacting the overall effectiveness score. Dell SonicWALL was provided with a list of application identification and control misses and allowed to submit signature updates to improve their overall effectiveness. The E-Class NSA Series completed this part of the evaluation identifying and controlling 100% of the applications tested, noted by a 3 in the graph to the right, with no improper categorization. This included components of social media applications / websites. Furthermore, identifying and properly controlling bandwidth utilization was also successful. Page 22 of 31

25 User Protection Introduction The threat landscape has changed over the past several years putting enterprise users in the crosshairs of everyone from novice script kiddies to large organized crime syndicates. From the computers being used to the applications and services enterprises rely on each day, it is easy to understand why this has become such a large attack surface. Attacks enter the enterprise network in various forms. They can start as a downloaded piece of malware, a phishing with malicious attachments or URLs, or can be unsafe websites or locations on the Internet. Regardless of the entry point, these types of attacks can be combined together into rootkits giving the attacker, whether novice or expert, remote access to the protected network. This leads to everything from additional protected machines being compromised to sensitive data being stolen. To protect users, next generation firewalls need to be able to detect and prevent malware, exploits targeting application vulnerabilities and restrict access to undesirable locations. A combined approach, such as this, can provide overall security coverage for the enterprise. Detailed Findings To test User Protection, a collection of security concerns was tested. First, a test set of attacks targeting application vulnerabilities was developed. This set included remotely exploitable, high-severity vulnerabilities found in common user applications and operating systems spanning the last three years with all having a Common Vulnerability Scoring System, or CVSS, score of 7 (out of 10) or greater. The test set was weighted most heavily with vulnerabilities in software developed by popular developers including Microsoft, Adobe, Mozilla, and Oracle. To develop test cases for the vulnerabilities selected, a variety of sources was researched. The pie chart to the right outlines the distribution of the vulnerability set across software vendors. Before building any test cases, all vulnerabilities to be used as part of this, or any engagement, are researched and the vulnerable applications, services and operating systems are acquired. This allows for a better understanding of what is being tested as well as allows all test cases to be validated on the actual vulnerable target (i.e. application, service or operating system) and not rely on a third party tool to confirm exploitation. Once this research is completed and the actual target application, service or operating system is running in the lab, popular sources of information available online are used to retrieve proof-of-concept, or PoC, examples of how to exploit a target susceptible to the vulnerability in question. Sometimes, these PoC examples, as provided, do not actually exploit the vulnerable target. The ICSA Labs Vulnerability Research Team uses its knowledge of the vulnerability to correct the PoC example so that it works as expected. Next, commercial testing tools, such as Core Impact, are used to capture a baseline of commercial attacks available that exploit the vulnerable target. This includes open source projects such as Metasploit which have commercial support available. As the previous test cases are developed using publicly available, community based or commercially based attack test cases, a vendor could do their due diligence and download or buy any or all of the sources used prior to this stage of the test case development and provide exploit based coverage protection. To confirm the product under test is providing the fullest protection possible for the vulnerabilities being tested, ICSA Labs develops its own attacks targeting these vulnerabilities. As with all Page 23 of 31

26 of the previous test cases, these attacks are confirmed to exploit the vulnerability they are designed for by using the actual vulnerable target. Once this process is completed, the test set generation is complete. As outlined in the Product Deployment section of this report, the E-Class NSA Series was configured to detect and block for low, medium and high priority attacks. Once configured, a baseline of normal / legitimate traffic was run to confirm connectivity was functioning as expected. To confirm the configuration was correct, a baseline set of attacks targeting a small set of vulnerabilities (not included in the actual test set outlined above) was executed to confirm the E-Class NSA Series was detecting and preventing attacks as expected. With the configuration confirmed, testing commenced. A mixture of normal / legitimate traffic along with attack traffic (targeting the collection of vulnerabilities selected) was introduced. This normal traffic accessed similar functionality of the vulnerable applications and operating systems that the exploits targeted however did not include any attack vectors. Initially, the E-Class NSA Series was found to be 86.10% effective, as noted by the 1 in the graph to the left, at detecting and preventing attacks targeting the vulnerabilities selected. Dell SonicWALL was provided a list of vulnerability misses and allowed to provide signature updates to improve the overall security protection effectiveness. This evaluation completed with the E-Class NSA Series providing 91.70% security effectiveness, as noted by the 3 on the graph to the left, targeting user application and operating system vulnerabilities. Next, the ability to detect and prevent malware related attacks was tested. A collection of malware that was considered in-the-wild was used to create the test set. The test set was initially based off of the current traditional WildList and the current Extended WildList as well as other malware samples considered relevant by ICSA Labs. Starting with hundreds of samples as a base, the samples selected were replicated, where applicable, as well as verified to confirm that they were malicious in nature. If samples were polymorphic, they were replicated through multiple generations to confirm that the E-Class NSA could detect a variety of samples of polymorphic malware. When the test set generation process was completed, the test set included thousands of malware samples. As outlined in the Product Deployment section of this report, the E-Class NSA Series was configured to scan and block all malware related traffic for all protocols both inbound and outbound using the Gateway Anti-Virus settings. To test the malware effectiveness, a collection of files including both normal / legitimate files (i.e. known, not malicious files) as well as samples from the test set were downloaded through the E-Class NSA Series. All connections were confirmed to be terminated or, in the cases where the connection completed, any remnants downloaded were confirmed to not match the original sample and be modified in some sort of fashion. The bar graph below outlines how the E-Class NSA Series performed with respect to the original sample list (in blue) compared to the test set (in red) defined above. Page 24 of 31

27 During the initial round of testing, the E-Class NSA Series provided 83.22% coverage protection, as noted by the 1 in the chart to the below, for the malware test set and 99.59% against the original samples prior to the test set generation process. The reason for this discrepancy in the coverage protection revolves around polymorphic samples. The majority of the misses from the test set were polymorphic samples thus only accounting for a small number prior to replication in the original sample list. At the end of the initial round of testing, Dell SonicWALL was provided with a list of misses based on the original sample name on the original sample list as reported In-The-Wild. Once Dell SonicWALL confirmed the reported issues were addressed, the E-Class NSA Series was retested. This evaluation completed with the E-Class NSA Series providing % security effectiveness for malware protection. Lastly, the ability to restrict access to undesirable locations was tested. As outlined in the Product Deployment section of this report, the E-Class NSA Series was configured to block categories of websites based on their content as well as was block connections based on their geographical location. To build the undesirable locations test set, categories of websites were selected and URLs meeting the requirements were selected. Also, to add in additional undesirable location data, research was performed to find and validate services running in locations blocked via geographical location. Connection attempts were made to locations that should be allowed and should be denied based on the configured policy. Connection attempts included HTTP, DNS, SMTP and Telnet to ensure proper blocking across various service types. To the right is an example of what a user received when accessing a blocked website via the security access policy. This included connection attempts to locations that were in the geographically blocked location however were overridden, or whitelisted, via the configured policy. During the initial round of testing, the E-Class NSA Series provided 63.86% coverage protection, as noted by the 1 in the graph to the left, for undesirable locations. The majority of the coverage protection misses related to content filtering with the geographical location providing 100% coverage during the initial and subsequent testing rounds. Dell SonicWALL was provided with a list of misses along with a description of the configuration to help with their investigation. Once Dell SonicWALL confirmed the reported issues were addressed, the E-Class NSA Series was retested. This evaluation completed with the E-Class NSA Series providing % security effectiveness, as noted by the 3 in the graph to the left, for blocking undesirable locations. Page 25 of 31

28 Conclusion The areas discussed above, when combined, provide an overall view of User Protection. Application vulnerabilities, malware and undesirable locations are combined together to create exploit root kits as well as botnets. Failure to provide adequate coverage in one area may compromise the effectiveness of the others thus leaving users without proper protection. To conclude the overall view of the effectiveness of the E-Class NSA Series, all areas were combined into one single security effectiveness percentage. The initial round of testing showed the E-Class NSA Series provided 83.96% effectiveness, as noted by the 1 in the chart to the right, in providing User Protection. During the course of testing, Dell SonicWALL was able to provide updates to improve the overall effectivess at detecting and blocking attacks related to User Protection. This evaluation completed with the E-Class NSA Series providing 98.34% security effectiveness, as noted by the 3 in the chart to the right, for blocking attacks targeting users. This security effectiveness was accomplished without negatively impacting normal / legitimate traffic causing false positives. Server Protection Introduction Enterprises rely on network based communications to perform essential day to day operations of their businesses. These services are available on more than just the local area network, or LAN. Almost every business today uses technology to communicate with their customers, business partners or resellers as well as perform ecommerce transactions or manage their finances. To make this all possible, network servers are deployed offering enterprise users the ability to communicate with each other and the world at large. To allow the enterprise network to participate in the larger Internet community, enterprise servers are deployed in an Internet facing de-militarized zone, or DMZ, and accessed by potentially unknown Internet users. These public facing services can be anything from the web server hosting the enterprise s website to the enterprise s mail server and even application servers hosting ecommerce applications and Voice-over-IP, or VoIP, phone systems. Furthermore, as client operating systems and network deployments have become more sophisticated, any host on the network can operate as a server. This includes endpoint protection client software deployed on an employee laptop opening a TCP socket to listen for commands from the central administrative software to the client operating system, by default, listening for Windows SMB connections. Enterprises need to secure and monitor their networks. These organizations are faced with protecting themselves at several, often dissimilar, points in their networks against a myriad of threats. They need a means to not only block malicious attackers entering through perimeter Internet and wide area networks, or WAN, connections but also to prevent the exploitation of network resources by valid users who either unknowingly or purposefully introduce compromised equipment or exploits into the core of an organization s network. Page 26 of 31

29 Detailed Findings Dell SonicWALL E-Class NSA Series To test Server Protection, a collection of relevant vulnerabilities was selected. This set included remotely exploitable, high-severity vulnerabilities found in enterprise software spanning the past three years with all having a Common Vulnerability Scoring System, or CVSS, score of 7 or greater. The test set was weighted most heavily with vulnerabilities in software developed by popular developers including Microsoft, HP, Oracle, Symantec, CA, IBM, McAfee, Novell, etc. as well as important industry verticals like power (i.e. supervisory control and data acquisition or SCADA). To develop test cases for the vulnerabilities selected, a variety of sources was researched. The pie chart to the right outlines the distribution of the vulnerability set across software vendors. Following the methodology outlined in the User Protection for test set generation, a Server Protection test set was created targeting services and server operating systems. As outlined in the Product Deployment section of this report, the E-Class NSA Series was configured to detect and block for low, medium and high priority attacks. Once configured, a baseline of normal / legitimate traffic was run to confirm connectivity was functioning as expected. To confirm the configuration was correct, a baseline set of attacks targeting a small set of vulnerabilities (not included in the actual test set outlined above) were executed to confirm the E- Class NSA Series was detecting and preventing attacks as expected. With the configuration confirmed, testing commenced. A mixture of normal / legitimate traffic along with attack traffic (targeting the collection of vulnerabilities selected) was introduced. This normal traffic accessed similar components of the vulnerable systems that the exploits targeted however did not include any attack vectors. This mixture of traffic was repeated in both directions to confirm, regardless of direction, the E-Class NSA Series would provide protection. Conclusion During the initial round of testing, the E-Class NSA Series provided 82.40% security coverage protection, as noted by the 1 in the graph to the right, for the vulnerabilities selected. Dell SonicWALL was provided with a list of vulnerability misses, by Common Vulnerabilities and Exposures Identifier, or CVE ID, and allowed the opportunity to provide signature updates to improve on their Server Protection security coverage protection effectiveness. Once Dell SonicWALL confirmed the reported issues were addressed, the E-Class NSA Series was retested. This evaluation completed with the E-Class NSA Series providing 94.60% security coverage protection effectiveness, as noted by the 3 in the graph to the right, for the vulnerabilities selected. This high effectiveness was accomplished without negatively impacting normal / legitimate traffic causing false positives. Page 27 of 31

30 Miscellaneous Notes Introduction Factual observations, general notes, and/or specific comments collected during testing that did not fall neatly into one of the preceding sections are included below. Note that all observations and comments that follow may have no direct bearing on the evaluation results. The information is presented as it may be useful to enterprise end users. Detailed Findings The E-Class NSA Series performed well while blocking traffic to / from geographical locations deemed unsuitable, for the purposes of this engagement, for enterprise users. There was one observation made that created a race condition and could potentially allow content that was to be blocked to be allowed. When a new request was made to a geographical location that has not yet been accessed or has not been accessed for some time, the E-Class NSA Series would perform its lookup in parallel to the new connection. If the new connection completed before the E-Class NSA Series received a response from the Dell SonicWALL Security Services, the user making the request would not know this connection was to be blocked. This was possible to do if the connection was small like a DNS request. Also, if an HTTP request was made directly to a website that should have been blocked using its IP address instead of the fully qualified domain name, or FQDN, part of the content of the website would be displayed before the connection was terminated by the E-Class NSA Series. The E-Class NSA Series had several different methods of logging various categories of events. During this evaluation, three methods of logging were used. These were the local logging in the web UI, exporting log events using syslog and exporting the log events using external flow reporting via IPFIX. Syslog and external flow reporting relied on separate hosts that received events over a network connection. The local logging method stored events in some form of transient memory which could be viewed via the web UI. This memory could only hold a few hundred log events before it exhausted its resources and started overwriting data. For this reason, the majority of this evaluation relied on the external logging options as it was beneficial to have a larger logging storage. A CentOS workstation, provided by ICSA Labs, was used for receiving and storing logged events sent via syslog. To capture IPFIX data and report on it, Dell SonicWALL provided licensing for the Dell SonicWALL Scrutinizer with Flow Analytics which was installed onto a Windows VM provided by Dell SonicWALL. This product offered advanced reporting functionality not covered directly as part of this evaluation. For more information on it and its capabilities, please visit Dell SonicWALL s website. Below is a screenshot of Scrutinizer web UI. Page 28 of 31

31 To provide complete Application Identification and Control, a combination of App Rules and Content Filter Policies were needed. At the end of this evaluation, Application Identification and Control as well as content filtering testing completed with % security effectiveness. Summary Dell SonicWALL completed all tests included in this next generation firewall evaluation. During the course of this evaluation, Dell SonicWALL submitted signature updates which provided additional security and application identification coverage to improve their overall detection / prevention coverage effectiveness. The E-Class NSA Series completed this evaluation with the following functional and security effectiveness: Area of Evaluation Effectiveness User-Based Authentication % Application Identification and Control % User Protection 98.34% Server Protection 94.60% Dell SonicWALL was able to provide the above effectiveness while not impacting normal / legitimate, traffic thus causing false positives. Page 29 of 31

32 Partners and Resources Introduction This evaluation was made possible through the use of ICSA Labs partnerships, commercial tools, open source tools and resources available on the Internet. The following is a list of partnerships, tools and resources used during this evaluation. Commercial Partnerships Open Source Projects / Other Commercial Tools Other Research Sources Page 30 of 31

33 Testing Information This report is issued by the authority of the Managing Director, ICSA Labs. Tests are done under normal operating conditions. Please visit for the most current information about this and other products. Lab Report Date 17 July 2012 Test Location ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA Product Developer s Headquarters Dell SonicWALL 2001 Logic Drive San Jose, CA The test methods used to produce this report are accredited and meet the requirements of ISO/IEC as verified by the ANSI-ASQ National Accreditation Board/ACLASS. Refer to certificate and scope of accreditation number AT Testing reports shall not be reproduced except in full, without prior written approval of ICSA Labs. All other product, brand and company names in this document are trademarks or registered trademarks of their respective companies. Page 31 of 31

What to Look for When Evaluating Next-Generation Firewalls

What to Look for When Evaluating Next-Generation Firewalls What to Look for When Evaluating Next-Generation Firewalls Using independent tests to compare performance, cost and functionality Table of Contents Why Use Independent Tests in Evaluations?... 3 What to

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

SonicOS 5.9 One Touch Configuration Guide

SonicOS 5.9 One Touch Configuration Guide SonicOS 5.9 One Touch Configuration Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Applications erode the secure network How can malware be stopped?

Applications erode the secure network How can malware be stopped? Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc. SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Contents. Release Purpose. Platform Compatibility. SonicOS 5.8.4.0 TZ 105 / TZ 205 Series Release Notes. SonicOS

Contents. Release Purpose. Platform Compatibility. SonicOS 5.8.4.0 TZ 105 / TZ 205 Series Release Notes. SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Browser Support... 2 Enhancements in SonicOS 5.8.4.0... 2 Supported Features by Appliance Model... 3 Known Issues... 5 Resolved Issues...

More information

Analyzer 7.1 Administrator s Guide

Analyzer 7.1 Administrator s Guide Analyzer 7.1 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Configuration Guide. Websense Web Security Solutions Version 7.8.1

Configuration Guide. Websense Web Security Solutions Version 7.8.1 Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying

More information

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Using Palo Alto Networks to Protect the Datacenter

Using Palo Alto Networks to Protect the Datacenter Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular

More information

STARTER KIT. Infoblox DNS Firewall for FireEye

STARTER KIT. Infoblox DNS Firewall for FireEye STARTER KIT Introduction Infoblox DNS Firewall integration with FireEye Malware Protection System delivers a unique and powerful defense against Advanced Persistent Threats (APT) for business networks.

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data.

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data. Controlling Webmail Tech Note Overview Webmail interfaces are widespread and available from search providers (Yahoo, Google), software vendors (Microsoft s Hotmail), social networking sites (Myspace, Facebook),

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Single Sign-On in SonicOS Enhanced 4.0

Single Sign-On in SonicOS Enhanced 4.0 Single Sign-On in SonicOS Enhanced 4.0 Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS Enhanced 4.0. This document

More information

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser) 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Chapter 4 Firewall Protection and Content Filtering

Chapter 4 Firewall Protection and Content Filtering Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with Web content filtering options such as Block Sites and Keyword Blocking. Parents and network administrators

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

User Manual. ALLO STM Appliance (astm) Version 2.0

User Manual. ALLO STM Appliance (astm) Version 2.0 User Manual ALLO STM Appliance (astm) Version 2.0 Table of Contents 1. Introduction... 1 1.1. Overview:... 1 1.2. STM Deployment Considerations... 3 2. Initial Setup & Configuration... 4 2.2. Default Configuration...

More information

Analyzer 7.2 Administrator s Guide

Analyzer 7.2 Administrator s Guide Analyzer 7.2 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.

ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4. ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Single Sign-On. Document Scope. Single Sign-On

Single Sign-On. Document Scope. Single Sign-On Single Sign-On Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS 5.1 Enhanced. This document contains the following

More information

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Chapter 4 Firewall Protection and Content Filtering

Chapter 4 Firewall Protection and Content Filtering Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.

More information

Deploying F5 to Replace Microsoft TMG or ISA Server

Deploying F5 to Replace Microsoft TMG or ISA Server Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security

More information

SonicOS 5.8.1.2 Release Notes

SonicOS 5.8.1.2 Release Notes SonicOS Contents Contents... 1 Platform Compatibility... 1 Geo-IP and Botnet Filter are Now Licensed Services... 2 Supported Features by Appliance Model... 4 Browser Support... 6 Known Issues... 7 Resolved

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

M2M Series Routers. Port Forwarding / DMZ Setup

M2M Series Routers. Port Forwarding / DMZ Setup Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Palo Alto Networks User-ID Services. Unified Visitor Management

Palo Alto Networks User-ID Services. Unified Visitor Management Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

QUICK START GUIDE. Cisco C170 Email Security Appliance

QUICK START GUIDE. Cisco C170 Email Security Appliance 1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance

More information

Deployment Guide for Citrix XenDesktop

Deployment Guide for Citrix XenDesktop Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

Contents. Platform Compatibility. SonicOS

Contents. Platform Compatibility. SonicOS SonicOS Contents Platform Compatibility... 1 Licensing... 2 Key Features... 2 Known Issues... 5 Resolved Issues... 7 Upgrading SonicOS Image Procedures... 8 Related Technical Documentation... 13 Platform

More information

Deployment Guide for Microsoft Lync 2010

Deployment Guide for Microsoft Lync 2010 Deployment Guide for Microsoft Lync 2010 Securing and Accelerating Microsoft Lync with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...3

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Platform Compatibility... 1 Key Features... 2 Known Issues... 4 Upgrading SonicOS Image Procedures... 6 Related Technical Documentation...

Platform Compatibility... 1 Key Features... 2 Known Issues... 4 Upgrading SonicOS Image Procedures... 6 Related Technical Documentation... SonicOS SonicOS Enhanced 5.6.5.0 Early Field Trial Release Notes Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 4 Upgrading SonicOS Image Procedures... 6 Related Technical Documentation...

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information