1 Secure Management Through Firewalls Jim Doble, CISSP Tavve Software Co. Tavve Software Co. One Copley Parkway Suite 480 Morrisville, NC
3 Secure Management Through Firewalls Executive Summary Firewall-based network partitioning is a well established and sometimes mandated security practice, but creates a dilemma for management professionals seeking to provide a centralized, comprehensive, and unified infrastructure for managing network devices and servers across the enterprise. Centralized management applications typically rely on the ability to communicate with devices and servers across the enterprise using ubiquitous management protocols, such as ICMP and SNMP, but security professionals typically resist creating firewall rules to allow management protocols, and rightly so, because these protocols were defined years ago and typically lack the security mechanisms required in today s threat environment. So how can companies leverage their existing management infrastructure across the entirety of their firewallpartitioned network, without compromising security? This white paper will: 1. Explore security concerns associated with managing firewall-partitioned networks. 2. Evaluate solutions for managing firewall-partitioned networks. 3. Demonstrate how Tavve s ZoneRanger appliance can be used as a management proxy firewall to extend the reach of management applications, without compromising security. Introduction Ongoing evolution of enterprise security and management practice has resulted in a tension between the two: Security practitioners deploy firewalls in order to control and limit flow of information between network zones of trust. Management protocols such as ICMP and SNMP are typically prevented from passing through the firewall, because they are old, and relatively insecure. Management practitioners rely on the flow of management information between centrally deployed management applications and the network infrastructure devices and servers distributed throughout the network. Firewalls present an obstacle, blocking the flow of information necessary for management. If firewalls are configured to allow the flow of management protocols, security is reduced. If management protocols are blocked, the ability to provide centralized, unified management is severely compromised. What is needed is a solution that resolves this tension, enabling centralized management while not compromising on security. The use of firewalls to partition networks based on zones of trust is a well established and sometimes mandated security practice. Notwithstanding the sensational headlines and startling statements associated with groups such as the Jericho Forum, firewalls do not appear to be going away any time soon. At the same time that some talk about de-perimeterizing the network, we have industry standards, such as the Payment Card Industry Data Security Standard (PCI DSS) mandating the use of firewalls (i.e. separating the portion of the enterprise network that deals with credit card information from the portion that does not). Firewalls essentially serve to block undesirable, unexpected, or inherently high-risk traffic from passing between network zones that are trusted to different degrees. For example, many companies deploy their internet-facing servers and infrastructure within a demilitarized zone or 1
4 DMZ, with a firewall separating this zone from the rest of the corporate network. The rationale is that the internet-facing servers are subjected to less controlled and therefore more dangerous traffic, and have a higher risk of compromise. Deploying these servers in the DMZ, reduces the likelihood that compromise will spread further into the corporate network. Similar arguments have been used to suggest that groups of computers handling human resources, accounting, or other sensitive information be deployed within their own firewall-protected zones. As a result, the trend is toward highly partitioned enterprise networks, as illustrated in Figure 1. Figure 1: Enterprise Network Partitioning Internal firewall-based network partitioning creates a problem for management professionals seeking to provide a centralized, comprehensive, and unified infrastructure for configuring, monitoring, and controlling network devices and servers across the whole enterprise. Management practice tends to rely heavily on a suite of sophisticated management applications, which serve to automate the wide variety of tasks required to manage devices: monitoring status, collecting events and statistics, modifying configurations, and much more. These applications typically use ubiquitous management protocols, such as ICMP and SNMP, to monitor and control the devices they are managing. In order to manage the whole enterprise, a centralized management application deployed in one zone must be able to communicate with all managed devices, regardless of their network location. If the management application and the device to be managed are deployed in different zones, the internal firewall becomes an obstacle, blocking the flow of information between management applications and the devices they are managing, and defeating the goal of centralized management. The reason why security personnel prefer to block management protocols is that many of them are relatively old, having been defined in the days when the Internet was new, and security was not a significant concern or consideration. As an example, the ICMP protocol, which is neither encrypted not authenticated, defines an ICMP Redirect packet that can be used to instruct a host to send traffic destined for a given IP address range to a different gateway address. Who, at the time, would have imagined that this message could be used to facilitate malicious traffic sniffing and man-in-the-middle attacks? Initial versions of SNMP that are still in common use are not encrypted, and are weakly authenticated using community strings. It is trivial for an attacker to sniff the SNMP traffic, obtain the community string, then start sending its own SNMP Get and Set
5 requests to obtain detailed device information, or worse, change configuration settings. In the eyes of a security practitioner, today s management protocols simply pose too great a risk. So here is where we are: departments responsible for management have invested heavily in centralized management applications and infrastructure and need to leverage that investment across the entire enterprise; departments responsible for security are equally attached to their firewalls, and do not want to open them up to any traffic that might be perceived as a threat. Something has got to give. When confronted with this dilemma, enterprises have historically employed a variety of less than ideal approaches to more or less work around the issue. The prevalent approaches are discussed in the following section. Workaround Approaches The various approaches that have historically been used to work around the problem of managing through firewalls can be summarized as follows: 1. Ad-hoc Management In some companies, where the security department has sufficient clout, all traditional management protocols will be blocked at the firewall, as shown in Figure 2. Figure 2. Management Protocols Blocked at the Firewall In such cases, the department responsible for management will frequently resort to ad-hoc management of devices located in network zones that cannot be reached from the centralized management applications: Unreachable network zones are treated as a special case with respect to management. Device status can be periodically monitored via SSH or Telnet. Device configuration changes are applied manually. The fundamental characteristic of ad-hoc management is that devices in unreachable zones are managed differently, with different tools and/or procedures, which essentially defeats the goal of unified, centralized management. If the ad-hoc procedures used to manage these devices are not as strong or rigorous as those used in the reachable portion of the network, there is an increased risk that outages and/or performance degradation in the unreachable zones may go undetected for significant periods of time, potentially resulting in negative financial impact to the business.
6 2. Define Firewall Rules If you ask a management application vendor how to extend the reach of their application beyond a firewall, they will typically recommend that you define firewall rules so that the required management protocols are able to pass through the firewall, between management application servers and managed devices. Figure 3. Management Protocols Allowed by the Firewall While this sounds simple enough in the context of a single application, the reality, in the typical enterprise, is far from simple. First of all, each management application may use multiple protocols, each of which defines its own ports. As a result, multiple rules are needed just to allow a single management application server to communicate with a single managed device, as shown in the following figure. Figure 4. Multiple Ports On top of that, considering that most enterprises will have hundreds of devices in unreachable zones that need to be managed, and will typically use multiple management applications to manage these devices, the number of firewall rules required can become quite large, as illustrated in the following figure.
7 Figure 5. Multiple Ports, Multiple Applications, Multiple Devices There are a number of problems that arise when defining a large number of firewall rules. First of all, the initial effort to define the rules is large. The more rules you have, the more likely it is that someone will make a mistake. Remember that complexity is the enemy of security. The administrative overhead to maintain these rules over time will also be significant. Due to the associated security impact, some companies require approval by standing committees for any firewall configuration changes. As a result, the cost of making necessary ongoing changes will be high, and the time required to complete the approval process will lead to delayed projects and a perception that the IT department is unresponsive to business needs. The other problem with allowing management protocols to pass through the firewall is that the management protocols themselves lack essential security mechanisms. Many of these protocols were defined in the early days of the Internet, when the kinds of security threats we face today simply had not been imagined, and as a result security was not viewed as a high priority. A high-level security analysis of several commonly used management protocols, as shown in Table 1, illustrates this point. Authentication Encryption Easy to Spoof ICMP None None Yes SNMP v1 / v2c Simplistic None Yes SNMP v3 Good Good No Syslog None None Yes NetFlow None None Yes SFlow None None Yes TFTP None None Yes FTP In the Clear None No HTTP In the Clear None No HTTPS Good Good No Telnet In the Clear None No SSH Good Good No Table 1. Security Analysis of Common Management Protocols
8 If management protocols had little power and were essentially harmless, their lack of security mechanisms would be less of a concern. Unfortunately, management protocols are in fact very powerful, and can be used by a hacker to obtain valuable information about a network, modify device configurations, manipulate the flow of traffic through the network, and open the door to a wide range of follow-on attacks. The fundamental problem here is that the security mechanisms provided by management protocols are not commensurate with their power. They are like power tools without the safety guards. As a result, even if the administrative effort required to configure the firewalls to allow management protocols can be justified, in doing so, the overall security of the enterprise network is diminished. 3. Management VPN A management Virtual Private Network (VPN) can also be used to extend the reach of a management application into a firewall-partitioned network zone. The simplest form of this approach is to install a VPN client on each management application server, and a VPN server in the unreachable network zone as illustrated in the following figure. Figure 6. Management VPN The VPN client within each management application server can be configured to intercept traffic destined for managed devices in the unreachable network zone and relays this traffic via an encrypted link to the VPN server, which relays the traffic to the managed devices. Similarly, the VPN server is configured to route traffic originated by the managed devices to the VPN clients associated with the intended management application servers. A management VPN can significantly reduce the number of firewall rules that need to be configured: There is no need to configure rules for multiple ports; only the port used for communications between VPN client and the VPN server is required. There is no need to configure rules for each managed device; by providing a rule for a given VPN server, management applications are able to effectively reach all managed devices that are reachable by that VPN server. While a management VPN can simplify firewall configuration, the same security concerns remain that were described for the Define Firewall Rules approach, because the VPN allows fundamentally insecure management protocols to pass between the network zones. The VPN server will typically be a general-purpose network device that is not aware of the nature and behavior of management protocols. In the absence of more specific additional configuration, a VPN server will typically pass any network traffic on any port, whether or not that traffic is related to management, which is considerably less secure than defining firewall rules. Some VPN solutions may allow you to configure access control rules limiting the ports that can be
9 accessed for given managed devices, but at that point you are effectively doing the equivalent work of defining firewall rules without providing any added security benefit. 4. Application-Specific Probes or Agents Another strategy that management application vendors can use to extend the reach of their application through firewalls is to provide probes or agents that can be deployed in the unreachable network zone, and can communicate back to the centralized management application server using a secure encrypted link, as shown in the following figure. Figure 7. Application-Specific Probes or Agents Even though this approach still requires configuration of firewall rules to allow the probes and agents to communicate with the centralized management application servers, the number of rules that need to be configured is significantly reduced (one port per pair of communicating entities as opposed to multiple ports), and by using a secure encrypted link, the associated security risk is minimized. The problem with this approach is that management application vendors typically develop their own probe or agent that only works with their own application. As a result, if you are using multiple management applications as most companies do you will end up having to deploy multiple probes or agents in each network zone, one for each management application that you use, as illustrated in the following figure.
10 Figure 8. Multiple Application-Specific Probes or Agents As the number of probes and agents you need to deploy increases, your costs go up, and the complexity of your management environment increases as well. In addition, the probes and agents provided by different management application vendors will provide different levels of security, and you will need to evaluate each one independently, in order to ensure that your needs are met. Some may provide a good degree of security, while others may be weak in this area, because it is not their primary area of expertise, or perhaps because their product is relatively new to the market. In a highly secure environment, you may need to perform penetration testing for each different probe or agent, and as the number of probes and agents increases, the cost/time to perform this testing will increase as well. 5. Management Application Replication Another approach that can be used to manage multiple firewall-partitioned network zones is to install and operate a separate instance of each required management application within each network zone, as illustrated in the following figure. Figure 9. Management Application Replication The advantage of this approach is that all network zones are fully managed without needing to open up the firewalls to allow management traffic. The primary disadvantage is that it defeats the ultimate management goal, which is to provide a single unified view of the entire enterprise network.
11 This approach can also be very expensive, depending on the licensing arrangement that you have with your management application vendors. If you have paid a fixed price for a corporate licenses, the additional costs may be manageable, but if you are paying on a perinstance basis, this approach can rapidly become cost prohibitive, especially as the number of network zones increases. Even if the software costs are manageable, you will need to deploy and maintain additional servers in each network zone, on which to install and run your management application instances. If you are deploying management application instances in a high-risk network zone, such as a DMZ, you will want those applications to be hardened for security, which is not a typical management application requirement, and often is not within the application vendor s area of expertise. Otherwise you run the risk that your management application servers may be compromised, either to deny service to or tamper with the management application (e.g. to provide cover for an ongoing attack), or to be used as a vantage point for subsequent attacks on other devices and systems (e.g. if the network infrastructure devices are locked down via access control lists, to only allow commands from the management application servers, if an attacker can compromise the management application server they then have management access to the infrastructure devices). 6. Management Proxy Firewall A management proxy firewall extends the reach of management applications into a firewallpartitioned network zone with a minimum of firewall rules and with significantly enhanced security. The typical approach for deploying a management proxy firewall is similar to that for a Management VPN. A client is installed on each of the management servers, and one or more proxy firewall appliances are deployed in each unreachable network zone, as illustrated in the following figure. Figure 10. Management Proxy Firewall The client within each management application server intercepts traffic destined for managed devices in the unreachable network zone and relays this traffic via an encrypted link to the proxy firewall, which relays the traffic to the managed devices. Similarly, the proxy firewall is configured to route traffic originated by the managed devices to the clients associated with the intended management application servers. The management proxy firewall approach is also comparable to a management VPN in terms of firewall rule reduction: There is no need to configure rules for multiple ports; only the port used for communications between client and the proxy firewall appliance is required.
12 There is no need to configure rules for each managed device; by providing a rule for a proxy firewall appliance, management applications are able to effectively reach all managed devices that are reachable by that appliance. The distinguishing characteristic of a management proxy firewall 1 is that it operates at the application protocol layer and is aware of the ports, message formats and transaction patterns associated with specific management protocols. A management proxy firewall will only relay traffic that involves the expected participants, that uses the expected ports, and that looks and behaves like valid management traffic, resulting in a significantly reduced attack surface. Conceptually, a management proxy firewall breaks down the traffic passed between management applications and managed devices by port and protocol, and includes specific validation modules for commonly-used management protocols, as illustrated in the following figure. Figure 11. Management Proxy Firewall Conceptual Architecture In a more practical implementation, the client and the proxy firewall appliance may share the responsibility for protocol validation, so that invalid traffic can be discarded at the point where the traffic is received, as illustrated in the following figure. 1 A proxy firewall is sometimes referred to as an application layer firewall (see because it deals with protocols at the application layer.
13 Figure 12. Management Proxy Firewall Practical Architecture A management proxy firewall may also serve to isolate the lower layer transport protocols (e.g. IP, TCP, UDP) on the management application side from those on the managed device side, because each transport protocol can effectively be terminated at the local point of contact (i.e. client or proxy firewall). For example, when providing a proxy for a TCP-based protocol such as SSH, rather than simply relaying IP datagrams or TCP segments, the TCP/IP transport can be implemented as two TCP connections, one between the management application and the client, and one between the proxy firewall and the managed device. The header content of each datagram and segment sent by the client or proxy firewall will be created by the sending client or proxy firewall. This approach effectively protects against a wide variety of transport layer attacks, including fingerprinting attacks that would typically be used to identify management application server software versions, in order to identify known vulnerabilities. In summary, there are a variety of approaches that can be used to manage devices in firewallpartitioned networks. The Management Proxy Firewall approach is recommended, because it provides a best of all worlds solution, extending the reach of centralized management applications throughout the entire enterprise network, simplifying firewall configuration, and providing enhanced security. The remainder of this paper will describe Tavve s ZoneRanger, which has been developed to meet the market need for a security-hardened, commercial management proxy firewall. ZoneRanger A Commercial Management Proxy Firewall Introduction to ZoneRanger Tavve s ZoneRanger is a commercial Management Proxy Firewall and can extend the reach of management applications throughout firewall-partitioned networks, while minimizing firewall rules
14 and mitigating associated security threats. ZoneRanger provides proxy and forwarding services for a wide variety of management protocols, including the following: ICMP Echo Request (a.k.a. ping ) Proxy SNMP Get/Set Request Proxy Telnet/SSH Proxy HTTP/HTTPS Proxy FTP/TFTP Proxy SNMP Trap Forwarding Syslog Forwarding NetFlow/sFlow Forwarding TACACS+ Proxy RADIUS Proxy NTP Proxy A minimal ZoneRanger installation consists of two components: 1. The Ranger Gateway software, typically installed on the management application server. 2. The ZoneRanger appliance, typically deployed in an unreachable network zone, such as a DMZ. Figure 13. Minimal ZoneRanger Installation Note that the Ranger Gateway software acts as the client and the ZoneRanger acts as the proxy firewall as previously described in the Management Proxy Firewall approach. The Ranger Gateway intercepts traffic destined for managed devices in the unreachable network zone and relays this traffic via an encrypted link to the ZoneRanger, which relays the traffic to the managed devices. Similarly, the ZoneRanger is configured to forward traffic originated by the managed devices to the Ranger Gateways associated with the intended management application servers. In order to facilitate integration with a wide variety of management applications, Ranger Gateway and ZoneRanger provide transparent proxy services. That is, management applications are able to use the same device addresses and protocols to communicate with managed devices beyond the firewall that they would use in the absence of the firewall, and no special management
15 application configuration is required. As a result, the management application can remain completely unaware that a proxy service is being used. As an example, consider the network illustrated in the following figure: Figure 14. Network Example Assume that a management application such as HP NNM or CA ehealth is installed on the management application server. In order to perform an SNMP Get Request, the management application will send a normal SNMP Get Request message to the target device address (e.g ). The Ranger Gateway will intercept this request, perform validation, then will forward the request in an internal format to a ZoneRanger that is able to communicate with the target device. The ZoneRanger will rebuild the request and send it to the target device. Note that the source address in the rebuilt request will be the IP address of the ZoneRanger (e.g ), so that when the device replies, the reply will be routed back to the ZoneRanger. When the ZoneRanger receives the reply, it is validated, matched with a known outstanding request, and relayed back to the requesting Ranger Gateway in an internal format. The Ranger Gateway rebuilds the reply and forwards it to the management application. Note that the source address in the reply will be the IP address of the target device (e.g ). The message flow for this example is illustrated in the following figure: Figure 15. SNMP Proxy Message Flow In the case of management protocol traffic originated by managed devices, the existence of the proxy is semi-transparent. That is, the managed device can use the same protocols that it would normally use, but must be configured to direct management traffic towards the ZoneRanger, as opposed to sending it to the management application. One advantage of this approach, in the case where the ZoneRanger is deployed in a network zone of low trust, is that the ZoneRanger serves to hide the IP addresses of the management applications from the managed devices. From the perspective of the managed devices, they are being managed by the ZoneRanger.
16 As an example, consider the case where a managed device sends a Syslog message to the ZoneRanger. The destination address, in this case, must be the ZoneRanger s IP address (e.g ). When the ZoneRanger receives the Syslog message, it will validate the message, then will consult its configured forwarding rules to determine where the message should be forwarded. The ZoneRanger will forward the message to any indicated Ranger Gateways, along with a list of addresses (based on matching forwarding rules) to which the message should be forwarded. The Ranger Gateway will forward the message to the specified recipients, using the original managed device s IP address (e.g ) as the source address, so that it looks to the receiving management application as if the message had been sent directly from the managed device. The message flow for this example is illustrated in the following figure: Figure 16. Syslog Forwarding Message Flow Deploying ZoneRanger In a typical large enterprise, there will be multiple management applications and multiple DMZs, or other firewall-partitioned networks. In order to accommodate this requirement, each ZoneRanger is able to work with multiple Ranger Gateway instances, and each Ranger Gateway instance can work with multiple ZoneRangers, as illustrated in the following figure. Figure 17. Large Enterprise Configuration
17 In this configuration, two ZoneRangers are deployed in each firewall-partitioned network highavailability, and a Ranger Gateway instance is installed on each management application server. In general, each Ranger Gateway instance will have an SSL connection to each of the ZoneRangers, enabling the corresponding management application to reach into each of the firewall-partitioned networks where the ZoneRanger pairs have been deployed. ZoneRangers are frequently deployed in redundant pairs in order to provide high availability, so that if one of the ZoneRangers becomes unavailable, the other ZoneRanger in the pair will be able to proxy the necessary management traffic. The mechanisms provided by ZoneRanger in order to support high availability are illustrated in the following figure. Figure 18. High Availability Mechanisms As shown in the figure, the Ranger Gateway is configured with a table indicating which ZoneRangers are able to reach specific managed devices or subnets. The table shown indicates that either ZR-1 or ZR-2 can be used to proxy traffic to devices in the /24 subnet. The Ranger Gateway monitors the status of all associated ZoneRangers on an ongoing basis, so that it can divert traffic away from any ZoneRangers that may be unavailable. If, for example, the management application sends an SNMP Get request to , the Ranger Gateway will intercept the request, consult its configuration table to identify the list of ZoneRanger candidates (ZR-1 or ZR-2), eliminate any ZoneRangers that are currently unavailable from the list, then select one of the remaining ZoneRangers to proxy the request. In cases where the management protocol transaction is initiated by the managed device, such as SNMP trap forwarding, the managed device can be configured to send the trap to the virtual IP address associated with the pool (e.g ). Assuming that ZR-1 is currently active with respect to the virtual IP address, the trap will be received by ZR-1, which will forward the trap on to one or more Ranger Gateways based on configured rules. If ZR-1 were to become unavailable, ZR-2 would detect this condition and become the new owner. Note that each ZoneRanger also has its own individual IP address. As an alternative to the virtual IP mechanism, a managed device can also be configured to send each trap to two or more ZoneRangers. Each ZoneRanger will forward the trap to one or more Ranger Gateways based on
18 configured rules, and each Ranger Gateway will detect and remove the duplicates before forwarding traps on to the management application. A pool of ZoneRangers (e.g. three or more) can be deployed in a firewall-partitioned network zone in order to provide a combination of high capacity and high availability, where the size of the pool is based on the management traffic load. When the load increases, additional ZoneRangers can be added to the pool in order to handle the additional traffic. Each Ranger Gateway instance is responsible for distributing management traffic transactions evenly across each pool of ZoneRangers. When a management application initiates a management protocol transaction, the Ranger Gateway will intercept the initial request, and will select an available ZoneRanger to proxy the request. The Ranger Gateway keeps track of ZoneRanger status and transaction history, and will attempt to balance the transaction load across the set of available ZoneRangers in the pool. The load balancing function provided by the Ranger Gateway is illustrated in the following figure. Figure 19. Load Balancing Note that the load balancing algorithm is based on the same configuration table that is used for high availability. In fact, the ZoneRanger selection algorithm in the Ranger Gateway essentially addresses both high availability and load balancing requirements by seeking to balance the load across the set of available ZoneRangers. The rule of thumb in sizing a ZoneRanger pool is to determine the number of ZoneRangers necessary to handle the anticipated load, assuming that all of them are available, then add one, to handle the case where one of the ZoneRangers becomes unavailable. For example, if four ZoneRangers are needed to handle the management protocol transaction load, a pool of five is recommended, so that if any one of the ZoneRangers becomes unavailable, the Ranger Gateway will detect this condition and will spread the load across the remaining four. ZoneRanger Interfaces Each ZoneRanger appliance has two network interface cards (NICs), and can be configured for single-nic or dual-nic operation. In a single-nic configuration, traffic between the ZoneRanger and the Ranger Gateway, and traffic between the ZoneRanger and the managed devices shares a single interface, as shown in the following figure.
19 Figure 20. Single-NIC Configuration The single-nic configuration is preferred in situations where the traffic flowing through the firewall is a combination of both management and non-management traffic. The single-nic configuration allows non-management traffic to be routed directly to the intended devices, bypassing the ZoneRanger, so that the ZoneRanger does not become a bottleneck. In the dual-nic configuration, traffic between the Ranger Gateway and the ZoneRanger is carried over the first interface, and traffic between the ZoneRanger and the managed devices is carried over the second interface, as illustrated in the following figure. Figure 21. Dual-NIC Configuration The dual-nic configuration works well in cases where there is a separate management network, dedicated to management traffic. Note that the dual-nic configuration also serves to enhance security, by providing an additional layer of isolation between the corporate network and the managed devices. Deploying Ranger Gateway The simplest approach for deploying the Ranger Gateway is to install an instance of the Ranger Gateway software on each management application server. Within each server, traffic originated by the management application and destined for managed devices that are located in firewallpartitioned networks will be intercepted by the Ranger Gateway, and relayed to available ZoneRangers that are able to communicate with the intended managed device.
20 There may be cases where it is preferable to deploy shared stand-alone Ranger Gateway servers, making use of the Ranger Gateway Virtual Interface (RGVI) mechanism, as illustrated in the following figure. Figure 22. Shared Ranger Gateway Servers The RGVI mechanism requires a relatively thin RGVI Client to be installed on each management application server. The RGVI Client intercepts traffic originated by the management application destined for managed devices that reside in a firewall-partitioned network, and forwards intercepted traffic to a Ranger Gateway server, which relays the traffic to available ZoneRangers that are able to communicate with the intended managed device. Responses received by the ZoneRanger are passed back to the Ranger Gateway, which forwards them to the original RGVI client, which forwards them to the requesting management application. Note that Ranger Gateway servers are typically deployed in pairs in order to provide high availability. Even though the RGVI mechanism still requires software to be installed on each management application server, it should be noted that the RGVI Client has a much smaller memory and processing footprint than the Ranger Gateway software. As a result, the potential for impact to the management application is minimized. Another advantage of sharing Ranger Gateway servers is the potential to reduce the number of firewall rules that must be defined to allow communication between Ranger Gateways and ZoneRangers, because the overall number of Ranger Gateway instances is reduced. In addition, by consolidating Ranger Gateway configuration and control is into a small number of dedicated servers, overall configuration effort is reduced, and access to the Ranger Gateway can easily be restricted to authorized users. The primary disadvantage of sharing dedicated Ranger Gateway servers is the additional cost to purchase and operate the dedicated servers. In some organizations these costs will outweigh the advantages. In other organizations, the reverse may be true. Conclusions Firewall-based network partitioning creates a dilemma for centralized management. The preferred strategy to resolve this dilemma is to deploy a management proxy firewall, in order to extend the reach of centralized management applications throughout the entire enterprise network, while simplifying firewall configuration, and providing enhanced security. Tavve s ZoneRanger appliance provides a mature, commercial-grade, feature-rich management proxy firewall solution, complete with high availability features and a scalable architecture.
Network Monitoring within a DMZ January 2005 Gary Schlachter Tavve Software Co. Tavve Software Co. One Copley Plaza Suite 480 Morrisville, NC 27560 +1 919-460-1789 http://www.tavve.com Network Monitoring
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
FIREWALLS & CBAC firstname.lastname@example.org Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Proxy SNMP Trap Reception from DMZ Anthony V. Edwards Tavve Software Co. Tavve Software Co. One Copley Plaza Suite 480 Morrisville, NC 27560 +1 919-460-1789 www.tavve.com Proxy SNMP Trap Reception from
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University email@example.com
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: firstname.lastname@example.org ABSTRACT Internet security
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
FIREWALL RULES Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator,
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia email@example.com 1. Introduction In this
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
Bypassing Firewall @ PISA AGM Theme Seminar 2005 Presented by Ricky Lou Zecure Lab Limited Firewall Piercing (Inside-Out Attacks) Disclaimer We hereby disclaim all responsibility for the following hacks.
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html
2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Cryptography and network security Firewalls slide 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Your consent to our cookies if you continue to use this website.