McAfee Next Generation Firewall

Size: px
Start display at page:

Download "McAfee Next Generation Firewall"

Transcription

1 McAfee Next Generation Firewall Design and Implementation Guide Next Generation Network Design Guide McAfee Next Generation Firewall Design and Implementation Guide Page 1

2 Table of Contents INTRODUCTION 4 Purpose of This Document...4 Audience...4 Resources...4 SOLUTION OVERVIEW 5 Enterprise Requirements...5 Managed Service Provider Requirements...6 Use Cases...7 SOLUTION DESIGN 8 Architecture...8 Equipment...9 Network McAfee Security Management Center USE CASE 1: USER-BASED APPLICATION CONTROL 12 Design Additional Resource: Video Configuration Validation Test Case 1: Allow Individual Access to Services Test Case 2: Prohibit Individual Access to Services Test Case 3: Allow Group Access to Services Test Case 4: Prohibit Group Access to Services USE CASE 2: REMOTE CLIENT-TO-SITE VPN 24 Design Additional Resource: Video Configuration VPN Gateway and VPN Client Configuration in McAfee Security Management Center VPN Policy on Firewall Validation Test Case 1: User Authentication Test Case 2: Remote User Policy USE CASE 3: SITE-TO-SITE VPN 33 Design Configuration Validation McAfee Next Generation Firewall Design and Implementation Guide Page 2

3 USE CASE 4: HIGH AVAILABILITY CLUSTERING 38 Design Configuration Validation USE CASE 5: HIGH AVAILABILITY McAFEE MULTI-LINK 47 Design Configuration Validation GETTING SUPPORT 54 Evaluating McAfee Next Generation Firewall McAfee Next Generation Firewall Customers McAfee Next Generation Firewall Design and Implementation Guide Page 3

4 INTRODUCTION Purpose of This Document The McAfee Next Generation Firewall Design and Implementation Guide provides best practice designs and configuration steps for some of the most common use cases that enterprises will encounter. The recommendations and examples have been validated on a live network within our lab at McAfee. Our lab is designed to simulate a typical customer network environment. Our customers may use these recommendations to implement similar configurations in their environments. These examples may also be used by our own McAfee system engineers, architects, and professional services teams to create customer proof-of-concepts (POCs). Each use case will provide an overview of the management requirements, best practice design, configuration steps, and validation examples. Some use cases also include an optional technical video that describes the use case. After familiarizing yourself with the Solution Design section, you may choose to skip to the use case you are interested in. You are not required to review the use cases sequentially. Audience This guide is intended for technical personnel who need to deploy and/or manage a McAfee Next Generation Firewall in a live network, test environment, or for a product evaluation. Resources To learn more about the McAfee Next Generation Firewall, find additional documentation, download a product evaluation, or to get product support, please visit our website at Product documentation Product evaluation Evader test tool McAfee Security Management Center Architecture and Configuration video In May 2013, Stonesoft became part of McAfee, which is a wholly owned subsidiary of Intel Corporation and part of the Intel Security Group. Throughout this document, you may see pictures of software with the name Stonesoft shown, but the products will be referred to as a McAfee product. Regardless of whether you are buying a new solution or if you already own Stonesoft-branded products, the guidance provided in this document applies. McAfee Next Generation Firewall Design and Implementation Guide Page 4

5 SOLUTION OVERVIEW This section provides a brief overview of McAfee Next Generation Firewall, the business problems it can solve, and the environments the use cases presented in this guide are best suited to address. Enterprise Requirements Conditions continually change with time. Enterprise networks that are still protected by traditional firewalls or early next-generation firewalls are seeing new attack patterns, like advanced evasion techniques (AETs), successfully pass through the security controls and policies they have implemented. To test your organization s network security against AETs, McAfee offers a free software-based testing environment called Evader. Visit evader.mcafee.com for more details on AETs and the Evader tool. Most enterprises cannot afford to have downtime due to a firewall failure. Today, there is an urgent need for a nextgeneration firewall that offers more than just deep traffic inspection. Enterprises are looking for next-generation firewalls that include protection against AETs with anti-evasion technology, offer high availability for zero downtime, and provide granular application control. As a result of extensive research into the latest attacks, McAfee Next Generation Firewall was developed as a means of identifying and stopping advanced evasion techniques beyond any competitor s capability. It enables enterprises to do business securely and cost effectively. It offers continuous protection against advanced threats, powerful management tools that enable operational efficiency, full situational awareness, and high availability to support business continuity. McAfee Next Generation Firewall has been built from the ground up to deliver application control, intrusion prevention system (IPS), and virtual private network (VPN) functionality as well as innovative evasion prevention capabilities in an extensible, highly scalable design. Offering more than just deep packet inspection, McAfee Next Generation Firewall includes powerful anti-evasion technologies that decode and normalize network traffic for inspection on all protocol layers, making traffic evasion-free and exploits more easily detectable. Vulnerability-based fingerprints block exploits in the normalized data stream. As part of the Security Connected framework, McAfee Next Generation Firewall offers a holistic network security solution combining network and endpoint intelligence. For maximum return on investment and an extended lifecycle, McAfee Next Generation Firewall is based on a unified software core, which is available in multiple, adaptive hardware, software, and virtual appliances, and is transformable into different network security roles. McAfee Next Generation Firewall offers your organization the security and control you need: Granular application control. Unified software design. Advanced evasion prevention. High availability. Centralized management. Flexible delivery. This guide and its use cases are focused on real-world deployments of McAfee Next Generation Firewall and typical management activities such as configuring VPN services, using application control, and designing for high availability. For more information about McAfee Next Generation Firewall and its protection against AETs, unified software design, management platform, supported configurations, and form factors for scale, virtualization, and multitenancy, visit our product website at McAfee Next Generation Firewall Design and Implementation Guide Page 5

6 McAfee Firewall Enterprise and the McAfee Next Generation Firewall both have features and benefits that meet the needs of different customer environments. McAfee Firewall Enterprise meets the hardened, highassurance requirements typical of national and other government entities. McAfee Next Generation Firewall offers enterprises, service providers, and data center teams adaptive, advanced security in a cost-effective solution. Managed Service Provider Requirements The continually evolving threat landscape and its technologies have also resulted in a short supply of specialists possessing the needed skill sets to address it; concerns about ongoing investments in new solutions like the nextgeneration firewall to keep pace with it; and an overall business need in shifting the corresponding IT budgets from a capital expenditures (CapEx) to an operational expenditures (OpEx) model. MSPs are stepping in to answer this need by offering a variety of services that provide enterprises with the ability to both keep pace and contain costs. For example: Managed security services where the enterprise may own their equipment, but a provider manages it. Managed on-premises services where the MSP may both own and manage the equipment at their customers sites. Dedicated or hosted multitenant services where the security device is located with, owned, and often managed by the provider offering remote, dedicated, or cloud-based delivery of services (Security-as-a-Service). Firewall-as-a-Service (FWaaS) as part of a larger Infrastructure-as-a-Service (IaaS) solution for private-hosted or hybrid cloud environments. Securing Software-as-a-Service (SaaS) where a provider is actually securing its own data center that delivers applications in a cloud-based delivery model. Whether you are a service provider using McAfee Next Generation Firewall to deliver services or to secure other services you may deliver, or whether you are an enterprise that is considering working with a provider, your requirements are likely to be the same as general enterprise requirements (previous section), with an added focus on: Multitenancy. Domain, role, web-based, automated and API-accessible management. Scalable, high-performance, and high-availability platforms. McAfee Next Generation Firewall is an ideal solution for MSPs interested in offering managed services, and the enterprises that are interested in working with them. It offers both platform and management console multitenancy. An individual appliance can support up to 250 virtual contexts, while the centralized console can separate administrative domains with customized web portal access. This allows MSPs to manage each customer separately and provides enterprises the visibility and option to maintain shared responsibility with their providers or across their own IT organizations. Automated plug-and-play deployment and policy management and a wide range of both physical and virtual appliances offer MSPs and enterprises the ability to select the right platform and configuration to meet their requirements and service models. The use cases in this guide apply best to services that MSPs offer on premises or for remote management of appliances that are located physically at the enterprise site. Essentially, the same configuration steps apply whether an MSP deploys on premises and manages the solution onsite or remotely or an enterprise customer purchases and manages the solution on its own. The main difference is in the ability of the MSP to use an offsite, multitenant McAfee Security Management Center to provide remote management for multiple customers and provide each customer with the option to view and/or maintain management of their security services. For more information: Enterprises interested in working with an MSP, please visit our Partner Directory at MSPs interested in offering McAfee Next Generation Firewall as a managed service, please visit our website at McAfee Next Generation Firewall Design and Implementation Guide Page 6

7 Use Cases The overall solution and design example offered in this guide is illustrated through five use cases: 1. User-Based Application Control. 2. Client-to-Site VPN. 3. Site-to-Site VPN. 4. High Availability Clustering. 5. High Availability McAfee Multi-Link. Each use case describes the basic management requirement it addresses, how the solution is designed, and how it is configured and implemented and offers examples or recommendations on how to validate that your configuration works as intended. Some use cases also offer a supplemental video for additional reference. After reviewing the Solution Design section, you may want to skip directly to the use case and sections you are interested in. McAfee Next Generation Firewall Design and Implementation Guide Page 7

8 SOLUTION DESIGN This section provides a brief overview of how we have created our lab network, which is used for the configuration and validation examples provided for the use cases in this guide. This design is intended for instructional purposes only, and it is assumed the technical personnel using this guide will adjust the recommendations provided to meet their own requirements and work within each unique environment. Architecture In Figure 1, we have an internal, private network and branch office protected by McAfee Next Generation Firewall. Remote users can connect to the main, private network through a VPN gateway, which is built into McAfee Next Generation Firewall. Figure 1. McAfee Next Generation Firewall example solution architecture. McAfee Next Generation Firewall Design and Implementation Guide Page 8

9 Equipment The table below represents the products used within our simulated lab environment, depicted in Figure 1, and the versions of software installed. Always refer to the product documentation for specifics on supported platforms, configurations, and operating systems. Table 1: Design Example Equipment Configuration Product Hardware or Operating System Units Software Version McAfee Next Generation Firewall McAfee Security Management Center Microsoft Active Directory Server Windows Server 2008 R Windows Server 2008 R2 1 Stonesoft User Agent Installed on Active Directory Server Cisco Routers (2) SE1 Cisco Routers (4) M3 McAfee Next Generation Firewall Design and Implementation Guide Page 9

10 Network Figure 2 below depicts how our simulated lab is configured. Table 2 provides a legend for some of the abbreviations used. Figure 2. Lab network design. Table 2: Lab Network Design Abbreviations Abbreviation AD SMC MEG MWG OTP ESM Vmnic Description Active Directory McAfee Security Management Center McAfee Gateway McAfee Web Gateway McAfee One Time Password McAfee Enterprise Security Manager Virtual Machine Network Interface Card McAfee Security Management Center All the configuration steps performed in these use cases used McAfee Security Management Center. To learn more about how to use McAfee Security Management Center to deploy a similar solution in your environment, view the McAfee Next Generation Firewall Design and Implementation Guide Page 10

11 McAfee Security Management Center Architecture and Configuration video: McAfee Security Management Center Architecture and Configuration video. To bind McAfee Security Management Center to Active Directory in Microsoft Windows 2008 R2, use caps lock for CN. Example: CN=admin, CN=Users, dc=inside, dc=com McAfee Security Management Center version 5.6 does not generate a user agent certificate. Use version or higher. McAfee Next Generation Firewall Design and Implementation Guide Page 11

12 USE CASE 1: USER-BASED APPLICATION CONTROL Administrators want to be able to control, limit, provision and de-provision user access to applications while also having high visibility and correlation between user activity and security policy. McAfee Security Management Center allows you to more flexibly identify and control traffic beyond specifying a network protocol and ports for TCP and UDP traffic. There are several predefined application elements available that define the criteria for matching commonly used applications. You can also create custom application elements. Applications are matched against the payload in the packets, so applications are also detected from non-standard ports. And within McAfee Security Management Center logs, statistics, and reports, you can easily see which applications are used the most or which applications are in use and by which user. Access control by user allows you to designate user and user group elements as the source or destination of a rule to create user-specific rules without requiring user authentication. You can employ user-specific rules with user authentication rules to allow some user groups to access a service, while, at the same time, generally requiring authentication for the same service. However, user-specific rules do not replace user authentication. They are tools to simplify the configuration of access control and improve the user experience by allowing transparent access to services. They should be used for trusted users in a trusted environment where strong authentication is not required. McAfee AppPrism technology has been added in McAfee Next Generation Firewall v With the introduction of McAfee AppPrism in McAfee Next Generation Firewall, the number of application categories will increase tremendously. Design User- and group-based policies are assigned to provide transparent and uninterrupted services to users. For our use case, we have assigned various policies to both individual users and to groups. Some of these users are part of the finance and marketing groups in the example. The configured order of the policies is very important for the rules to be correctly applied to users or groups. Each user is associated with one IP address from a client computer. McAfee Next Generation Firewall lets you associate a user with an IP address by utilizing a software component called the user agent. The user agent can be installed on a Windows system in an Active Directory domain that communicates with the Active Directory domain controller to associate users with IP addresses. We have an Active Directory set up to query the users and the installed user agent in the same Active Directory system, and we also have an authentication server to authenticate the users based on username/password. McAfee Security Management Center v. 5.6 does not generate a user agent certificate. To generate a user agent certificate, you need v or higher. Review the diagram in Figure 3 to see the users we have created in our lab and which users are a part of the marketing, finance, and branch groups in the example. Additional Resource: Video For an overview of this section, view a video about McAfee Next Generation Firewall application control implementation: McAfee Next Generation Firewall Design and Implementation Guide Page 12

13 Configuration The configuration shown in Figure 3 is used in all the test cases for the user- and group-based policies use case. The policies are uploaded on the edge firewall of the main office. Figure 3 shows a screen capture from our McAfee Security Management Center that manages the two McAfee Next Generation Firewalls in our design. The policies are configured in the McAfee Security Management Center console, after which they are uploaded to the respective firewall. Let s look at an example of a user lmajors. As seen below, user lmajors belongs to the finance group. We have created a separate policy for user lmajors, and we also have a policy for the group finance. While you configure rules for your policy, keep in mind that the order in which you define your rules is very important. Incorrect order of rules will lead to inaccurate results. Figure 3. Use case 1: users and groups configuration. McAfee Next Generation Firewall Design and Implementation Guide Page 13

14 Figure 4 shows an example of a user, mkay, who belongs to the marketing group. We have configured a policy for user mkay and we have a separate policy for the marketing users group. You can see that the rule for user mkay is configured above the marketing users rules, which means user mkay will always follow the rule 15.7 since it is defined above the marketing group s rule. Again, if the rules are not configured in the correct order, you will not achieve the expected results. Figure 4. Use case 1: user policy configuration example. McAfee Next Generation Firewall Design and Implementation Guide Page 14

15 Validation Test Case 1: Allow Individual Access to Services User lmajors, who is located on the internal, private main office network, tries to access through a web browser. We would like to allow this user to access this service. Procedure As shown in Figure 5, based on the policy 15.5 for user lmajors, the firewall queries the sub-policy to see if is being discarded. Since it is not discarded, it goes to the next sub-policy, which is allowing everything that is not specifically discarded in the previous sub-policy. Figure 5. Use case 1, test case 1: allowing individual user access to services. Results Based on the policy , user lmajors should be able to access We look at the log server data example in Figure 6 to understand the results. User lmajors has been associated with local IP address The source address is , and the application it is trying to access is Dropbox, as shown in the application tab. The log also shows which firewall node is allowing or discarding the connection. In this test case, we see McAfee Next Generation Firewall 1, node 1, which is the edge firewall in the company s main office. The tab Situation shows whether a connection will be allowed or discarded based on the policy. In this test case, the connection to Dropbox is allowed based on the policy , as we saw earlier. McAfee Next Generation Firewall Design and Implementation Guide Page 15

16 Figure 6. Use case 1, test case 1: log server data. McAfee Security Management Center also allows you to check which rule is allowing this connection. This is a great feature for troubleshooting. As shown in Figure 7, right click on the connection and view the rule. In this test case, clicking on View Rule takes us to sub-policy Individual Users, which is policy We proved that the Dropbox connection is allowed by policy McAfee Next Generation Firewall Design and Implementation Guide Page 16

17 Figure 7. Use case 1, test case 1: viewing rule correlation in McAfee Security Management Center. McAfee Next Generation Firewall Design and Implementation Guide Page 17

18 Test Case 2: Prohibit Individual Access to Services User lmajors, who is located on the private/company main office network, tries to access through a web browser. We would like to prevent this user from accessing this service. Procedure As shown in Figure 8, based on the policy 15.5 for user lmajors, the firewall queries the sub-policy to see if is being discarded. Policy is discarding all Amazon-based applications. The user lmajors sees the message Page Not Found displayed on his/her browser window. Figure 8. Use case 1, test case 1: prohibit individual user access to services. Results As shown in Figure 9, the log server shows that the connection to is discarded. The connection is being attempted by IP address In the previous section, we have learned that IP address has been associated with user lmajors. To prove which policy is discarding the connection, we right-click on the connection that is discarded and click View Rule. This test case takes us to the rule below, which is This proves that the connection to made by user lmajors is being discarded by the correct policy. McAfee Next Generation Firewall Design and Implementation Guide Page 18

19 Figure 9. Use case 1, test case 2: viewing rule correlation in McAfee Security Management Center. McAfee Next Generation Firewall Design and Implementation Guide Page 19

20 Test Case 3: Allow Group Access to Services User bsmith, who is a part of the finance group and is located on the private/company main office network, wants to access through a web browser. Based on his membership in the finance group, we would like to allow him/her to access this service. Procedure As shown in Figure 10, based on the policy for finance group users, all users will be allowed access to box.net application. As user bsmith is a part of the finance group, bsmith will be able to connect to any box.net application. Figure 10: Use case 1, test case 3: allowing group access to services. Results In Figure 11, user bsmith has been associated with a local IP address In the log server we can see that the connection to box.net for IP address was allowed. Right-clicking on the connection will take you to the rule that is allowing this connection. Based on the results, we prove that the box.net connection was allowed by the correct policy. McAfee Next Generation Firewall Design and Implementation Guide Page 20

21 Figure 11. Use case 1, test case 3: viewing rule correlation in McAfee Security Management Center. McAfee Next Generation Firewall Design and Implementation Guide Page 21

22 Test Case 4: Prohibit Group Access to Services User bsmith is a part of the finance group and is located on the internal, private company main office network. The user wants to access through a web browser, but, based on his/her group membership, access should be prohibited. Procedure Based on policy for finance group users, all users will be prevented from accessing the box.net application, as depicted in Figure 12. Since the user bsmith is trying to access and Dropbox falls under the File Sharing category, the connection will be discarded based on policy Figure 12. Use case 1, test case 4: prohibiting group access to services. McAfee Next Generation Firewall Design and Implementation Guide Page 22

23 Results User bsmith has been associated with a local IP address From the log server data as shown in Figure 13, we can see that the connection to Dropbox for IP address was discarded. Right-click on the connection, and click on View Rule to see which rule is discarding the connection. Based on the results, we prove that the rule is correctly discarding this connection. Figure 13. Use case 1, test case 4: viewing rule correlation in McAfee Security Management Center. McAfee Next Generation Firewall Design and Implementation Guide Page 23

24 USE CASE 2: REMOTE CLIENT-TO-SITE VPN When mobile users need direct, secured access to your organization's network or if remotely used applications do not feature web client functionality, the McAfee Next Generation Firewall IP security (IPsec) VPN client offers a secure solution with transparent network access for roaming users. This remote client-to-site use case shows how the McAfee Next Generation Firewall IPsec VPN client provides a secure VPN connection to a McAfee Next Generation Firewall/VPN gateway for individual user computers running on Windows platforms. The IPsec VPN client protects private information while it is transferred over the Internet and allows verification of the user s identity. The McAfee Next Generation Firewall IPsec VPN client supports Windows platforms. Design In this use case, remote users have installed McAfee Next Generation Firewall (Stonesoft) IPsec VPN client on their Microsoft Windows systems and have established secure connections through the built-in internal gateway, which is configured on the McAfee Next Generation Firewall at the company s network edge (Figure 14). To establish a VPN connection, the McAfee Next Generation Firewall IPsec VPN client prompts a user to authenticate to the McAfee Next Generation Firewall built-in VPN gateway. After successful authentication, the IPsec VPN client downloads a configuration file from the firewall to set the correct options for establishing a client-togateway VPN with that gateway (for encryption, authentication, endpoints to contact, and the IP addresses that are accessible through the VPN.) When changes are made on the gateway, each IPsec VPN client updates its configuration the next time the IPsec VPN client starts a new VPN connection. Due to the centralized configuration method, the McAfee Next Generation Firewall IPsec VPN client can connect to McAfee Next Generation Firewall or McAfee Next Generation Firewall/VPN gateways only. If you wish to use a third-party VPN gateway, you will configure through the third-party solution graphical user interface (GUI) or command-line interface (CLI). Once the user establishes a secure VPN connection, the application control policies are set for users and groups on the firewall, such as those reviewed in Use Case 1. McAfee Next Generation Firewall Design and Implementation Guide Page 24

25 Figure 14. Use case 2: remote client-to-site VPN. Additional Resource: Video For a technical overview and demonstration of this remote client-to-site use case, you may also view our video at: Configuration VPN Gateway and VPN Client Configuration in McAfee Security Management Center As shown in Figure 15, drag and drop the gateways you want to include in this VPN into either of the two panels to define which gateways can create a VPN with one another. In our scenario, the IPsec client is the satellite gateway and Santa Clara Internal SGW is the central gateway. Let s define different types of gateways before we proceed further: If you add a gateway under Central Gateways, the gateway can establish VPN with any other gateway in this VPN (both central and satellite). If you add a gateway under Satellite Gateways, the gateway can establish VPN only with gateways defined as central in this VPN. Add two or more gateways in this view to create a VPN. You must add at least one of the gateways under Central Gateways. You do not have to add any gateways under Satellite Gateways. (All gateways can be central.) Once you drag and drop the desired gateways, this will create a VPN tunnel between the two gateways. McAfee Next Generation Firewall Design and Implementation Guide Page 25

26 Figure 15. McAfee Next Generation Firewall built-in, internal VPN gateway and IPsec client configuration. VPN Policy on the Firewall Figure 16 shows the VPN policies on the firewall, with policy as a mandatory policy for the VPN. Policy allows remote users to authenticate and connect to the private/internal network. In the action tab, select Enforce VPN and the client-to-gateway VPN that we configured earlier. McAfee Next Generation Firewall Design and Implementation Guide Page 26

27 Figure 16. VPN policies on the firewall. McAfee Next Generation Firewall Design and Implementation Guide Page 27

28 Validation Test Case 1: User Authentication A remote user lmajors needs to get secured VPN access from a remote location. Procedure In this example (Figure 17), remote user lmajors will connect to the McAfee Next Generation Firewall internal VPN gateway by providing a username and password. Active Directory will query the username and password to authenticate the user if the credentials are accurate. Once the user authenticates successfully, based on the policy 15.12, the user will be provided with a VPN virtual IP address via the dynamic host configuration protocol (DHCP) server. All remote users will successfully authenticate if their credentials are accurate. User- and group-based policies created for users and groups will be applied. Figure 17. Use case 2: user authentication. McAfee Next Generation Firewall Design and Implementation Guide Page 28

29 Results Figure 18 shows the McAfee Next Generation Firewall IPsec VPN client installed on a user s desktop, interacting with the McAfee Next Generation Firewall s internal VPN gateway, and providing the credentials. If the authentication server successfully authenticates the user, a virtual IP address is assigned to the remote user. In this case, the virtual IP address assigned to user lmajors is Figure 18. Use case 2, test case 1: client on user desktop authenticating to VPN. Figure 19 shows the log view of the VPN tunnel negotiations between the client s machine and McAfee Next Generation Firewall. If there is a problem establishing a VPN tunnel, you should start troubleshooting by looking at this log view. The Information Message field that is highlighted will give you details on each negotiation step. McAfee Next Generation Firewall Design and Implementation Guide Page 29

30 Figure 19. Use case 2, test case 1: viewing VPN tunnel negotiations in a log. McAfee Next Generation Firewall Design and Implementation Guide Page 30

31 Test Case 2: Remote User Policy User lmajors wants to access through a web browser. The user is already authenticated and has established a secure tunnel to the private network. Any Internet-based activity from the user lmajors should go through the tunnel to the private network and pushed out through the firewall and its configured policies. Procedure Based on policy (Figure 20), user lmajors is not allowed to go to any amazon.com applications. As all access policies for this user should be implemented through the remote connection, the request goes to the firewall, and the firewall should discard this connection. This proves that the traffic from the remote user is following the correct path. If you don t see any log activity from user lmajors in the log server, that means the VPN connection is not established accurately and the user is not going to the Internet via the private network. Figure 20. Enforcing policies on remote user sessions. McAfee Next Generation Firewall Design and Implementation Guide Page 31

32 Results Figure 21 below shows the output on the log server. We can see that the request for amazon.com was discarded. The right corner of the log tab also shows the same information, and you can see that the source address for lmajors is , which is the virtual IP address assigned by the DHCP server. To see the policy that caused the connection to be discarded, right-click on the connection and click View Rule. The information shown in the figure indicates that the connection was correctly discarded by the policy Figure 21. Use case 2, test case 2: viewing rule correlation in McAfee Security Management Center. McAfee Next Generation Firewall Design and Implementation Guide Page 32

33 USE CASE 3: SITE-TO-SITE VPN Just as remote users connecting to their corporate sites require secured connections to make certain that neither their endpoint device nor their main company network is compromised, it is important to provide full security between branch offices and their connected corporate sites. This use case shows how a branch network can connect to an internal, private network through a VPN tunnel using a McAfee Next Generation Firewall on each network edge. Design In this use case, we have established a secure connection between the internal VPN gateways of two McAfee Next Generation Firewalls in order to create a secure VPN tunnel over the Internet (Figure 22). Any information exchanged between the main office and its branch office will be securely transferred through the VPN tunnel. Figure 22. Securing branch office communications with site-to-site VPNs. McAfee Next Generation Firewall Design and Implementation Guide Page 33

34 Configuration In Figure 23, drag and drop Santa Clara Internal SGW to Central Gateways and, similarly, the Branch Internal SGW goes to Satellite Gateways. To learn more about these two types of gateways, refer to use case 2. This creates a site-to-site VPN tunnel between the main office and branch office. Figure 23. Configuring a secure VPN tunnel between two McAfee Next Generation Firewall internal VPN gateways. The VPN policy on both the firewalls making a VPN tunnel should be the same. Figure 24 shows the site-to-site VPN tunnel policy on the main office edge firewall. Figure 24. Policy on the main office edge firewall. Figure 25 shows that we have the exact same VPN policy on the branch firewall. McAfee Next Generation Firewall Design and Implementation Guide Page 34

35 Figure 25. Policy on the branch office edge firewall. McAfee Next Generation Firewall Design and Implementation Guide Page 35

36 Validation A user binside at the branch office wants to securely transfer a file to Server A, which is located at the company s main office. Procedure As shown in Figure 26, we will attempt to successfully transfer files from user binside desktop, located at the branch office, to Server A, located in main office over our established VPN tunnel. Figure 26. Securely transferring files from a branch office to a main office over a VPN tunnel. Results Once we ve successfully moved the file, which will be evident by completion of file copying, we ll look at the log server to see this transfer. Figure 27 shows that source (associated to user binside ) is allowed to transfer a file to destination Server A ( ). We also see that the first red box (sender tab) shows both the firewalls NGFW1 and NGFW2 are allowing this connection. Now, let s right-click on the connection in View Rule to see which policy on the firewall is allowing this connection. In our test, the VPN tunnel policy is allowing the connection; this is accurate, proving that the file transfer was done securely through the established VPN tunnel. McAfee Next Generation Firewall Design and Implementation Guide Page 36

37 Figure 27. Use case 3, test case: viewing rule correlation in McAfee Security Management Center. McAfee Next Generation Firewall Design and Implementation Guide Page 37

38 USE CASE 4: HIGH AVAILABILITY CLUSTERING A single firewall can be a single point of failure. This can affect the availability of business-critical applications and complicate the maintenance of firewall equipment. Clustering firewall nodes together can significantly reduce the risk of these problems while also supporting higher performance. Firewall clustering allows uninterrupted operations during system maintenance and updates and is transparent to users. McAfee Next Generation Firewall offers high availability by natively clustering as many as 16 firewall cluster nodes without using extra load-balancing products. If any individual nodes fail, others will keep going. And you can perform maintenance or add nodes to scale performance and availability without compromising service. For the administrator, the cluster is managed as a single firewall entity. Design A McAfee Next Generation Firewall cluster is a single virtual entity that can include from two to as many as 16 physical devices (Figure 28). Each physical device that makes up the firewall cluster is called a firewall node (FW node). McAfee offers two types of clustering: active-standby and active-active. In active-standby clustering, only one node at a time processes traffic, and the other nodes wait on standby, ready to take over when the currently active node goes offline. Nodes that should not take over automatically can be set offline as usual. In active-active mode, the firewall engines dynamically load balance individual connections between the nodes, transparently transferring connections to available nodes in the event a node becomes overloaded or experiences a failure. Clustering in active-active mode improves performance when heavy packet processing functions are needed, such as deep inspection, VPNs, application identification, URL logging, or complex policies. When you design a firewall cluster, ensure that, if one or more nodes goes offline, the remaining nodes have enough capacity to handle the increased load. For example, in a three-node cluster with a 50%-50%- 50% load on each node, if one node goes down, then the remaining two nodes will be able to handle 75%- 75% load. But if the three nodes are at 80%-80%-80% load each and one node goes offline, the remaining two nodes will become overloaded. McAfee Next Generation Firewall Design and Implementation Guide Page 38

39 Figure 28. McAfee Next Generation Firewall native clustering of up to 16 firewall nodes. McAfee Next Generation Firewall Node Interfaces There are two types of interfaces on a node: Cluster virtual interface (CVI) is a logical interface shared by all nodes in a cluster and is used for traffic routed through the firewall for inspection. Node-dedicated interface (NDI) handles communication between nodes, as well as between the nodes and the McAfee Security Management Center server. The cluster s firewall nodes exchange information constantly. The state tables that list open connections (state sync) and the operating state of the other nodes (heartbeat) are exchanged. This exchange of information ensures that all nodes have the same information about the connections and that if a node becomes unavailable, the other nodes of the cluster immediately detect this. The exchange of information between clustered firewall nodes is synchronized through selected interfaces via a heartbeat network using multicast transmissions. One NDI on a node must be selected as the primary heartbeat interface. Another NDI should be configured as the backup heartbeat interface. A dedicated network is recommended for the primary heartbeat. McAfee Next Generation Firewall Design and Implementation Guide Page 39

40 Figure 29. McAfee Next Generation Firewall node interfaces in a three-node cluster. Because of their dual role as members of a common virtual entity and as separate physical devices, firewall engines in a cluster have two types of IP addresses: Cluster virtual IP address (CVI) An IP address that is used to handle traffic routed through the cluster for inspection. This is an IP address that is shared by all nodes in a cluster, in effect making the node appear as if it were a single entity for the outside network behind the IP address. Node-dedicated IP address (NDI) An IP address that is used to handle traffic from or to a single node in a cluster. These IP addresses are used for the heartbeat connections between the engines in a cluster, for control connections from the McAfee Security Management Center server. You can configure several CVIs and/or NDIs on the same physical interface. In the example in Figure 29, interface 1 is used as the CVI for protected network traffic and for the heartbeat backup. Interface 3 is used as the CVI for Internet traffic (for example, Internet traffic from clients in the protected network). It is also the primary control NDI for management server. Interface 2 is the backup control NDI for management server. Interface 0 on each node is the NDI used for heartbeat traffic between the nodes in a dedicated network. There is no CVI on Interface 0, since it handles only node-to-node traffic. McAfee Next Generation Firewall Design and Implementation Guide Page 40

41 Configuration Let s configure a firewall cluster step by step: 1. Select the Monitoring System Status tab. 2. Right-click on Firewall and select New Firewall Cluster, as highlighted in red in Figure This will open the window in Figure 30. Figure 30. Opening the firewall cluster dialog box. McAfee Next Generation Firewall Design and Implementation Guide Page 41

42 4. Assign a name to the firewall cluster element (ESG_Test in our example in Figure 31), and select the log server for storing logs. 5. Add DNS IP addresses used to resolve server names (optional). 6. Two nodes are added by default. We have added an additional third node to the cluster. You can add a node to the cluster with just one click. When you add a node, example node 4, as shown in Figure 31, an NDI is automatically generated for that node. Figure 31. Creating the firewall cluster element. 7. Go to the interfaces tab and click on Add New Physical Interface, as shown in Figure 32. A physical interface definition in the management client always represents a network interface definition on all nodes of the cluster. You must define at least two interfaces for the firewall cluster: one control interface for communications between the McAfee Security Management Center server and the engines and one Heartbeat Interface for communications between the cluster nodes. McAfee Next Generation Firewall Design and Implementation Guide Page 42

43 You must also define a CVI that is shared by all the nodes in the cluster. In our example we have two CVI s, one for the private network and the other for routed traffic sent to the firewall for inspection. Figure 32. Configuring interfaces. We configured four interfaces for our example. Int 0 is the heartbeat, Int 1 is the protected network, Int 2 is the primary control, and Int 3 is the control backup. 8. Right-click on Int 2, select New IPv4 Address. We entered CVI and NDI as required in our example (Figure 33). As we discussed earlier, CVI on Int 1 is used for the internal protected network, CVI on Int 2 is used for the routed traffic that is sent to the firewall for inspection. McAfee Next Generation Firewall Design and Implementation Guide Page 43

44 NDI handles all communications for which the endpoint is the node itself, including node-to-node, McAfee Security Management Center server-to-node, and node-initiated connections. You must define an NDI IP address for all nodes on each physical interface. If there is a shortage of IP addresses, it is possible to leave some physical interfaces without an NDI. Figure 33. Node interface IP addresses. 9. Click on Options to define the role of the physical interface (Figure 34). McAfee Next Generation Firewall Design and Implementation Guide Page 44

45 Figure 34. Defining the role of the physical interface. Figure 35 shows the end result of the configuration steps. We have created a firewall cluster named ESG_Test with three firewall nodes. Figure 35. Firewall cluster ESG_Test. McAfee Next Generation Firewall Design and Implementation Guide Page 45

46 Validation When considering deploying a clustered firewall environment to protect service-level agreements (SLAs) for performance and availability, it is also highly recommended that you work with a staging environment first. Procedure When testing your configuration, you may choose to disconnect physically if necessary each configured node to validate that the cluster, its function, and load-balancing are set up in your intended configuration. Results When a node goes down on the cluster, you can see on the McAfee Security Management Center that the McAfee Next Generation Firewall cluster remains online only the node that is down is grayed out. If you have a traffic generator test tool, you can validate that there is no traffic/packet loss when a node goes down. McAfee Next Generation Firewall Design and Implementation Guide Page 46

47 USE CASE 5: HIGH AVAILABILITY McAFEE MULTI-LINK A single connection to the Internet is also a single point of failure. If the connection becomes unavailable, all outbound traffic is blocked. To prevent this, patented McAfee Multi-Link technology distributes outbound traffic between multiple network connections (Figure 36). McAfee Multi-Link ensures that Internet connectivity remains available even if one or more network connections fails. McAfee Next Generation Firewall can also load balance outbound traffic between multiple network connections (Netlinks) to use the available Internet connection capacity more efficiently. Design McAfee Multi-Link can integrate with any type of connection to ensure that inbound, outbound, and VPN traffic is delivered securely through the fastest connections without incident or disruptive downtime. McAfee Multi-Link can accommodate digital subscriber lines (DSL), leased lines, cable modems, satellite, mobile broadband, and even WAN links, such as point-to-point multiprotocol label switching (MPLS). Organizations gain the flexibility to deploy the type and number of connections that are best suited for their environments and their budgets. Combined with McAfee active load balancing and Quality-of-Service (QoS) capabilities, McAfee Multi-Link also optimizes networks and supports technologies, such as Voice-over-IP (VoIP), and video conferencing. Organizations gain granular control of their networks and ensure the availability of applications that are mission-critical to their operations. Figure 36. McAfee Multi-Link. McAfee Next Generation Firewall Design and Implementation Guide Page 47

48 Which Netlink Is Selected? One or more Netlinks makes up a McAfee Multi-Link. Netlinks are selected based on bandwidth and performance or how they are configured. There are two load-balancing methods: round-trip time (RTT) and the ratio method. Either will be selected based on bandwidth and performance. Netlinks can be configured in standby mode to avoid expensive links or based on quality-of-service (QoS) preferences. Round-trip time (RTT) Netlink performance is measured for each new TCP connection by sending the first SYN packet of the handshake to the destination through all available Netlinks. The Netlink that sees the SYN- ACK response first is used to set up the connection. The firewall cancels other attempts by sending a TCP RESET to the destination through other Netlinks. Information about the performance of each Netlink is cached, so no new measurement is made if a new connection is opened to the same destination within a short time period. Ratio method There are, however, times when a ratio method may be preferred. For example, if one ISP s bandwidth far exceeds other connections being used and is supplemented by smaller ISPs, the smaller ISP may return a faster SYN-ACK. While this may seem like the fastest connection, it may not take into account the proportionate bandwidth available. McAfee Multi-Link can resolve this by using a ratio method. When the ratio method is used, traffic is distributed among all of the available Netlinks according to the relative capacity of the links. The bandwidths of the other Netlinks are automatically compared to the Netlink with the most bandwidth to produce a ratio for distributing the traffic. When the volume of traffic is low, the ratio of actual traffic distribution is approximate. When the volume of traffic is high, the ratio of traffic handled by each Netlink is closer to the ratio calculated from the link capacity. In Figure 37 below, using standard outbound load balancing could result in using the 2 Mbps link even though the 5 Mbps link may be more efficient. Using ratio-based load balancing allows McAfee Multi-Link to take the larger link(s) into consideration to allow for a more granular and efficient use of available links. Figure 37. McAfee Multi-Link load balancing. McAfee Next Generation Firewall Design and Implementation Guide Page 48

49 Quality-of-Service Organizations can optionally assign a QoS class to each Netlink. Assigning a QoS class to a Netlink specifies that traffic with the selected QoS class is routed through the selected Netlink. The same QoS class can be assigned to more than one Netlink. When no QoS class is assigned to a particular Netlink, traffic is routed through that Netlink according to the load-balancing method selected. The actual QoS classes can be assigned to specific traffic in the firewall policy or in the QoS policy based on the differentiated services code point (DSCP) codes of the incoming traffic. Standby Links for High Availability Standby Netlinks allow organizations to define a Netlink as a backup that is only activated when all primary Netlinks are unavailable. This minimizes the use of Netlinks that are more expensive (where the cost is based on the amount of traffic used) or otherwise less preferable, while still ensuring high availability of Internet connectivity. You can define multiple active Netlinks and multiple standby Netlinks. Augmented VPN McAfee Augmented VPN uses McAfee Multi-Link technology to provide a simple and cost-effective way to create fast, secure, high-capacity connections between sites and ensure uninterrupted Internet connectivity. Designed for ease of use, the implementation requires no special equipment, software, or Internet Service Provider (ISP) peering agreements. McAfee Multi-Link enables organizations to flexibly and simultaneously connect to multiple network providers, creating fault-tolerant and highly available connections without having to change existing network infrastructures. With McAfee Augmented VPN, the aggregation of all ISP links is now possible. Link aggregation is a unique feature that enables organizations to combine different ISP lines to obtain a single high-capacity tunnel. McAfee Augmented VPN with McAfee Multi-Link technology enables the prioritization of network flows and the definition of bandwidth portions dedicated to different types of flows. Business applications can have priority on highquality Internet connections, and the rest of the traffic can use more cost-effective Internet connections. When compared to other ISP multi-homing solutions, McAfee increases performance by providing true ISP load balancing, provides greater flexibility for implementation, and significantly reduces administration costs, while adding security to the network with McAfee Next Generation Firewall. In addition, McAfee Multi-Link provides a significant increase in VPN reliability and performance. Failover for VPNs among multiple providers is unique to McAfee Multi- Link technology. For more details on McAfee Augmented VPN, refer to this document: McAfee Next Generation Firewall Design and Implementation Guide Page 49

50 Configuration Let s start by configuring a Netlink. We know that two or more Netlinks form a McAfee Multi-Link. A Netlink typically represents a connection to an ISP. It may be a leased-line or xdsl. Netlinks provide the routing connectivity that can support more than one default route. A Netlink contains: A router element that represents the router for that network connection. A network element that represents the set of public IP addresses allocated by the provider of the network connection. Step-by-step instructions to configure McAfee Multi-Link: 1. Browse to Security Engines Network Elements Traffic Handlers. 2. Right-click Traffic Handles New Static Netlink (Figure 38). The Netlink window will open up. Configure Name, Gateway, Probe IP Address (the address that will communicate with the McAfee Security Management Center), and other aspects of your desired configuration. Figure 38. Create static Netlink. We know that Netlink contains a router element and a network element. 3. Drag and drop the configured Netlinks under the appropriate interfaces. In our example (Figure 39), Netlink RTRB_ISP is configured under Interface 2 and Netlink RTRA_ISP is configured under Interface Drag and drop the Any Network network onto the Netlink. McAfee Next Generation Firewall Design and Implementation Guide Page 50

51 Figure 39. Configure Netlink interface. 5. Group the configured Netlinks together to define an outbound McAfee Multi-Link element. 6. Browse back to Traffic Handlers, right-click and select New Outbound Multi-Link (Figure 40). 7. The properties window will open where you choose the routing method. You can click on Add to add at least two Netlinks. 8. When you click on Add, the McAfee Multi-Link member window opens. Go ahead and add the Netlink configuration based on your preferences. 9. Once everything is configured, click OK. You have now created a McAfee Multi-Link with two Netlinks, just like our lab example (Figure 41). McAfee Next Generation Firewall Design and Implementation Guide Page 51

52 Figure 40. Create outbound McAfee Multi-Link. McAfee Multi-Link for outbound connections is implemented in the firewall policy with network address translation (NAT) rules that define which traffic uses the outbound McAfee Multi-Link element. It is not necessary for all traffic to be balanced through the outbound McAfee Multi-Link element. When a NAT rule that balances outbound connections matches the traffic, only the traffic that matches the rule is balanced through the outbound McAfee Multi-Link element specified in the rule. Other traffic does not use the outbound McAfee Multi-Link element. Figure 41. Active outbound McAfee Multi-Link element. McAfee Next Generation Firewall Design and Implementation Guide Page 52

53 Validation As with clustering, it is always good to stage and test a new configuration like McAfee Multi-Link for high availability environments before deploying into a production environment. Procedure To test the successful function of McAfee Multi-Link, you could disconnect one of the Netlinks, view the changed status within McAfee Security Management Center, and then validate that Internet communication through an ISP is still functioning. Results Figure 42 shows the system status tab of McAfee Security Management Center. We can see the healthy McAfee Multi-Link on the left side, and the routers are online as well. The topology also shows the two Netlinks going outbound through the McAfee Next Generation Firewall cluster. Figure 42. Complete McAfee Multi-Link configuration. McAfee Next Generation Firewall Design and Implementation Guide Page 53

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings McAfee Multi-Link Always-on connectivity with significant savings Table of Contents Executive Summary...3 How McAfee Multi-Link Works...4 Outbound traffic...4 Load balancing...4 Standby links for high

More information

Multi-Link - Firewall Always-on connectivity with significant savings

Multi-Link - Firewall Always-on connectivity with significant savings White Paper Multi-Link - Firewall Always-on connectivity with significant savings multilink.internetworking.ch able of Contents Executive Summary How Multi-Link - Firewalls works Outbound traffic Load

More information

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency. Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High

More information

Whitepaper. StoneGate Multi-Link. Ensuring Always-on Connectivity with Significant Savings

Whitepaper. StoneGate Multi-Link. Ensuring Always-on Connectivity with Significant Savings Ensuring Always-on Connectivity with Significant Savings Contents Executive Summary.................................................. 3 How Multi-Link Works................................................

More information

McAfee Next Generation Firewall

McAfee Next Generation Firewall McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Design and Implementation Guide. Data Center Design Guide: Implement McAfee Next Generation Firewall for the Perimeter

Design and Implementation Guide. Data Center Design Guide: Implement McAfee Next Generation Firewall for the Perimeter Data Center Design Guide: Implement McAfee Next Generation Firewall for the Perimeter Table of Contents Introduction...3 McAfee Next Generation Firewall...3 Purpose of the document....3 Audience...3 Resources...3

More information

McAfee Next Generation Firewall (NGFW) Administration Course

McAfee Next Generation Firewall (NGFW) Administration Course McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,

More information

Advanced Network Protection with McAfee Next Generation Firewall

Advanced Network Protection with McAfee Next Generation Firewall Advanced Network Protection with McAfee Next Generation Firewall A SANS Product Review Written by Dave Shackleford June 2014 Sponsored by McAfee, part of Intel Security 2014 SANS Institute Introduction

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 End-User Authentication Using Active Directory and Network Policy Server C ONTENTS Introduction to NPS Authentication with AD... 2 Registering the NPS

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

F IREWALL/VPN INSTALLATION GUIDE

F IREWALL/VPN INSTALLATION GUIDE STONEGATE 5.1 F IREWALL/VPN INSTALLATION GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Forcepoint Stonesoft Management Center

Forcepoint Stonesoft Management Center Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Appendix C Network Planning for Dual WAN Ports

Appendix C Network Planning for Dual WAN Ports Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

VPN Configuration Guide. Dell SonicWALL

VPN Configuration Guide. Dell SonicWALL VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of

More information

Assuring Your Business Continuity

Assuring Your Business Continuity Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)

More information

McAfee NGFW Installation Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role

McAfee NGFW Installation Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role McAfee NGFW Installation Guide for Firewall/VPN Role 5.7 NGFW Engine in the Firewall/VPN Role Legal Information The use of the products described in these materials is subject to the then current end-user

More information

McAfee SMC Installation Guide 5.7. Security Management Center

McAfee SMC Installation Guide 5.7. Security Management Center McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can

More information

E-commerce Home Office Small Business Network Solution

E-commerce Home Office Small Business Network Solution Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity Reliable, highly available MPLS-based WAN solution

More information

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged Converged Private Networks voice and high-speed data connectivity Reliable, highly

More information

Reliable high throughput data connections with low-cost & diverse transport technologies

Reliable high throughput data connections with low-cost & diverse transport technologies Virtual Leased Line (VLL) for Communications between Offices Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband Bonding Network

More information

F IREWALL/VPN INSTALLATION GUIDE

F IREWALL/VPN INSTALLATION GUIDE STONEGATE 5.3 F IREWALL/VPN INSTALLATION GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

McAfee Security. Management Client

McAfee Security. Management Client Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation

More information

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment What You Will Learn Cisco Systems and Akamai Technologies intend to deliver the world s first combined Cisco Intelligent WAN with

More information

Everything You Need to Know About Network Failover

Everything You Need to Know About Network Failover Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know

More information

Optimal Network Connectivity Reliable Network Access Flexible Network Management

Optimal Network Connectivity Reliable Network Access Flexible Network Management The Intelligent WAN Load Balancer Aggregating Links For Maximum Performance Optimal Network Connectivity Reliable Network Access Flexible Network Management Enterprises are increasingly relying on the

More information

Stonesoft Augmented VPN WITH MULTI-LINK TECHNOLOGY

Stonesoft Augmented VPN WITH MULTI-LINK TECHNOLOGY Stonesoft Augmented VPN WITH MULTI-LINK TECHNOLOGY Trends 1 2 3 4 Online production systems need to be available at all times and from any location Organizations are geographically distributed. Remote

More information

Nominee: Barracuda Networks

Nominee: Barracuda Networks Nominee: Barracuda Networks Nomination title: Barracuda Next Generation Firewall The Barracuda NG (Next Generation) Firewall is much more than a traditional firewall. It is designed to protect network

More information

Cisco Easy VPN on Cisco IOS Software-Based Routers

Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN Solution Overview The Cisco Easy VPN solution (Figure 1) offers flexibility, scalability, and ease of use for site-to-site and remoteaccess

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

Web Request Routing. Technical Brief. What s the best option for your web security deployment? Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments Page 0 2015 SOLUTION BRIEF MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments NET ACCESS LLC 9 Wing Drive Cedar Knolls NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction...

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,

More information

Supporting voice and business-critical applications across multiple sites

Supporting voice and business-critical applications across multiple sites MPLS Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity Reliable, highly available MPLS-based WAN solution that supports

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

White Paper: Broadband Bonding with Truffle PART I - Single Office Setups

White Paper: Broadband Bonding with Truffle PART I - Single Office Setups PART I - Single Office Setups Truffle boosting WAN banwidth and reliability for a single office The Truffle Broadband Bonding Network Appliance enables an SMB (Small and Medium Sized Business) or an enterprise

More information

Configuring High Availability for Embedded NGX Gateways in SmartCenter

Configuring High Availability for Embedded NGX Gateways in SmartCenter Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

ENTERPRISE CONNECTIVITY

ENTERPRISE CONNECTIVITY ENTERPRISE CONNECTIVITY IP Services for Business, Governmental & Non-Governmental Organizations The success of today s organizations and enterprises highly depends on reliable and secure connectivity.

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks Stonesoft 5.5 Firewall/VPN Reference Guide Firewall Virtual Private Networks Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Whitepaper. A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity

Whitepaper. A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity Whitepaper A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity Table of Content Executive Overview 1 The Challenge 1 The Solution: Multi-Link Technology 3 Making Your VPNs Reliable

More information

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

IP Address Management: Smoothing the Way to Cloud-Based Services

IP Address Management: Smoothing the Way to Cloud-Based Services White Paper IP Address Management: Smoothing the Way to Cloud-Based Services What You Will Learn Cloud computing offers many operational advantages to service providers. An important element of successful

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

MANAGED DATABASE SOLUTIONS

MANAGED DATABASE SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution

More information

McAfee NGFW Reference Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role

McAfee NGFW Reference Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role McAfee NGFW Reference Guide for Firewall/VPN Role 5.7 NGFW Engine in the Firewall/VPN Role Legal Information The use of the products described in these materials is subject to the then current end-user

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations

More information

Virtualized Network Services SDN solution for enterprises

Virtualized Network Services SDN solution for enterprises Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations

More information

Achieving Network Nirvana

Achieving Network Nirvana TCO Whitepaper Achieving Network Nirvana How to Reduce Costs and Complexities While Optimizing Security and Performance T C O W h i t e p a p e r A c h i e v i n g N e t w o r k N i r v a n a 1 Table of

More information

White Paper: Virtual Leased Line

White Paper: Virtual Leased Line Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

Vyatta Network OS for Network Virtualization

Vyatta Network OS for Network Virtualization Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components

More information

White Paper. Complementing or Migrating MPLS Networks

White Paper. Complementing or Migrating MPLS Networks White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating

More information

F IREWALL/VPN REFERENCE GUIDE

F IREWALL/VPN REFERENCE GUIDE STONEGATE 5.3 F IREWALL/VPN REFERENCE GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

High Level Overview of IPSec and MPLS IPVPNs

High Level Overview of IPSec and MPLS IPVPNs IPVPN High Level Overview of IPSec and MPLS IPVPNs Date: 16/0/05 Author: Warren Potts Version: 1.1 Abstract This document provides a high level overview of the differences between IPSec and MPLS based

More information

StoneGate Installation Guide

StoneGate Installation Guide SMC FW IPS SSL VPN VPN StoneGate Installation Guide SOHO Firewalls Updated for StoneGate Management Center 5.0.0 Legal Information End-User License Agreement The use of the products described in these

More information

Building Your Complete Remote Access Infrastructure on Windows Server 2012

Building Your Complete Remote Access Infrastructure on Windows Server 2012 Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad

More information

DOMINO Broadband Bonding Network

DOMINO Broadband Bonding Network 2 DOMINO AGGREGATION DE VOIES ETHERNET N 1 Bridging to the Future par [Hypercable] DOMINO DOMINO Broadband BondingTM Network Appliance With cellular data card failover/aggregation capability DANS CE NUMERO

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide

More information

The Hybrid Enterprise. Enhance network performance and build your hybrid WAN

The Hybrid Enterprise. Enhance network performance and build your hybrid WAN The Hybrid Enterprise Enhance network performance and build your hybrid WAN ABOUT ELFIQ NETWORKS With today s growing Internet demands, Elfiq Networks enhances network performance and business continuity

More information