Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks

Size: px
Start display at page:

Download "Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks"

Transcription

1 Stonesoft 5.5 Firewall/VPN Reference Guide Firewall Virtual Private Networks

2 Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user license agreement, which can be found at the Stonesoft website: Third Party Licenses The Stonesoft software includes several open source or third-party software packages. The appropriate software licensing information for those products can be found at the Stonesoft website: U.S. Government Acquisitions If Licensee is acquiring the Software, including accompanying documentation on behalf of the U.S. Government, the following provisions apply. If the Software is supplied to the Department of Defense ( DoD ), the Software is subject to Restricted Rights, as that term is defined in the DOD Supplement to the Federal Acquisition Regulations ( DFAR ) in paragraph (c) (1). If the Software is supplied to any unit or agency of the United States Government other than DOD, the Government s rights in the Software will be as defined in paragraph (c) (2) of the Federal Acquisition Regulations ( FAR ). Use, duplication, reproduction or disclosure by the Government is subject to such restrictions or successor provisions. Product Export Restrictions The products described in this document are subject to export control under the laws of Finland and the European Council Regulation (EC) N:o 1334/2000 of 22 June 2000 setting up a Community regime for the control of exports of dual-use items and technology (as amended). Thus, the export of this Stonesoft software in any manner is restricted and requires a license by the relevant authorities. General Terms and Conditions of Support and Maintenance Services The support and maintenance services for the products described in these materials are provided pursuant to the general terms for support and maintenance services and the related service description, which can be found at the Stonesoft website: Replacement Service The instructions for replacement service can be found at the Stonesoft website: Hardware Warranty The appliances described in these materials have a limited hardware warranty. The terms of the hardware warranty can be found at the Stonesoft website: Trademarks and Patents The products described in these materials are protected by one or more of the following European and US patents: European Patent Nos , , , , , , , , , , , , , , and and US Patent Nos. 6,650,621; 6,856,621; 6,912,200; 6,996,573; 7,099,284; 7,127,739; 7,130,266; 7,130,305; 7,146,421; 7,162,737; 7,234,166; 7,260,843; 7,280,540; 7,325,248; 7,360,242; 7,386,525; 7,406,534; 7,461,401; 7,573,823; 7,721,084; and 7,739,727 and may be protected by other EU, US, or other patents, or pending applications. Stonesoft, the Stonesoft logo and StoneGate, are all trademarks or registered trademarks of Stonesoft Corporation. All other trademarks or registered trademarks are property of their respective owners. Disclaimer Although every precaution has been taken to prepare these materials, THESE MATERIALS ARE PROVIDED "AS-IS" and Stonesoft makes no warranty to the correctness of information and assumes no responsibility for errors, omissions, or resulting damages from the use of the information contained herein. All IP addresses in these materials were chosen at random and are used for illustrative purposes only. Copyright 2013 Stonesoft Corporation. All rights reserved. All specifications are subject to change. Revision: SGFRG_

3 TABLE OF CONTENTS INTRODUCTION CHAPTER 1 Using Stonesoft Documentation How to Use This Guide Documentation Available Product Documentation Support Documentation System Requirements Supported Features Contact Information Licensing Issues Technical Support Your Comments Other Queries CHAPTER 2 Introduction to Firewalls The Role of the Firewall Firewall Technologies Packet Filtering Proxy Firewalls Stateful Inspection Stonesoft Multi-Layer Inspection Additional Firewall Features Authentication Deep Packet Inspection and Unified Threat Management Integration With External Content Inspection.. 22 Load Balancing and Traffic Management Logging and Reporting Network Address Translation (NAT) VPNs Firewall Weaknesses Complexity of Administration Single Point of Failure Worms, Viruses, and Targeted Attacks CHAPTER 3 Introduction to Stonesoft Firewalls The Stonesoft Security Platform Stonesoft Firewall/VPN System Components.. 27 Firewall/VPN Engines Main Benefits of Stonesoft Firewall/VPN Advanced Traffic Inspection Built-in Clustering for Load Balancing and High Availability Multi-Link Technology Built-in Inbound Traffic Management QoS and Bandwidth Management Integration with Stonesoft IPS and Stonesoft Layer 2 Firewalls Clustered Multi-Link VPNs CHAPTER 4 Stonesoft Firewall/VPN Deployment Deployment Overview Supported Platforms General Deployment Guidelines Positioning Firewalls External to Internal Network Boundary Internal Network Boundaries DMZ Network Boundaries INTERFACES AND ROUTING CHAPTER 5 Single Firewall Configuration Overview to Single Firewall Configuration Configuration of Single Firewalls Dynamic Firewall Interface Addresses Internal DHCP Server Security Strength of Management Connections 43 Configuration Workflow Task 1: Create Single Firewall Elements Task 2: Define Physical Interfaces Task 3: Define VLAN Interfaces Task 4: Define Tunnel Interfaces Task 5: Define an ADSL Interface Task 6: Define a Wireless Interface Task 7: Define IP Addresses Task 8: Define Loopback IP Addresses Task 9: Define Modem Interfaces Task 10: Install the Firewall Engine Task 11: Install a Firewall Policy Example of a Single Firewall Deployment Setting up a Single Firewall Adding a New Interface to an Existing Configuration Table of Contents 3

4 CHAPTER 6 Firewall Cluster Configuration Overview to Firewall Cluster Configuration Benefits of Clustering Communication Between the Nodes Hardware Security Strength of Management Connections 51 Configuration of Firewall Clusters Load Balancing Standby Operation Network Interfaces and IP Addresses Clustering Modes How Packet Dispatch Works Configuration Workflow Task 1: Create a Firewall Cluster Element Task 2: Create Physical Interfaces Task 3: Define VLAN Interfaces Task 4: Define Tunnel Interfaces Task 5: Configure Physical or VLAN Interfaces Task 6: Define Loopback IP Addresses Task 7: Install the Firewall Engines Task 8: Install a Firewall Policy Using a Firewall Cluster Internal DHCP Server Node State Synchronization Security Level for State Synchronization Manual Load Balancing Examples of Firewall Cluster Deployment Setting up a Firewall Cluster Adding a Node to a Firewall Cluster CHAPTER 7 Master Engine and Virtual Firewall Configuration Overview to Master Engine and Virtual Firewall Configuration Configuration of Master Engines and Virtual Firewalls Configuration Workflow Task 1: Create a Master Engine Element Task 2: Create Virtual Resource Element(s) Task 3: Configure Master Engine Interfaces Task 4: Create a Virtual Firewall Element Task 5: Configure Virtual Firewall Interfaces Task 6: Install a Firewall Policy Using Master Engines and Virtual Firewalls Moving a Virtual Firewall to a Different Master Engine Using Master Engines and Virtual Firewalls With Domains Example of Master Engine and Virtual Firewall Deployment Deploying Virtual Firewalls for MSSP Customers CHAPTER 8 Routing and Antispoofing Overview to Routing and Antispoofing Configuration of Routing and Antispoofing Reading the Routing and Antispoofing Trees.. 70 Multi-Link Routing for Single and Clustered Firewalls Default Elements Configuration Workflow Task 1: Add Router or NetLink Task 2: Add Network(s) Task 3: Refresh Firewall Policy Using Routing and Antispoofing Policy Routing Multicast Routing Modifying Antispoofing Monitoring Routing Examples of Routing Routing Traffic with Two Interfaces Routing Internet Traffic with Multi-Link Routing Traffic to Networks That Use Same Address Space ACCESS CONTROL POLICIES CHAPTER 9 Firewall Policies Overview to Firewall Policies Policy Hierarchy How the Engine Examines Traffic Configuration of Policy Elements Default Elements Table of Contents

5 Configuration Workflow Task 1: Create a Template Policy Task 2: Create a Policy Task 3: Create a Firewall Sub-Policy Task 4: Install the Policy Using Policy Elements and Rules Validating Policies User Responses Connection Tracking vs. Connectionless Packet Inspection Policy Snapshots Continue Rules Adding Comments to Rules Examples of Policy Element Use Protecting Essential Communications Improving Readability and Performance Restricting Administrator Editing Rights CHAPTER 10 Access Rules Overview to Access Rules Configuration of Access Rules Considerations for Designing Access Rules Default Elements Configuration Workflow Task 1: Define the Source and Destination Task 2: Define the Service Task 3: Select the Action and Action Options Task 4: Select Logging Options Task 5: Add User Authentication Requirements Task 6: Restrict the Time When the Rule Is Enforced Task 7: Restrict the Rule Match Based on Source VPN Using Access Rules Allowing System Communications Configuring Default Settings for Several Rules 107 Using Continue Rules to Set Logging Options Using Continue Rules to Set the Protocol Using Aliases in Access Rules Creating User-Specific Access Rules Using Domain Names in Access Rules Interface Matching in Access Rules Examples of Access Rules Example of Rule Order Example of Continue Rules Example of User-Specific Rules CHAPTER 11 Inspection Policies Overview to Inspection Policies Configuration of Inspection Policies Verifying and Tuning Inspection Considerations for Designing Inspection Policies Exception Rule Cells Default Elements Configuration Workflow Task 1: Create an Inspection Policy Task 2: Activate Deep Inspection in Firewall Policies Task 3: Activate the Relevant Inspection Checks Task 4: Define the Exceptions Task 5: Eliminate False Positives Task 6: Add Custom Inspection Checks Using Inspection Policies Setting Default Options for Several Inspection Exceptions Importing Snort Rules Libraries Example of Inspection Rules Eliminating a False Positive CHAPTER 12 Network Address Translation (NAT) Rules Overview to NAT Static Source Translation Dynamic Source Translation Static Destination Translation Destination Port Translation Configuration of NAT Considerations for Designing NAT Rules Default Elements Configuration Workflow Task 1: Define Source, Destination, and Service Task 2: Define Address Translation Task 3: Define the Firewall(s) that Apply the Rule Task 4: Check Other Configurations Using NAT and NAT Rules NAT and System Communications Table of Contents 5

6 Example of a Situation Where a Contact Address is Needed Contact Addresses and Locations Outbound Load Balancing NAT Proxy ARP and NAT Protocols and NAT Examples of NAT Dynamic Source Address Translation Static Address Translation NAT with Hosts in the Same Network CHAPTER 13 Protocol Agents Overview to Protocol Agents Connection Handling Protocol Validation NAT in Application Data Configuration of Protocol Agents Configuration Workflow Task 1: Create a Custom Service with a Protocol Agent Task 2: Set Parameters for the Protocol Agent Task 3: Insert the Service in Access Rules Using Protocol Agents FTP Agent GRE Agent H323 Agent HTTP Agent HTTPS Agent MSRPC Agent NetBIOS Agent Oracle Agent Services in Firewall Agent Shell Agent SIP Agent SMTP Agent SSH Agent SunRPC Agent TCP Proxy Agent TFTP Agent Examples of Protocol Agent Use Preventing Active Mode FTP Logging URLs Accessed by Internal Users CHAPTER 14 TLS Inspection Overview to TLS Inspection Configuration of TLS Inspection Default Elements Configuration Workflow Task 1: Create Server Credentials Elements Task 2: Create Client Protection Certificate Authority Elements Task 3: Exclude Traffic from Decryption and Inspection Task 4: Activate TLS Inspection Using TLS Inspection Security Considerations Virus Scanning of Decrypted TLS Traffic Web Filtering Decrypted TLS Traffic Examples of TLS Inspection Server Protection Client Protection CHAPTER 15 Web Filtering Overview to Web Filtering Configuration of Web Filtering Default Elements Configuration Workflow Task 1: Prepare the Firewall Task 2: Create User Response Messages Task 3: Blacklist/Whitelist Individual URLs. 162 Task 4: Configure Web Filtering Rules in the Policy Examples of Web Filtering Allowing a Blocked URL CHAPTER 16 Spam Filtering Overview to Spam Filtering Configuring Spam Filtering Configuration Workflow Task 1: Define Spam Filtering for a Firewall Task 2: Select Traffic for Inspection with Access Rules Task 3: Select Traffic Not to Be Filtered Using Spam Filtering Anti-Spoofing and Anti-Relay Protection Handling Address Forgery Spam Filter Sensitivity Settings Table of Contents

7 Spam Filtering Rules DNS-Based Blackhole Lists CHAPTER 17 Virus Scanning Overview to Virus Scanning Configuration of Virus Scanning Configuration Workflow Task 1: Activate the Anti-Virus Feature for a Firewall Task 2: Select Traffic for Inspection with Access Rules Task 3: Define the Content Not to Be Scanned Using Virus Scanning Integrated Scanning vs. Content Inspection Server Limitations of Virus Scanning on Clusters CHAPTER 18 External Content Inspection Overview to Content Inspection Configuration of Content Inspection Default Elements Configuration Workflow Task 1: Create a CIS Server Element Task 2: Create a Custom Service for Content Inspection Server Redirection Task 3: Define Access Rules for Redirection Task 4: Configure NAT Rules for Content Inspection Server Redirection Using Content Inspection Example of Content Inspection Inspecting Internal User s Web Browsing and File Transfers CHAPTER 19 Situations Overview to Situations Configuration of Situations Situation Contexts Correlation Contexts Anti-Virus Contexts DoS Detection Contexts Scan Detection Contexts Protocol-Specific Contexts File Contexts System Contexts Default Elements Configuration Workflow Task 1: Create a Situation Element Task 2: Add a Context for the Situation Task 3: Associate Tags and/or Situation Types with the Situation Task 4: Associate the Situation with a Vulnerability Using Situations Example of Custom Situations Detecting the Use of Forbidden Software CHAPTER 20 Applications Overview to Applications Configuration of Applications Default Elements Configuration Workflow Task 1: Define TLS Matches Task 2: Create Access Rules Examples of Applications Blocking Application Use CHAPTER 21 Blacklisting Overview to Blacklisting Risks of Blacklisting Configuration of Blacklisting Configuration Workflow Task 1: Define Blacklisting in Access Rules Task 2: Define Exceptions in the Inspection Policy Using Blacklisting Manual Blacklisting Monitoring Blacklisting Whitelisting USERS AND AUTHENTICATION CHAPTER 22 Directory Servers Overview to Directory Servers Configuration of Directory Servers Internal User Database Authentication Server User Linking External Directory Server Integration User Agents for Active Directory Table of Contents 7

8 Configuration Workflow Task 1: Create an LDAP Server or an Active Directory Server Element Task 2: Add an LDAP Domain Task 3: Add Users and User Groups or Link Users Task 4: Install and Configure the User Agent Examples of Directory Servers Using the Internal User Database Integrating a Microsoft Active Directory Server 204 CHAPTER 23 User Authentication on the Firewall Overview to User Authentication on the Firewall 206 Configuration of User Authentication on the Firewall Default Elements Configuration Workflow Task 1: Define User Authentication in IPv4 Access Rules Task 2: Configure User Authentication Interfaces Example of User Authentication on the Firewall. 209 Authenticating VPN Client Users CHAPTER 24 External User Authentication Overview to External User Authentication Configuration of External User Authentication Directory Servers for External User Authentication RADIUS Authentication TACACS+ Authentication Authentication Methods Federated Authentication Default Elements Configuration Workflow Task 1: Define Servers Task 2: Associate Authentication Methods with Servers Task 3: Define User Authentication in IPv4 Access Rules Task 4: Configure User Authentication Interfaces Examples of External User Authentication Integrating a Microsoft Active Directory Server 218 Using SecurID Authentication with Stonesoft IPsec VPN Clients TRAFFIC MANAGEMENT CHAPTER 25 Outbound Traffic Management Overview to Outbound Traffic Management Configuration of Multi-Link Load Balancing Methods Standby NetLinks for High Availability Link Status Probing Configuration Workflow Task 1: Create NetLink Elements Task 2: Configure Routing for NetLinks Task 3: Combine NetLinks into Outbound Multi-Link Elements Task 4: Create NAT Rules for Outbound Traffic Using Multi-Link Multi-Link with a Single Firewall Multi-Link with a Firewall Cluster Using Multiple Outbound Multi-Link Elements. 229 Examples of Multi-Link Preparing for ISP Breakdown Excluding a NetLink from Handling a QoS Class of Traffic Balancing Traffic According to Link Capacity Balancing Traffic between Internet Connections 231 CHAPTER 26 Inbound Traffic Management Overview to Server Pool Configuration Configuration of Server Pools Multi-Link for Server Pools Default Elements Configuration Workflow Task 1: Define Hosts Task 2: Combine Hosts into a Server Pool Element Task 3: Configure the External DNS Server Task 4: Create an Inbound Load Balancing Rule Task 5: Set up Server Pool Monitoring Agents Using Server Pools Dynamic DNS (DDNS) Updates Using Server Pool Monitoring Agents Examples of Server Pools Load Balancing for Web Servers Table of Contents

9 Setting up Multi-Link and Dynamic DNS Updates CHAPTER 27 Bandwidth Management and Traffic Prioritization Overview to Bandwidth Management and Traffic Prioritization Bandwidth Management Traffic Prioritization Effects of Bandwidth Management and Prioritization Configuration of Limits, Guarantees, and Priorities for Traffic Default Elements Configuration Workflow Task 1: Define QoS Classes Task 2: Define QoS Policies Task 3: Assign QoS Classes to Traffic Task 4: Define QoS for Interfaces and VPNs Using Bandwidth Management and Traffic Prioritization Designing QoS Policies Communicating DSCP Markers Managing Bandwidth of Incoming Traffic Collecting QoS Class-Based Statistics Examples of Bandwidth Management and Traffic Prioritization Ensuring Quality of Important Communications 254 Preparing for ISP Breakdown Limiting the Total Bandwidth Required VIRTUAL PRIVATE NETWORKS CHAPTER 28 Overview to VPNs Introduction to VPNs IPsec VPNs Tunnels Security Associations (SA) Internet Key Exchange (IKE) Perfect Forward Secrecy (PFS) Authentication Header (AH) and Encapsulating Security Payload (ESP) Authentication Tunnel and Transport Modes IPsec VPN Topologies for Policy-Based VPNs CHAPTER 29 Policy-Based VPN Configuration Overview to Policy-Based VPN Configuration Configuration of Policy-Based VPNs Default Elements Configuration Workflow Task 1: Define the Gateway Settings Task 2: Define the Gateway Profile Task 3: Define the Gateways Task 4: Define the Sites Task 5: Create Certificates Task 6: Define the VPN Profile Task 7: Define the VPN Element Task 8: Modify the Firewall Policy Task 9: Configure VPN Clients and External Gateway Devices Using VPNs VPN Logging Using a Dynamic IP Address for a VPN End-Point Using a NAT Address for a VPN End-Point Supported Authentication and Encryption Methods FIPS Mode GOST-Compliant Systems Message Digest Algorithms Authentication Methods Encryption Algorithms Using Pre-Shared Key Authentication Using Certificate Authentication Validity of Certificates Internal VPN Certificate Authorities External Certificate Authorities Configuring Policy-Based VPNs with External Gateway Devices Clustering and Policy-Based VPNs Multi-Link and Policy-Based VPNs Providing Encryption for the Route-Based VPN in Tunnel Mode Examples of Policy-Based VPN Configurations. 287 Creating a Policy-Based VPN Between Three Offices Creating a Policy-Based VPN for Mobile Users 289 Creating a Policy-Based VPN That Requires NAT Table of Contents 9

10 CHAPTER 30 Route-Based VPN Configuration Overview to Route-Based VPN Configuration Configuration of the Route-Based VPN Default Elements Configuration Workflow Task 1: Define Tunnel Interfaces Task 2: Configure Routing and Antispoofing for Tunnel Interfaces Task 3: Define the Gateways Task 4: Define the VPN Profile Task 5: Define Route-Based VPN Tunnels Task 6: Add Access Rules to Allow the Traffic Task 7: Refresh Firewall Policy Using the Route-Based VPN Configuring the Route-Based VPN with External Gateway Devices Using the Route-Based VPN in Tunnel Mode Using the Route-Based VPN with Dynamic Routing Examples of Route-Based VPN Configurations Protecting Dynamic Routing Communications. 300 Configuring a Route-Based VPN with an External Gateway APPENDICES APPENDIX A Command Line Tools Management Center Commands Engine Commands Server Pool Monitoring Agent Commands APPENDIX B Default Communication Ports Management Center Ports Security Engine Ports APPENDIX C Predefined Aliases Predefined User Aliases System Aliases APPENDIX D Situation Context Parameters Port/Host Scan Detection Parameters Correlation Context Parameters Regular Expression Parameter Other Context Parameters APPENDIX E Regular Expression Syntax Syntax for Stonesoft Regular Expressions Special Character Sequences Pattern-Matching Modifiers Bit Variable Extensions Variable Expression Evaluation Stream Operations Other Expressions System Variables Independent Subexpressions Parallel Matching Groups APPENDIX F Schema Updates for External LDAP Servers APPENDIX G SNMP Traps and MIBs APPENDIX H Multicasting The General Features of Multicasting Multicasting vs. Unicasting Multicasting vs. Broadcasting IP Multicasting Overview Multicasting Applications Internet Group Management Protocol Membership Messages Ethernet Multicasting Multicasting and Stonesoft Firewalls Unicast MAC Multicast MAC Multicast MAC with IGMP Glossary Index Table of Contents

11 INTRODUCTION In this section: Using Stonesoft Documentation - 13 Introduction to Firewalls - 17 Introduction to Stonesoft Firewalls - 25 Stonesoft Firewall/VPN Deployment

12 12

13 CHAPTER 1 USING STONESOFT DOCUMENTATION This chapter describes how to use this Guide and related documentation. It also provides directions for obtaining technical support and giving feedback about the documentation. The following sections are included: How to Use This Guide (page 14) Documentation Available (page 15) Contact Information (page 16) 13

14 How to Use This Guide This Reference Guide provides information that helps administrators of Stonesoft Firewalls understand the system and its features. It provides high-level descriptions and examples of the configuration workflows. This guide is divided into several sections. The chapters in the first section provide a general introduction to Stonesoft Firewalls. The sections that follow each include chapters related to one feature area. The last section provides detailed reference information in tabular form, and some guideline information. For other available documentation, see Documentation Available (page 15). Typographical Conventions The following conventions are used throughout the documentation: Table 1.1 Typographical Conventions Formatting User Interface text References, terms Command line User input Command parameters Informative Uses Text you see in the User Interface (buttons, menus, etc.) and any other interaction with the user interface are in bold-face. Cross-references and first use of acronyms and terms are in italics. File names, directories, and text displayed on the screen are monospaced. User input on screen is in monospaced bold-face. Command parameter names are in monospaced italics. We use the following ways to indicate important or additional information: Note Notes prevent commonly-made mistakes by pointing out important points. Caution Cautions prevent breaches of security, information loss, or system downtime. Cautions always contain critical information that you must observe. Tip Tips provide additional helpful information, such as alternative ways to complete steps. Example Examples present a concrete scenario that clarifies the points made in the adjacent text. 14 Chapter 1 Using Stonesoft Documentation

15 Documentation Available Stonesoft technical documentation is divided into two main categories: Product Documentation and Support Documentation (page 16). Each Stonesoft product has a separate set of manuals. Product Documentation The table below lists the available product documentation. Table 1.2 Product Documentation Guide Reference Guide Installation Guide Online Help Administrator s Guide User s Guide Appliance Installation Guide Description Explains the operation and features of the Stonesoft system comprehensively. Demonstrates the general workflow and provides example scenarios for each feature area. Available as separate guides for Stonesoft Management Center and Stonesoft Firewall/ VPN, and as a combined guide for Stonesoft IPS and Stonesoft Layer 2 Firewall. Instructions for planning, installing, and upgrading a Stonesoft system. Available as separate guides for Stonesoft Management Center and Stonesoft Firewall/VPN, and as a combined guide for Stonesoft IPS and Stonesoft Layer 2 Firewall. Describes how to configure and manage the system step-by-step. Accessible through the Help menu and by using the Help button or the F1 key in any window or dialog. Available in the Stonesoft Management Client and the Stonesoft Web Portal. An HTML-based system is available in the Stonesoft SSL VPN Administrator through help links and icons. Describes how to configure and manage the system step-by-step. Available as a combined guide for Stonesoft Firewall/VPN, Stonesoft IPS, and Stonesoft Layer 2 Firewall, and as separate guides for Stonesoft SSL VPN and Stonesoft IPsec VPN Client. Instructions for end-users. Available for the Stonesoft IPsec VPN Client and the Stonesoft Web Portal. Instructions for physically installing and maintaining Stonesoft appliances (rack mounting, cabling, etc.). Available for all Stonesoft hardware appliances. PDF guides are available at current/. The Stonesoft Administrator s Guide, and the Reference Guides and Installation Guides for Stonesoft Management Center, Stonesoft Firewall/VPN, Stonesoft IPS, and Stonesoft Layer 2 Firewall are also available as PDFs on the Management Center DVD. Documentation Available 15

16 Support Documentation The Stonesoft support documentation provides additional and late-breaking technical information. These technical documents support the Stonesoft Guide books, for example, by giving further examples on specific configuration scenarios. The latest Stonesoft technical documentation is available on the Stonesoft web site at System Requirements The certified platforms for running Stonesoft engine software can be found at the product pages at The hardware and software requirements for the version you are running can also be found in the Release Notes available at Supported Features Not all features are supported on all platforms. See the Appliance Software Support Table at the Stonesoft Support Documentation pages for more information. Contact Information For street addresses, phone numbers, and general information about Stonesoft products and Stonesoft Corporation, visit our web site at Licensing Issues You can view your current licenses at the License Center section of the Stonesoft web site at For license-related queries, Technical Support Stonesoft offers global technical support services for Stonesoft s product families. For more information on technical support, visit the Support section at the Stonesoft web site at Your Comments We want to make our products fulfill your needs as well as possible. We are always pleased to receive any suggestions you may have for improvements. To comment on software and hardware products, feedback@stonesoft.com. To comment on the documentation, documentation@stonesoft.com. Other Queries For queries regarding other matters, info@stonesoft.com. 16 Chapter 1 Using Stonesoft Documentation

17 CHAPTER 2 INTRODUCTION TO FIREWALLS This chapter introduces and discusses the underlying security principles of firewalls in general. In this chapter we will discuss what firewalls are, which different types of firewalls there are, how they are used, what they are capable of, as well as what their possible weaknesses are. The following sections are included: The Role of the Firewall (page 18) Firewall Technologies (page 19) Additional Firewall Features (page 21) Firewall Weaknesses (page 24) 17

18 The Role of the Firewall Firewalls are the primary tool for perimeter access control between networks with different security levels. Firewalls control the traffic between networks and deny access that does not look like acceptable business use as defined by the administrators. The generally accepted principle of access control is whatever is not expressly permitted is denied. The most secure network is achieved when nobody and nothing is permitted entry to the protected network. In most cases, such a network is naturally too limited, so a firewall must be introduced to allow specific limited services to pass in a safe way. That means that in order for any traffic to be allowed into the network, it must first match an explicit allow rule. There are three main types of platforms for running a firewall: Dedicated firewall appliances. Firewall software installed on a server dedicated to be used as a firewall. Firewall software running as a virtual machine in a virtualized server environment. Stonesoft Firewalls are available on all of these platform types. Regardless of the type of platform, the network structure in which the firewalls are placed must be carefully designed so that there are no loopholes or back doors. Firewalls can only control traffic that actually passes through them; even the most carefully planned firewall system can be undermined by a single back door that allows traffic to circumvent the firewall. In addition to access control, modern firewall devices often include a variety of additional integrated features, such as intrusion prevention systems (IPS), content filtering, anti-virus, and anti-spam. In this chapter, the additional features are discussed separately, and the discussion focuses on the primary role of access control. Such additional features in Stonesoft Firewalls are covered in more detail in section Additional Firewall Features (page 21). 18 Chapter 2 Introduction to Firewalls

19 Firewall Technologies This section presents an overview to the main firewall techniques, and explains how Stonesoft Firewalls use them. The discussion here is limited to the traditional firewall component of a firewall system; the various additional inspection features that modern firewalls often incorporate are discussed separately. Traditional firewall features are commonly achieved through three main techniques: packet filtering proxy firewalls stateful inspection. The next sections first discuss these techniques separately and then explains how they can be utilized together to achieve an optimal balance between performance and security. Packet Filtering Packet filtering examines the header information of packets and allows or stops each packet individually. In addition to firewalls, such simple access control lists (ACLs) are implemented on most common routing devices. Pure packet filters cannot protect against protocol misuse or other malicious contents in higher levels of the protocol stack. However, for some simple network protocols, packet filtering can be light on firewall resources and even provide an adequate level of protection. Proxy Firewalls Proxy firewalls are firewalls running application proxy services. Proxies are a man-in-the-middle, and they establish their own separate connections to both the client and the server. This type of firewall is fully application-aware, and therefore very secure, but at the same time there s a trade-off in performance due to the inevitable increase in overhead. Illustration 2.1 Proxy Firewall Model Firewall Technologies 19

20 Stateful Inspection Stateful inspection firewalls are aware of basic networking standards and use historical data about connections in determining whether to allow or stop a packet. They track the established connections and their states in dynamic state tables and ensure that the connections comply with the security policies and protocol standards. Since stateful inspection understands the context of connections (and therefore can relate the returning packets to appropriate connections), connections already determined to be secure can be allowed without full examination based on previous packets. This is especially important with services such as FTP, which can open several related connections that do not match a single basic profile. Even though Stateful inspection has some application awareness, it concentrates on protocols, not on inspecting data at the application layer. Stonesoft Multi-Layer Inspection Stonesoft Multi-Layer Inspection combines application layer inspection, stateful inspection, and packet filtering technologies flexibly for optimal security and system performance. Like stateful inspection, the Stonesoft Firewall uses state tables to track connections and judge whether a packet is a part of an established connection or not. The Stonesoft Firewall also features application-layer inspection through specific Protocol Agents, when necessary, for enhanced security to inspect data all the way up to the application layer. The Stonesoft Firewall can also act as a packet filter for types of connections that do not require the security considerations of stateful inspection. Illustration 2.2 Multi-layer Inspection Model By default, all Stonesoft Firewall Access rules implement stateful inspection, but the administrator can flexibly configure rules with simple packet filtering or an additional layer of application level security as needed. Stonesoft Firewalls apply application level inspection with or without proxying the connections, depending on what is required. Application level inspection can be selected to certain types of traffic by attaching a connection to a protocol-specific Protocol Agent. 20 Chapter 2 Introduction to Firewalls

21 Protocol Agents are also used to handle protocols that generate complex connection patterns, to redirect traffic to content inspection servers, and to modify data payload if necessary. For example, the FTP Protocol Agent, can inspect the control connection and only allow packets containing valid FTP commands. If an FTP data connection is opened using a dynamically assigned port, the Protocol Agent reads the port and allows the traffic. If NAT (network address translation) is applied to the connection, the Protocol Agent can also modify the IP address and port transported in the packet payload to allow the connection to continue despite the NAT. The Protocol Agents are covered in more detail in Protocol Agents (page 141). Additional Firewall Features A firewall can have several different functions on a network. Although a firewall s primary function is to control network access, they can be used in several complementary roles depending on the firewall product used. This section concentrates on the main features available in Stonesoft Firewalls. Authentication The primary task of any firewall is to control access to data resources, so that only authorized connections are allowed. Adding an authentication requirement to firewall policies allows the firewall to also consider the user before access is granted. For more information on authentication, see User Authentication on the Firewall (page 205) and External User Authentication (page 211). Deep Packet Inspection and Unified Threat Management Deep packet inspection includes measures such as virus detection, web content filtering, intrusion detection, or some other check of the actual data being transferred. When several such features are combined together with a firewall, the solution is often called unified threat management (UTM). Stonesoft s UTM solution includes: Virus checking. URL filtering. Intrusion detection. By combining several features, a UTM solution simplifies the physical network setup and makes the administration simpler. However, device performance limits can be quickly reached when several advanced inspection features are active. Therefore, UTM firewalls are generally used in environments where the traffic load stays relatively low even at peak times. When higher traffic volumes are needed, external content inspection servers and IPS devices are more often used for further inspecting the traffic. For more information on the advanced traffic inspection features, see Inspection Policies (page 115), Virus Scanning (page 169), and Web Filtering (page 159). Additional Firewall Features 21

22 Integration With External Content Inspection External content inspection servers (CIS) are a preferred choice in high traffic environments, as they offer better hardware optimization. Content inspection services can be run on a dedicated physical or virtual server that can be configured, scaled, and exchanged independently from the firewall. The firewall redirects the traffic to the CIS, which either strips anything deemed malicious from the packet or drops the packet altogether, according to what the security rules in force on the CIS define. Screened traffic continues to the destination. Illustration 2.3 Content Screening with CIS Client Firewall Server Content Inspection Server For instance, incoming SMTP traffic could be forwarded from the firewall to the CIS for virus and content checking. The CIS removes suspicious content and the scrubbed packets are returned back to the firewall for routing to their final destination. For more information on integrating a CIS with Stonesoft Firewalls, see External Content Inspection (page 173). In addition to sending traffic to external content inspection, Stonesoft Firewalls also integrate with Stonesoft IPS and Stonesoft Layer 2 Firewalls. The Firewalls can accept blacklisting requests from the IPS and Layer 2 Firewalls. They can therefore stop traffic that the IPS engines or the Layer 2 Firewalls have detected to be harmful. For more information on Stonesoft IPS and Layer 2 Firewalls, see the IPS and Layer 2 Firewall Reference Guide. Load Balancing and Traffic Management As an access controller with address translation duties, a firewall is also a natural point for affecting the distribution of traffic load. Stonesoft Firewalls utilize Stonesoft s patented Multi- Link technology to flexibly use several standard network links to increase bandwidth and provide automatic failover when links go down. For more information on traffic management, see Outbound Traffic Management (page 223) and Inbound Traffic Management (page 233). Outbound bandwidth can be additionally managed through QoS measures by setting priorities, limits, and guarantees for different types of traffic. For more information on the QoS features, see Bandwidth Management and Traffic Prioritization (page 243). 22 Chapter 2 Introduction to Firewalls

F IREWALL/VPN REFERENCE GUIDE

F IREWALL/VPN REFERENCE GUIDE STONEGATE 5.3 F IREWALL/VPN REFERENCE GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

Stonesoft 5.4. Firewall Reference Guide. Firewall Virtual Private Networks

Stonesoft 5.4. Firewall Reference Guide. Firewall Virtual Private Networks Stonesoft 5.4 Firewall Reference Guide Firewall Virtual Private Networks Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

McAfee NGFW Reference Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role

McAfee NGFW Reference Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role McAfee NGFW Reference Guide for Firewall/VPN Role 5.7 NGFW Engine in the Firewall/VPN Role Legal Information The use of the products described in these materials is subject to the then current end-user

More information

F IREWALL/VPN REFERENCE GUIDE

F IREWALL/VPN REFERENCE GUIDE STONEGATE 5.2 F IREWALL/VPN REFERENCE GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

StoneGate Reference Guide

StoneGate Reference Guide SMC FW IPS SSL VPN VPN StoneGate Reference Guide Firewall/VPN 5.0 Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user

More information

F IREWALL/VPN INSTALLATION GUIDE

F IREWALL/VPN INSTALLATION GUIDE STONEGATE 5.1 F IREWALL/VPN INSTALLATION GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

StoneGate Installation Guide

StoneGate Installation Guide SMC FW IPS SSL VPN VPN StoneGate Installation Guide SOHO Firewalls Updated for StoneGate Management Center 5.0.0 Legal Information End-User License Agreement The use of the products described in these

More information

F IREWALL/VPN INSTALLATION GUIDE

F IREWALL/VPN INSTALLATION GUIDE STONEGATE 5.3 F IREWALL/VPN INSTALLATION GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

SMC INSTALLATION GUIDE

SMC INSTALLATION GUIDE STONEGATE 5.3 SMC INSTALLATION GUIDE S TONEGATE MANAGEMENT CENTER Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user

More information

STONEGATE 5.2 I NSTALLATION GUIDE I NTRUSION PREVENTION SYSTEM

STONEGATE 5.2 I NSTALLATION GUIDE I NTRUSION PREVENTION SYSTEM STONEGATE 5.2 I NSTALLATION GUIDE I NTRUSION PREVENTION SYSTEM Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user

More information

VPN CLIENT ADMINISTRATOR S GUIDE

VPN CLIENT ADMINISTRATOR S GUIDE STONEGATE IPSEC VPN 5.1 VPN CLIENT ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

STONEGATE 5.3 SMC REFERENCE GUIDE S TONEGATE MANAGEMENT CENTER

STONEGATE 5.3 SMC REFERENCE GUIDE S TONEGATE MANAGEMENT CENTER STONEGATE 5.3 SMC REFERENCE GUIDE S TONEGATE MANAGEMENT CENTER Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user

More information

McAfee NGFW Reference Guide for IPS and Layer 2 Firewall Roles 5.7. NGFW Engine in the IPS and Layer 2 Firewall Roles

McAfee NGFW Reference Guide for IPS and Layer 2 Firewall Roles 5.7. NGFW Engine in the IPS and Layer 2 Firewall Roles McAfee NGFW Reference Guide for IPS and Layer 2 Firewall Roles 5.7 NGFW Engine in the IPS and Layer 2 Firewall Roles Legal Information The use of the products described in these materials is subject to

More information

McAfee Next Generation Firewall (NGFW) Administration Course

McAfee Next Generation Firewall (NGFW) Administration Course McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,

More information

McAfee SMC Installation Guide 5.7. Security Management Center

McAfee SMC Installation Guide 5.7. Security Management Center McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can

More information

McAfee SMC Reference Guide 5.7. Security Management Center

McAfee SMC Reference Guide 5.7. Security Management Center McAfee SMC Reference Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can be

More information

McAfee NGFW Installation Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role

McAfee NGFW Installation Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role McAfee NGFW Installation Guide for Firewall/VPN Role 5.7 NGFW Engine in the Firewall/VPN Role Legal Information The use of the products described in these materials is subject to the then current end-user

More information

VPN CLIENT USER S GUIDE

VPN CLIENT USER S GUIDE STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

ADMINISTRATOR S GUIDE

ADMINISTRATOR S GUIDE STONEGATE SSL VPN 1.4.3 ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Fireware Essentials Exam Study Guide

Fireware Essentials Exam Study Guide Fireware Essentials Exam Study Guide The Fireware Essentials exam tests your knowledge of how to configure, manage, and monitor a WatchGuard Firebox that runs Fireware OS. This exam is appropriate for

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

VPNC Interoperability Profile

VPNC Interoperability Profile StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN

More information

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3 Firewall FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Firewall v3 24 January 2012 01-432-148222-20120124 Copyright 2012 Fortinet, Inc. All rights reserved. Contents and terms are subject to

More information

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Tagesordnung WIN/IP-Forum

Tagesordnung WIN/IP-Forum Tagesordnung WIN/IP-Forum Mittwoch 19.10.2005 9:00 11:00 Uhr 9:00-9:15 Uhr Bericht des WiN-Labors Verena Venus, WiN-Labor RRZE Erlangen 9:15-9:30 Uhr Customer Network Management für das G-WiN, X-WiN und

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE V IRTUAL PRIVATE NETWORKS C ONTENTS Introduction to the Scenarios... 3 Scenario 1: Gateway-to-Gateway With Pre-Shared Secrets... 3 Configuring

More information

Forcepoint Stonesoft Management Center

Forcepoint Stonesoft Management Center Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

Remote Firewall Deployment

Remote Firewall Deployment StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........

More information

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance This article will easily explain how to configure your Apple ipad, iphone or ipod Touch

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

FortiOS Handbook IPsec VPN for FortiOS 5.0

FortiOS Handbook IPsec VPN for FortiOS 5.0 FortiOS Handbook IPsec VPN for FortiOS 5.0 IPsec VPN for FortiOS 5.0 26 August 2015 01-504-112804-20150826 Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard, are registered

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

HOWTO: How to configure IPSEC gateway (office) to gateway

HOWTO: How to configure IPSEC gateway (office) to gateway HOWTO: How to configure IPSEC gateway (office) to gateway How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender Integra. For this

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Intrusion Detection and Analysis for Active Response - Version 1.2. Installation Guide

Intrusion Detection and Analysis for Active Response - Version 1.2. Installation Guide Intrusion Detection and Analysis for Active Response - Version 1.2 Installation Guide Copyright 2001 2005 Stonesoft Corp. Stonesoft Corp. All rights reserved. No part of this book may be reproduced or

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

More information

VPN Configuration Guide. Dell SonicWALL

VPN Configuration Guide. Dell SonicWALL VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

What s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured,

What s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured, Microsoft Internet Security and Acceleration (ISA) Server 2004 is the advanced application-layer inspection firewall, VPN, and Web cache solution that enables enterprise customers to maximize existing

More information

Vantage Report. User s Guide. www.zyxel.com. Version 3.0 10/2006 Edition 1

Vantage Report. User s Guide. www.zyxel.com. Version 3.0 10/2006 Edition 1 Vantage Report User s Guide Version 3.0 10/2006 Edition 1 www.zyxel.com About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the Vantage

More information

SonicOS Enhanced 5.7.0.2 Release Notes

SonicOS Enhanced 5.7.0.2 Release Notes SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

McAfee Security. Management Client

McAfee Security. Management Client Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation

More information

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel between a WatchGuard Firebox Vclass appliance (Vcontroller version

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 End-User Authentication Using Active Directory and Network Policy Server C ONTENTS Introduction to NPS Authentication with AD... 2 Registering the NPS

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks How-to guides for configuring VPNs with GateDefender Integra Panda Security wants

More information

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by

More information

version 1.0 Installation Guide

version 1.0 Installation Guide version 1.0 Installation Guide Copyright 2001 2004 Stonesoft Corp. Stonesoft Corp. All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or

More information

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 Course Overview Through this 2-day instructor-led classroom or online virtual training, participants

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Deploying ACLs to Manage Network Security

Deploying ACLs to Manage Network Security PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system

More information

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

Web Request Routing. Technical Brief. What s the best option for your web security deployment? Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize

More information

Palo Alto Networks Administrator's Guide. Release 3.1

Palo Alto Networks Administrator's Guide. Release 3.1 Palo Alto Networks Administrator's Guide Release 3.1 Palo Alto Networks Administrator s Guide Release 3.1 2/25/10 Third/Final Review Draft - Palo Alto Networks COMPANY CONFIDENTIAL Palo Alto Networks,

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

Stonesoft Guide. 3G Modem Guide

Stonesoft Guide. 3G Modem Guide Stonesoft Guide 3G Modem Guide Copyright 2013 Stonesoft Corporation. All rights reserved. All specifications are subject to change. Revision: Stonesoft_3G Modem_ 20130620 2 Introduction Thank you for choosing

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Release Notes for Version 1.5.207

Release Notes for Version 1.5.207 Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Clustering. Configuration Guide IPSO 6.2

Clustering. Configuration Guide IPSO 6.2 Clustering Configuration Guide IPSO 6.2 August 13, 2009 Contents Chapter 1 Chapter 2 Chapter 3 Overview of IP Clustering Example Cluster... 9 Cluster Management... 11 Cluster Terminology... 12 Clustering

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

VPN. VPN For BIPAC 741/743GE

VPN. VPN For BIPAC 741/743GE VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

How to configure DNAT in order to publish internal services via Internet

How to configure DNAT in order to publish internal services via Internet How to configure DNAT in order to publish internal services via Internet How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender

More information

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations Cisco PIX Security Appliance provides stateful firewall protection at smaller Internet gateways. Cisco IT Case Study / Security and

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Chapter 4 Security and Firewall Protection

Chapter 4 Security and Firewall Protection Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be

More information

CounterACT 7.0 Single CounterACT Appliance

CounterACT 7.0 Single CounterACT Appliance CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment

More information

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) : Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)

More information