Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication



Similar documents
Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

Secure VoIP for optimal business communication

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Lucent VPN Firewall Security in x Wireless Networks

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Security Gateway 10er Serie

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

SCADA SYSTEMS AND SECURITY WHITEPAPER

Firewall Defaults and Some Basic Rules

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The Cisco ASA 5500 as a Superior Firewall Solution

Firewall and UTM Solutions Guide

Network Services Internet VPN

White Paper. ZyWALL USG Trade-In Program

About Firewall Protection

Secure Access Gateway 3000er Serie

Gigabit Content Security Router

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Cisco Integrated Services Routers Performance Overview

Deploying a Secure Wireless VoIP Solution in Healthcare

ISG50 Application Note Version 1.0 June, 2011

How To Create An Intelligent Infrastructure Solution

Security and the Mitel Teleworker Solution

Firewalls Overview and Best Practices. White Paper

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

SIP Trunking Configuration with

Elfiq Networks Vital for Hospitality

Voice Over IP and Firewalls

QoS (Quality of Service)

Windows Embedded Security and Surveillance Solutions

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

Masters Project Proxy SG

White Paper. Complementing or Migrating MPLS Networks

Gigabit Multi-Homing VPN Security Router

Preparing Your IP Network for High Definition Video Conferencing

Deploying Firewalls Throughout Your Organization

PART D NETWORK SERVICES

IVCi s IntelliNet SM Network

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Cisco SR 520-T1 Secure Router

SonicWALL Corporate Design System. The SonicWALL Brand Identity

axsguard Gatekeeper Internet Redundancy How To v1.2

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Truffle Broadband Bonding Network Appliance

How To Balance Out The Power Of The Usg On A Network On A Pc Or Mac Mac 2.5 (For A Mac 2) On A 2G Network On An Ipnet 2.2 (For An Ipro) On An Un

Steelcape Product Overview and Functional Description

WAN Traffic Management with PowerLink Pro100

Mesh VPN Link Sharing (MVLS) Solutions

ICAB5238B Build a highly secure firewall

Site2Site VPN Optimization Solutions

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB _v02

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.

Industrial Firewalls Endpoint Security

BroadCloud PBX Customer Minimum Requirements

Application Firewall Overview. Published: February 2007 For the latest information, please see

Preparing Your IP network for High Definition Video Conferencing

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

NETWORK REQUIREMENTS. Broadband Network Access (WAN) Speed/Bandwidth

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Improving Network Efficiency for SMB Through Intelligent Load Balancing

Voice over IP Networks: Ensuring quality through proactive link management

Network Security. Protective and Dependable. Pioneer of IP Innovation

Advantages of Managed Security Services

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

PRODUCTS & TECHNOLOGY

Edgewater Routers User Guide

Tunnel Routing. Preface. Challenge

Alteon Switched Firewall

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Author: Seth Scardefield 1/8/2013

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Cisco IOS Advanced Firewall

Private Cloud Solutions Virtual Onsite Data Center

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Virtualization 101 A basic guide to virtualization for the small to medium business

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

Cisco Advanced Services for Network Security

VoIP in Industrial Networks

State of Wisconsin. Wide Area Network (WAN) Quality of Service (QoS) Service Offering Definition (SOD)

Microsoft Windows Server System White Paper

Transcription:

Feature Brief Quality of Service April 2007 Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication Protecting Values

Introduction Clavister Security Service Platform (SSP ) is our proven, feature-rich and service-oriented framework for providing best-inclass security solutions. Clavister SSP comprises of Clavister Network Security Elements, Clavister Lifecycle Systems, and Clavister Lifecycle Services. Its combination of precise control, fine-granular administration, and seamless scalability makes it easy to provision the perfect solution for any customer; be it a small organization, a large Internet Service Provider, a Managed Security Service Provider, or a multimedia-ready telecom operator. Clavister Network Security Elements The physical building blocks installed in the network. The major network security element products are the Clavister Security Gateway; pre-packaged solutions in either turn-key appliance format for easy deployment or software-only format for your preferred hardware platform. Clavister Lifecycle Systems A set of software components enabling true network security management throughout the entire lifecycle, including deployment, configuration, integration, monitoring, reporting, and analysis/optimization/troubleshooting. Clavister Lifecycle Services Empowers you and your products with tools, services, and resources that help maximize benefits and eliminate problems, including planning, deployment, optimization, operations and maintenance. Clavister SSP provides a secure environment for your business; as a service provided to you by a Managed Security Service Provider (MSSP) or as systems and services integrated in your own network. For more information about Clavister products and services, please visit us at:. Quality of Service Overview To supplement the perimeter security modern organizations also need a platform that provide them with value adding functionality such as secure Virtual Private Network (VPN), Quality Of Service (QoS), Voice over IP (VoIP) capabilities, User Authentication, Content Filtering, and Centralized Management. One of the major drawbacks of TCP/IP, the protocols used for communication over networks like Internet, Local Area Networks (LAN) and Wide Area Networks (WAN), is the lack of true QoS functionality. QoS in networks is the ability to guarantee and limit bandwidth for certain services and users. Although Clavister support the Differentiated Services (DiffServ) protocol, the protocol is not an optimal solution to offer QoS in large networks. Several other solutions have be proposed but none have reached a high enough standard for large-scale usage. Another fact is that most of the current QoS solutions are application-based, that is, they work by having applications supplying the network with QoS information. From a security standpoint, it is of course unacceptable that the applications, i.e. the users, decide the priority of their own traffic within a network. In security-sensitive scenarios, where the users cannot be trusted, the network equipment such as the Clavister Security Gateway should be the sole arbiter of priorities and bandwidth allocations. Clavister provides QoS functionality by applying limits and guarantees to the network traffic itself, rather than trusting applications and users to make these choices for themselves. It is hence well suited to managing bandwidth for a LAN as well as in one or more chokepoints in large Metropolitan Area Networks (MAN) or WANs.

Protecting Values Traffic Shaping Basics The simplest way to obtain QoS in a network, from a security perspective as well as a functionality perspective, is to have the components in the network, not the applications, be responsible for network traffic control in well-defined chokepoints such as the point between the Internet and the internal network. Traffic shaping in Clavister Security Gateway works by measuring and queuing IP packets, in transit, with respect to a number of configurable parameters. Differentiated rate limits and traffic guarantees based on source, destination and protocol parameters can be created; much the same way gateway policies are implemented. Traffic shaping works by: Applying bandwidth limits by queuing packets that would exceed configured limits, and sending them later when the momentary demand for bandwidth is lower. Dropping packets if the packet buffers are full. The packet to be dropped should be chosen from those that are responsible for the congestion. Prioritizing traffic according to the administrator s choice; if the traffic in a higher priority increases while a communications line is full, traffic in lower priorities should be temporarily limited to make room for the high-priority traffic. Providing bandwidth guarantees. This is typically accomplished by treating a certain amount of traffic (the guaranteed amount) as a higher priority, and traffic exceeding the guarantee as the same priority as any other traffic, which then gets to compete with the rest of the non-prioritized traffic. Well-built traffic shapers do not normally work by queuing up immense amounts of data and then sorting out prioritized traffic to send before sending non-prioritized traffic. Rather, they attempt to measure the amount of prioritized traffic and then limit the non-prioritized traffic dynamically so that it will not interfere with the throughput of prioritized traffic. Clavister Security Gateway has an extensible traffic shaper integrated in its core, which supports the following key features: Pipe-Based Traffic Shaping Close Integration with the Clavister Security Gateway Rule Set Traffic Prioritizing and Bandwidth Limiting Grouping Dynamic Bandwidth Balancing Pipe Chaining Traffic Guarantees IPsec Integration The following sections will explain the details of these key features and give examples on how to best use these features to achieve an optimal QoS configuration. Pipe-Based Traffic Shaping Traffic shaping in Clavister Security Gateway is handled by a concept based on pipes, where each pipe has several prioritizing, limiting and grouping possibilities. Individual pipes may be chained in different ways to construct bandwidth management units that far exceed the capabilities of one single pipe. Pipes are fairly simplistic, in that they do not know much about the types of traffic that pass through them, and they know nothing about direction. A pipe simply measures the traffic that passes through it and applies the configured limits in each precedence and/or user group. Figure 1 below shows the concept of pipes.

Incoming Packets Pipe Pipe Pipe Rule Set Figure 1: Pipes Inbound network traffic is first filtered within the rule set, and is then passed to the pipe or pipes specified in the matching rule. In the pipe, traffic is limited with respect to the configuration of the pipe and is then forwarded to its destination, or to the next pipe in a chain. As usual, the traffic is recognized by source interface, source address, destination interface, destination address and service. These parameters are used in the pipe rules section for mapping traffic into a certain pipe, or chain of pipes, on a certain precedence level. Close Integration with the Clavister Security Gateway Rule Set Each rule set may be assigned to one or more pipes, on an individual basis. Traffic Prioritizing and Bandwidth Limiting Each pipe contains a number of priority levels, each with its own bandwidth limit, specified in kilobits per second (kbps) and/or packets per second. Limits may also be specified for the total of the pipe. Grouping Traffic through a pipe can be automatically grouped into pipe users, where each pipe user can be configured to the same extent as the main pipe. Traffic may also be grouped with respect to a number of parameters, such as source IP network or destination IP network, IP address, or port number. The benefit of using grouping is that additional bandwidth controls may be applied to each group. This means that if grouping is performed on, for example, on IP address, the Clavister Security Gateway can limit and guarantee bandwidth per IP address communicating through the pipe. There are also precedences in user groups. Bandwidth may be limited per precedence, as well as for each group as a whole.

Protecting Values Pipe Total 192.168.123.5 192.168.123.7 192.168.123.18 Figure 2: Grouped Pipes Grouping is used for fairness between the different users/applications that use the pipes at any given moment. It avoids the problem of one user taking all traffic in a precedence level, leaving nothing guaranteed for the other users, with the result that their traffic will be forced down to P0 even though they should be qualified for a higher precedence level. You configure the Clavister Security Gateway to perform this fairness calculation by using the Grouping drop down box. It supports values such as Per DestNet, Per DestIP, Per DestPort, and so on. Normally the in-pipe is grouped Per DestNet and the out-pipe is grouped Per SrcNet. Bandwidth control first occurs per user and then continues with the pipe as a whole. Dynamic Bandwidth Balancing The traffic shaper in the Clavister Security Gateway can be used to dynamically balance the bandwidth allocation of different pipe users if the pipe as a whole has exceeded its limits. This means that available bandwidth is evenly balanced with respect to the chosen grouping for the pipe. This allows you to get the maximum performance out of your network without sacrificing the benefits from guaranteed bandwidth to critical resources. Pipe Chaining When pipes are assigned to rules, up to eight pipes may be connected to form a chain. This permits filtering and limiting to be handled in a very sophisticated manner. Pipe chaining means that two pipes are connected together at one end, so traffic first flows through one pipe, and then it flows through to the next pipe. This can be used to shape the traffic in many ways, for example to move traffic to another precedence level, or to limit the total amount of a certain traffic type. Traffic Guarantees With the proper pipe configuration, the traffic shaping in Clavister Security Gateway may be used to guarantee bandwidth and thereby quality, for traffic through the Clavister Security Gateway. IPsec Integration If the optional IPsec VPN support is used in the Clavister Security Gateway, bandwidth and priorities may be configured for VPN tunnels as well as for ordinary rules.

Applied Quality of Services in a Corporate Network Figure 3 illustrates an implementation of QoS with guaranteed bandwidth in a hypothetical corporate network with three different departments and a DMZ with business critical servers. Internet Min 100% SG4200 Min 20% Min 35% Research & Development Min 25% Min 20% Administration Sales & Marketing Application Servers and Databases Figure 3: Example Corporate Network with QoS Each segment of the network has a guaranteed minimum level and is also able to utilize up to 100% of the available network capacity. By enabling a dynamic bandwidth allocation up to 100% it is possible to get the maximum value out of the network connection whilst having a guaranteed minimum capacity level. Conclusion The Feature Brief describes Quality of Services and how to use it with your Clavister SSP installation. Below are some key customer benefits: Clavister SSP Key Benefits Robust Security The purpose-built security offering from Clavister provides a complete set of security features, including SPI Firewalling with DoS and DDoS protection, VPN with strong encryption, and User Authentication. Rapid Deployment The Clavister Security Gateway provides effortless and rapid deployment. A trained technician can easily deploy and configure new network security elements within minutes, even across continents. Flexible Traffic Control

The highly sophisticated bandwidth management capabilities in the Clavister Security Gateway makes it possible to not only guarantee bandwidth for business critical applications or server, but also to optimize the entire traffic flow in your network and avoid inefficient bandwidth usage. Lowered Costs for Administration The powerful administration system that comes with Clavister Security Gateway enables organizations to lower the costs for administration through centralized management. The administration system makes it possible to deploy and configure all devices across the network, no matter if they are located next door or across the globe. High Performance Scalable performance with unsurpassed maximum bandwidth, concurrent connections and simultaneous VPN tunnels makes the Clavister Security Gateway the ideal choice even in the most demanding environments like Internet Service Provider Networks, Data Centers, and telecom operators. Low Total Cost of Ownership (TCO) Clavister s goal is to provide complete security solutions more cost efficiently than any competitor. Clavister SSP with its unique combination of integrated features, world-class service and support, and powerful administration system provide the lowest TCO and the best price/performance ratio possible. Quality of Service Unique Features Pipe-Based Traffic Shaping Close Integration with the Clavister Security Gateway Rule Set Traffic Prioritizing and Bandwidth Limiting Grouping Dynamic Bandwidth Balancing Pipe Chaining Traffic Guarantees IPsec Integration Feedback Clavister Product Marketing is always interested in feedback from our readers. Please direct suggestions, comments or questions regarding this document to product-marketing@clavister.com. Please include the title of the document in your e-mail. About Clavister Clavister - a Swedish privately owned company developing IT security products, including its award-winning Clavister Security Service Platform (SSP ). This serviceoriented framework enables organizations to monitor network traffic, protecting critical business assets and blocking undesirable surfing. It will also protect you against intrusion, viruses, worms, Trojans, and overload attacks. It requires minimal servicing, with central administration, and has exceptionally flexible configuration possibilities. Its seamless scalability makes it easy to provision the perfect solution for any customer; be it small organizations, large Internet Service Providers, Managed Security Service Providers, or multimedia-ready telecom operators. Clavister was founded 1997 in Sweden, with R&D and headquarters based in Örnsköldsvik and Sales and Marketing based in Stockholm. Its solutions are marketed and sold through International sales offices, distributors, and resellers throughout EMEA and Asia. Clavister also offers its technology to OEM manufacturers. For more information, please visit us at. Limitation of Responsibilities The information in this document represents the current view of Clavister AB on the issues discussed as of the date of publication. Because Clavister must respond to changing conditions, it should not be considered to be a commitment for Clavister, and Clavister cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. CLAVISTER MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the written permission of Clavister. Clavister may have trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Clavister, the furnishing of this document does not give you any license to these trademarks, copyrights, or other intellectual property.