Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance



Similar documents
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Next-Generation Firewalls: Critical to SMB Network Security

How to Build a Massively Scalable Next-Generation Firewall

Achieve Deeper Network Security

Achieve Deeper Network Security and Application Control

Dell SonicWALL Portfolio

SSL Performance Problems

Performance and Scalability with the Juniper SRX5400

Network Security Solution. Arktos Lam

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Blind as a Bat? Supporting Packet Decryption for Security Scanning

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

Applications erode the secure network How can malware be stopped?

Next Generation Enterprise Network Security Platform

Why protection & performance matter

Providing Secure IT Management & Partnering Solution for Bendigo South East College

DPtech ADX Application Delivery Platform Series

Why Protection and Performance Matter

Networking for Caribbean Development

Brocade Solution for EMC VSPEX Server Virtualization

Scaling Next-Generation Firewalls with Citrix NetScaler

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Next Generation Firewalls and Sandboxing

Dell Security Next-Generation Firewalls

Is the Security Industry Ready for SSL Decryption?

Application Intelligence, Control and Visualization

Securing Virtualization with Check Point and Consolidation with Virtualized Security

HP FlexNetwork and IPv6

Check Point taps the power of virtualization to simplify security for private clouds

SonicWALL ECLASS Netw

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

IINS Implementing Cisco Network Security 3.0 (IINS)

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Network Packet Monitoring Optimizations in Data Centre

Brocade One Data Center Cloud-Optimized Networks

Forefront Threat Management Gateway (TMG) Whitepaper The Solution.

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

SSL Inspection Step-by-Step Guide. June 6, 2016

SuperMassive E10000 Series

Hillstone Intelligent Next Generation Firewall

Application Delivery Testing at 100Gbps and Beyond

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

Inspection of Encrypted HTTPS Traffic

APV9650. Application Delivery Controller

Networking and High Availability

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Availability Digest. Redundant Load Balancing for High Availability July 2013

Secure Cloud-Ready Data Centers Juniper Networks

Jort Kollerie SonicWALL

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

High Availability Solutions & Technology for NetScreen s Security Systems

Networking and High Availability

Multi Stage Filtering

IBM Security Network Protection

Cisco ACE 4710 Application Control Engine

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

Steelcape Product Overview and Functional Description

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

Background. Industry: Challenges: Solution: Benefits: APV SERIES CASE STUDY Fuel Card Web Portal

Secure networks are crucial for IT systems and their

Virtualized Security: The Next Generation of Consolidation

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

安 瑞 科 技 物 聯 網 對 應 用 交 付 器 (ADC) 的 需 求 及 應 用 實 例 徐 乃 丁 博 士 研 發 副 總 裁 / 技 術 長

Zscaler Internet Security Frequently Asked Questions

全 新 企 業 網 路 儲 存 應 用 THE STORAGE NETWORK MATTERS FOR EMC IP STORAGE PLATFORMS

VMware vcloud Networking and Security Overview

FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology. August 2011

The Hybrid Enterprise. Enhance network performance and build your hybrid WAN

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Guideline on Firewall

Understanding the Platform

Implementing Cisco IOS Network Security

Next-Generation Firewall Market Analysis: The SonicWALL Difference CONTENTS

Next-Generation Network Security: A Buyers Guide

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Cisco Application Networking for IBM WebSphere

Load Balancing 101: Firewall Sandwiches

4 Delivers over 20,000 SSL connections per second (cps), which

Deploying Brocade VDX 6720 Data Center Switches with Brocade VCS in Enterprise Data Centers

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

Architecture de Réseaux et Dimensionnement du Trafic

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Avaya P333R-LB. Load Balancing Stackable Switch. Load Balancing Application Guide

MPLS VPN Security Best Practice Guidelines

Transcription:

Firewall Sandwich Aleksander Kijewski Presales Engineer Dell Software Group 1

Many of your users web sessions are encrypted with HTTPS 2

Many of your users web sessions are encrypted with HTTPS and so is the malware that targets them 3

Encrypted web traffic growth SSL/TLS comprises 15 20 percent of total web traffic and 25 35 percent of typical enterprise traffic There s an average yearly increase of 20 percent in SSL/TLS traffic Only 20 percent of enterprises with next-generation firewalls (NGFWs) inspect inbound/outbound SSL/TLS traffic 50 percent of all inbound/outbound attacks will use SSL/TLS by 2017 - Gartner 58% 470% 315% 4

You can t protect what you can t see hackers are hiding in plain sight (SSL/TLS encrypted traffic) Dell saw HTTPS web connections grow 109 percent in CY2014 Example: Yahoo (SSL encrypted HTTPS sessions) third-party banner ads distributed malware over four days (27,000 users per hour) an attack unseen by most firewalls 5

Organizations need next-generation protection to eliminate blind spots in SSL traffic how much of your network traffic is HTTPS? 6 How can we add and scale this critical protection to prevent lag and network latency?

What are the industry limitations today? Processing power: key sizes, ciphers Knowledge of PKI, deployment pain Non-browser-based applications that leverage SSL (mobile, certain desktop apps) Distribution of certs in non-managed/trusted environments Connection count (memory allocation) Bypassing sites (whitelisting strategies) 7

Introducing a super solution for massive security issues Dell SonicWALL SuperMassive 9000 series powers next-generation enterprise solutions that provide SSL decryption, inspection and protection with no added latency 4SFP+ 10GbE+, 8SFP GbE, 8GbE 8

Reassembly-Free Deep Packet Inspection (RFDPI) vs. packet assembly-based architecture 9 U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361

RFDPI vs. packet assembly-based architecture 10 U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361

Firewall sandwich architecture Provides the blueprint for deploying a network-based, scale-out security layer architecture Offers transparent security services via highly resilient Layer 2 design to enhance existing security solutions, separate security functions or provide added capacity Fully validates with Dell Networking S4810, S5000, S6000 and Dell Network Security SuperMassive 9x00 series NGFW products Provides N+1 redundancy (vs. 1+1) without reliance on HA or clustering protocols Supports 1, 10 or 40GE ingress/egress connections (today) and performance Switch layer - ingress N+1 active firewall layer Switch layer - egress Utilizes VLT, symmetric hashing, port channel LAG, active mesh 11

Why such a design? Networking reasons Scalability, commoditization of 10/40 GbE Convergence of layers Redundancy and resiliency Increases in east to west traffic Virtualization, Datacenters Security reasons Scalability, commoditization of 10/40 GbE Inspection at the Distribution/Core layer not just Access Layer (Perimiter) East to West inspection Malware Lifecycle (lateral movements, exfiltration, reconnaissance) 12

Firewall sandwich deployment options for all customer scenarios: The classic firewall sandwich Customer currently owns and opts to keep their existing firewall infrastructure Usually a Cisco or Juniper solution deployed at the perimeter for stateful packet inspection, routing and NAT Would like to add deep packet inspection (DPI) Non-intrusive deployment, highly resilient design Routing/stateful DPI Perimeter Distribution 13

Firewall sandwich deployment options for all customer scenarios: The double firewall sandwich Customer would like to completely replace their existing firewall infrastructure Requires routing and DPI solutions While maintaining high performance and superb resiliency Dell SonicWALL NGFW high-availability pair at the perimeter, providing Layer 3 services Classic firewall sandwich providing all DPI services Routing/stateful DPI Perimeter Distribution 14

Firewall sandwich deployment options for all customer scenarios: The open firewall sandwich Customer would like to replace their firewall solution with a Dell SonicWALL solution, but would prefer to leverage their existing switch infrastructure Requires enormous amount of NAT and concurrent connections Third-party Layer 3 network load balancer needed Internet Routing/stateful DPI Link aggregation L3 load balancer or Perimeter Distribution 15 Load balancer Load balancer

How far does it scale? Firewall mode Security services Platform Dell F10 switches IPS + App Intelligence IPS + App Wiremode Intelligence IPS, GAV, ASPY and Application Intelligence IPS, GAV, ASPY and Application Intelligence NATed/routed IPS, GAV, ASPY and Application Intelligence Cluster of firewall blades configuration (Wiremode, NATed/routed) SM9400 (16 units) SM9800 (16 units) SM9800 (16 units) SM9400 (16 units) + 4 X SM9800 SM9800 (16 units) + 4 X SM10800 Throughput DPI-SSL throughput TCP connection per seconds Max. concurrent TCP connections S5000, S6000 160G (120G recommended for redundancy) 40G 2.2 million 24 million S5000, S6000 320G (240G recommended for redundancy) 80G 4.5 million 40 million S5000, S6000 160G (120G recommended for redundancy) 80G 4.5 million 40 million S5000, S6000 120G 40G 1.1 million 12 million S5000, S6000 120G 80G 1.6 million 40 million 16

Transform NGFW economics and data center agility Dell can deliver cost savings up to 85 percent * Classic deployment Dell firewall sandwich Switch layer - ingress 10GbE 1+1 active/passive firewall layer Switch layer - egress N+1 active firewall layer 10GbE Dell Networking S5000 SuperMassive 9800 Dell Networking S5000 17 * All pricing and performance figures taken from published information for comparable model or configurations.

References Challenge Stateful firewall Research network has historically been open, leading to exposure and risk Growth, cloud initiatives and device proliferations Bandwidth increases to support 40Gbps and ultimately 100Gbps networks Results A network-based model for scaling a NGFW architecture to support 40Gbps to 100Gbps DPI performance 18

Resources 19

Thank you 20