Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope



Similar documents
with NetFlow Technology Adam Powers Chief Technology Officer

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Network Performance + Security Monitoring

REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Cisco IOS Flexible NetFlow Technology

Network Visibility Guide

STEALTHWATCH MANAGEMENT CONSOLE

How to Get NetFlow from Cisco 3750s. Joe Buchanan System Engineer Manager

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

Observer Analyzer Provides In-Depth Management

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Gaining Operational Efficiencies with the Enterasys S-Series

and InMon Traffic Sentinel

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

NetFlow Tips and Tricks

INTRUSION DETECTION SYSTEMS and Network Security

Best Practices for NetFlow/IPFIX Analysis and Reporting

STEALTHWATCH MANAGEMENT CONSOLE

Beyond Monitoring Root-Cause Analysis

Best Practices for Securing IP Telephony

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

How To Understand The Importance Of Network Forensics

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Clavister InSight TM. Protecting Values

Network System Design Lesson Objectives

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

White Paper: Application and network performance alignment to IT best practices

Cisco ISR Web Security with Cisco ScanSafe

Love at Second Sight. Written by Drew Robb

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Avaya Diagnostic Server

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Cisco Cyber Threat Defense - Visibility and Network Prevention

CISCO IOS NETWORK SECURITY (IINS)

How To Protect A Network From Attack From A Hacker (Hbss)

Avaya Diagnostic Server

SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Deploying Firewalls Throughout Your Organization

Traffic Analysis With Netflow. The Key to Network Visibility

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Modular Network Security. Tyler Carter, McAfee Network Security

Cisco Certified Security Professional (CCSP)

Unified network traffic monitoring for physical and VMware environments

Traffic Analysis with Netflow The Key to Network Visibility

Ecom Infotech. Page 1 of 6

Enhancing Network Monitoring with Route Analytics

Uncover security risks on your enterprise network

Network Instruments white paper

Introduction. The Inherent Unpredictability of IP Networks # $# #

Network Security Forensics

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Mapping to NIST and Exceeding the Standard with StealthWatch

Advanced approach to network security and performance monitoring

Cisco IPS Tuning Overview

Real-Time Traffic Engineering Management With Route Analytics

Network Management. 8.1 Centralized Monitoring, Reporting, and Troubleshooting Monitoring Challenges and Solutions CHAPTER

Securing Virtual Applications and Servers

Traffic Monitoring using sflow

Introduction to Cisco IOS Flexible NetFlow

RAVEN, Network Security and Health for the Enterprise

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

The Critical Role of Netflow/IPFIX Telemetry in the Next- Generation Network Security Infrastructure

(d-5273) CCIE Security v3.0 Written Exam Topics

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Cisco Certified Network Expert (CCNE)

Network Monitoring Comparison

Best Practices for Outdoor Wireless Security

OneSight Voice Quality Assurance

Take the NetFlow Challenge!

Network Management and Monitoring Software

Cisco Network Analysis Module Software 4.0

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

MPLS and NetEnforcer Synergy. Enhancing the control of MPLS-based, enterprise managed services with Allot's NetEnforcer

Flow Analysis Versus Packet Analysis. What Should You Choose?

Observer Probe Family

Observer Reporting Server Sample Executive Reports

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Network Performance Monitoring at Minimal Capex

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Transcription:

Maximize Network Visibility with NetFlow Technology Andy Wilson Senior Systems Engineer Lancope

Agenda What is NetFlow Introduction to NetFlow NetFlow Examples NetFlow in Action Network Operations User Case Security Operations User Case PCI Compliance and Auditing User Case A Glimpse into the Power of NetFlow 10+ G Ethernet Environments Virtual Environments MPLS and Multi-point VPNs

What is NetFlow? Internet NetFlow Packets NetFlow Fields src and dst IP src and dst port start time end time packet count byte count... StealthWatch Flow Collector

NetFlow vs. Traditional SNMP Monitoring Traditional SNMP NetFlow Reporting

Flow-based Visibility and Drill-down

NetFlow for the Network Team NetFlow Packet flow1 flow2... StealthWatch Flow Collector Network Team Interface utilization Billing and chargeback QOS monitoring BGP ASN monitoring MPLS visibility Application troubleshooting Compliance and Auditing PCI Compliance HIPAA Compliance SCADA Security Sarbanes-Oxley Security Team File sharing Malware outbreak detection Network acceptable use Flow forensics Data loss prevention

NetFlow in Action : Network Operations OldCastle APG Leading North American manufacturer of concrete masonry, lawn, garden and paving products and a regional leader in clay brick 206 Operating locations 7000+ employees Challenge No way to visualize who or what was causing network slowdowns Internal IT staff using multiple tools in attempts to troubleshoot incidents Solution Combining Cisco NetFlow and Lancope s StealthWatch System for visibility into the who, what, when and where of network traffic

NetFlow Compliance and Auditing NetFlow Packet flow1 flow2... StealthWatch Flow Collector Network Team Interface utilization Billing and chargeback QOS monitoring BGP ASN monitoring MPLS visibility Application troubleshooting Compliance and Auditing PCI Compliance HIPAA Compliance SCADA Security Sarbanes-Oxley Security Team File sharing Malware outbreak detection Network acceptable use Flow forensics Data loss prevention

NetFlow in Action : PCI Compliance NetFlow facilitates compliance with PCI DSS Requirements: Verifies actual network communications (1.1.2) Monitors services and ports in use (1.1.5) Determines when accounts are active and what they did during this activity (8.5.6) Audits access to anything on the network and tying activity to an individual user, including administrative accounts (10.1)

NetFlow in Action : PCI Compliance AirTran Airways Fortune 1000 company Geographically dispersed network across the continental US Challenge Required improved security and network management across the enterprise in accordance with Payment Card Industry (PCI) requirements Wanted greater network visibility and behavioral intrusion detection Ability to monitor a geographically dispersed network Solution StealthWatch identifies who does what when, and provides data to enforce accountability

NetFlow for the Security Team NetFlow Packet flow1 flow2... StealthWatch Flow Collector Network Team Interface utilization Billing and chargeback QOS monitoring BGP ASN monitoring MPLS visibility Application troubleshooting Compliance and Auditing PCI Compliance HIPAA Compliance SCADA Security Sarbanes-Oxley Security Team File sharing Malware outbreak detection Network acceptable use Flow forensics Data loss prevention

NetFlow in Action : Security Operations Aurora HealthCare Network Overview Largest private employer in Wisconsin over 27,000 employees 14 Hospitals Over 150 Clinics 200 + Pharmacies Challenge Monitor a widely dispersed network without deploying administratively problematic and financially burdensome individual sensors throughout the network Needed complete visibility of the network from the internal network to the clinics at the edge Monitor for zero-day attacks, viruses, Trojans, etc. Support for HIPAA Compliance Solution Combining NetFlow & StealthWatch System

Visibility Lost Due to Emerging Tech Emerging network technologies are outpacing traditional network monitoring techniques such as SNMP and SPAN/tap-based technology... 10G Ethernet is so fast few probe technologies can keep up and those that can are too expensive MPLS and multi-point VPNs create a meshed WAN that s expensive to monitor adequately Virtualization hides whole network segments from the network manager s view, making VM2VM communication problems difficult to troubleshoot These issues result in an inability to react to network problems because of a basic lack of.

10G+ Ethernet 10G Ethernet is so fast few probe technologies can keep up and those that can are too expensive traditional Ethernet sensor Where to plug in?

NetFlow in a 10G+ Ethernet Environment 10G Ethernet is so fast few probe technologies can keep up and those that can are extremely expensive StealthWatch Flow Collector

Virtualization Virtualization hides whole network segments from the network manager s view, making VM2VM communication problems difficult to troubleshoot Physical network VM1 VM2 VM3 virtual machines VM2VM traditional Ethernet probe physical machine virtual switches

NetFlow in the Virtual Environment physical network NetFlow v9 promiscuous capture VM VM VM VM Server virtual machines VM2VM virtual switches StealthWatch Flow Collector *** Cisco Nexus 1000v also supports NetFlow ***

MPLS and Multi-point VPNs MPLS and multi-point VPNs create a meshed WAN that s expensive to monitor adequately traditional Ethernet sensor

MPLS and Multi-point VPNs Fully meshed connectivity circumvents network monitoring deployed at the hub location

MPLS and Multi-point VPNs Full visibility requires a probe at each location throughout the WAN

NetFlow Collection in the WAN Deploy a StealthWatch NetFlow collector at a central location and enable NetFlow at each remote site StealthWatch Flow Collector NetFlow Packet NetFlow Packet

Quick Recap: Network Operations Fully integrated view of network usage, performance, host integrity and user behavior Diagnose Network congestion and provide root cause analysis of the problem causing response time delays Visibility and Metrics for WAN Optimization Real-time and Historical data to facilitate network performance monitoring, capacity planning and resource management Monitor Quality of Service on a per-hop basis throughout the Network

Quick Recap: Security Operations Quickly pinpoint zero-day and unknown threats that bypass perimeter security Identify policy violations, unauthorized activity/applications, misconfigured hosts, and other rogue devices Faster Incident Resolution & detailed Forensic data Detection of DoS/DDoS attacks, Worms, Viruses and Botnets Track and Audit network behavior and access by Individual Hosts

Quick Recap: PCI Compliance and Auditing NetFlow Solutions supply organizations with the means to: Continuously but passively monitoring host behaviors looking for deviations from normal processes Tie individual users to internal network performance problems Tie individual users to the introduction of security risks inside the internal network Implement appropriate Network Controls and Policies Provide for Internal Audit and Risk Assessment

Thank You Andy Wilson Senior Systems Engineer Lancope