LoadMaster Application Delivery Controller Security Overview



Similar documents
CS5008: Internet Computing

A Layperson s Guide To DoS Attacks

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

A Decision Maker s Guide to Securing an IT Infrastructure

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Application Traffic Management

Building A Secure Microsoft Exchange Continuity Appliance

Tenzing Security Services and Best Practices

10 Configuring Packet Filtering and Routing Rules

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

VALIDATING DDoS THREAT PROTECTION

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Networking for Caribbean Development

IxLoad-Attack: Network Security Testing

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

Firewall Firewall August, 2003

Features of a comprehensive application security solution

Firewall and UTM Solutions Guide

KEMP LoadMaster Support for Windows Terminal Services

Tenzing Security Services and Best Practices

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

Firewall Environments. Name

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

AppDirector Load balancing IBM Websphere and AppXcel

PCI Security Scan Procedures. Version 1.0 December 2004

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

How Cisco IT Protects Against Distributed Denial of Service Attacks

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

The Hillstone and Trend Micro Joint Solution

Barracuda Load Balancer Administrator s Guide

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Seminar Computer Security

Chapter 8 Security Pt 2

Introduction to Endpoint Security

Injazat s Managed Services Portfolio

Next-Generation Firewalls: Critical to SMB Network Security

PART D NETWORK SERVICES

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

PROFESSIONAL SECURITY SYSTEMS

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Barracuda Load Balancer Administrator s Guide

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Cisco Advanced Services for Network Security

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

IJMIE Volume 2, Issue 9 ISSN:

DDoS Protection on the Security Gateway

Firewall. User Manual

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Barracuda Load Balancer Administrator s Guide

Complete Protection against Evolving DDoS Threats

Using Palo Alto Networks to Protect the Datacenter

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

FortiDDos Size isn t everything

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

Penetration Testing Service. By Comsec Information Security Consulting

A Guide to Application delivery Optimization and Server Load Balancing for the SMB Market

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Achieving PCI Compliance Using F5 Products

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing _06_2000_c1_sec3

Network Configuration Settings

Content-ID. Content-ID URLS THREATS DATA

Secure and Optimize Application Delivery, Performance, and Reliability

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Network Security: A Practical Approach. Jan L. Harrington

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Specific recommendations

Deploying Firewalls Throughout Your Organization

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

74% 96 Action Items. Compliance

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Securing Virtual Applications and Servers

Payment Card Industry (PCI) Data Security Standard

IBM Managed Security Services Vulnerability Scanning:

Chapter 11 Cloud Application Development

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Transcription:

LoadMaster Application Delivery Controller Security Overview

SSL Offload/Acceleration, Intrusion Prevention System (IPS) and Denial of Service (DOS) Overview Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These webbased applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected. SMBs are facing an extraordinary number of network attacks from internal personnel and external hackers. Security problems such as unauthorized access, firewall breaches and other malicious intrusions are occurring on a daily basis. Compounding these problems is the fact that existing security tools such as firewalls, IDS, VPNs, anti-spam and anti-virus gateways do not have the processing capability, performance and the application-level security intelligence to protect against the growing amount of application-level attacks. SMBs are particularly vulnerable to security threats, and risk major losses of intellectual property, user productivity and potential loss of revenue. With that said, there is an increasing need for security solutions that provide real-time protection from a wide variety of application-level attacks. When an SMB incurs a DoS attack, their IT resources are deprived of the services. Examples of such an inability of a network service are: e-mail might become unavailable, or there may be a temporary loss of all network connectivity and services, or the datacenter may be forced to temporarily shut down operations. DoS attacks can also wipe out a computer system s software programs and files. The need for application-based security protection Web-based Applications are Vulnerable to Attacks such as viruses, intrusions, and DoS, as traffic comes into the network through various ports and firewalls without being inspected. Explosive Growth of Attacks The amount and seriousness of application vulnerabilities are growing at a dramatic rate, while the cost of these attacks is soaring. Current Security Tools Cannot Block Attacks Firewalls, IDS and anti-virus gateways do not have the processing capacity, performance and the application-level security intelligence to guard against application-level attacks, leaving organizations vulnerable. LoadMaster Security Benefits Protects web servers that have no controlled access including protection from hackers and denial of service attacks Protects web servers with controlled access, by limiting access specifically to authorized users Provides security protection for Internet, intranet, and extranet environments Blocks the most common attacks before they reach servers LoadMaster Security Capabilities Black List (Access Control List system) IP address filtering Firewall filtering DDOS mitigation SYN Flood Protection Ping of Death Protection ICMP Flood protection UDP Flood protection SSH/SSL brute force attack protection 2 - - LoadMaster Application Delivery Controller Security Overview

White Paper LoadMaster SSL Security All LoadMaster Application Delivery Controllers and Server Load Balancers include hardware-based (ASIC) for Secure Socket Layer (SSL) offload and acceleration. SSL Acceleration performed by LoadMaster provides two benefits: LoadMaster offloads the SSL workload from the Servers, and performs Layer 7 processing, cookie-based persistence and content switching. ASIC-enabled SSL Acceleration has a separate specialized processor, which handles all SSL functions. SSL Acceleration includes support for up to 256 SSL Certificates, supports third-party certificates, automated SSL certificate chaining, and web user interface-based SSL certificate signing request (CSR) generation. Intrusion Prevention System (IPS) LoadMaster s Intrusion Prevention System (IPS) is installed in-line, inspecting all traffic before forwarding it onto the network. If the LoadMaster IPS detects malicious activity it terminates the session. By default, intrusion prevention is enabled, and protects all application delivery services. However, administrators can disable the LoadMaster intrusion prevention capabilities. The Intrusion Prevention System protects applications from the following common threats: Virus propagation Buffer overflows Protocol-specific attacks LoadMaster Application Delivery Controller Security Overview - - 3

Network protocol protection The LoadMaster 3500 contains protocolspecific guards that protect your Servers from attacks targeting SMTP, DNS, and LDAP protocols. Application-specific attacks The LoadMaster 3500 protects applications that are particularly vulnerable to external attacks. These applications include IIS, Websphere, Cold Fusion, Exchange, and many others. Operating system-specific attacks LoadMaster 3500 contains Microsoft and UNIX-specific detection capabilities that identify malicious activity against these operating systems. The Intrusion Prevention System is updated with the latest threats every hour by Energize Updates. Avoid the "port 443 blind spot With the LoadMaster, you can get complete Application Layer 7 IPS exactly where you need it. As an SSL termination point, the LoadMaster is the outermost point on the network that enables it to see all Layer 7 exploits coming in, and completely avoid the dreaded "port 443 blind spot". Get the performance you need The LoadMaster 3500 delivers 2,000 TPS of SSL processing power, so you don't have to sacrifice end-user responsiveness. Denial of Services LoadMaster ensures continuous real-time DoS/DDoS and SYN attack protection for web application security. Security events are isolated to ensure continuous uptime even while under attack, while unaffected traffic is allowed through without degrading performance. SYN Flood Protection Ping of Death Protection ICMP Flood protection UDP Flood protection Credit Card Security LoadMaster Application Delivery Controllers are compliant with PCI-DSS (the credit card data security standard). Companies use LoadMasters every day to process credit card transactions via SSL. 4 - - LoadMaster Application Delivery Controller Security Overview

White Paper Summary Small-to-medium sized businesses face unprecedented amounts of network security attacks from internal personnel and external hackers. Security tools such as firewalls, IDS, VPNs, anti-spam and anti-virus gateways are not capable of providing the processing capacity, performance and the application-level security intelligence necessary to protect against the increasing amount of application-level attacks. SMBs are continuously exposed to security hazards that pose a threat to their intellectual property, potential revenue loss and lost productivity. KEMP Technologies LoadMaster Application Delivery Controllers and Server Load Balancers help to ensure that online business remains stable even while under attack. The LoadMaster simplifies and centralizes network infrastructure management, and optimizes performance and scalability of IT infrastructure to economically scale server resources and security operations to deliver optimal security management and enforcement. KEMP products deliver availability, performance, scalability and security to the SMB web infrastructure. KEMP Technologies, Inc. 12 Old Dock Road Yaphank, NY 11980 Tel: (631) 345-5292 Info@KEMPtechnologies.com KEMPtechnologies.com LoadMaster Application Delivery Controller Security Overview - - 5