Raptor Firewall Products



Similar documents
Firewall Architectures of E-Commerce

Security Technology: Firewalls and VPNs

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

12. Firewalls Content

CheckPoint FireWall-1 Version 3.0 Highlights Contents

Proxy Server, Network Address Translator, Firewall. Proxy Server

Internet Security Firewalls

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Cornerstones of Security

Chapter 12 Supporting Network Address Translation (NAT)

How To Pass A Credit Course At Florida State College At Jacksonville

OS/390 Firewall Technology Overview

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Basic Network Configuration

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewalls and Virtual Private Networks

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Intranet, Extranet, Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

How To Protect Your Network From Attack

Stateful Inspection Technology

Networking Basics and Network Security

Steelcape Product Overview and Functional Description

21.4 Network Address Translation (NAT) NAT concept

Lecture 23: Firewalls

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

CMPT 471 Networking II

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

The Bomgar Appliance in the Network

Basics of Internet Security

z/os Firewall Technology Overview

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Device Log Export ENGLISH

Check Point FireWall-1 White Paper

Step-by-Step Configuration

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Network Security 1. Module 4 Trust and Identity Technology. Ola Lundh ola.lundh@edu.falkenberg.se

Chapter 37. Secure Networks

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

7.1. Remote Access Connection

Internet Security Firewalls

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Fig : Packet Filtering

Figure 41-1 IP Filter Rules

VPN. Date: 4/15/2004 By: Heena Patel

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Multi-Homing Dual WAN Firewall Router

Firewall Architecture

Overview - Using ADAMS With a Firewall

Step-by-Step Configuration

Load Balance Router R258V

INTRODUCTION TO FIREWALL SECURITY

Firewall Security. Presented by: Daminda Perera

Network Security and Firewall 1

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

NETASQ MIGRATING FROM V8 TO V9

Protecting a Private Network: The AltaVista Firewall

Networking: EC Council Network Security Administrator NSA

Overview - Using ADAMS With a Firewall

Network Access Security. Lesson 10

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

8. Firewall Design & Implementation

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Computer and Network Security Exercise no. 4

CSCE 465 Computer & Network Security

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

EXPLORER. TFT Filter CONFIGURATION

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Understanding the Cisco VPN Client

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Transcription:

Axent Technologies, Ltd The Leader in Integrated Firewall and VPN Solutions Raptor Firewall Products

Security Cannot Be Ignored >100M Users on WWW E Commerce Shift Billions Lost to Cyberthieves 150,000 Crooks on Net National Security Threats

Products Virtual Private Networks Encryption of Internet Packets between two systems/sites Huge costs savings and convienence Firewalls Perimeter security of internal network from the Internet Control over all connections going in and out

VPN Why Do It? Dedicated T-1 between offices $10k - $100k per month Economics Convenience Internet $2-4k/month Thousands of Modems $100s/month/person $15/month/person

VPN VPN Cost Justification Shave over 75% off your remote access costs 100 Users Dial in for 30 minutes per day VPN in for unlimited time per day Annual Cost: Dial in: $180,000 (does not include equipment cost) VPN: $42,000 (includes server, license, client and token software cost) $180.000 $160.000 $140.000 $120.000 $100.000 $80.000 $60.000 $40.000 $20.000 $0 1 year cost Dial In VPN

Mobile User to Office VPN Internet Hotel Small Office Home

Office to Office VPN Internet Branch Office Supplier/Partner

How It Works Packet Transforms 10.1.1.1 Hello, Bob Internet 128.1.1.1 204.1.1.1 172.168.1.1 Original Packet Hello, Bob To: 172.168.1.1 From: 10.1.11.1 Authentication 128-Bit Checksum To: 10.1.1.1 From: 172.168.1.1 MD-5 Checksum Hello, Bob Checksum: 54321 Encryption DES or 3-DES Hello, Bob To: 10.1.1.1 From: 172.168.1.1 MD-5 Checksum Encryption Header Key: 10101 New IP Header (Encapsulation) @#$%)*@#$%)*%^%&^_(#@( Encryption Header To: 204.1.1.1 From: 128.1.1.1

How It Works Packet Transforms 10.1.1.1 Internet 128.1.1.1 204.1.1.1 Hello, Bob 172.168.1.1 Checksum: 54321 Hello, Bob Hello, Bob To: 10.1.1.1 From: 172.168.1.1 To: 10.1.1.1 From: 172.168.1.1 MD-5 Checksum Original Packet Re-Checksum Key: 1010101 @#$%)*@#$%)*%^%&^_(#@( Encryption Header Decrypt @#$%)*@#$%)*%^%&^_(#@( Encryption Header To: 204.1.1.1 From: 128.1.1.1 Decapsulate

Products Virtual Private Networks Encryption of Internet Packets between two systems/sites Huge costs savings and convienence Firewalls Perimeter security of internal network from the Internet Control over all connections going in and out

Architecture Firewalls Router Internet Firewall Gateway Computer DMZ Web Server TCP/IP Subnet Firewall System

Architecture Firewall Types Stateful Packet Filter Application Level Firewall Per Packet Processing - CPU Intensive No Protection Against Application Level Attacks VERY Hard to Manage - Security holes appear due to mis-management Always routing packets - prone to fail- open Per Session Processing Protection against application level attacks EASY to manage Never routes packets - prone to fail-safe

Architecture Firewall Internals Host OUT Email Separation and Examination Raptor Host IN Mail Server TCP IP Network Interface Hardware 204.3.2.1 SMTP gwcontrol TCP IP Network Interface Hardware 10.1.1.1 TCP IP Network Interface Hardware Address Hiding

What Can a Firewall NOT Do? Prevent Session Hijacking Wait until a session is established through the firewall Prevent Snooping of network data Data is not encrypted Prevent Modification of network data Data is not checksummed Prevent Re-routing of network data Firewall cannot establish fixed routes Prevent spoofing of network messages Data not signed with a signature

Strengths/Uniqueness Firewalls Raptor Firewall Part of larger family of AXENT Security products 3rd generation application proxies High degree of security intelligence Enterprise features High performance Automatic System Hardening At installation Continuous thereafter Best Fit Rule Ordering 1st call customer support Stable Product

Raptor Firewall Authorization (Access Control) IP addresses, Services, Time, Users URL Filtering Application Level Controls and Attack Filtering Telnet, FTP, HTTP, SMTP, SQL*NET, CFIS, NNTP, NTP, RealAudio Authentication Strong - S/Key, ACE, CryptoCard, Defender Weak - Gateway, NT Domain, Radius, TACCAS+ Logging Passive security management Non-repudiation Notification Email, Beeper, SNMP, Audible, Custom Script Enterprise Features High Availability (Qualix and Veritas Support) Transparency Load Balancing of Servers Integrated VPN

Raptor Firewall Vulture - Continuous System Hardening and Suspcious Activity Monitoring SMTP TELNET WindowsNT - Intel Sun Solaris - Ultra Sparc HP/UX - PA-RISC FTP RealAudio HTTP GOPHER Generic Proxy Access Control / Logging / Management TCP/IP / VPN / Packet Filtering Future Proxies

Raptor Remote Firewall The Raptor Enterprise GUI is used to configure the remote gateway Raptor Remote Raptor Enterprise Internet Firewall to Firewall VPN Capability. Use the Internet as cheap private lease line.

Raptor Mobile Internet Encrypted IP Datagrams Router Dial up (PPP), ISDN, or LAN Raptor Firewall Network Level Encryption Smart Tunneling Various forms of authentication Integration with Raptor Firewall

Q & A