Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Similar documents
Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Next-Generation Firewalls: Critical to SMB Network Security

Virtualized Security: The Next Generation of Consolidation

PART D NETWORK SERVICES

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewall and UTM Solutions Guide

Security Policy JUNE 1, SalesNOW. Security Policy v v

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Networking for Caribbean Development

The Cisco ASA 5500 as a Superior Firewall Solution

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Network Security Solution. Arktos Lam

Security Technology: Firewalls and VPNs

8. Firewall Design & Implementation

Chapter 9 Firewalls and Intrusion Prevention Systems

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Nominee: Barracuda Networks

Introducing IBM s Advanced Threat Protection Platform

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

How to Build a Massively Scalable Next-Generation Firewall

Gateway Security at Stateful Inspection/Application Proxy

Firewall Environments. Name

Firewall Evolution - Deep Packet Inspection by Ido Dubrawsky last updated July 29, 2003

Intro to Firewalls. Summary

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Lesson 5: Network perimeter security

Figure 41-1 IP Filter Rules

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall


Configuration Example

Multi-Homing Dual WAN Firewall Router

INTRODUCTION TO FIREWALL SECURITY

Cisco IOS Advanced Firewall

H.I.P.A.A. Compliance Made Easy Products and Services

What Your Network s Missing: The Network TAP And 7 Ways To Leverage It

Fortigate Features & Demo

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

Elfiq Networks Vital for Hospitality

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Cisco ASA 5500 Series IPS Solution

Running head: Next Generation Firewalls 1

CMPT 471 Networking II

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

Astaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls (IPTABLES)

SIP Security Controllers. Product Overview

PRODUCT CATEGORY BROCHURE. Juniper Networks Integrated

74% 96 Action Items. Compliance

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Lecture 23: Firewalls

Next Generation Firewalls and Sandboxing

Raptor Firewall Products

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

FortiDDos Size isn t everything

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Firewall Market Trends

McAfee Next Generation Firewall

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Securing EtherNet/IP Using DPI Firewall Technology

Best Practices in Deploying a Secure Wireless Network

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

How To Design An Intrusion Prevention System

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Chapter 15. Firewalls, IDS and IPS

Introduction of Intrusion Detection Systems

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Customer Service Description Next Generation Network Firewall

Astaro Gateway Software Applications

Security threats and network. Software firewall. Hardware firewall. Firewalls

Firewalls. Chapter 3

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Providing Secure IT Management & Partnering Solution for Bendigo South East College

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

NetScreen-5GT Announcement Frequently Asked Questions (FAQ)

IPv6 Transport Support and Market Segmentations

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

White Paper. ZyWALL USG Trade-In Program


Executive Brief on Enterprise Next-Generation Firewalls

FIREWALL POLICY November 2006 TNS POL - 008

Dell SonicWALL Portfolio

Security Portfolio. Juniper Networks Integrated Firewall/VPN Platforms. Product Brochure. Internet SRX Fixed Telecommuter or Small Medium Office

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

Are Second Generation Firewalls Good for Industrial Control Systems?

How To Protect Your Network From Attack From A Malicious Computer (For A Network) With Juniper Networks)

Transcription:

Symantec Enterprise Firewalls From the Internet Thomas

Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are using this version in our class The 5400 Series of high end, integrated firewall offices for the enterprise The 100/200/200R series of appliance firewalls for the remote or small office 2

Symantec 5400 Series Symantec Gateway Security 5400 Series is a next-generation firewall appliance that integrates full packet inspection firewall technology with intrusion prevention intelligence at the gateway between the Internet and corporate network or between network segments. The solution leverages tightly integrated, industry-leading technologies to control and validate data packets as they pass through the gateway. 3

5400 Series Appliances - 2 First, the firewall allows administrators to set granular policies for complete control of information entering and leaving the network It performs deep packet inspection that drops and logs bad packets. If a VPN session is active, the proxy-secured, VPN technology decrypts the packet and drops it into the data stream. Next, the firewall performs session checks at the circuit layer and once again, drops and logs bad packets. The integrated intrusion prevention and intrusion detection technologies block packets that contain threats The IDS automatically notifies the the firewall of malicious sessions from specific IP addresses The firewall can then block specific sessions that contain threats or block specific IP addresses that continue to pose a threat. 4

Enterprise 5400 Firewalls - 3 The firewall then opens and examines application layer protocol packets. These packets are checked to ensure conformity with the applicable RFCs and valid commands. Once again, bad packets are dropped and logged. If the packets are HTTP based, content filtering technology compares the source IP against a list of prohibited Web sites. Prohibited content is dropped and logged. If the packets are HTTP, FTP, or SMTP protocol based, files and attachments are sent to the virus scanner Actively blocks email messages by subject line text, file name attachment type, and message size. If a virus is found, the file is either repaired or dropped. All viruses are logged and a message is added to mail messages indicating that a virus was found and the attachment was deleted. If all of these checks are passed, the appliance allows the packet to enter or leave the network. This unique combination of security technologies helps stop viruses, malicious attacks, and blended threats at the network perimeter. 5

Symantec 4500 Series - 4 Security 5400 Series offers three high-performance models, all with an integrated high availability and load balancing option for maximum uptime. With its clustering and centralized management capabilities, Symantec Gateway Security provides robust and easily managed security for environments ranging from small offices to distributed networks with tens of thousands of nodes. Regardless of the network environment, the appliance delivers throughput that scales from 200 Mbps to more than 3.5 Gbps in clustered configurations. 6

4500 Series Specifications 7

Symantec Office Firewalls - 1 These new small office firewall appliances form Symantec provide Integrated Firewall Capability for Cable Modem and DSL VPN Capability to connect to other small offices and a main corporate office Costs 100 Street price around $350 200 Street price around $550 200r Street price $800 - $900 8

Symantec Small Office Appliances 9

Model 100/200/200R Compared 10