Endian Unified Threat Management



Similar documents
Unified Threat Management Systems (UTMS), Open Source Routers and Firewalls. Tim Hooks Scott Rolf

NETASQ MIGRATING FROM V8 TO V9

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Sophos UTM Software Appliance

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Firewall, Mail and File server solution

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

F-Secure Messaging Security Gateway. Deployment Guide

Darstellung Unterschied ZyNOS Firmware Version 4.02 => 4.03

Astaro Gateway Software Applications

Firewall Defaults and Some Basic Rules

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Steps for Basic Configuration

Virtual Web Appliance Setup Guide

WatchGuard Training. Introduction to WatchGuard Dimension

Installing and Using the vnios Trial

Cisco Small Business ISA500 Series Integrated Security Appliances

Virtual Managment Appliance Setup Guide

Who s Endian?

Kerio Control. Step-by-Step Guide. Kerio Technologies

Configuring Trend Micro Content Security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Sophos Certified Architect Course overview

Funkwerk UTM Release Notes (english)

Step-by-Step Configuration

Web Application Firewall

Configuration Example

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION

Unified Threat Management

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Introduction to Computer Security Benoit Donnet Academic Year

Pearl Echo Installation Checklist

NetSpective Global Proxy Configuration Guide

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

F-Secure Internet Gatekeeper Virtual Appliance

How to Create a Basic VPN Connection in Panda GateDefender eseries

F-SECURE MESSAGING SECURITY GATEWAY

CYAN SECURE WEB APPLIANCE. User interface manual

A Guide to New Features in Propalms OneGate 4.0

70-662: Deploying Microsoft Exchange Server 2010

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER

Security Technology: Firewalls and VPNs

Filter. SurfControl Filter 5.0 for SMTP Getting Started Guide. The World s #1 Web & Filtering Company

Configuration Example

Sophos Roadshow. Complete Security Vision

IBM Security SiteProtector System Configuration Guide

System Admin Module User Guide. Schmooze Com Inc.

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007

Setting Up Scan to SMB on TaskALFA series MFP s.

Configuration Information

Configuring PA Firewalls for a Layer 3 Deployment

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

QUICK START GUIDE. Cisco C170 Security Appliance

Solution Brief FortiMail for Service Providers. Nathalie Rivat

Network Configuration Settings

Palo Alto Networks User-ID Services. Unified Visitor Management

User Guide. Cloud Gateway Software Device

Boston Area Windows Server User Group April 2010

Medical Networks and Operating Systems

Lab Configuring Access Policies and DMZ Settings

Configuring Windows Server Clusters

SonicWALL Security Quick Start Guide. Version 4.6

Lesson Plans Configuring Exchange Server 2007

Barracuda Link Balancer

Deployment Topologies

Installation Notes for Outpost Network Security (ONS) version 3.2

Cyberoam Anti Virus Implementation Guide Version 9

Comodo Korugan Software Version 1.4

Move over, TMG! Replacing TMG with Sophos UTM

escan SBS 2008 Installation Guide

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Proxies. Chapter 4. Network & Security Gildas Avoine

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

SuperLumin Nemesis. Administration Guide. February 2011

INTRODUCTION TO FIREWALL SECURITY

VMware Identity Manager Connector Installation and Configuration

Introduction to Mobile Access Gateway Installation

Barracuda Link Balancer Administrator s Guide

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

Preparing for Version 10

Securing Your Network with pfsense. ILTA-U Dale Qualls Pattishall, McAuliffe, Newbury, Hilliard & Geraldson LLP dqualls@pattishall.

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

Multi-Homing Security Gateway

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

Step-by-Step Configuration

Perimeter Firewalls. Brandon Napier Rick Archibald Pete Jamison HAL PC & HLUG 09/22/2007. brought to you by: in association with

Small Business Server Part 2

Firewall Firewall August, 2003

1 You will need the following items to get started:

OnCommand Performance Manager 1.1

Lesson 5: Network perimeter security

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Transcription:

Endian Unified Threat Management Introduction/Demo to Endian UTM lmarzke Lee Marzke (4AERO.com) Infrastructure Consultant: Software Development organizations Specialize in SCM, Process, PM, Tools Just Enough Agile Virtualization (VMware, NetAPP SAN ) 2 to 200 hosts Endian Unified Threat Management ( UTM ) UTM Components Security Filtering Network Services Form Factor Software Appliance Hardware Appliance Unified Threat Management is: (1) Consolidated Security Multi-zone Firewall / Proxy (HTTP, FTP, SMTP, DNS) Web and Email AV Intrusion Detection (SNORT in-line) OpenVPN 1 of 14 07/08/2010 01:53 PM

Filtering URL, Content, Attachment Filtering Email Anti-Spam, Bayesian Learning Filter Unified Threat Management is: (2) Network Services DHCP, DNS, Time, QoS Misc Services Dynamic DNS NTOP traffic monitor * Hotspot / radius server pfsense, IPCOP, Smoothwall -vs- UTM Security <-----------> Administration Cost One server per job <---> Combined Functions Minimal Functions <---> More Functions You could also argue that more security functions for the same budget gives you more security. Endian (Bolzano, Italy) Open Source (community) software appliance Virtual Firewall Appliance (VM) Commercial software appliance w/ support Network Portal for managing devices on support Hardware Appliances 10-2500 users Firewall Architecture 4 zones (Red/Orange/Green/Blue) + VPN (purple) zone 2 of 14 07/08/2010 01:53 PM

UTM at 4AERO Web GUI (1) Dashboard Network Interface(s) and Status Hardware Status (RRD) current traffic graphs (RRD) Web GUI (1a) 3 of 14 07/08/2010 01:53 PM

Web GUI (2) - Status Connections Web GUI (2a) Status HW RRD Graphs 4 of 14 07/08/2010 01:53 PM

Web GUI (2b) Status Traffic RRD Graphs 5 of 14 07/08/2010 01:53 PM

Web GUI (3) Network Hosts Web GUI 4 Services DHCP fixed leases Web GUI (4a) Services IDS (Snort in-line) 6 of 14 07/08/2010 01:53 PM

Web GUI 5 Firewall OUT Web GUI 5a Firewall port forwards 7 of 14 07/08/2010 01:53 PM

Web GUI 5b Firewall Interzone Web GUI 6 Proxy HTTP 8 of 14 07/08/2010 01:53 PM

Web GUI 6a Proxy HTTP Content Filter Web GUI 7 VPN 9 of 14 07/08/2010 01:53 PM

Demo System Lenovo X61 Laptop VMware Workstation Endian UTM VM --> Private Network Windows XP (green) <-- Example Use Cases (1) Filter Web (HTTP) Traffic HTTP Proxy Modes Manual Proxy setup in Browser Automatic Proxy detection (WPAD, or PAC) Transparent Optional Authentication Internal, AD, Radius Filtering AntiVirus, URL's, Content, Attachments Example Use Cases (2) Email Filtering POP3 Proxy ( Spam and AV ) 10 of 14 07/08/2010 01:53 PM

SMTP Proxy Both Inbound and Outbound filtering ( Spam, AV, Attachments ) Bayesian Spam Learning ( Site Wide ) SPAM Training Service SPAM folder on IMAP HAM folder on IMAP Example Use Cases (3) Prevent client DNS attacks DNS Proxy Rewrite port 53 requests to use Endian specified DNS Redirect known spyware requests Change NS based on domain Example Use Cases (4) Internal Hosts ( ~ split DNS ) Specify internal IP for external domain names Allows external URL's to work internally. Example Use Cases (5) Redundant Uplinks Network/Interfaces/Uplink Editor Network/Routing/Policy Routing Example Use Cases (6) Assign Fixed DHCP leases Services/DHCP Advantages of Static, without the hassle Great for Laptops! Example Use Cases (7) 11 of 14 07/08/2010 01:53 PM

Intrusion Detection (Snort) Services/IDS Default is to Warn, Click to Block IDS traffic enabled case-by-case using Firewall Rules Example Use Cases (8) Enable Quality of Service (QoS) Services/QoS/Devices Set Uplink/Downlink speeds Classes Default (High, Medium, Low, Bulk ) Rules Based on MAC, IP, zone, or TOS Example Use Cases (9) Setup OpenVPN Services/VPN/OpenVPN Add user Download cacert.pem to client Install Endian OpenVPN client ( Commerical version only ) -or- Install OpenVPN and scripts as required. Command Line Serial Console optional ( at install time ) Config Files Normal configuration files /var/efw/, /etc/endian/services Scripts Endian scripts in /usr/local/bin ( python ) Enterprise Features 12 of 14 07/08/2010 01:53 PM

* = Not Available in Community Multi-WAN fail-over RAID 1 ( if 2 disks available during install ) * High Availability (Hot Spare ) * Endian Network ( remote Portal for upgrades, control ) Endian Network Open Source -vs- Commercial Support Open Source (Community) Many open-source packages Many menu options Testing / support by community I've found ~10% of functions broken in new releases Commercial Released after Community 'shake-out' Email support from Endian Production quality Commercial Pricing Software Subscription - $250+ per year Hardware $750 to $10k + Commercial Demos or Pricing Quotes 13 of 14 07/08/2010 01:53 PM

Contact lmarzke@4aero.com Questions 14 of 14 07/08/2010 01:53 PM