F5 Datacenter Virtualization & Application Security



Similar documents
F5 ASM i DB Monitoring w ofercie NASK

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Availability Acceleration Access Virtualization - Consolidation

ORACLE S SIEBEL BUSINESS APPLICATIONS 8.0

F5 Web Application Security. Radovan Gibala Senior Solutions Architect

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

F5 White Paper. The F5 Powered Cloud

Application Security Manager ASM. David Perodin F5 Engineer

Deliver Secure and Accelerated Remote Access to Applications

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry.

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

F5 NETWORKS, INC. Secure Your Applications, Simplify Authentication, and Optimize Critical System

Basic & Advanced Administration for Citrix NetScaler 9.2

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

Achieving PCI Compliance Using F5 Products

Application Delivery and Load Balancing for VMware View Desktop Infrastructure

F5 Data Solutions w ofercie NASK

F5 Networks Overview Maximizing the Performance and Delivery of Your Mission Critical Enterprise Applications

Achieve Unified Access Control and Scale Cost-Effectively

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

Optimize Application Delivery Across Your Globally Distributed Data Centers

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

Deploying the BIG-IP System v10 with SAP NetWeaver and Enterprise SOA: ERP Central Component (ECC)

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

Post-TMG: Securely Delivering Microsoft Applications

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

Cisco Application Networking for IBM WebSphere

Dynamic Attack Protection and Access Control

Aplikacija novi vladar poslovanja. Dino Novak F5 Networks

Deploying F5 with IBM Tivoli Maximo Asset Management

Application Traffic Management

Security F5 SECURITY SOLUTION GUIDE

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5

Deploying the BIG-IP System v11 with Microsoft SharePoint 2010 and 2013

Cisco Application Networking for BEA WebLogic

Secure Cloud-Ready Data Centers Juniper Networks

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Global Service Loadbalancing & DNSSEC. Ralf Brünig Field Systems Engineer r.bruenig@f5.com DNSSEC

Deliver Secure and Fast Remote Access to Anyone from Any Device

Oracle and F5 Reference Architecture for SOA

Deploying F5 Application Ready Solutions with VMware View 4.5

Datacenter Transformation

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Solution Brief. Secure and Assured Networking for Financial Services

Secure iphone Access to Corporate Web Applications

F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11. Description

F5 Silverline Web Application Firewall Onboarding: Technical Note

Connecting to the Cloud with F5 BIG-IP Solutions and VMware VMotion

DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA

F5 and the 8 Ways to Virtualization

INTRODUCTION TO FIREWALL SECURITY

Achieve Unified Access Control and Scale Cost-Effectively

Deploying F5 with Microsoft Forefront Threat Management Gateway 2010

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Gigabit SSL VPN Security Router

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Deploying the BIG-IP System with Microsoft SharePoint

Using Palo Alto Networks to Protect the Datacenter

Chapter 9 Firewalls and Intrusion Prevention Systems

F5 Beyond Load Balancer

F5 and VMware. Realize the Virtual Possibilities.

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Deploying F5 with Microsoft Active Directory Federation Services

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

Load Balancing for Microsoft Office Communication Server 2007 Release 2

BIG-IP v9 Series. BIG-IP Local Traffic Manager. Key Benefits

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Microsoft Exchange Server

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0

Workshop VLAB WMWARE. F5 Networks : Nicolas BERTHIER WestconSecurity : Romain MOREL 11 / 1 / 2010

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy

Optimizing VMware View VDI Deployments with F5

Deploying the BIG-IP System with Microsoft IIS

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

Transcription:

1 F5 Datacenter Virtualization & Application Security Łukasz Formas Field Systems Engineer l.formas@f5.com +48 695 157 277 18th of Dec 2008

Datacenter Virtualization 2

3 Traffic on classic datacenter design Cell phone NetApp PC - Home App. Server MS SQL Server EMC Laptop coffee shot App. Server PC - LAN Oracle Windows file storage App. Server PC - WAN App. Server mysql Server Windows file storage

4 8 steps to vitrualization Operating system virtualization Application virtualization Application server virtualization Management virtualization Network virtualization Hardware virtualization Storage virtualization Service virtualization

5 Operating system virtualization Modular architecture of TMOS Support for virtualization products (VMware, MS Hyper-V) icontrol

6 Application virtualization R E M O T E Supplier Employee Internet Internet Quarantine Quarantine network network SSL W I R E L E S S WLAN WLAN segment 2 segment 2 SSL/TLS User directory I N T E R N A L Corporate Desktop Internal Internal LAN LAN segment 1 segment 1 Network, portal, app access Support all client types Centralized Access Control Simplified policy management Integrated endpoint security

7 Application server virtualization Users The F5 Solution Applications Mobile Phone PDA Laptop Desktop Application Delivery Network TMOS CRM Database Siebel BEA Legacy.NET SAP PeopleSoft IBM ERP SFA Custom Co-location

8 Management virtualization Management domains VLAN, admins, partitions Resource provisioning (v10) Enterprise Manager

9 Network virtualization Since 2004 LTM functionality Virtual servers, SNAT, VLANs, one:many Link aggregation Rate shaping Policies

10 Hardware virtualization Virtual Machines Servers Physical Server Servers Virtual Machines Automatic addition of power No need to overprovision Fixed and predictable OpEx Servers Physical Server

11 Storage virtualization Decouples access from physical file location Presents a Global Namespace view of the data a federation of the underlying file systems Masks changes to underlying storage systems from users and applications Automates common storage management tasks Migration Storage Tiering Load Balancing These tasks now take place without affecting access to the file data or requiring client re-configuration

12 Service virtualization Site and application availability and performance Client geo-based resolution Enterprise s business rules Optimized WAN load balancing methods Support of SOA rollup of services under FQDN L-DNS Client Site 1 (Primary) BIG-IP GTM Router Site 2 (Standby or Active/Active)) BIG-IP GTM Router Corporate Servers Corporate Servers

F5 Data Center Virtualisation 13 Mobile PC - Home Remote - WAN PC - LAN WLAN Data Center & Link Virtualisation GTM & LC Virtualisation LTM Application Server Virtualisation LTM File Storage Virtualisation App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server App. Server ARX NetApp EMC Windows file storage Windows file storage

14 F5 Products Deployments F5 TMOS Branch Office FirePass WANJet Enterprise Manager DMZ WANJet BIG-IP Link Controller Remote Users FirePass Firewalls BIG-IP Global Traffic Manager Internet or WAN BIG-IP Application Security Manager BIG-IP WebAccelerator BIG-IP Local Traffic Manager Disaster Recovery DMZ FirePass BIG-IP Global Traffic Manager WANJet BIG-IP Link Controller Firewalls Oracle Portal Oracle 10g App Servers OFM Applications Oracle Database BIG-IP Local Traffic Manager F5 TMOS Headquarters Oracle Portal Oracle 10g App Servers OFM Oracle Applications Database F5 TMOS

Business Business Continuity Continuity HA HA Disaster Disaster Recovery Recovery 15 App Security & Data Integrity User Experience & App Performance Managing Scale & Consolidation Unified Security Enforcement & Access Control

Business Continuity HA Disaster Recovery 16 App Security & Data Integrity User Experience & App Performance People Apps Data Managing Scale & Consolidation Storage Growth Unified Security Enforcement & Access Control

Business Continuity HA Disaster Recovery 17 App Security & Data Integrity User Experience & App Performance People Apps Data Managing Scale & Consolidation Storage Growth Unified Security Enforcement & Access Control

Business Continuity HA Disaster Recovery 18 App Security & Data Integrity Managing Scale & Consolidation AAA Data Protection Transaction Validation Virtualized App & Infrastructure Server & App Offload Load Balancing WAN Virtualization File Virtualization DC to DC Acceleration Virtualized VPN Access People People Apps Apps Data Data Remote, WLAN & LAN Central Policy Enforcement End-Point Security Encryption AAA Asymmetric & Symmetric Acceleration Server Offload Load Balancing Virtualization Migration Tiering Load Balancing User Experience & App Performance Storage Growth Unified Security Enforcement & Access Control

Application Delivery Network Business Continuity HA Disaster Recovery BIG-IP LTM GTM LC WA FirePass ARX WJ 19 BIG-IP LTM ASM FirePass App Security & Data Integrity AAA Data Protection Transaction Validation WAN Virtualization File Virtualization DC to DC Acceleration Virtualized VPN Access People Asymmetric & Symmetric Acceleration Server Offload Load Balancing User Experience & App Performance BIG-IP LTM GTM WA ARX WJ Apps Data BIG-IP LTM GTM LC WA FirePass ARX WJ Managing Scale & Consolidation Virtualized App & Infrastructure Server & App Offload Load Balancing Remote, WLAN & LAN Central Policy Enforcement End-Point Security Encryption AAA Virtualization Migration Tiering Load Balancing Storage Growth ARX BIG-IP GTM Unified Security Enforcement & Access Control FirePass BIG-IP LTM GTM

20 How To Achieve the Requirements? Multiple Point Solutions More Bandwidth Application Network Administrator Application Developer Add More Infrastructure? Hire an Army of Developers?

21 F5 s Integrated Solution Users The F5 Solution Applications Mobile Phone PDA Laptop Desktop Application Delivery Network TMOS CRM Database Siebel BEA Legacy.NET SAP PeopleSoft IBM ERP SFA Custom Co-location

The entire solution is built on top of the TMOS operating system that integrates all the tools 22 irules and icontrol Programmable Network Language GUI-Based Application Profiles Repeatable Policies Unified Application Infrastructure Services Programmable Application Network Targeted and Adaptable Functions Security Optimisation Delivery New Service Universal Inspection Engine (UIE) Complete Visibility and Control of Application Flows TMOS Fast Application Proxy Client Side Server Side

Application Networking (ADN) Architecture Enabling Organization and Business Success 23 International Data Center Policy-based, centralized AND Management Users Intelligent & policy-based DNS; support virtualization & SOA components Bi-directional applicationaware multihoming & QoS Services Symmetric WAN optimization & application acceleration Services Universal client and system application & network VPN Services Application & server virtualization, SOA component support, application loadbalancing, switching, filtering Asymmetric application acceleration Bi-directional application firewall services Applications Open SOAP/XML API & SDK IP Proxy O/S Business Goal: Achieve these objectives in the most operationally efficient manner

Application Networking (ADN) Architecture Enabling Organization and Business Success 24 International Data Center Policy-based, centralized AND Management Users Intelligent & policy-based DNS; support virtualization & SOA components Bi-directional applicationaware multihoming & QoS Services Symmetric WAN optimization & application acceleration Services Universal client and system application & network VPN Services Application & server virtualization, SOA component support, application loadbalancing, switching, filtering Asymmetric application acceleration Bidirectional application firewall services Applications Open SOAP/XML API & SDK IP Proxy O/S Business Goal: Achieve these objectives in the most operationally efficient manner

25 Application Security F5 Application Security Manager

26 Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week DATA

27 Web Application Security! Noncompliant Information! Infrastructural Intelligence Buffer Overflow Cross-Site Scripting SQL/OS Injection Cookie Poisoning Hidden-Field Manipulation Parameter Tampering Perimeter Security Is Strong PORT 80 PORT 443 But Is Open to Web Traffic! Forced Access to Information Attacks Now Look To Exploit Application Vulnerabilities High Information Density = High Value Attack

28 Why Are Web Applications Vulnerable? New code written to best-practice methodology, but not tested properly New type of attack not protected by current methodology New code written in a hurry due to business pressures Code written by third parties; badly documented, poorly tested third party not available Flaws in third party infrastructure elements Developers focused on funcionality

29 Application Security with a WAF! Unauthorised Access And Stops Bad Requests! Noncompliant Information Browser! Unauthorised Access WAF Allows Legitimate Requests! Infrastructural Intelligence Bi-directional: Inbound: protection from generalised & targeted attacks Outbound: content scrubbing & application cloaking Application content & context aware High performance, low latency, high availability, high security Policy-based full proxy with deep inspection & Java support Positive security augmenting negative security Central point of application security enforcement

30 Application Security with a WAF Intelligent Decisions Allow Only Good Application Behaviour; Positive Security Browser Definition of Good and Bad Behaviour

31 Negative vs. Positive Security Model Negative Security Model Lock Known Attacks Everything else is Allowed Patches implementation is quick and easy (Protection against Day Zero Attacks) Positive Security Model (Automatic) Analysis of Web Application Allow wanted Transactions Everything else is Denied Implicit Security against New, yet Unknown Attacks (Day Zero Attacks)

Support of dynamic values 32

33 Example: SAP Application Protect the session information in the URI https://saptest.xyz.de/sap(bd1kzszjptaxma==)/... Protect dynamic parameter names and values &Tdokfilter_subdok_dokstrukturK2_Y123456789103459 185=F

34 Selective Application Flow Enforcement! ALLOWED Username From Acc. $ Amount Should this be a violation? The user may have bookmarked the page! Unnecessarily enforcing flow can lead to false positives.? Password! VIOLATION To Acc.! VIOLATION Transfer This part of the site is a financial transaction that requires authentication; we should enforce strict flow and parameter validation

35 XML Firewall Well formatted validation Schema/WSDL validation Methods selection Attack signatures for XML platforms Backend Parser protection XML islands application protection Full request Logging

36 Flexible Deployment Options Tighter Security Posture Typical standard starting point OBJECT FLOWS PARAMETER VALUES PARAMETER NAMES OBJECT NAMES OBJECT TYPES POLICY TIGHTENING SUGGESTIONS Policy-Building Tools Trusted IP Learning Live Traffic Learning Crawler Negative RegEx Template

37 Flexible Policy Granularity Generic Policies - Policy per object type Low number of policies Quick to implement Requires little change management Can t take application flow into account Optimum policy is often a hybrid Specific Policies Policy per object High number of policies More time to implement Requires change management policy Can enforce application flow Tightest possible security Protects dynamic values

Traditional Security Doesn t Protect Web Applications Looking at the wrong thing in the wrong place 38 Known Web Worms Unknown Web Worms Known Web Vulnerabilities Unknown Web Vulnerabilities Illegal Access to Web-server files Forceful Browsing File/Directory Enumerations Buffer Overflow Cross-Site Scripting SQL/OS Injection Cookie Poisoning Hidden-Field Manipulation Parameter Tampering Application Firewall Network Firewall Present Present Present Present Present Present Present Present Present Present X X X IPS Present Present Present Present Present Present Present Present Present Present X X X

Secerno 39

Whitehat Sentinel 40

Application Networking (ADN) Architecture Enabling Organization and Business Success 41 International Data Center Enterprise Manager Users BIG-IP Global Traffic Manager BIG-IP Link Controller WANJet FirePass BIG-IP Local Traffic Manager Web Accelerator Application Security Manager Applications icontrol TMOS Business Goal: Achieve these objectives in the most operationally efficient manner

42 Virtualize and Unify Network Services and Offload the Application Network BIG-IP W W A Database System A SECURE DoS and SYN Flood Protection Network Address/Port Translation Application Attack Filtering Certificate Management Resource Cloaking Advanced Client Authentication Firewall - Packet Filtering Selective Content Encryption Cookie Encryption Content Protection Protocol Sanitization Application Security Module FAST SSL Acceleration Quality of Service Connection Pooling Intelligent Compression L7 Rate Shaping Content Spooling/Buffering TCP Optimization Content Transformation Caching AVAILABLE Comprehensive Load Balancing Advanced Application Switching Customized Health Monitoring Intelligent Network Address Translation Intelligent Port Mirroring Universal Persistence Response Error Handling Session / Flow Switching IPv6 Gateway Advanced Routing

43 Company Snapshot Facts Position References

44 F5 is the Global Leader in Application Delivery Networking Users Data Centre At Home In the Office On the Road Application Delivery Network SAP Microsoft Oracle Business goal: Achieve these objectives in the most operationally efficient manner

45 Analyst Leadership Position Challengers Leaders Ability to Execute Cisco Systems Foundry Networks Nortel Networks Niche Players Completeness of Vision Citrix Systems Visionaries F5 Networks Akamai Technologies Cresendo Radware Juniper Coyote Point Zeus NetContinuum Array Networks Magic Quadrant for Application Delivery Products, 2007 F5 Strengths Offers the most feature-rich AP ADC, combined with excellent performance and programmability via irules and a broad product line. Strong focus on applications, including long-term relationships with major application vendors, including Microsoft, Oracle and SAP. Strong balance sheet and cohesive management team with a solid track record for delivering the right products at the right time. Strong underlying platform allows easy extensibility to add features. Support of an increasingly loyal and large group of active developers tuning their applications environments specifically with F5 infrastructure. Source: Gartner, January 2007

46 F5 Customers in EMEA (1 of 2) Banking, Insurance, Telco,, Service Financial Investments Providers, Mobile

47 F5 Customers in EMEA (2 of 2) Transport, Media, Technology, Manufact., Governm., Travel Online Energy Other Health, Consumer

Thank You 48