Next-Generation Firewall Overview

Similar documents
Next-Generation Firewall Overview

Firewall Feature Overview

Palo Alto Networks Next-Generation Firewall Overview

Next-Generation Firewall Overview

Content-ID. Content-ID URLS THREATS DATA

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Palo Alto Networks Next-generation Firewall Overview

REPORT & ENFORCE POLICY

Using Palo Alto Networks to Protect the Datacenter

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Palo Alto Networks Next-Generation Firewall Overview

Palo Alto Networks - Next Generation Firewall. Contents

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

June Palo Alto Networks 3300 Olcott Street Santa Clara, CA

How to Dramatically Reduce the Cost and Complexity of PCI Compliance

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

WildFire. Preparing for Modern Network Attacks

Moving Beyond Proxies

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

A Modern Framework for Network Security in the Federal Government

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Palo Alto Networks In The Data Center: Eliminating Compromise. May 2011

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Things Your Next Firewall Must Do

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

Palo Alto Networks. October 6

Networking for Caribbean Development

Still Using Proxies for URL Filtering? There s a Better Way

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Deployment Guide for Citrix XenDesktop

Next-Generation Firewalls: Critical to SMB Network Security

Controlling Peer-to-Peer Applications

Palo Alto Networks Overview

Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide

How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)

Monitor Network Activity

Palo Alto Networks User-ID Services. Unified Visitor Management

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Deployment Guide for Microsoft Lync 2010

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

The Application Usage and Threat Report

PALO ALTO SAFE APPLICATION ENABLEMENT

Panorama Overview. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

Securing the Virtualized Data Center With Next-Generation Firewalls

A Buyer's Guide to Data Loss Protection Solutions

Breaking the Cyber Attack Lifecycle

Solution Brief. Secure and Assured Networking for Financial Services

APERTURE. Safely enable your SaaS applications.

Next Generation Enterprise Network Security Platform

Firewall Feature Overview

Streamline PCI Compliance With Next-generation Security

Web Interface Reference Guide Version 6.1

Introduction to Endpoint Security

Panorama. Panorama provides network security management beyond other central management solutions.

Re-Inventing Network Security to Safely Enable Applications

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

The Hillstone and Trend Micro Joint Solution

It s Time to Fix The Firewall

McAfee Network Security Platform Administration Course

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

On-Premises DDoS Mitigation for the Enterprise

Enterprise Security Platform for Government

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Palo Alto Networks Gets Top Marks for Solving Bandwidth and Security Issues for School District

Defending Against Cyber Attacks with SessionLevel Network Security

Monitor Network Activity

Reinventing Network Security, One Firewall at a Time. Chris King Director, Product Marketing

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Introducing IBM s Advanced Threat Protection Platform

Configuring PA Firewalls for a Layer 3 Deployment

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

Advantages of Managed Security Services

Superior protection from Internet threats and control over unsafe web usage

Firewall Testing Methodology W H I T E P A P E R

FIREWALL BUYERS GUIDE

McAfee Web Reporter Turning volumes of data into actionable intelligence

The Benefits of SSL Content Inspection ABSTRACT

Reports and Logging. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Carbon Black and Palo Alto Networks

Securing FlexPod Deployments with Next-Generation Firewalls

Reports and Logging. PAN-OS Administrator s Guide. Version 6.1

SANS Top 20 Critical Controls for Effective Cyber Defense

Transcription:

Next-Generation Firewall Overview Business and technology advancements have steadily eroded the protection that the traditional firewall provided. Users have come to expect to be able to work from any location they desire--the office, their home, a hotel room, or a coffee shop--rendering the traditional concept of a perimeter obsolete. Furthermore, applications easily bypass traditional port-based firewalls; hopping ports, using SSL and SSH, sneaking across port 80, or using non-standard ports. Attempts to restore visibility and control have produced duplicate security polices for local and remote users. The local policy includes firewall helpers deployed either stand-alone, or through sheet-metal integration, while the remote user policy is delivered via parallel, end-point offerings. These approaches introduce policy inconsistency and do not solve the visibility and control problem due to inaccurate or incomplete traffic classification, cumbersome management, and multiple latency-inducing scanning processes. Restoring visibility and control requires a new, fresh, from-the-ground-up approach. What s needed is a next-generation firewall that unifies security policies for all users, and all applications, both local and remote. Key Next-Generation Firewall Requirements: Identify applications, not just ports: Identify exactly what the application is, across all ports, irrespective of protocol, encryption (SSL or SSH), or evasive tactic. The application identity becomes the basis for all security policies. Identify users, not just IP addresses: Employ user and group information from enterprise directories for visibility, policy creation, reporting, and forensic investigation no matter where the user is located. Inspect content in real-time: Protect the network against vulnerability exploits and malware embedded in application traffic, regardless of origin. Simplify policy management: Securely enable applications with easy-to-use graphical tools that tie them together in a unified policy. Enable a logical perimeter: Secure all users, including traveling and telecommuter users, with consistent security that extends from the physical to the logical perimeter. Deliver multi-gigabit throughput: Combine purpose-built hardware and software to enable low-latency, multi-gigabit performance with all services enabled. Palo Alto Networks next-generation firewalls enable unprecedented visibility and control of applications, users, and content not just ports, IP addresses, and packets using three unique identification technologies: App-ID, User-ID, and Content-ID. These identification technologies, found in every Palo Alto Networks enterprise firewall, enable enterprises to embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation.

App-ID: Classifying Applications, All Ports, All the Time Accurate traffic classification is the heart of any firewall, with the result becoming the basis of the security policy. Traditional firewalls classify traffic by port and protocol, which, at one point, was a satisfactory mechanism for securing the perimeter. Today, applications can easily bypass a port-based firewall; hopping ports, using SSL and SSH, sneaking across port 80, or using non-standard ports. App-ID TM addresses the traffic classification visibility limitations that plague traditional firewalls by applying multiple classification mechanisms to the traffic stream, as soon as the device sees it, to determine the exact identity of applications traversing the network. Unlike add-on offerings that rely solely on IPS-style signatures, implemented after port-based classification, every App-ID automatically uses up to four different traffic classification mechanisms to determine the exact identity of the application. There is no need to apply specific settings for a particular application, App-ID continually classifies the traffic, using the appropriate identification mechanism, resulting in consistent and accurate application identification, across all ports, for all the traffic, all the time, in many cases, down to the function level. Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics As applications are identified by the successive mechanisms, the policy check determines how to treat them: block, allow, or securely enable (scan for, and block embedded threats, inspect for unauthorized file transfer and data patterns, or shape using QoS). LDAP, Citrix, Microsoft Terminal Server, and XenWorks. An XML API and Captive Portal round out the range of mechanisms that enable organizations to incorporate user information into their security policies. A network-based User- ID agent communicates with the domain controller, mapping the user information to the IP address that they are using at a given time. 10.0.0.227 10.0.0.211 Login 10.0.0.232 Monitoring 10.0.0.220 10.0.0.239 10.0.0.242 10.0.0.245 10.0.0.209 10.0.0.217 End Station 10.0.0.232 Polling 10.0.0.221 User-ID Role Discovery Captive Portal Paul I Engineering Finance Group User and group information provided by User-ID is pervasive throughout the Palo Alto Networks next-generation firewall feature set including Application Command Center, the policy editor, logging and reporting. Content-ID: Protecting Allowed Traffic Today s employees are using any application they want for a combination of both work and personal purposes; simultaneously, attackers are taking full advantage of this unfettered usage to achieve their goals. Content-ID, in conjunction with App-ID, provides administrators with a twopronged solution to protecting their network assets. App-ID can be used to identify and control the applications on the network, allowing specific applications to be used. Then, using Content-ID, specific policies can be applied to each application as a means of blocking attacks and limiting the transfer of unauthorized files and sensitive data. Rounding out the control elements that Content-ID offers is a comprehensive URL database to control web surfing. Nancy I User-ID: Enabling Applications by Users and Groups Traditionally, security policies were applied based on IP addresses, but the increasingly dynamic nature of users and computing means that IP addresses alone have become ineffective as a mechanism for monitoring and controlling user activity. DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware URLS Web Filtering User-ID seamlessly integrates Palo Alto Networks nextgeneration firewalls with the widest range of enterprise directories on the market; Active Directory, edirectory, Open Content-ID PAGE 2

Content-ID uses a stream-based scanning engine and a uniform signature format to look for and block a wide range of attacks including vulnerability exploits, viruses, spyware, and worms. Stream-based scanning means that threat prevention begins as soon as the first packet is scanned while the uniform signature format eliminates redundant processes common to multiple scanning engine solutions (TCP reassembly, policy lookup, inspection, etc.). The result is a reduction in latency and improved performance. Secure Application Enablement The seamless integration of App-ID, User-ID, and Content- ID enables organizations to establish consistent application enablement policies, down to the functional level in many cases, that span the permissiveness spectrum from allow to deny. The same policies that protect users within the corporate headquarters can be extended to all users, no matter where they are located, thereby establishing a logical perimeter for users outside of the corporate walls. Secure enablement policies begin with the application identity, determined by App-ID, as soon as traffic hits the device. The application identity is then mapped to the associated user with User-ID, while traffic content is scanned for threats, files, data patterns, and web activity by Content-ID. These results are displayed in Application Command Center (ACC) where the administrator can learn, in near real-time, what is happening on the network. Then, in the policy-editor, the datapoints gleaned from ACC about applications, users, and content can be turned into appropriate security policies that block unwanted applications, while allowing and enabling others in a secure manner. Finally, any detailed analysis, reporting, or forensics can be performed, again, with applications, users, and content as the basis. Application Command Center: Knowledge is Power Application Command Center (ACC) utilizes a subset of the log database to graphically display a high-level summary of the applications traversing the network, who is using them, and their potential security impact. ACC is dynamically updated, leveraging the continuous traffic classification that App-ID performs; if an application changes ports, App-ID continues to see the traffic, displaying the results in App-ID. There are no settings to modify, no signatures to enable or configure. New or unfamiliar applications that are seen in ACC can be quickly investigated with a single click that displays a description of the application, its key features, its behavioral characteristics, and who is using it. Additional data on URL categories, threats, and data provides a complete and well-rounded picture of network activity. With ACC, an administrator can very quickly learn more about the traffic traversing the network and then translate that information into a more informed security policy. Application Visibility View application activity in a clear, easy-to-read format. Add and remove filters to learn more about the application, its functions and who is using them. PAGE 3

Policy Creation A familiar look and feel enables the rapid creation and deployment of policies that control applications, users and content. Policy Editor: Translating Knowledge into Secure Enablement Policies Immediate access to the knowledge of which applications are traversing the network, who is using them, and the potential security risk empowers administrators to quickly deploy application-, application function-, and port-based enablement policies in a systematic and controlled manner. Policy responses can range from open (allow), to moderate (enabling certain applications or functions, then scan, or shape, schedule, etc.), to closed (deny). Examples may include: Assign Salesforce.com access to the sales and marketing groups by leveraging user and group information. Protect data within the Oracle database by limiting access to finance groups, forcing the traffic across the standard ports, and inspect the traffic for application vulnerabilities. Enable only the IT group to use a fixed set of management applications across their standard ports. Define and enforce a corporate policy that allows and inspects specific webmail and instant messaging usage. Allow the use of MSN and Google Talk, but block the use of their respective file transfer functions. Allow SharePoint Admin to be used by only the SharePoint administration team, and allow access to SharePoint Docs for all other users. Implement QoS policies to allow media and other bandwidth intensive applications but limit their impact on VoIP applications. Identify the transfer of sensitive information such as credit card numbers or social security numbers, either in text or file format. Deploy URL filtering policies that block access to obvious non-work related sites, monitor questionable sites, and coach access to others using customized block pages. Deny all traffic from specific countries based or block unwanted applications such as P2P file sharing, circumventors, and external proxies. The tight integration of application control, based on users and groups, and the ability to scan the allowed traffic for a wide range of threats, allows organizations to dramatically reduce the number of policies they are deploying along with the number of employee adds, moves and changes that may occur on a day-to-day basis. PAGE 4

Content and Threat Visibility View URL, threat and file/data transfer activity in a clear, easyto-read format. Add and remove filters to learn more about individual elements. Policy Editor: Protecting Enabled Applications Securely enabling applications means allowing access to the applications, then applying specific threat prevention and file, data, or web traffic blocking policies with Content- ID. Each of the elements included in Content-ID can be configured on a per-application or application-function basis, allowing administrators to be very targeted in their prevention efforts. Intrusion Prevention System (IPS): Vulnerability protection integrates a rich set of intrusion prevention system (IPS) features to block known and unknown network and application-layer vulnerability exploits, buffer overflows, DoS attacks, and port scans. Network Antivirus: Stream-based antivirus protection blocks from millions of malware variants, including PDF viruses and malware hidden within compressed files or web traffic (compressed HTTP/HTTPS). Policy based SSL decryption enables organizations to protect against malware moving across SSL encrypted applications. URL Filtering: A fully-integrated, customizable URL filtering database of 20 million URLs across 76 categories allows administrators to apply granular web-browsing policies, complementing application visibility and control policies and safeguarding the enterprise from a full spectrum of legal, regulatory, and productivity risks. File and Data Filtering: Data filtering features enable administrators to implement policies that will reduce the risks associated with file and data transfers. File transfers and downloads can be controlled by looking inside the file (as opposed to looking only at the file extension), to determine if it allowed or not. Executable files, typically found in drive-by downloads, can be blocked, thereby protecting the network from unseen malware propagation. Finally, data filtering features can detect, and control the flow of confidential data patterns (credit card and social security numbers). Traffic Monitoring: Analysis, Reporting and Forensics Security best practices dictate that administrators strike a balance between being proactive, continually learning and adapting to protect the corporate assets and being reactive, investigating, analyzing and reporting on security incidents. ACC and the policy editor can be used to proactively apply application enablement policies, while a rich set of monitoring and reporting tools provide organizations with the necessary means to analyze and report on the application, users and content flowing through the Palo Alto Networks next-generation firewall. App-Scope: Complementing the real-time view of applications and content provided by ACC, Appscope provides a dynamic, user-customizable view of application, traffic and threat activity over time. PAGE 5

Reporting: Predefined reports can be used as-is, customized, or grouped together as one report in order to suit the specific requirements. All reports can be exported to CSV or PDF format and they can be executed and emailed on a scheduled basis. Behavioral Botnet Detection: Data regarding unknown applications, IRC traffic, malware sites, dynamic DNS, and newly created domains is analyzed with the results displaying the list of potentially infected hosts that can be investigated as members of a botnet. Logging: Real-time log filtering facilitates rapid forensic investigation into every session traversing the network. Log filter results can be exported to a CSV file or sent to a syslog server for offline archival or additional analysis. Trace Session Tool: Accelerate forensics or incident investigation with a centralized, correlated view across all of the logs for traffic, threats, URLs, and applications related to an individual session. GlobalProtect: Extending Policy Control to All Users For users within the physical perimeter, enforcing security policies with a next-generation firewall is straightforward. Traffic is classified by the firewall, enablement policies are applied, traffic is scanned for threats, and the network is protected. However, the rapid pace of today s business has forced an abstraction of applications, users, and content from the physical perimeter, making the deployment and enforcement of a consistent set of security policies for remote users nearly impossible. GlobalProtect extends the same next-generation firewallbased policies that are enforced within the physical perimeter to all users, no matter where they are located. In effect, Global Protect establishes a logical perimeter that mirrors the physical perimeter. Employees working from home, on the road for business, or logging in from a coffee shop will be protected by the logical perimeter in the same manner that they would be if they were working from their office. Global Protect delivers a significant benefit to organizations; a consistent firewall-based security policy for all users. The creation and management of separate policies for firewalls and remote users is eliminated, as are the associated management efforts. The result is a streamlined security infrastructure and a more consistent security policy. Global Protect Enforce consistent secure application enablement policies for all users, no matter where they are located. Palo Alto Networks 232 E. Java Drive Sunnyvale, CA. 94089 Sales 866.320.4788 408.738.7700 www.paloaltonetworks.com Copyright 2011, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of Palo Alto Networks, Inc. All specifications are subject to change without notice. Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. PAN-OS 4.0, March 2011.