1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic



Similar documents
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

10 Cool Things Your Firewall Should Do. A firewall that blocks threats is only the beginning

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Applications erode the secure network How can malware be stopped?

Next-Generation Firewalls: Critical to SMB Network Security

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Application Intelligence, Control and Visualization

Securing the Small Business Network. Keeping up with the changing threat landscape

Achieve Deeper Network Security and Application Control

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Introducing IBM s Advanced Threat Protection Platform

Deploying Firewalls Throughout Your Organization

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

The Ultimate Guide to Gaining Control of the WAN

The Cisco ASA 5500 as a Superior Firewall Solution

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Consolidating SMB Network Security Infrastructure. Ways to Cut Costs and Complexity

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

Advantages of Managed Security Services

White Paper. ZyWALL USG Trade-In Program

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Best Practices for Controlling Skype within the Enterprise > White Paper

Dell SonicWALL Portfolio

How To Control Your Computer With Watchguard Application Control

SonicWALL Corporate Design System. The SonicWALL Brand Identity

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

REPORT & ENFORCE POLICY

Achieve Deeper Network Security

WildFire. Preparing for Modern Network Attacks

Network Security Solution. Arktos Lam

Top 10 Reasons Enterprises are Moving Security to the Cloud

isheriff CLOUD SECURITY

The Application Usage and Threat Report

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Load Balancing Security Gateways WHITE PAPER

Network protection and UTM Buyers Guide

Mobility, Security and the Enterprise: 10 Best Practices for Controlling Smartphone and Tablet Access to Corporate Networks

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Healthcare Security and HIPAA Compliance with A10

Networking for Caribbean Development

February Considerations When Choosing a Secure Web Gateway

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

PART D NETWORK SERVICES

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Application Visibility and Monitoring >

Defending Against Cyber Attacks with SessionLevel Network Security

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Using Palo Alto Networks to Protect the Datacenter

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Content-ID. Content-ID URLS THREATS DATA

How to Gain Visibility and Control of Encrypted SSL Web Sessions >

Threat Containment for Facebook

Prioritize Access to Business Applications With Cyberoam s Application Visibility & Control

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

Clean VPN Approach to Secure Remote Access for the SMB

HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

Norton Personal Firewall for Macintosh

Achieving PCI-Compliance through Cyberoam

Netsweeper Whitepaper

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Firewalls Overview and Best Practices. White Paper

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Deployment Guide for Citrix XenDesktop

Intro to Firewalls. Summary

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Moving Beyond Proxies

The Hillstone and Trend Micro Joint Solution

Types of cyber-attacks. And how to prevent them

Transcription:

1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic

Table of Contents The Firewall Grows Up 1 What does SonicWALL Application Intelligence and Control do? 2 How does SonicWALL Application Intelligence and Control work? 3 1st Cool Thing: Block Viruses from Entering Your Network 4 2nd Cool Thing: Manage Bandwidth for a Group of Users 5 3rd Cool Thing: Prevent Data Loss over Web Mail 6 4th Cool Thing: Application Use Enforcement 7 5th Cool Thing: Block Games on Facebook 8 6th Cool Thing: Control P2P Applications 9 7th Cool Thing: Bandwidth Manage Streaming Audio and Video 10 8th Cool Thing: Prioritize Application Bandwidth 11 9th Cool Thing: Block Confidential Documents 12 10th Cool Thing: Identify Connections by Country 13 11th Cool Thing: Visualize Your Application Traffic 14 When You Add it All Up 15

The Firewall Grows Up Traditional firewalls focus on blocking threats that can be detected at the network layer. Next-Generation Firewalls combine security services such as intrusion prevention, anti-malware, content filtering and even some antispam services to enhance the threat protection. With the advent of services provided from the cloud, along with technologies developed under the Web 2.0 umbrella, firewalls today have another challenge to contend with application identification. Many applications are delivered over the Web, which means that often they come in over the same few ports, rendering traditional firewalls blind to these applications, and unable to prioritize important versus unimportant traffic. Another critical function that must be present in any Next-Generation Firewall is application awareness and the ability to control these applications. Along with blocking traditional network level threats, malware and intrusion attacks, application intelligence and control is a critical component of security and networking infrastructures. 1

What does SonicWALL Application Intelligence and Control do? SonicWALL Application Intelligence and Control extends malware protection capabilities to add the management and control of application-layer traffic, enhancing compliance, content filtering and data leakage prevention for networks of all sizes through application identification based on their DNA, rather than ports or protocols. SonicWALL Application Intelligence and Control can allocate throughput for mission-critical or latency-sensitive applications, while restricting productivitydraining applications like online games or streaming video. This control can be established on a user and/or group basis, as well as time of day and other variables, for flexible control that can fit any network requirement. 2

n How does SonicWALL Application Intelligence and Control work? By utilizing the extensive, and constantly growing, database of application signatures, the Application Intelligence and Control capability identifies applications based on their core characteristics, rather than superficial attributes, such as ports. When combined with SonicWALL s Reassembly-Free Deep Packet Inspection, Application Intelligence and Control can control not only entire categories of applications, individual applications, but even specific features of applications that you may want to block or control. For example, you can allow instant messaging, but block file transfer or allow Facebook access, but block access to Facebook-based games, such as Farmville or MafiaWars. This traffic can also be controlled within SSL connections*, which are as important to impact and protect as the unencrypted connections. As more applications and services become available, SonicWALL will continue growing its already rich database of over 3,000 signatures in order to keep up with the application ecosystem. *Optional DPI SSL feature. 3

1st Cool Thing: Block Viruses from Entering Your Network Networking is the key driver behind many technological trends and revolutions that have taken place in the past decade. Network security must be at the forefront of any IT administrator s focus. The ability to prevent malware such as viruses, spyware, keyloggers, Trojans and intrusion attempts from entering the network at the gateway relieves the infrastructure from great risk and spares potentially wasted resources. Activate SonicWALL Network Security Services SonicWALL security services, running on the high-performance and ultra-low-latency architecture of SonicWALL Next-Generation Firewalls, are capable of blocking millions of threats from entering the network, before they become a danger to your users. If your users connect an infected laptop to the network, SonicWALL Next-Generation Firewalls are capable of blocking the propagation of that malware within the department and within the rest of the organization. 4

2nd Cool Thing: Manage Bandwidth for a Group of Users What do you do if your CEO or CFO complain that the business news videos that they review each day are too slow? You could ease off on the bandwidth restrictions for everyone, but now there is a better answer: group-based bandwidth management. Create a policy to not limit streaming video for the executive group 1. Apply this policy to the executive group imported from your LDAP server 2. The Deep Packet Inspection (DPI) engine uses pre-defined streaming video application signatures from the application signature list 3. Apply bandwidth guarantee to traffic with that header Streaming Video Bandwidth Desired Executive Streaming Video Bandwidth Provided Everyone Else s Streaming Video Bandwidth Provided 5

3rd Cool Thing: Prevent Data Loss over Web Mail Let s assume your existing anti-spam protection can detect and block a normal outbound email that contains Company Confidential information. But what if an employee uses a Web Mail service, such as Yahoo or Gmail, to send out a Company Confidential information? Create a policy to block Company Confidential email 1. The Deep Packet Inspection (DPI) engine looks for Email Body = Company Confidential 2. Block message and notify the sender that the message is Company Confidential GO From: goodguy@your_company.com To: goodguy@partner.com Subject: Time Card Approval Jim STOP I approve your time card hours for this week. Joe From: badguy@your_company.com To: badguy@competitor.com Subject: Design road map Here is the Roadmap GO Jan 09 Release 7.0 This document is Company Confidential STOP 6

4th Cool Thing: Application Use Enforcement IE 8.0 You want all employees to stop using IE6 (Internet Explorer 6) or IE7 Web browsers and upgrade to IE8. Your mission is to ensure all employees launching IE6 or IE7 are automatically redirected to the IE8 download site, and restricted from all other Web access over IE6 or IE7. Your possible solutions include: n Physically check everyone s system each day for IE6 or IE7 browsers n Set up some type of script to check everyone s system for IE6 or IE7 browsers and make sure it checks everyone s system everyday n Set up a policy with application intelligence and control and stop worrying IE 7.0 Create a policy to redirect IE6 or IE7 users to download IE8, and block Internet access for IE6 or IE7 1. The Deep Packet Inspection (DPI) engine looks for User Agent = IE 6.0 or User Agent = IE 7.0 in the HTTP header 2. The policy redirects IE6 or IE7 users to the IE8 download site, while blocking access for IE6 or IE7 to any other Web sites 7

5th Cool Thing: Block Games on Facebook Social networking applications such as Facebook, Twitter and YouTube have become new channels of communications for individuals and for companies. Sometimes, it may be counterproductive to block an entire category of applications, but you may want to control the access. For example, there may be a legitimate case to allow users to access Facebook to check their private messages, or to allow marketing personnel to update the company s Facebook page, but not allow anyone to play games. With application intelligence and control, you can create a policy to allow access to Facebook, but block Facebook games. Create a policy to allow Facebook, but block Facebook games 1. Select All users 2. Select the application feature Facebook games 3. Create a single rule to Block all users from accessing Facebook games 4. Confirm the effectiveness of your new policy with real-time Visualization by logging into the Application Flow Monitor. 8

6th Cool Thing: Control P2P Applications Peer-to-peer (P2P) applications such as BitTorrent can quickly consume bandwidth, and transmit all kinds of problematic files. However, the creation of new P2P applications, or simple changes (e.g., version numbers) to the existing P2P applications happen all the time. Create a policy to detect and control P2P applications 1. The Deep Packet Inspection (DPI) engine uses pre-defined P2P application signatures from the application signature list 2. Block or limit P2P applications through bandwidth and time-based restrictions Application Signature List BitTorrent-6.1 BitTorrent-6.0.3 BitTorrent-6.0.2 BitTorrent-6.0.1 hundreds more Application Signature List Updates from SonicWALL are received and applied + = Application Signature List BitTorrent-6.1.1 BitTorrent-6.1 BitTorrent-6.0.3 BitTorrent-6.0.2 hundreds more The Results n You can manage and control P2P applications n You don t have to spend time updating IPS signature rules 9

7th Cool Thing: Bandwidth Manage Streaming Audio and Video Access to streaming video from sites such as YouTube.com is sometimes useful, but is often abused. Blocking these sites might work, but a preferable approach is to limit the total bandwidth given to streaming video, regardless of where it comes from. This also applies to streaming audio sites such online music radio stations and personalized music playlist sites. This traffic doesn t necessarily need to come from well-known sites, but can also be hosted by blogs. Thus, the goal is to identify this traffic by what it is, rather by its origin. Deep Packet Inspection excels at this process. Streaming Audio and Video Bandwidth Desired Streaming Audio and Video Bandwidth Provided Create a policy to limit streaming audio and streaming video by predefined signature list 1. Select Streaming Video and Streaming Audio as application categories 2. Set the amount of bandwidth that you want to allocate to these application categories (e.g., 10%) 3. Create a rule that enforces Streaming Video and Streaming Audio to consume a maximum of 10% of bandwidth for everyone (perhaps excluding particular department groups, such as those in the training group) 4. Optionally, schedule the rule to be effective during standard business hours, but not during lunch hours or after 6 p.m. 5. Confirm the effectiveness of your new policy with real-time Visualization by logging into the Application Flow Monitor 10

8th Cool Thing: Prioritize Application Bandwidth Today many mission-critical applications, such as Live Meeting, Salesforce.com and SharePoint, are cloud-based, or run across geographically dispersed networks. Ensuring that these applications have priority to the network bandwidth that they need to operate can improve business productivity. Create a policy to give bandwidth priority to the Live Meeting application 1. The Deep Packet Inspection (DPI) engine looks for the application signature or application name 2. Assign the Live Meeting application a higher bandwidth priority Live Meeting Salesforce.com SharePoint Others Application priority can be date-based (think end-of-quarter priority for sales applications) 11

9th Cool Thing: Block Confidential Documents In some companies, outbound email does not pass through their Email Security system, or that system does not check the content of email attachments. In either case Company Confidential attachments can easily leave the organization. Since outbound network traffic goes through your firewall, you can detect and block this data-in-motion. Create a policy to block email attachments which contain the Company Confidential watermark The Deep Packet Inspection (DPI) engine looks for: 1. Email Content = Company Confidential and 2. Email Content = Company Proprietary and 3. Email Content = Private Proprietary, etc. This can also be done for FTP-based content 12

10th Cool Thing: Identify Connections by Country What should you do if you saw the computers in your small, local-neighborhood office, store or branch site are connecting to IP addresses in a foreign country? How would you know if this is just somebody browsing international Web sites, or a sign of botnet activity or data leakage? You can use application intelligence as a powerful forensics tool to identify exactly what s happening on your network. Create a filter for all connections to a specific country or countries, which checks: 1. What applications are connecting 2. What IPs inside your network are responsible for these connections 3. What viable URLs are being access You then could talk to the user, inspect the machine with the offending IP address, or enable a packet capture utility on the firewall to analyze exactly what s going over that connection. With application intelligence and control, you can identify and address problems that you might not have been aware of otherwise. 13

11th Cool Thing: Visualize Your Application Traffic Do you ever wonder What s happening on my network?, Who s wasting my bandwidth? or Why is my network so slow? You could use a combination of separate tools to answer these questions, but this process is time consuming, and will only provide you with afterthe-fact information. With real-time Visualization of traffic intelligence gleaned by Deep Packet Inspection, you can answer these questions instantly, quickly diagnose issues, detect out-of-compliance network usage, create appropriate policies and immediately see the effectiveness of these steps. View all traffic in real time by logging into the Application Flow Monitor 1. View real-time graphs of all application traffic 2. View real-time graphs of ingress and egress bandwidth 3. View real-time graphs of Web sites visited and all user activity 4. Create your own filtering that gives you the most relevant information Visualization ties application intelligence and control together to provide administrators with both feedback and depth of information to increase the efficiency of both your network and your network management. 14

When You Add it All Up High Performance Platform + Deep Packet Inspection + Intrusion Prevention + Application Intelligence, Control and Visualization SonicWALL Next-Generation Firewall Performance, Protection and Application Control 15

How Can I Learn More? n Download the white paper,, AimPoint Group: Application Control Defined The Top 7 Capabilities Required to Restore Firewall Effectiveness n View the video n Download the data sheet For feedback on this e-book or other SonicWALL e-books or whitepapers, please send an email to feedback@sonicwall.com. About SonicWALL Guided by its vision of Dynamic Security for the Global Network, SonicWALL develops advanced intelligent network security and data protection solutions that adapt as organizations evolve and as threats evolve. Trusted by small and large enterprises worldwide, SonicWALL solutions are designed to detect and control applications and protect networks from intrusions and malware attacks through awardwinning hardware, software and virtual appliance-based solutions. For more information, visit the company Web site at www.sonicwall.com. SonicWALL s line-up of dynamic security solutions NETWORK SECURITY SECURE REMOTE ACCESS WEB AND E-MAIL SECURITY BACKUP AND RECOVERY POLICY AND MANAGEMENT SonicWALL, Inc. 2001 Logic Drive, San Jose, CA 95124 T +1 408.745.9600 F +1 408.745.9300 www.sonicwall.com 2010 SonicWALL and the SonicWALL logo is registered trademarks of SonicWALL, Inc. Dynamic Security For The Global Network is a trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Specifications and descriptions subject to change without notice. 10/10 SW 1091