Networking for Caribbean Development



Similar documents
Guideline on Firewall

Next-Generation Firewalls: Critical to SMB Network Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Configuration Example

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Importance of Web Application Firewall Technology for Protecting Web-based Resources

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Defending Against Cyber Attacks with SessionLevel Network Security

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Gateway Security at Stateful Inspection/Application Proxy

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Security Technology: Firewalls and VPNs

NGFWs will be most effective when working in conjunction with other layers of security controls.

Firewalls. Chapter 3

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewall Testing Methodology W H I T E P A P E R

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Zscaler Internet Security Frequently Asked Questions

WildFire. Preparing for Modern Network Attacks

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

BlackRidge Technology Transport Access Control: Overview

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Network Defense Tools

Modular Network Security. Tyler Carter, McAfee Network Security

Fireware Essentials Exam Study Guide

Fortigate Features & Demo

Agenda , Palo Alto Networks. Confidential and Proprietary.

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Firewall Firewall August, 2003

The Benefits of SSL Content Inspection ABSTRACT

Chapter 11 Cloud Application Development

INTRODUCTION TO FIREWALL SECURITY

CMPT 471 Networking II

Did you know your security solution can help with PCI compliance too?

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

SERVICE DESCRIPTION Web Proxy

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Jort Kollerie SonicWALL

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

The Hillstone and Trend Micro Joint Solution

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Security threats and network. Software firewall. Hardware firewall. Firewalls

Chapter 4 Firewall Protection and Content Filtering

Firewall and UTM Solutions Guide

74% 96 Action Items. Compliance

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Next-Generation Firewalls: CEO, Miercom

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Intro to Firewalls. Summary

DMZ Network Visibility with Wireshark June 15, 2010

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

High Performance NGFW Extended

Configuring PA Firewalls for a Layer 3 Deployment

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Next Generation Firewalls and Sandboxing

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Fighting Advanced Threats

Inspection of Encrypted HTTPS Traffic

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls CSCI 454/554

Palo Alto Networks. October 6

Content-ID. Content-ID URLS THREATS DATA

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

Guidance Regarding Skype and Other P2P VoIP Solutions

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

FIREWALLS & CBAC. philip.heimer@hh.se

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Chapter 15. Firewalls, IDS and IPS

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Intrusion Prevention Systems (IPS) Frequently Asked Questions FAQ

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Blind as a Bat? Supporting Packet Decryption for Security Scanning

Transcription:

Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g

N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g

Security Lab Firewalls

What is a Firewall Commonly describes systems or devices that are placed between a trusted and an untrusted network. Network firewall solutions offer user and application policy enforcement that supplies protection for different types of security threats. These solutions often provide logging capabilities that enable the security administrators to identify, investigate, validate, and mitigate such threats.

Network Firewalls Network-based firewalls provide key features used for perimeter security. The primary task of a network firewall is to deny or permit traffic that attempts to enter or leave the network based on explicit preconfigured policies and rules. Firewalls are often deployed in several other parts of the network to provide network segmentation within the corporate infrastructure and also in data centers.

Typical Firewall Function Simple packet-filtering techniques Image Application proxies Image Network Address Translation Image Stateful inspection firewalls Virtual Personal Networks(VPN)

Next-generation context-aware firewalls NGFWs goes beyond the standard functions The goal of next generation firewalls is to include more layers of the OSI model to improve filtering of network traffic dependent on the packet contents. They expected go deeper to inspect the payload of packets and match signatures for harmful activities such as known vulnerabilities, exploit attacks, viruses and malware

NGFW features Signature based IPS engine Application awareness, full stack visibility and granular control Capability to incorporate information from outside the firewall, e.g., authentication-based policy, blacklists, white lists, etc. Upgrade path to include future information feeds and security threats SSL decryption to enable identifying undesirable encrypted applications

Types of Firewall Software base Pfsense, Netfilter/iptables, Vyatta, Untangle Gateway and Microsoft Forefront Threat Management Gateway Hardware/appliances Check Point VPN-1, Watchguard, FortiGate, Palo Alto Networks, CISCO ASA, Juniper SSG

Network Threats Unauthorized Network traffic and access control Denial of services attacks Virus and malware outbreak Botnet and distributed denial of services Malware encrypted network traffic Phishing Sites and attacks Spam and infected email Data protections

Packet Filters and Proxy & ALG Two types of policies: Packet Filter Examines the IP header of each packet, and operates at the network and transport protocol packet layers. Proxy & ALG (Application Layer Gateway) Proxy Examines the IP header and the content of a packet at the application layer. If the content does not match the criteria you set in your proxy policies, you can set the proxy to deny the packet. Some proxy policies allow you to remove the disallowed content. ALG Completes the same functions as a proxy, but also provides transparent connection management. Proxy policies and ALGs examine the commands used in the connection to make sure they are in the correct syntax and order, and use deep packet inspection to make sure that connections are secure.

Packet Filtering Policies or Rules Includes packet filter policy templates for many specific types of traffic that use various ports and protocols. Select the policy template to see details about the port and protocol it applies to. You can also create custom policy templates. To create a packet filter policy, select the template and click Add. In the policy, specify the source, destination, and any other policy properties.

Disabling Outgoing policy The Outgoing policy allows outgoing TCP and UDP connections on all ports. If you want to allow users on your trusted and optional networks to browse the web, but do not want to allow other TCP/UDP traffic, you can: Add policies for: HTTP on TCP port 80 HTTPS on TCP port 443 DNS on TCP port 53 and UDP port 53 Disable the Outgoing policy If you disable the Outgoing policy, the firewall denies outbound TCP and UDP traffic on all ports unless you add another policy to allow it.

Intrusion Detection and Prevention Vulnerability found and exposed Hacker builds attack that uses vulnerability Attack launched Vendor builds patch Vendor distributes patch IT admin queues patch update based on severity IT admin installs patch Proactively blocks many threats Firewallbased IPS supplies zero-day protection Attack signature developed and distributed Ongoing protection at higher performance

Default Packet Handling Spoofing attacks Port and address space probes Flood attacks Denial of service Options for logging and automatic blocking

Control Incoming Connections Use the DNS-Incoming action as a template You own the server You decide who gets to connect to the server DNS Proxy DNS server Your network

Use DNS-Outgoing Use DNS-Outgoing proxy action to block DNS requests for services, such as queries for: POP3 servers Advertising networks IM applications P2P applications 18

Signature Base Services Gateway AntiVirus, APT Blocker, Data Loss Prevention, Intrusion Prevention Application Control

Set Up Gateway AntiVirus 1. Firebox downloads the initial signature file 2. Firebox gets new signatures and updates at a regular interval 3. Gateway AV strips viruses and allows valid email or web pages to load Gateway AntiVirus database updates Your Network WatchGuard

APT Blocker What is an APT (Advanced Persistent Threat)? APTs leverage the latest targeted malware techniques and zero-day exploits (flaws which software vendors have not yet discovered or fixed) to infect and spread within a network. Designed to gain access to networks and access confidential data over extended periods of time. APTs are highly sophisticated and often target specific high-profile institutions such as government or financial-sector companies APT use has now expanded to target smaller networks and lower profile organizations. Traditional signature-based scan techniques do not provide adequate protection against APTs.

What is Data Loss Prevention Data Loss Prevention (DLP) is a signature-based security service that can help you control the loss of confidential data from your network. DLP uses content control rules to identify sensitive data, such as: Bank routing numbers Credit card numbers Confidential document markers National identity numbers Driver s license numbers Medical records Postal addresses and telephone numbers Email addresses DLP scans outbound traffic over proxied SMTP, FTP, HTTP, and HTTPS connections.

Know your network and users

2015-11-03 13:46:23 Deny 197.237.140.161 190.213.227.137 14836/udp 27332 14836 0-External Firebox Denied 131 111 (Unhandled External Packet-00)