A Layered Security Stance For Higher Education

advertisement
SecurED:
A Layered Security Stance
For Higher Education
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
1
A Recognized Leader in Secure Networking
 Addressing the challenges of enterprises
that require strategic value from their
networks
 A no-compromise, systems-based
approach to high performance with
security at scale
 Best-in-class products, solutions, and
services for enterprises and public sector
organizations
 Proven record of meeting challenging
and dynamic application environments
#1 In Secure Access
#1 High End Routing
#1 High End Firewall
92 of Fortune 100
Top 30 Service Providers
$2.5B Revenue, 4800 Employees
47 of 50 US State Govts
NASDAQ 100 Company
20,000+ Global Customers
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
2
Gartner Magic Quadrants
Juniper, a proven leader in all categories
SSL VPN
FW/VPN
IPS
Copyright © 2007 Juniper Networks, Inc.
WAN Optimization
IPSec
Proprietary and Confidential
www.juniper.net
3
Sampling of Juniper Great Lakes Customers
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
4
Hundreds of Education and Research Customers
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
5
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
6
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
7
CSU ITRP2 Typical Security Deployment
Off Campus Office
Server Farm/
Data Center
RemoteAcess or
Extranet DMZ
DMZ
Campus Security Zones
Residence Halls
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
8
Today’s Discussion
 Today’s Security Threats
 An Extended Campus Model
 Building a Layered Security Stance
 Firewall Architecture Considerations
 Remote Access Architecture Considerations
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
9
Compromised PC,
U-turn attacks,
hijacked remote
session
Today’s Security Threats
Commuter
 Changing levels of trust
Business
Partner
• Widening range of network
access including faculty
Worms, viruses,
and students, remote
Trojan attacks
students, business
partners, customers and
suppliers
 Ubiquitous access to the
Internet
• Availability of Internet
everywhere has provided
a potential entry point for
attacks
Regional
Office
Internet2
Internet
Intrusion over
WLAN
DMZ
Wireless
Network
Internal attacks,
roaming, malicious
users
Administration
Campus
Living
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
10
Today’s Security Threats - continued
 Attack sophistication
• New types of attacks extending into the application
layer
 Restructuring the DMZ
• Increased access to applications within the DMZ and
server consolidation efforts
 Internal attacks
• Intentional or unintentional security attacks by students
and even faculty
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
11
The Extended Campus Model
Network
Perimeter
Campus
MAN/LAN
Extended
Campus
Distance Learning
Remote Faculty
Remote Access
Commuters
Administration
Business
Partners
Library
Finance
DMZ
Branch
Campus
Locations
Department
Servers
Remote Data Center
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
Site-to-Site
www.juniper.net
12
A Layered Security Stance – Firewalls
The First Layer of Defense
 Foundation for creating a security policy on campus
 Performs stateful inspection of incoming traffic to protect
network from malicious content
• Source and destination IP addresses
• Source and destination port numbers
• Packet sequence numbers
 Provides Denial of Service (DoS) attack protection
• SYN flood attacks, UDP flood and Port Scan
 Strengthens user access control and authentication
 Allows network segmentation (zones) and user containment
• Secure virtual segments (administration, student accounts, faculty)
Track Sessions
Session Level
Protection
Stateful
Inspection
Firewall
YYYYY
YYYYY
Network
Copyright © 2007 Juniper Networks, Inc.
Packets
XXXXX
XXXXX
XXXXX
XXXXX
YYYYY
Proprietary and Confidential
XXXXX
YYYYY
XXXXX
www.juniper.net
13
Flexible Security Zones by Policy
Virtualized
Storage
Approach:
• Using firewalls
capabilities
• Standards-based,
open solutions
• Security that doesn't
impact applications
• Assured performance
for all applications
Principal’s
Zone
Student
Records
Virtualized
Storage
Student
Records
E-Mail
FTP
E-Mail
FTP
Payroll &
Procurement
Virtualized
Storage
Teacher’s
Zone
Parent or
Volunteer’s
Zone
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
14
The Extended Campus Model
Firewalls
Network
Perimeter
Campus
MAN/LAN
Extended
Campus
Distance Learning
Remote Faculty
Remote Access
Commuters
Administration
Business
Partners
Library
Finance
DMZ
Branch
Campus
Locations
Department
Servers
Remote Data Center
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
Site-to-Site
www.juniper.net
15
A Layered Security Stance – IDP
The Second Layer of Defense
 IDP (Intrusion Detection and Prevention)
• Application-level attack protection at the campus perimeter by
looking for “hidden” security threats in common applications like
email & IM
• We’re digging deeper into the packet to enforce rules of the
protocol and block traffic with known malicious signatures
• Stops worms, Trojans, Spyware, malware and others from
penetrating and proliferating across the network
Application Level
Protection
Intrusion
Prevention
System (IPS)
Application attack
Protocol conformance
Reassemble, normalize, eliminate ambiguity
Track Sessions
Session Level
Protection
Stateful
Inspection
Firewall
YYYYY
YYYYY
Network
Copyright © 2007 Juniper Networks, Inc.
Packets
XXXXX
XXXXX
XXXXX
XXXXX
YYYYY
Proprietary and Confidential
XXXXX
YYYYY
XXXXX
www.juniper.net
16
A Layered Security Stance - UTM
 Unified Threat Management (UTM)
• Anti-Virus, Anti-Spyware, Anti-Phishing, Anti-Spam,
Web filtering
• Additional file level protection to protect critical network
assets – scanning incoming email and web traffic
File Level
Protection
Application Level
Protection
Inspect Files
Gateway
Antivirus
System
Intrusion
Prevention
System (IPS)
File: xx.exe
File: yy.exe
Application attack
Protocol conformance
Reassemble, normalize, eliminate ambiguity
Track Sessions
Session Level
Protection
Stateful
Inspection
Firewall
YYYYY
YYYYY
Network
Copyright © 2007 Juniper Networks, Inc.
Packets
XXXXX
XXXXX
XXXXX
XXXXX
YYYYY
Proprietary and Confidential
XXXXX
YYYYY
XXXXX
www.juniper.net
17
The Extended Campus Model
Firewalls + IDP
Network
Perimeter
Campus
MAN/LAN
Extended
Campus
Distance Learning
Remote Faculty
Remote Access
Commuters
Administration
Business
Partners
Library
Finance
DMZ
Branch
Campus
Locations
Department
Servers
Remote Data Center
If it isn’t really a safe web
page, then fix it!
Copyright © 2007 Juniper Networks, Inc.
Malicious
Javascript
Site-to-Site
Port 80 P2P
Proprietary and Confidential
www.juniper.net
18
IPSec VPN vs. SSL VPN
Distance
Learning
Remote
Faculty
Sales
Branch Campus
HR
Finance
Department
Servers
Remote Data
Center
DMZ-1
Main
Campus
Commuters
Business
Partners,
Customers,
Contractors
Application Type
Commuter, Remote Faculty,
Partner Extranet and
Network access
Fixed
Type of Connection
Mobile or Fixed
VPN Type
IPSec VPN
VPN Type
SSL VPN
Access Requirement
Network Access
Access Requirement
Per Application Access
Control Requirement
IP to IP control
Control Requirement
User to Application control
Remote Network Security
Managed, Trusted
Remote Network Security
UnManaged, UnTrusted
Application Type
Branch Campus
Type of Connection
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
19
Coordinated Threat Control
SSL VPN + IDP Coordination
 Identify specific attacks originating from remote student via SSL
VPN and quarantine the user (and only the offending user)
1. Student logs in using SSL VPN & deliberate or inadvertent attacks are launched
2. IDP detect the attack and block requests to the internal resources
3. IDP sends identifying data to SA SSL VPN gateway
4. Based on data from IDP, SA quarantine and notifies the user
Quarantine
Identifying Data
Infected
Attack
Attack
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
20
The Extended Campus Model
Firewalls + IDP + IPSec and SSL/VPN
Network
Perimeter
Campus
MAN/LAN
Extended
Campus
Distance Learning
Remote Faculty
Remote Access
Commuters
Administration
Business
Partners
Library
Finance
DMZ
Branch
Campus
Locations
Department
Servers
Remote Data Center
Site-to-Site
IPSec connections available through FW/VPN
SSL/VPN connections using SA 4000
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
21
A Layered Security Stance - UAC
 Centralized Access Policy Manager for the
campus LAN/MAN
• Single, centralized policy engine that provides access
using a combination of identity-based policy and
endpoint intelligence
 Standards-based solution
• Interoperates with wide variety of AAA authentication
servers like RADIUS, LDAP, etc
• Dynamically provisioned TNC-compliant UAC agent
that allows real-time network policy management
• Interoperates with firewalls for Layer 3 enforcement
and with switches and Access Points that are 802.1Xcompliant in both wired and wireless environments
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
22
The Extended Campus Model
Firewalls + IDP + IPSec and SSL/VPN + UAC
Network
Perimeter
Campus
MAN/LAN
Extended
Campus
Distance Learning
Remote Faculty
Remote Access
Commuters
Administration
Business
Partners
Library
Finance
DMZ
Branch
Campus
Locations
Department
Servers
Remote Data Center
Site-to-Site
IPSec connections available through FW/VPN
SSL/VPN connections using SA 4000
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
23
Firewall Architecture Considerations
 How many firewalls do you currently have deployed?
What are the throughput requirements of the
FW/VPN?
 How are you controlling access between different
departments?
 How do you protect your critical assets from
application attacks?
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
24
Firewall Architecture Considerations
 Has your network ever been affected by any worms
or viruses?
 Do you require a full mesh FW/VPN solution to allow
for redundant physical paths in the network,
providing maximum resiliency and uptime?
 How do you handle attacks at the perimeter gateway
with so much traffic going in and out of the network?
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
25
Remote Access Architecture Considerations
 What are you using today to provide secure access?
 Do users have problems with their laptops caused by the IPSec
code resulting in calls to your Help Desk?
 Do you need to connect partners (other universities or companies
involved in joint research, etc.) so they can access documents or
other resources?
 Are you worried about students infecting your network when they
connect?
 Do you have a Pandemic Plan, Disaster Recovery Plan, or Business
Continuity Plan?
 Do users need to access resources from multiple PCs or any PC
that is handy?
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
26
The JUNOS Software Advantage
Intelligent Modularity
Independent functional operation
• Dedicated resources, protected
Module
Memory space
X
Module
• Handles adversity, contains faults
X
Module
• Flexible integration through
X
defined interfaces
Development Discipline
Customer Benefits
•High Availability
•Security
•Lower TCO
8.1
8.2
8.3
8.4
8.5
9.0
Q406
Q107
Q207
Q307
Q407
Q108
•Extensibility
Development without compromise
• One code set, 4 predictable releases a year
• One implementation, consistent feature set
• Full regression testing per release
–– Deployed since 1998 · 30,000+ deployments · TL9000 engineering certification ––
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
27
Our Architecture principles
No-compromise
• Security
• Performance & scale
• Reliability & flexibility
• Accessibility
Modularity
Manageability
3rd party support
• Superior availability &
reliability
• Flexibility
• Common programmatic
interface
• Consistent user interface
• Common management
platform
Copyright © 2007 Juniper Networks, Inc.
• Standards support
• Consistent inbound &
outbound interfaces
• Documentation
Proprietary and Confidential
www.juniper.net
28
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
29
Download