Palo Alto Networks

advertisement
Palo Alto Networks
Product Overview
Karsten Dindorp, Computerlinks
Applications Have Changed – Firewalls Have Not
• The gateway at the trust
SaaS
Collaboration / Media
Personal
border is the right place to
enforce policy control

Sees all traffic

Defines trust boundary
• But applications have changed
 Ports ≠ Applications
 IP addresses ≠ Users
 Headers ≠ Content
Need to Restore Application Visibility & Control in the Firewall
Page 2 |
© 2009 Palo Alto Networks. Proprietary and Confidential
Stateful Inspection Classification
The Common Foundation of Nearly All Firewalls
• Stateful Inspection classifies traffic by looking at the IP header
-
source IP
-
source port
-
destination IP
-
destination port
-
protocol
• Internal table creates mapping to well-known protocols/ports
-
HTTP = TCP port 80
-
SMTP = TCP port 25
-
SSL = TCP port 443
-
etc, etc, etc…
Page 3 |
© 2009 Palo Alto Networks. Proprietary and Confidential
Enterprise End Users Do What They Want
• The Application Usage & Risk Report from Palo Alto Networks highlights actual behavior of 960,000
users across 60 organizations:
-
HTTP is the universal app protocol – 64% of BW, most HTTP apps not browser-based
-
Video is king of the bandwidth hogs – 30x P2P filesharing
-
Applications are the major unmanaged threat vector
• Business Risks: Productivity, Compliance, Operational Cost, Business Continuity and Data Loss
Page 4 |
© 2009 Palo Alto Networks. Proprietary and Confidential.
Firewall “helpers” Is Not The Answer
Internet
• Complex to manage
• Expensive to buy and maintain
• Firewall “helpers” have limited view of traffic
• Ultimately, doesn’t solve the problem
Page 5 |
© 2009 Palo Alto Networks. Proprietary and Confidential
The Right Answer: Make the Firewall Do Its Job
New Requirements for the Firewall
1. Identify applications regardless of
port, protocol, evasive tactic or SSL
2. Identify users regardless of IP address
3. Scan application content in real-time
(prevent threats and data leaks)
4. Granular visibility and policy control
over application access / functionality
5. Multi-gigabit, in-line deployment with
no performance degradation
Page 6 |
© 2009 Palo Alto Networks. Proprietary and Confidential
Identification Technologies Transforming the Firewall
App-ID
Identify the application
User-ID
Identify the user
Content-ID
Scan the content
Page 7 |
© 2009 Palo Alto Networks. Proprietary and Confidential
Purpose-Built Architectures (PA-4000 Series)
RAM
RAM
Signature
Match
Dedicated Control Plane
• Highly available mgmt
• High speed logging and
route updates
RAM
RAM
Signature Match HW Engine
• Palo Alto Networks’ uniform
signatures
• Vulnerability exploits (IPS), virus,
spyware, CC#, SSN, and other
signatures
10Gbps
RAM
Dual-core
CPU
CPU CPU CPU . . CPU
3
1
2
16
RAM
HDD
SSL
IPSec
RAM
RAM
DeCompression
10Gbps
QoS
Route,
ARP,
MAC
lookup
Control Plane
Page 8 |
© 2009 Palo Alto Networks. Proprietary and Confidential
NAT
Multi-Core Security Processor
• High density processing for flexible
security functionality
• Hardware-acceleration for
standardized complex functions (SSL,
IPSec, decompression)
10 Gig Network Processor
• Front-end network processing offloads
security processors
• Hardware accelerated QoS, route
lookup, MAC lookup and NAT
Data Plane
PAN-OS Core Features
• Strong networking
foundation:
• High Availability:
-
Active / passive
-
Configuration and session
synchronization
-
Path, link, and HA monitoring
-
Dynamic routing (OSPF, RIPv2)
-
Site-to-site IPSec VPN
-
SSL VPN
-
Tap mode – connect to SPAN port
-
Virtual wire (“Layer 1”) for true
transparent in-line deployment
-
All interfaces (physical or logical)
assigned to security zones
-
L2/L3 switching foundation
-
Establish multiple virtual systems to
fully virtualized the device (PA-4000
& PA-2000 only)
• Virtualization:
• QoS traffic shaping
-
Max, guaranteed and priority
-
By user, app, interface, zone, and
more
Page 9 |
© 2009 Palo Alto Networks. Proprietary and Confidential
• Intuitive and flexible
management
-
CLI, Web, Panorama, SNMP, Syslog
Flexible Deployment Options
Application Visibility
• Connect to span port
• Provides application visibility
without inline deployment
Page 10 |
Transparent In-Line
• Deploy transparently behind existing
firewall
• Provides application visibility &
control without networking changes
© 2008 Palo Alto Networks. Proprietary and Confidential.
Firewall Replacement
• Replace existing firewall
• Provides application and networkbased visibility and control,
consolidated policy, high
performance
Palo Alto Networks Next-Gen Firewalls
PA-4060
PA-4050
PA-4020
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
10 Gbps FW
5 Gbps threat prevention
2,000,000 sessions
4 XFP (10 Gig) I/O
4 SFP (1 Gig) I/O
10 Gbps FW
5 Gbps threat prevention
2,000,000 sessions
16 copper gigabit
8 SFP interfaces
2 Gbps FW
2 Gbps threat prevention
500,000 sessions
16 copper gigabit
8 SFP interfaces
PA-2050
PA-2020
PA-500
•
•
•
•
•
•
•
•
•
•
•
•
•
•
1 Gbps FW
500 Mbps threat prevention
250,000 sessions
16 copper gigabit
4 SFP interfaces
Page 11 |
500 Mbps FW
200 Mbps threat prevention
125,000 sessions
12 copper gigabit
2 SFP interfaces
© 2009 Palo Alto Networks. Proprietary and Confidential
250 Mbps FW
100 Mbps threat prevention
50,000 sessions
8 copper gigabit
PAN-OS 3.0 Summary of Features
• Networking
-
Quality of Service Enforcement
SSL VPN
IPv6 Firewall (Virtual Wire)
IPsec Multiple Phase 2 SAs
802.3ad link aggregation
PA-2000 virtual systems licenses (+5)
• App-ID
-
Custom Web-based App-IDs
Custom App-ID Risk and Timeouts
CRL checking within SSL forward proxy
• Threat Prevention & URL Filtering
-
Dynamic URL Filtering DB
Increased signature capacity
Threat Exception List
CVE in Threat Profiles
• User Identification
Page 12
Citrix/Terminal Server User ID
X-Forwarded-For
Support
| Proxy
© 2009
Palo Alto Networks. Proprietary
and Confidential
• Visibility and Reporting
-
User Activity Report
• Management
Multi-zone Rules
- Automated Config Backup in Panorama
- Role-based admins in Panorama
- SNMP Enhancements
 Custom community string
 Extended MIB support
- XML-based REST API
- Ability to Duplicate Objects
- Log Export Enhancements
 Support for FTP
 Scheduler
- Custom Admin Login Banner
- Web-based Tech Support Export
- Database indexing
- Configurable management I/O settings
-
Demo
Page 13 |
© 2007
2009 Palo Alto Networks. Proprietary and Confidential
Download