NextGen-Firewall

advertisement
Break-1520 - Next Generation
Firewall's
James Oryszczyn
President, TBJ Consulting LLC
My Credential’s
•
•
•
•
CISSP
SANS GIAC Audit and Windows Certified
I have been in the security business for over 15 years
Have implement Firewall’s and security in numerous
education environments
•
I am President of TBJ Consulting LLC
Agenda
•
•
•
•
•
•
•
Discuss problems traditional firewall’s
Discuss modern malware
Discuss URL filtering
Discuss User Authentication
Discuss Threat Prevention
Discuss Logging
Open Discussion, if you have a question ask…
At the End of the Presentation
I will discuss a survey you can take to if
you have a next generation firewall
Tradition Firewall’s
• Only Filter ports, real just a port filter
• Has limited capabilities for user identification,
source/destination IP address only
• Logging is ok to poor. Can see what is dropped/allowed
• No Directory integration
• Traditionally no spyware/anti-virus/malware protection
• NO Intrusion Prevention (IPS) or Detection (IDS)
Tradition Firewall’s Continued
•
•
•
•
•
Usually need a third party URL Filter
Typically, much more difficult to mange
Difficult to apply updates
Does not prevent attacks
Turning on IPS/IDS features kills the firewall
Next Generation Firewall’s
Industry Analysts Recommend a Change
Move to next-generation firewalls at the next refresh
opportunity – whether for firewall, IPS, or the combination of
the two.
-Gartner
…we anticipate a consolidation of firewalls and IPS to create
an even more advanced multifunction security gateway.
-Forrester
Performance
/ Damage
The Early Days
VPN
Connection-Based
Firewall
Hardware Theft
1980s
Physical
1990s
2000s
Today
Lock & Key
Performance
/ Damage
Vendors Followed The Threats
Spyware
Anti-Spyware
Worms
Spam
Banned Content
Antispam
Web Filter
Trojans
Antivirus
Viruses
Intrusions
IPS
Content-Based
VPN
Connection-Based
Firewall
Hardware Theft
Physical
Lock & Key
Result: Multiple Devices, Consoles, Vendors
Problems Created
Stand-alone, nonintegrated security
Created gaps in security
strategy
Mix of off-the-shelf
systems and applications
Difficult to deploy /
manage / use
High cost of ownership
A Better Approach to Threat Prevention
Integrating IPS and threat prevention into the firewall is NOT simply about
convenience…it’s a necessity
True integration of IPS with the NGFW solves problems that traditional
security products can’t
1. Controls threats on non-standard ports
2.
Proactively reduces the attack surface
3.
Controls the methods attackers use to hide
4.
Integrates multiple threat prevention disciplines
5.
Provides visibility and control of unknown threats
Port
20
Port
22
Port
23
Port
80
IM
HTTP
Telnet
SSH
FTP
The Evolution of Next GEN Firewalls
Port
531
• Applications
Became Evasive
– Needed to traverse the
firewall
– Would look for commonly
open ports
• Port 80, 443, 53
– Or look for any
available port
Evasive applications
fundamentally break the
port-based model
• Open high ports
Non-Standard…Is the New Standard
M ostFrequently Detected "Dynam ic" Applications
100%
80%
83%
78%
77%
73%
60%
60%
60%
55%
54%
51%
40%
42%
20%
0%
Sharepoint
iTunes
MS RPC
Skype
BitTorrent MSN Voice
Ooyla
Mediafire
Applications That are Capable of Tunneling
36
Networking (73)
18
18
Collaboration (46)
8
Media (24)
12
6
General-Internet (17)
7
10
Business-Systems (15)
0
25
17
2
12
13
4
41
25
50
Client-server (78)
Browser-based (66)
Network-protocol (19)
Peer-to-peer (12)
75
eMule
Teamviewer
• 67% of the apps use
port 80, port 443, or
hop ports
• 190 of them are
client/server
• 177 can tunnel other
applications, a
feature no longer
reserved for SSL or
SSH
Impact of Port Evasion on Threat Prevention
Telnet
Port
22
Port
23
Port
80
Port
20
Port
22
Port
23
Port
531
IPS
+
Port
80
• IPS solutions are also port-
based
IM
SSH
Port
20
HTTP
FTP
Firewall
Port
531
-
typically only look for exploits
on the “typical” ports
• If the FW can’t control traffic…
-
IPS will miss threat on
unexpected ports or…
-
IPS must run all signatures
on all ports
IM
HTTP
Telnet
SSH
FTP
NGFW Fixes the Firewall…and the IPS
App-ID
Port
20
Port
22
Port
23
Port
80
Port
531
• IPS is enforced consistently
• Evasive applications do not
evade the IPS or the firewall
• Rebuilt the firewall
from the ground up
• Identifies traffic at
application level
– Always on
– Always the 1st action
– On all ports
• Positive control is regained,
regardless of the port the
traffic travels on
• The firewall does what it was
originally designed to do
Control the Attack Surface of the Network
Only allow the
apps you need
» Traffic limited to
» The ever-expanding
universe of applications,
services and threats
approved business
use cases based on
App and User
» Attack surface
reduced by orders of
magnitude
Clean the allowed
traffic of all threats
in a single pass
» Complete threat library with no
blind spots
Bi-directional inspection
Scans inside of SSL
Scans inside compressed
files
Scans inside proxies and
tunnels
• Block Unneeded and
High-Risk Applications
– Block (or limit) peer-to-peer
applications
– Block unneeded applications that
can tunnel other applications
– Review the need for applications
known to be used by malware
– Block anonymizers such as Tor
– Block encrypted tunnel applications
such as UltraSurf
– Limit use to approved proxies
– Limit use of remote desktop
Control the Methods Threats Use to Hide
• Encrypted Traffic
Inspect within SSL
Circumventors and Tunnels
Encryption (e.g.
SSL)
•
Proxies
Common user-driven evasion
•
Remote Desktop
Increasingly popular tool for endusers
• Compressed Content
Proxies (e.g
CGIProxy)
Compression (e.g.
GZIP)
 Outbound C&C Traffic
ZIP files and compressed HTTP
(GZIP)
• Encrypted Tunnels
Hamachi, Ultrasurf, Tor
Purpose-built to avoid security
Unknown Threats: Learn to See Traffic That Doesn’t Belong
• NGFW classifies all known traffic
– Custom App-IDs for internal or custom
developed applications
• Any remaining “unknown” traffic can be
tracked and investigated
– Used in the field to find botnets and
unknown threats
• Behavioral Botnet Report
– Automatically correlates end-user
behavior to find clients that are likely
infected by a bot
– Unknown TCP and UDP, Dynamic DNS,
Repeated file downloads/attempts,
Contact with recently registered domains,
etc
Find specific users that
are potentially
compromised by a bot
10.1.1.101
10.1.1.56
10.0.0.24
192.168.1.5
10.1.1.34
10.1.1.16
192.168.1.4
192.168.124.5
192.168.1.47
10.1.1.277
Jeff.Martin
Directory Integration
• Use Active Directory To Authenticate users
– If part of the Domain, it will be pass-threw
– Will work with Apple devices
– Can restrict users to certain applications
– Can disallow guest from getting to the Internet or
greatly restrict them
– Can easily see users in firewall logs, not just IP addresses
– Allows you to take advantage of existing active directory
groups
– Gives you the ability to become granular in URL filtering
– Can trace threats down to the user
– Can also identify Citrix and Terminal server users
URL Filtering
• URL Filtering on Next Generation Firewall’s
–
–
–
–
–
–
–
–
–
–
–
Integrates with Security Policy, one place to manage your security
Faster than a proxy server, only one appliance to access
Databases update hourly/nightly
Make sure you have the ability to block unknown categories
Do not have to pay extra for spyware/malware categories
Database is updated automatically
Have the ability to also dynamically look up URL’s
Some products URL filtering is cloud based
Millions of URL’s rated
Easy ability to create bypass and override categories
Block Ad’s, they contain malware and junk ware
Fortinet URL Filter
Palo Alto URL Filter
Application Control
• Application Control on Next Generation Firewall’s
–
–
–
–
–
–
Ability to use applications instead of ports for firewall rules
Ability to allow Facebook, but block Facebook chat (Fore Example)
Can control what applications run over port 80
Can block proxy based applications (Good combined with a URL Filter)
Can block file sharing and peer to peer applications
Works very well along with a strong URL filter
Palo Alto Application Control
Fortinet Application Control
Anti-Virus/Malware Spyware
• Anti-Virus/Malware Spyware
–
–
–
–
–
–
Adds another layer of defense at the Gateway
Still need desktop Anti-virus (No, you can not get away from it)
Updates Daily/hourly
Uses a network to analyze the most current treats
Scans all downloads for Anti-virus
Can block certain file types such as .exe, .dll, etc. (This is on of the best
ways to prevent virus..)
– Can scan inside a VPN tunnel
– Integrates with the firewall rulebase
Traditional firewall’s are blind to
Viruses
Fortinet Anti-Virus
Palo Alto Anti-Virus
Threat Prevention
• Threat Prevention
–
–
–
–
–
–
Updates daily with the most current threats
Can help stop zero day and attacks against unpatched systems
Integrates with the Firewall to create a complete solution.
Prevents the attack from reaching the network
Also checks on all ports and applications, unlike a traditional IPS
Have the ability to track a threat to a user, not just an IP address
Traditional firewall’s are unable to
stop Threat’s or the threat
prevention is outdated
Logging and Reporting
• Logging
–
–
–
–
–
Logs contain usernames
Can run threat reports, URL Filtering reports and application reports
Can also run how much bandwidth someone is taking up
Can log what countries are being accessed
Can be a very useful tool for troubleshooting
Traditional firewall’s logging is ok,
but does not provide enough detail
Logs By Application and Bytes
Logs By User
Log what countries have been visited
How can a Next Generation Firewall Help you?
•
•
•
•
•
•
•
•
•
•
•
Provide one product to manage instead of many.
Protect your network’s and Students from attacks and from
themselves
Protect Students from using evasive ways to access websites
Provide Students the applications they need with ease
Use your directory service to authenticate users
Provide various level of access to application and websites.
Teachers can have a higher level of access
Cost savings by consolidating products and cutting down on
bandwidth hogging users.
Reports can be emailed to you daily if needed
Flexible deployment options
Easy to manage and use Web UI
Easy code Upgrade
Survey
If you give me your Business Card I will provide you an
assessment about your current Firewall/Security Environment
Questions?????
Thank You…………
You can contact me at
James@tbjconsulting.com
Download