20
© 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov AS Stallion

© 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Embed Size (px)

Citation preview

Page 1: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

© 2007 Palo Alto Networks. Proprietary and ConfidentialPage 1 |

Palo Alto Networks – next page in firewalling

It’s time to fix the firewall!

Tiit Sokolov

AS Stallion

Page 2: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

About Palo Alto Networks

• Founded in 2005 by security visionary Nir Zuk

• World-class team with strong security and networking experience

• Innovations: App-ID, User-ID, Content-ID

• Builds next-generation firewalls that identify and control more than 900 applications; makes firewall strategic again

• Global footprint: presence in 50+ countries, 24/7 support

• Named Gartner Cool Vendor in 2008

Page 3: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Application Control Efforts are Failing• Palo Alto Networks’ Application Usage & Risk Report highlights actual behavior of

900,000 users across more than 60 organizations- Bottom line: despite all having firewalls, and most having IPS, proxies, & URL filtering – none

of these organizations could control what applications ran on their networks

• Applications evade, transfer files, tunnel other applications, carry threats, consume bandwidth, and can be misused.

Applications carry risks: business continuity, data loss, compliance, productivity, and

operations costs

Page 4: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Trends

Page 5: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Applications Have Changed – Firewalls Have Not

• The gateway at the trust border is the right place to enforce policy control- Sees all traffic- Defines trust boundary

Need to Restore Visibility and Control in the Firewall

• BUT…Applications Have Changed

- Ports ≠Applications

- IP Addresses ≠Users

- Packets ≠Content

Page 6: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Internet

Sprawl Is Not The Answer

• “More stuff” doesn’t solve the problem

• Firewall “helpers” have limited view of traffic

• Complex and costly to buy and maintain

• Putting all of this in the same box is just slow

Page 7: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Traditional Multi-Pass Architectures are Slow

Port/Protocol-based IDPort/Protocol-based ID

L2/L3 Networking, HA, Config Management,

Reporting

L2/L3 Networking, HA, Config Management,

Reporting

Port/Protocol-based IDPort/Protocol-based ID

HTTP DecoderHTTP Decoder

L2/L3 Networking, HA, Config Management,

Reporting

L2/L3 Networking, HA, Config Management,

Reporting

URL Filtering PolicyURL Filtering Policy

Port/Protocol-based IDPort/Protocol-based ID

IPS SignaturesIPS Signatures

L2/L3 Networking, HA, Config Management,

Reporting

L2/L3 Networking, HA, Config Management,

Reporting

IPS PolicyIPS Policy

Port/Protocol-based IDPort/Protocol-based ID

AV SignaturesAV Signatures

L2/L3 Networking, HA, Config Management,

Reporting

L2/L3 Networking, HA, Config Management,

Reporting

AV PolicyAV Policy

Firewall PolicyFirewall Policy

IPS DecoderIPS Decoder AV Decoder & ProxyAV Decoder & Proxy

Application inspection in common UTM is performed on many inspection modules (IPS, AV, WF, etc.) based on products from

different vendors.

• It makes huge performance degradation.

Page 8: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Palo Alto Networks – unique features

Performs accurate application inspection (IPS, AV, etc.) without performance degradation (one inspection path - shared database of universal signatures, purpose-built hardware architecture).

L2/L3 Networking, HA, Config Management, ReportingL2/L3 Networking, HA, Config Management, Reporting

App-IDApp-ID

Content-IDContent-ID

Policy EnginePolicy Engine

Application Protocol Detection and Decryption

Application Protocol Detection and Decryption

Application Protocol DecodingApplication Protocol Decoding

HeuristicsHeuristics

Application SignaturesApplication Signatures

URL FilteringURL Filtering

Threat PreventionThreat Prevention

Data FilteringData Filtering

User-IDUser-ID

Page 9: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Single-Pass Parallel Processing (SP3) Architecture

Single Pass• Operations once per

packet- Traffic classification (app

identification)

- User/group mapping

- Content scanning – threats, URLs, confidential data

• One policy

Parallel Processing• Function-specific

parallel processing hardware engines

• Separate data/control planes

Up to 10Gbps, Low Latency

Page 10: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

New Requirements for the Firewall

1. Identify applications regardless of port, protocol, evasive tactic or SSL

2. Identify users regardless of IP address

3. Protect in real-time against threats embedded across applications

4. Fine-grained visibility and policy control over application access / functionality

5. Multi-gigabit, in-line deployment with no performance degradation

The Right Answer: Make the Firewall Do Its Job

Page 11: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Identification Technologies Transform the Firewall

App-IDIdentify the application

User-IDIdentify the user

Content-IDScan the content

Page 12: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

© 2009 Palo Alto Networks. Proprietary and Confidential.Page 15 | © 2008 Palo Alto Networks. Proprietary and Confidential.Page 15 | © 2008 Palo Alto Networks. Proprietary and Confidential.Page 15 |

Enables Visibility Into Applications, Users, and Content

Page 13: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

PAN-OS Core Firewall Features

• Strong networking foundation- Dynamic routing (OSPF,

RIPv2)- Tap mode – connect to SPAN

port- Virtual wire (“Layer 1”) for true

transparent in-line deployment- L2/L3 switching foundation

• VPN- Site-to-site IPSec VPN - SSL VPN

• QoS traffic shaping- Max/guaranteed and priority - By user, app, interface, zone,

and more

• Zone-based architecture- All interfaces assigned to security

zones for policy enforcement

• High Availability- Active / passive - Configuration and session

synchronization- Path, link, and HA monitoring

• Virtual Systems- Establish multiple virtual firewalls

in a single device (starting from PA-2000 Series)

• Simple, flexible management- CLI, Web, Panorama, SNMP,

Syslog

Visibility and control of applications, users and content complement core firewall features

PA-500

PA-2020

PA-2050

PA-4020

PA-4050

PA-4060

Page 14: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Flexible Deployment OptionsVisibility Transparent In-Line Firewall Replacement

• Application, user and content visibility without inline deployment

• IPS with app visibility & control• Consolidation of IPS & URL

filtering

• Firewall replacement with app visibility & control

• Firewall + IPS• Firewall + IPS + URL filtering

Page 15: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Site-to-Site and Remote Access VPN

• Secure connectivity- Standards-based site-to-site IPSec VPN

- SSL VPN for remote access

• Policy-based visibility and control over applications, users and content for all VPN traffic

• Included as features in PAN-OS at no extra charge

Site-to-site VPN connectivity

Remote user connectivity

Page 16: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Traffic Shaping Expands Policy Control Options

• Traffic shaping policies ensure business applications are not bandwidth starved - Guaranteed and maximum bandwidth settings

- Flexible priority assignments, hardware accelerated queuing

- Apply traffic shaping policies by application, user, source, destination, interface, IPSec VPN tunnel and more

• Enables more effective deployment of appropriate application usage policies

• Included as a feature in PAN-OS at no extra charge

Page 17: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Flexible Policy Control Responses

• Intuitive policy editor enables appropriate usage policies with flexible policy responses• Allow or deny individual application usage • Allow but apply IPS, scan for viruses, spyware

• Control applications by category, subcategory, technology or characteristic

• Apply traffic shaping (guaranteed, priority, maximum)

• Decrypt and inspect SSL • Allow for certain users or groups within AD

• Allow or block certain application functions • Control excessive web surfing

• Allow based on schedule • Look for and alert or block file or data transfer

Page 18: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Enterprise Device and Policy Management

• Intuitive and flexible management- CLI, Web, Panorama, SNMP, Syslog- Role-based administration enables delegation of tasks to appropriate person

• Panorama central management application- Shared policies enable consistent application control policies - Consolidated management, logging, and monitoring of Palo Alto Networks devices- Consistent web interface between Panorama and device UI- Network-wide ACC/monitoring views, log collection, and reporting

• All interfaces work on current configuration, avoiding sync issues

Page 19: © 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov

Our Platform Family…Pe

rform

an

ce

Remote Office/Medium Enterprise

Large Enterprise

•PA-2000 Series

• 1Gbps; 500Mbps threat prevention

•PA-4000 Series

• 500Mbps; 200Mbps threat prevention

2Gbps; 2Gbps threat prevention

10Gbps; 5Gbps threat prevention

10Gbps; 5Gbps threat prevention (XFP interfaces)

•PA-500• 250Mbps; 100Mbps threat prevention