24
Supported Topologies in 8.5.0 Software Release 8.5.0 Internal and Confidential for Partners/Resellers only Technical Brief Vital Security™ Supported Topologies

Vital Security 8.5.0 Supported Topologies · 2013. 3. 19. · Supported Topologies in 8.5.0 3 The supported topologies are categorized into the following groups: ♦ Basic topologies

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

  • Supported Topologies in 8.5.0

    Software Release 8.5.0 Internal and Confidential for Partners/Resellers only

    Technical Brief

    Vital Security™ Supported Topologies

  • Supported Topologies in 8.5.0

    © Copyright 1996-2007. Finjan Software Inc. and its affiliates and subsidiaries (“Finjan”). All rights reserved. All text and figures included in this publication are the exclusive property of Finjan and are for your personal and non-commercial use. You may not modify, copy, distribute, transmit, display, perform, reproduce, publish, license, create derivative works from, transfer, use or sell any part of its content in any way without the express permission in writing from Finjan. Information in this document is subject to change without notice and does not present a commitment or representation on the part of Finjan. The Finjan technology and/or products and/or software described and/or referenced to in this material are protected by registered and/or pending patents including U.S. Patents No. 3952315, 6092194, 6154844, 6167520, 6480962, 6209103, 6298446, 6353892, 6804780, 6922693, 6944822, 6993662, 6965968, 7058822, 7076469, 7155743, 7155744 and may be protected by other U.S. Patents, foreign patents, or pending applications. Finjan, Finjan logo, Vital Security, Vulnerability Anti.dote and Window-of-Vulnerability are trademarks or registered trademarks of Finjan. Sophos is a registered trademark of Sophos plc. McAfee is a registered trademark of McAfee Inc. Kaspersky is a registered trademark of Kaspersky Lab. SurfControl is a registered trademark of SurfControl plc. Microsoft and Microsoft Office are registered trademarks of Microsoft Corporation. All other trademarks are the trademarks of their respective owners. For additional information, please visit www.finjan.com or contact one of our regional offices: USA: San Jose 2025 Gateway Place Suite 180 San Jose, CA 95110, USA Toll Free: 1 888 FINJAN 8 Tel: +1 408 452 9700 Fax: +1 408 452 9701 [email protected]

    Europe: UK

    4th

    Floor, Westmead House, Westmead, Farnborough, GU14 7LP, UK Tel: +44 (0)1252 511118 Fax: +44 (0)1252 510888 [email protected]

    USA: New York Chrysler Building 405 Lexington Avenue, 35th Floor New York, NY 10174, USA Tel: +1 212 681 4410 Fax: +1 212 681 4411 [email protected]

    Europe: Germany Alte Landstrasse 27, 85521 Ottobrun, Germany Tel: +49 (0)89 673 5970 Fax: +49 (0)89 673 597 50 [email protected]

    Israel/Asia Pacific Hamachshev St. 1, New Industrial Area Netanya, Israel 42504 Tel: +972 (0)9 864 8200 Fax: +972 (0)9 865 9441 [email protected]

    Europe: Netherlands Printerweg 56 3821 AD Amersfoort Netherlands Tel: +31 334 543 555 Fax: +31 334 543 550 [email protected]

    Catalog name: VSST- TB- 850-01 Email: [email protected] Internet: www.finjan.com

  • Supported Topologies in 8.5.0

    1

    Table of Contents 1 System Overview...............................................................................................2 2 All in One vs. Distributed Topology................................................................3 3 Managing the Policy Server and Scanning Server ........................................3 4 Supported Topologies .......................................................................................4

    4.1 Basic Topologies ......................................................................................4 4.2 Proxy Chain Mode ...................................................................................6 4.3 ICAP Redirection......................................................................................8 4.4 Authentication Services.........................................................................11 4.5 Load Balancing.......................................................................................13 4.6 HTTP Caching ........................................................................................15 4.7 NG-8100 Appliance ...............................................................................16

    5 Appendix – Topology Summary....................................................................20

  • Supported Topologies in 8.5.0

    2

    1 System Overview Located at the gateway to your network, the Vital Security Web Appliance monitors all traffic between your company and the Web. It identifies the “true type” of the content, scans it, then allows or blocks the content in line with the rules and policies that you and your organization define. You can also configure the extent of transaction logging and the generating of reports.

    The following functional servers are incorporated:

    ♦ Policy Server: A centralized repository and administration point for system configuration and security policy settings. The settings defined in the Policy Server are “pushed” to all Scanning Servers such that the system is always updated.

    ♦ Log Server: A short-term centralized repository for transactional information. The transactional information is generated by the Scanning Servers and queued in Log Relays, after which they are aggregated to the centralized repository. The Log Server is a subset of the Policy Server.

    ♦ Report Server: A long-term centralized repository for transactional information. The transactional information is generated by the Scanning Servers and queued in Log Relays, after which they are aggregated to the centralized repository. The Report Server is a subset of the Policy Server.

    ♦ Scanning Servers: Multiple servers that scan content using the various scanning engines, including Finjan's proactive scanning technology, and enforce the predefined policy regarding that content.

    ♦ Authentication Device: a special device, used to authenticate users before they can browse the Internet. The Authentication Device communicates with an Active Directory in order to authenticate the users.

    The following physical components can be incorporated in the full system deployment:

    ♦ Load Balancer: When the amount of traffic exceeds a Scanning Server’s capacity, or following redundancy requirements, the deployment includes several Scanning Servers. A Load Balancer balances the load of incoming requests traffic between all active Scanning Servers. The load balancer can be any 3rd party load balancer.

    ♦ Caching Server: A deployment can include a Cache Appliance NG-6600 or any other third party caching server. The caching server can be connected to the Scanning Servers via an upstream proxy or downstream proxy.

    Although Vital Security supports many possible topologies, the following have been successfully tested and are therefore fully supported by Finjan. If none of these topologies address your needs, please contact your local Finjan representative for the appropriate deployment.

  • Supported Topologies in 8.5.0

    3

    The supported topologies are categorized into the following groups:

    ♦ Basic topologies – including both single and multiple Scanning Server topologies.

    ♦ Third party based topologies – topologies that include other components such as caching servers and Layer 7 switches.

    2 All in One vs. Distributed Topology Finjan’s Vital Security appliance can be installed in different operational modes:

    • All in One • Distributed Topology (Policy Server and Scanning Server)

    When working in All in One mode, a single server is used both for scanning the traffic and for managing the security policies, Logs, Reports and Updates. When an All in One device is used to manage an additional Scanning device, it provides additional scanning capabilities. The device should be set to receive a scanning throughput of about 50% of the maximum scanning capabilities of a standalone device. This enables the All in One device to perform other tasks required of it.

    For more information about sizing, please contact your Finjan representive.

    Working in a distributed topology, where the Policy Server and Scanning Server are installed on separate and dedicated hardware allows more flexibility and maintainability to the Policy Server (users are not affected by the load / availability of the Policy Server).

    NOTE: An All in One does not include an Authentication Device.

    3 Managing the Policy Server and Scanning Server In all the topologies presented in this document the Policy Server does not appear in the topology (unless the topology is All in One), due to the fact that the Policy Server can be located anywhere in the network, so long as it can communicate with the Scanning Server.

    In all management configurations, ensure that the IP address and Hostname of the Management unit is configured in the browser’s list of servers that should not be accessed via the proxy. This will ensure that active content which is used by the Management Console is not accidentally blocked by the scanning proxy rules.

    To ensure proper communication between Vital Security Web Appliance Series Version 8.5.0 Scanning Servers and Policy Server, several ports have to be open on the firewall. For detailed information, please refer to the Port Mapping Feature Description.

  • Supported Topologies in 8.5.0

    4

    4 Supported Topologies The following Topologies are supported with Vital Security Software Release 8.5.0.

    4.1 Basic Topologies 4.1.1 Simple Proxy mode

    In the Simple Proxy mode, users are configured to work with a proxy server. In this mode the users use the IP address of the Scanning Server as their proxy server for HTTP (default port 8080), HTTPS scanning (default port 8443) and FTP (default port 2121).

    The Scanning Server can be located either behind a firewall, in the DMZ (see Figure 1) or on the same network as the users (see Figure 2).

    Figure 1: Simple Proxy Mode (DMZ)

    Figure 2: Simple Proxy Mode (Same network)

  • Supported Topologies in 8.5.0

    5

    The traffic flow is as follows:

    1. The user initiates a connection to the Internet (HTTP, HTTPS, or FTP). The user sends the request to its proxy server, which is the Scanning Server.

    2. The Scanning Server processes the request (identifying the user, authenticating the user if required and finding the user’s policy) and if the content is allowed, then the Scanning Server issues a new request to the original destination server.

    3. The returning traffic is processed again by the Scanning Server (the Scanning Server is the originator of the session) and only after processing, the end-user receives the data (or block message).

    4.1.2 Transparent Mode In the Simple Transparent mode, users are not configured to work with a proxy server. In this mode the users send their requests directly to the IP address of the original web server. A Layer 4 traffic redirector (as appears in Figure 4) intercepts all HTTP and FTP traffic to the Scanning Server (using the original destination IP of the HTTP (or FTP) server.

    In order to configure the proxy to work in transparent mode, transparency has to be enabled (Settings Devices. Select the Scanning Server from the Network Roles tree and select proxy).

    Figure 3: Proxy Configuration for Transparent Mode

    Another way of achieving user transparency is by including a firewall rule which uses destination NAT for all HTTP (and possibly FTP) traffic. When users send HTTP traffic, this traffic is passed via the firewall. The destination NAT rule changes the destination IP address from the original web server in the Internet, to the IP address of the Vital Security Scanning Server. The traffic then reaches the Vital Security Scanning Server, which scans the traffic and fetches the information from the Internet. Returning traffic is scanned again and returned to the user.

  • Supported Topologies in 8.5.0

    6

    Figure 4: Simple Transparent Mode

    NOTE: This topology does not support scanning of HTTPS traffic.

    The traffic flow is as follows:

    1. The user initiates a connection to the Internet (HTTP or FTP). The user sends the request to the original server such that the destination IP address of the request is the IP address of the real server.

    2. The layer 4 switch transparently redirects all HTTP and FTP traffic to the Vital Security Scanning Server, which then processes the request (identifying the user, authenticating the user if required and finding the user’s policy) and if the content is allowed, the Scanning Server issues a new request to the original destination server.

    3. The returning traffic is processed again by the Scanning Server (the Scanning Server is the originator of the session) and only after processing, does the end-user receive the data (or block message) using the original server IP as the source IP address (i.e. as if the user communicates with the original server).

    4.2 Proxy Chain Mode Vital Security Web Appliance can be installed as the Next Proxy of the existing proxy in the network. In this topology, the users can be configured to work with a proxy server (the existing proxy in the network) or the users can be transparently redirected to the proxy server (depending on the network topology and proxy transparency support).

    In the Proxy Chain Topology, the Scanning Server can be out-of-line or in-line (connected with two interfaces).

  • Supported Topologies in 8.5.0

    7

    Figure 5: Proxy Chain Mode (with Scanning Server out-of-line)

    Figure 6: Proxy Chain Mode (with Scanning Server in-line)

    NOTE: If user authentication is required verify that the proxy server supports Authentication Pass-through or forward user credentials via http headers. If this feature is supported, then when the Web Appliances requests user authentication and the proxy server passes the request to the user.

    NOTE: The out-of-line topology is preferred, since in case of Scanning Server failure, it is easier to neutralize the redirection to the Scanning Server (if required).

    NOTE: If the corporate proxy is also a caching proxy which does not support IP spoofing, only one security policy can be enforced by the Scanning Servers.

    The traffic flow is as follows:

    1. The user initiates a connection to the Internet (HTTP, HTTPS, or FTP). Depending on the network topology, the user sends the request either to the original server if the first proxy is a transparent proxy, or directly to the IP address of the proxy server, if the proxy server is non-transparent.

  • Supported Topologies in 8.5.0

    8

    2. After the first proxy has processed the request, it sends it in a proxy format to the Vital Security Scanning Server which then processes the request (identifying the user, authenticating the user if required and finding the user’s policy) and if the content is allowed, the Scanning Server issues a new request to the original destination server.

    3. The returning traffic is processed again by the Scanning Server (the Scanning Server is the originator of the session) and only after processing does it send the traffic to the first proxy, which forwards it to the end-user after the first proxy has processed the traffic.

    4.3 ICAP Redirection The Internet Content Adaption Protocol (ICAP) is a protocol that provides basic redirection to HTTP traffic. Many organizations may already implement a caching solution, where the cache server supports ICAP redirection (for example, Blue Coat). If the cache server supports ICAP redirection, the Vital Security Web Appliance can be installed in ICAP mode, without the need to change the existing network topology.

    ICAP is a client – server protocol, which requires both ICAP client and ICAP server in order to operate properly. Finjan’s Vital Security Web Appliance can be installed as an ICAP Server. An ICAP server is a server that accepts ICAP requests arriving from an ICAP Client (for example, Blue Coat’s cache server). An ICAP client can redirect HTTP traffic (or portion of the traffic) to an ICAP server for additional processing, before sending the traffic to the Internet.

    4.3.1 Basic ICAP Mode with a single Scanning Server Using ICAP, the client has to configure their browser settings to work with a proxy server, which is the ICAP client’s IP. Once the ICAP client processes the request (or reply) it forwards it to the Scanning Server in ICAP format.

    Figure 7: Scanning Sever in ICAP Mode

  • Supported Topologies in 8.5.0

    9

    4.3.2 Basic Load Balancing in ICAP Mode In addition to the basic ICAP capabilities described in section 4.3.1 Basic ICAP Mode with a single Scanning Server, an ICAP Client can redirect traffic to multiple Scanning Servers, and thereby add the high availability functionality to the network as well as scalability. The topology, as described in Figure 8 shows an ICAP client with multiple Scanning Servers. In such a topology, the Scanning Servers must have the same configuration. Configuration of both ICAP modes (REQMOD and RESPMOD) is required.

    Figure 8: Basic Load Balancing in ICAP Mode

    4.3.3 Advantages and Disadvantages of ICAP The advantages of using the ICAP topologies are as follows:

    ♦ Easy deployment – an existing proxy scan be easily configured to use the Scanning Servers as ICAP Server without any impact on the end-users.

    ♦ Control over content – organization with specific needs can increase performance by configuring their ICAP client to only send certain files for scanning by the ICAP Server.

    The disadvantages of using the ICAP topologies are as follows:

    ♦ The ICAP topologies have similar security disadvantages of having a downstream Proxy. Most ICAP clients are Caching Servers so it’s possible that an item which was already cached will be served to a non-authorized user of a different security policy.

    ♦ When ICAP is implemented, there is the need to scan each transaction twice – once in REQMOD and another in RESPMOD. This adds an additional two hops to the traffic flow.

    ♦ Traffic originating from the ICAP Client – the Scanning Servers, must be treated differently and must be excluded from the ICAP treatment, in case it uses the same interface to connect to the internet.

  • Supported Topologies in 8.5.0

    10

    4.3.4 ICAP Redirection vs. Proxy Chain mode Both ICAP redirection and Proxy Chain mode can be used in existing networks with minimal topology changes, however, Proxy Chain Mode is preferred over ICAP redirection for the following reasons:

    ♦ Protocol independent: although the ICAP protocol is RFC based (RFC 3507) and respected by Finjan Vital Security Web Appliance, some vendors may not respect the RFC and have interoperability issues with ICAP implementation.

    ♦ Ease of Configuration: most proxy servers allow the administrator to configure the next proxy by simply configuring the next proxy IP address and port, while ICAP configuration request knowledge in the ICAP protocol, as well as configuring the REQMOD and RESPMOD.

    ♦ Debug-ability: It is much easier to debug native HTTP than debug ICAP traffic. In case system administrator has to debug the entire system, it is easier to:

    • Read capture files of HTTP traffic. • Configure a user to work directly with the Scanning Server and bypass

    the proxy server in order to identify the source of the problem.

    ♦ Number of hops: When working with ICAP Redirection, there are an additional two hops for each transaction. Traffic flow is as follows: The user send the traffic to the proxy server (1), the proxy server redirects the traffic to the Scanning Server (2), the Scanning Server scans the traffic and responds to the proxy (3), the proxy sends the request to the Internet (4) and the reply (5) is forwarded via ICAP to the Scanning Server (6) which scans the traffic and replies to the proxy (7), which then sends the traffic to the user (8).

    Figure 9: Traffic Flow with ICAP Redirection

    ♦ When working in Proxy Chain Mode, the traffic flow is as follows: The users send the traffic to the proxy server (1), the proxy server

  • Supported Topologies in 8.5.0

    11

    forwards the traffic to the next proxy, which is the Scanning Server (2), the Scanning Server scans the request and fetches the content from the Internet (3). When the traffic arrives from the Internet (4) it is scanned by the Scanning Server, which replies to the Proxy that originally made the request (5). The proxy server receives the traffic from the Scanning Server and sends it to the user (6).

    Figure 10: Traffic Flow with Proxy Chain Mode

    NOTE: When deploying in ICAP mode, make sure the Scanning Servers and Policy Server are allowed to access the Internet so they can perform pre-fetching and retrieve updates. If necessary, configure the HTTP devices and update mechanism to use the ICAP Client’s address as Proxy for Internet access.

    NOTE: ICAP requires configuration of the ICAP modes: REQMOD and RESPMOD.

    NOTE: For more information about ICAP configuration and integration with Blue Coat Secure Gateway, refer to the Installation and Configuration Guide, Chapter 7.

    4.4 Authentication Services Enterprise networks are built from different topologies for which different device types and configurations are used. End-user identification and authentication can be performed via various tools, devices, network equipment and through the use of different protocols. The ability to identify the user during the web transaction is crucial in order to isolate threats and enable policy enforcement with a specific behavior for each user or group. The option to identify and/or authenticate the user is dependent on the network layout, the security rules that are used in the network and the capability to integrate with an external authentication device. There is no common single solution that can fit all organizations and therefore an enterprise solution should be flexible enough to offer support for multiple topologies.

  • Supported Topologies in 8.5.0

    12

    Figure 11: Authentication Device Topology

    In this topology the Scanning Server does not communicate with any of the LAN appliances directly but rather uses the HTTP redirect method as a response to the end-user HTTP request when there is a need to authenticate a user.

    The Scanning Servers are set up and configured with the overall network topology structure in order to choose the right Authentication Device to redirect to. Once an HTTP request arrives, the Scanning Server uses an identification policy to decide whether and how to identify the user behind this session. If authentication is required, an HTTP redirect response is sent back to the end-user browser with the URL information of the relevant Authentication Device. As a result, the browser issues an HTTP call to the Authentication Device URL. The Authentication Device receives the HTTP request and initiates its own identification policy. In most cases it will issue an authentication challenge while communicating with the end-user browser. It then uses the authentication credentials that are received from the remote browser and authenticates them with the Active Directory which acts as an Authentication Server.

    The Authentication Device can be configured to work with multiple active directories, even those that are not in a trust relationship.

    NOTE: Since authentication requires redirection to the Authentication Device it is supported only for HTTP. In order to authenticate also HTTPS and FTP the Authentication Device must be configured as the HTTPS and FTP proxy.

    NOTE: When working with Authentication Device it is assumed that all http user-agents support cookies.

    NOTE: Authentication Device cannot be used as a subset of policy server in policy HA topologies.

  • Supported Topologies in 8.5.0

    13

    NOTE: The Scanning Server can also perform Authentication. For more information on Authentication, please refer to the Authentication and Identification Feature Description.

    The traffic flow is as follows:

    1. The user initiates an HTTP connection to a server in the Internet and sends the request to the proxy server, which is the Scanning Server.

    2. The Scanning Server replies with HTTP 302 Redirect response to the end-user browser and redirects the end user to the Authentication Device.

    3. The end-user then opens a new connection to the Authentication Device, requesting for the original URL.

    4. The Authentication Device replies with HTTP 407 – Authentication required and close the connection.

    5. The end-user then opens a new connection and sends its credentials to the Authentication device. The Authentication device communicates with the AD/LDAP/Authentication server and authenticates the user based on the collected credentials.

    6. Once the Authentication process is completed and the user is authentication, the Authentication Device redirects the user, using HTTP 302 Redirect back to the Scanning Server.

    4.5 Load Balancing 4.5.1 Load Balancing Multiple Scanning Servers in Proxy Mode

    Using a third party load balancer, it is possible to scale up and add additional Scanning Servers based on network growth and load of the Scanning Servers.

    In Figure 12, all the users in the network are configured to work with a proxy server for HTTP (default port 8080), HTTPS (default port 8443) and FTP (default port 8080). The IP address of the proxy server in the user’s browser is the Virtual IP of the load balancer. The load balancer has a single farm with all the Scanning Servers in the farm. The default gateway of the Scanning Servers is the internal interface of the load balancer (the Scanning Servers IP address should be part of the same network as the internal interface of the load balancer). The default gateway of the load balancer is the Firewall. The load balancer performs periodical health checks in order to verify that the Scanning Servers are active and available to serve the users. In case of failure of a Scanning Server, the traffic is distributed among the rest of the available Scanning Servers (the users will, however, have to re-establish their connection). In this topology, the load balancer has a redundant load balancer, working in the Vendor’s Proprietary Redundancy Protocol mode (VRRP mode).

    For more information about load balancing, please refer to the Load balancing Vital Security Scanning Servers Technical Brief.

  • Supported Topologies in 8.5.0

    14

    NOTE: The Policy Server must communicate directly with all the Scanning Servers in the network and not via the VIP, therefore, all the Scanning Servers must be configured on the Policy Server.

    Figure 12: Load Balancing Multiple Scanning Servers in Proxy Mode

    4.5.2 Load Balancing Multiple Scanning Servers in Transparent Mode

    Using a third party load balancer, it is possible to scale up and add additional Scanning Servers based on network growth and load of the Scanning Servers.

    In Figure 13, the users in the network do not have any browser settings and are sending their requests directly to the original web and FTP servers (HTTPS is not supported in transparent mode). The load balancer, installed in-line, intercepts users’ traffic and redirects the traffic to the best available server (based on load balancing algorithm). In this topology, the load balancer has a single farm with all the Scanning Servers in the farm. The default gateway of the Scanning Servers is the internal interface of the load balancer (the Scanning Servers IP address should be part of the same network as the internal interface of the load balancer). The default gateway of the load balancer is the Firewall. The load balancer performs periodical health checks in order to verify that the Scanning Servers are active and available to serve the users. In case of failure of a Scanning Server, the traffic is distributed among the rest of the available Scanning Servers (the users will, however, have to re-establish their connection). In this topology, the load balancer has a redundant load balancer, working in Vendor’s Proprietary Redundancy Protocol mode (VRRP mode).

    NOTE: The Policy Server must communicate directly with all the Scanning Servers in the network and not via the VIP, therefore, all the Scanning Servers must be configured on the Policy Server.

  • Supported Topologies in 8.5.0

    15

    Figure 13: Load Balancing Multiple Scanning Servers in Transparent Mode

    The traffic flow is as follows:

    1. The user initiates a connection to a server in the Internet (HTTP, HTTPS or FTP) and sends the request to the proxy server, which is a virtual IP address, belonging to the load balancer and represents the cluster of Scanning Servers.

    2. Based on the load balancing decision, the Load Balancer changes the original destination IP (the virtual IP) as well as the destination IP address and destination MAC address to the IP and MAC of the selected Scanning Servers.

    4.6 HTTP Caching The Vital Security Cache Appliance, NG-6600, integrates with the Vital Security Web Appliance. In the integrated solution, the Cache Appliance is configured as the next proxy of the Web Appliance, which sends all the HTTP traffic to the Cache Appliance. If the content is already in the cache, the Cache Appliance replies to the Web Appliance with the content, which will be scanned by the Web Appliance before sending it to the user. If the content is not on the Cache Appliance, the Cache Appliance fetches it for the user and sends it back to the Web Appliance for scanning.

    The integrated solution of Web Appliance and Cache Appliance is supported by any of the previously described topologies.

  • Supported Topologies in 8.5.0

    16

    Figure 14: Integrated Web Appliance and Cache Appliance Solution

    4.7 NG-8100 Appliance Vital Security™ Web Appliance NG-8100 is Finjan’s real-time web security solution, recommended for enterprises/organizations with up to 250,000+ users. This solution delivers unmatched web security in a high performance, scalable and high availability integrated blade server appliance. NG-8100 utilizes Finjan’s patented real-time content inspection technology to secure corporate networks against all types of web-borne attacks, including Spyware, Phishing, Trojans, obfuscated malicious code and other types of malicious content. This solution can be integrated Nortel Networks Layer 2-7 Gigabit Ethernet Switch Module Load Balancer to ensure compliance with the high performance and availability requirements of large enterprise networks.

    Two main topologies are supported by the NG-8100:

    ♦ Distributed topology using Nortel Layer 2-3 Switch

    ♦ Load Balancing of the Scanning Servers using Nortel Layer 4-7 switch

    4.7.1 Multiple Scanning Servers for different users groups using the Nortel Layer 2-3 switch

    Using the Nortel Layer 2-3 switch with the Vital Security NG-8100 series, different users groups can be configured to work with different blades for different Scanning Servers for HTTP, HTTPS and FTP. In case transparency is required, a Layer 4 switch can be used in order to transparently redirect all HTTP and FTP traffic to the Scanning Servers in case of Scanning Server failure.

  • Supported Topologies in 8.5.0

    17

    Figure 15: Multiple Scanning Servers for different users groups using the Nortel Layer 2-3

    switch

    NOTE: In case of a Scanning Server failure there is no automatic failover. System administrators will have to manually change the proxy settings of the users configured to the failed Scanning Server or to manually replace the failed blade.

    4.7.2 Load Balancing the Scanning Servers using Nortel Layer 2-7 switch

    When using the Nortel Layer 2-7 Switch, all the users are configured to send their web traffic (HTTP, HTTPS and FTP) to a virtual IP address, which is managed by the Layer 2-7 switch. The Layer 2-7 switch distributes user traffic among the available Scanning Server based on a user defined load balancing algorithm (such as round-robin, least users, etc). In case of Scanning Server failure, users are transparently redirected to another available Scanning Server.

  • Supported Topologies in 8.5.0

    18

    Figure 16: Load Balancing of Scanning Server with Nortel Layer 2-7 Switch

    4.7.3 Multi-Site Load Balancing using NG-8000 and Nortel Layer 2-7 Switch

    For large organizations that need to install Scanning Servers in two different sites, this topology provides site redundancy by using Nortel layer 2-7 switch. In this topology, end users are configured to send their requests to a proxy server, which is a VRRP address, handled by both NG-8000. When both NG-8000 are up and running, only one of them is managing all traffic and considered to be the master, which is responsible for the VRRP address. When end users send their requests to the VRRP address, the Nortel layer 2-7 switch makes a load balancing decision and redirects the end-user to one of the Scanning Servers, based on the load balancing algorithm. In case all Scanning Servers at one of the sites fail, the other Scanning Servers, on the other site are still available to serve the user’s requests.

    NOTE: For this topology, it is mandatory to have layer 2 connectivity between the two locations.

  • Supported Topologies in 8.5.0

    19

    Figure 17: Multi-Site Load Balancing using NG-8000 and Nortel Layer 2-7 Switch

  • Supported Topologies in 8.5.0

    20

    5 Appendix – Topology Summary

    Placement Topology

    (assuming placement in DMZ)

    Advantages Disadvantages Notes

    Simple Proxy mode

    PC > FW > Finjan > FW > Web

    ♦ Full Authentication with MS AD

    ♦ Simple to install and manage (proxy.pac; AD-GPO; login scripts)

    ♦ Requires configuration changes on clients

    ♦ User credentials are passed in the DMZ

    ♦ May require load balancers

    Proxy Chain Mode (Proxy Ahead or Upstream Proxy)

    PC > FW > Proxy > Finjan > FW > Web

    ♦ No configuration changes required on clients

    ♦ Cached objects are downloaded from the Proxy server which minimizes delays (improved performance)

    ♦ Cached content is not subject to the latest security updates, nor to policy changes on Finjan

    ♦ Finjan cannot log access to cached content

    ♦ Depends on proxy to authenticate and pass user ID in http header

    ♦ May not be possible to set different policies for different users/groups of cached objects

    ♦ May require load balancers

    ♦ If a policy regarding valid content changes, Finjan cannot prevent subsequent access to this data

  • Supported Topologies in 8.5.0

    21

    Proxy Chain Mode (Proxy Behind or Downstream Proxy)

    PC > FW > Finjan > Proxy > FW > Web

    ♦ Proxy server controls timing and content availability behavior

    ♦ More secure - configuration changes on Finjan will scan any previously cached objects

    ♦ Can forward usernames and IP addresses in http header to proxy (if supported)

    ♦ Finjan has to scan every response - even if cached

    ♦ May require load balancers

    ♦ All accesses to cached content are subject to the logging policy, and are potentially logged by Finjan Vital Security

    Transparent Mode PC > FW > Switch > FW > Web

    Finjan

    ♦ No special browser configuration is required

    ♦ Transparent to users

    ♦ Must configure Layer 4 router/switch

    ♦ Identification limited to IP Address

    ♦ User authentication requires that the web client application support http redirects and cookies

    ♦ May require load balancers

    ♦ May not work with very old browsers which do not provide host information

    ♦ Agents and other programs that do not work with authentication may be allowed by rule so they won’t be blocked

    ♦ Transparency is unidirectional, upstream devices will see Finjan IP

  • Supported Topologies in 8.5.0

    22

    ICAP PC > FW > Proxy > FW > Web

    Finjan

    ♦ No configuration changes required on clients

    ♦ Caching good data

    ♦ Inherent load balancing between cluster of Finjan appliances

    ♦ Configuration changes on Finjan may affect cached objects in Proxy

    ♦ There is about an 8% loss due to ICAP protocol overhead, but this can be offset by having the Proxy filter out protocols Finjan doesn’t need to process such as streaming video

    ♦ Only Blue Coat and NetCache are supported