SonicWALL UTM Overview Nov 10

Download Report

Transcript SonicWALL UTM Overview Nov 10

SonicWALL UTM Firewall Overview
November 2010
Andy Barrow
SonicWALL Product Manager
+44 1753 797944
Who are SonicWALL?

SonicWALL was founded in February 1991 to develop standards-based, network
infrastructure products to meet the needs of the small to medium business and
education markets.

Today, SonicWALL’s Internet security and transaction security solutions are
leading the way for a more diverse and secure Internet experience for small,
medium and large enterprises.
2
CONFIDENTIAL All Rights Reserved
4/8/2015
The SonicWALL Global Presence
Canada
United States
Mexico
Brazil
Belgium
United Kingdom
Germany
France
Spain
Italy
Russia
Dubai
Switzerland
Sweden
India
Japan
Korea
China
Hong Kong
Singapore
Australia
 25 offices around the world
 Conducting business in over 50 countries
3
CONFIDENTIAL All Rights Reserved
4/8/2015
How it all fits together
Market
Convergence
Vendor /
Technology
Convergence
End User /
Channel
Convergence
Keep Businesses Running
Increase IT Productivity
Manage Risks
Policy and Management
Business
Continuity
Content
Security
Network
Security
Content
Security
Business
Continuity
Policy and
Management
Unified
Threat
Management
Inbound &
Outbound
Content
Filtering
Secure
Backup and
Recovery
Policy
Creation
(Gateway AV,
Anti-Spy, IPS)
Network
Security
SSL-VPN
Compliance
Anti—Virus
Anti-Spyware
Anti-SPAM
Patch
Management
Comprehensive & Continuous Protection for our End-Users
Predictable & Profitable Growth for our Channel Partners
Monitoring
Reporting
Management
Recent 5 Star Awards – Across 4 Major
Product Categories
UTM – Network Security
5
CONFIDENTIAL All Rights Reserved
SSL VPN – Remote Access
Email Security Management
4/8/2015
Gartner Magic Quadrant - 2010
Magic Quadrant for Unified Threat Management Appliances
Source: Gartner October 2010
6
© 2005 SonicWALL, Inc. All Rights Reserved - Confidential
What’s a firewall?
A firewall is a dedicated appliance which
inspects network traffic passing through it,
and denies or permits passage based on a
set of rules. Wikipedia
7
CONFIDENTIAL All Rights Reserved
4/8/2015
Typical Deployment
8
CONFIDENTIAL All Rights Reserved
4/8/2015
Why do I need a firewall?
 To stop the wrong people getting into your network?
 Identity theft is big business
 Cabinet Office study – Cost of ID fraud to UK = £1.7Bn every
year
 FBI – 27.3 Million Americans have been victims costing
$48Bn!
 Personal data is everywhere
 DOB+ Address + fake utility bill = You 2.0
 C/Card details – Traded world wide
 New standards like PCI require you to have one
9
CONFIDENTIAL All Rights Reserved
4/8/2015
Networking Drivers & Trends
Business Drivers
 Reduction in operating costs
 Focus on TCO
 Mobilization of the workforce
 Compliance
 Outsourcing growth
 Gaining competitive advantage
Technology Trends
 Growth in real-time & Internet based
applications & communication
 SaaS / Web 2.0
 Virtualization of services
 Employees increasing utilize network
services – productive and unproductive
 High speed and available information
sharing is critical
 Increases in bandwidth and volume of
traffic
10
The Communications Landscape Is Rapidly Evolving
SonicWALL CONFIDENTIAL All Rights Reserved
The Facts at Work
25% of employees do peer-to-peer
file sharing at work
Equifax, 2007
16% of men and 8% of women admit
viewing pornography at work
USA Today, 2007
25% of office internet traffic
is non-business related
Burst Media Survey, 2008
11
CONFIDENTIAL All Rights Reserved
4/8/2015
Networks Exposed to New Threats

130% – The increase in unique
malware found in the wild from
July to November of 2008
(Kaspersky Labs)

4.2 million – The number of
URLs around the world that
harbor Malware
(Source: IT Pro, 2007)

Result – Trojans and malware
now outnumber viruses in terms
of risk to a network
(Kaspersky Labs)
12
CONFIDENTIAL All Rights Reserved
4/8/2015
Why do I need a new type of
Firewall?
 Because the Cyber criminals have got smarter.
 New and sneakier ways of getting in:
 Trojans
 Worms
 Spyware
 Botnets
 Applications like Instant Messenger and Skype create a
hole in your firewall.
 Recently, the FBI noted that 98% of organizations use
firewalls, but that 56% of them had still experienced
unauthorized network access.
13
CONFIDENTIAL All Rights Reserved
4/8/2015
What Are Employees Doing?








14
CONFIDENTIAL All Rights Reserved
Web surfing
Twitter, Facebook
Downloading files
Instant messaging
Streaming video
Web 2.0 applications
Playing games
Personal email
4/8/2015
…and More Non-Traditional Malware
The Prediction
Malware specifically disguised as "benign social networking links" will be
the top threat to data security in 2009.
(Georgia Tech's Information Security Center Emerging Cyber Threats Report for 2009)
The Reality
Target:
Set-up:
Lure:
Attack:
Infect:
Result:
LinkedIn
Create bogus celebrity LinkedIn profiles
Place link to celebrity “videos” in profile
Download of “codec” required to view video
Codec is actually Malware
System compromised
Beyonce
Kirsten
Dunst
Christina
Ricci
Kate
Hudson
(Gregg Keizer, Computerworld Jan 7, 2009)
15
CONFIDENTIAL All Rights Reserved
4/8/2015
New Risks
The New Paradigm of Network Communications Brings New Risk
SonicWALL CONFIDENTIAL All Rights Reserved
2010 Challenges
 Threats Aren’t Decreasing
User Population
 Increases in malware and malcode
 Threats go invisible
 Poor Application Visibility
 Abundance of unknown application use
 Ports are ineffective at blocking
application use
 Network misuse is rampant
 Increased Network Complexity
 Bandwidth efficiency is a top concern
 Admins want to manage and control
network traffic based on identity
Expanding App Usage
Open Access to Internet
Increase in “Unknown”
Traffic
Limited Control Over
Content
Security Required By
Application
Ever-increasing thirst for
Bandwidth
Network Use
SonicWALL CONFIDENTIAL All Rights Reserved
Current Solutions Present Challenges
Threats
Current
Required
Application Access
3
Application Layer Threats
Proxy
Software Vulnerabilities
2
Worms
IDS/IDP
Basic Applications
Legacy System Access
Complete
Inspection must
span the
communication
spectrum
1
Traditional Firewall

Network safeguards are changing with threats; As threats move up the
OSI model, inspection must be more complete and scalable

Application visibility is paramount to overcome the next generation of
threats and productivity issues

Siloed solutions are the current response due to performance but multilayered protection is the future
SonicWALL CONFIDENTIAL All Rights Reserved
Next Generation Security Requirements
What Is the Ideal Solution for Next Generation Protection?
Solutions
Threats
Application Access
Application Layer Threats
App Layer
Software Vulnerabilities
Real-time Prot.
IDP/IPS/File
Worms
Basic Applications
Content Filter
DPI Firewall
Legacy System Access
Multi-Tiered Protection
1.
Consolidated & Integrated Security Technology
 Covering a Wide Spectrum of Content-based, File-based & Application
Layer Attacks
2.
Application Visibility
 Inspection of Real-time & Latency Sensitive Applications/Traffic
3.
Scalable & High Performing
 High Speed Protection Against Perimeter and Internal Network
Challenges
SonicWALL CONFIDENTIAL All Rights Reserved
Introducing SonicWALL’s UTM
Firewall Appliances
Next Generation NSA Architecture
2010 Security
Requirements
1.
SonicWALL
Solution Features
Consolidated & Integrated Security
Technology
Multi-Tiered Protection Technology
2.
Application Visibility - Inspection of
Real-time & Latency Sensitive
Applications/Traffic
Re-Assembly Free DPI (RFDPI)
3.
21
Scalable & High Performing
Enough to Protect Against
Perimeter and Internal Network
Challenges
SonicWALL CONFIDENTIAL All Rights Reserved
Multi-Core High Perf. Architecture
Introducing the SonicWALL NSA and
NSA E-Class Series
The SonicWALL® Network Security Appliance (NSA) Series - the first multicore Unified Threat Management (UTM) platform that delivers application
aware Unified Threat Management without compromising performance
From the NSA240 through to the
award winning E-Class E8500 with
multi-Gigabit throughput
 Next-Generation Unified Threat
Management
 Application Visibility & Awareness
with ReAssembly-Free DPI (RFDPI)
 Revolutionary Multi-Core
Performance for Ultimate Scalability
 Best-In-Class Performance and
RFDPIEngine
EngineArchitecture
Architecture
RTDPI
RTDPI
Engine
Architecture
Protection
+
+
Unified Threat Protection
Re-Assembly Free Design
SonicWALL CONFIDENTIAL All Rights Reserved
Multi-Core
SonicWALL Network Security
Appliance Features
1. Security Integration
2. Ultimate Connectivity
 Complete UTM Protection with Gateway
Anti-Virus, Anti-Spyware and IDP
 Next Generation Application Firewall
 Content & Application Filtering
 “Clean VPN” Protection
 Secure IPSec Site-to-Site VPN
Connectivity
 Exceptional User Policy Control and
Access to Resources
 Wireless Mobility
 Network Availability
3. Reliability & Optimization
4. Flexible Deployments
 Highly Redundant Hardware – Power/Fans
 One Point of Network Control
 Business Application Prioritization & QoS
 Integrated Server Load Balancing Feature-set
23
© 2005 SonicWALL, Inc. All Rights Reserved - Confidential
 Data Center, Campus & Department
Network Applications
Transparent L2 Bridge Mode
 Integrated Wireless Switch Deployment
 Ease of Deployment & Management
SonicWALL Network Security
Appliance Features
 Multi-Function Security Integration
Deep Packet Firewall

Application Firewall



Intrusion Prevention
Anti-Malware
Content Filtering
Full Ant-SPAM
 Application Visibility





Bandwidth Management

CONFIDENTIAL All Rights Reserved
“Clean VPN” Secure IPSec Site-to-Site VPN Connectivity,
Clean Wireless, Wireless Switch / Controller
Exceptional User Policy Control and Access to Resources
Integrated Wireless Switch offer “Clean Wireless”
Reliability, Optimization & Flexibility





24
Integrated Application Firewall
Policy control over Applications, Application use & File Types
Ultimate Connectivity

Clean Wireless
Clean VPN
Complete Threat Protection with Intrusion Prevention & AntiMalware/Virus/Spyware
Content Control & URL Filtering
Full “Enterprise” quality Integrated Anti-SPAM
Protect whole infrastructures such as StoneWare Access
Highly Redundant Hardware – Power/Fans
Business Application Prioritization & QoS
Integrated Server Load Balancing Feature-set
Flexible Deployments branch office, corporate & department
network Applications
Award winning: Deployment & Management
4/8/2015
Introducing SonicOS 5.8
 Application Firewall Feature
Set
 High Availability with
statesync
 Integrated Load Balancing
 Application Bandwidth
Management
 Single Sign On
 Fully Dynamic GUI
 And more…
SonicOS 5.8 Redefines Deployment & Management
Simplicity and Functionality
25
SonicWALL CONFIDENTIAL All Rights Reserved
True L7 Application Intelligence
Standard with CGSS on all models from TZ210 upwards
Real time application visibility and control of users / apps
Fully customisable
Fully integrated into UTM appliance
Simple to manage
SonicWALL CONFIDENTIAL All Rights Reserved
The answer is…Application Intelligence
 Intelligence




Reassembly Free Deep Packet Inspection
Identify & categorise traffic by source / destination
Identify & categorise traffic by application (not just port / protocol)
Identify & categorise traffic by user / group (not just IP )
 Control
 Intelligence based policy enforcement
 Application & content control with 3000+ applications
 Application level bandwidth management
 Visualisation
 View network threats & trends in real time
 View application traffic by users
 View application bandwidth useage (ingress / egress)
27
CONFIDENTIAL All Rights Reserved
4/8/2015
The answer is… DPI – Reassmbly Free
 Reassembly Free Deep
Packet Inspection
 Avoid Latency (no buffering)
 Unique to SonicWALL
 Deep packet Inspection
 Doesn’t just check the list
 It searches…Deep inside
…the data packet
 All SonicWALL firewalls are
Deep Packet inspection
Firewalls
28
CONFIDENTIAL All Rights Reserved
4/8/2015
Layer 7 Application Visibility and
Control
29
© 2010 SonicWALL, Inc. All Rights Reserved - Confidential
Deployment Flexibility
Deployments: Central Site, Distributed Networks, Layer 2 Bridge, Wireless
Switch, Real-Time Application Protection
SonicWALL CONFIDENTIAL All Rights Reserved
SonicWALL GRID Network
Data Collection
Protection Development
Deployed Protection
Data Collection
010101010101010010
101010101001010101
010010101010100101
010101010100101010
101010010101001010
10100
UTM Appliances
NSA Series
24x7 Security Team
SonicWALL’s Global Response Internet Defense (GRID) Network works 24x7
by gathering and sharing security intelligence across all product platforms
SonicWALL CONFIDENTIAL All Rights Reserved
Product Specifications
SonicWALL UTM product range
No. of users
0 to 10
10 to 25
25 to 50
50 to 75
75 to 150
150 to 300
300 to 700
700 to 1000
1000 to
1500
1500 to 5000
Model
TZ 100/w
TZ 200/w
TZ 210/w
NSA 240
NSA 2400
NSA 3500
NSA 4500
NSA E5500
NSA E6500
NSA E7500
Interfaces
5 Ethernet
5 Ethernet
2 Gigabit/E + 4
Ethernet
3 Gigabit/E
+ 6 Ethernet
Throughput
90 Mbps
200 Mbps
200 Mbps
600 Mbps
775 Mbps
1,5 Gbps
2,75 Gbps
4 Gbps
4,5 Gbps
5,6 Gbps
UTM Through
25 Mbps
35 Mbps
50 Mbps
110 Mbps
150 Mbps
240 Mbps
600 Mbps
850 Mbps
1,6 Mbps
1,7 Gpbs
VPN Site
toSite
5
10
15
25
75
800
1 500
4 000
6 000
10 000
Client IPSEC
(max)
1 (25)
2 (10)
2 (25)
2 (25)
10 (250)
50 (1 000)
500 (3 000)
2 000 (4 000)
2 000 (6 000)
2 000 (10 000)
Client SSL
(max)
0 (5)
2 (10)
2 (10)
2 (15)
2 (25)
2 (30)
2 (30)
2 (50)
2 (50)
2 (50)
SMB
33
6 Gigabit/E
Mid-Market
4 Gigabit/E + 4
Gigabit Fibre
8 Gigabit/E
Enterprise
4/8/2015
SonicWALL NEW UTM Appliance
SonicWALL NSA E8500 UTM Appliance
Featuring :
4 Gigabit/E + 4SFP Interfaces
8 GB Stateful Inspection throughput
2.2GB UTM throughput
34
CONFIDENTIAL All Rights Reserved
4/8/2015
NSA Series
NSA 5000
NSA 4500
NSA 3500
NSA 2400 MX
NSA 2400
NSA 240
SonicOS Version
Enhanced 5.8
Enhanced 5.8
Enhanced 5.8
Enhanced 5.8
Enhanced 5.8
Enhanced 5.8
Interfaces
6GE
6GE
6GE
16 GE
6GE
6GE
Stateful Firewall
Throughput
1.8 Gbps
2.75 Gbps
1.5 Gbps
775 Mbps
775 Mbps
600 Mbps
1.2 Gbps
600 Mbps
240 Mbps
150 Mbps
150 Mbps
110 Mbps
UTM GAV
Throughput
500 Mbps
690 Mbps
350 Mbps
160 Mbps
160 Mbps
115 Mbps
UTM IPS
Throughput
680 Mbps
1.4 Gbps
750 Mbps
275 Mbps
275 Mbps
195 Mbps
3DES / AES VPN
Performance
350 Mbps
1.0 Gbps
625 Mbps
300 Mbps
300 Mbps
150 Mbps
RAM
1GB
512 MB
512 MB
512 MB
512 MB
1GB
Future SonicOS
Future SonicOS
Future SonicOS
Future SonicOS
Future SonicOS
Future SonicOS
A/P w/Statesync
A/P w/Statesync
A/P w/Statesync
A/P w/Statesync
A/P w/Statesync
A/P w/Statesync
UTM Throughput
SSL-VPN
HA
35
SonicWALL CONFIDENTIAL All Rights Reserved
E-Series Solution Statistics
NSA E8500*
NSA E7500*
NSA E6500*
NSA E5500*
Unrestricted
Unrestricted
Unrestricted
Unrestricted
SonicOS Enhanced 5.8
SonicOS Enhanced 5.8
SonicOS Enhanced 5.8
SonicOS Enhanced 5.8
Multi-Core
16 Core
16 Core 600Mhz
16 Core 550Mhz
8 Core 550Mhz
Interfaces
(4) 10/100/1000 Copper
Gigabit Ports, (4) SFP
Ports, 1 Gbe HA port
(4) 10/100/1000 Copper
Gigabit Ports, (4) SFP Ports,
1 Gbe HA port
(8) 10/100/1000 Copper
Gigabit Ports, 1Gbe
HA port
(8) 10/100/1000 Copper
Gigabit Ports, 1Gbe HA
port
Stateful Firewall
Throughput
8 Gbps
5.6 Gbps
5 Gbps
3.9 Gbps
UTM Throughput
2.2 Gbps
1.7 Gbps
1.59 Gbps
850 Mbps
UTM GAV Throughput
2.25 Gbps
1.84 Gbps
1.69 Gbps
1.0 Gbps
UTM IPS Throughput
3.7 Gbps
2.58 Gbps
2.3 Gbps
2.0 Gbps
3DES/ AES VPN
Performance
4 Gbps
3 Gbps
2.7 Gbps
1.7 Gbps
Power Supplies
Dual Hot Swappable
Dual Hot Swappable
Single Power Supply
Single Power Supply
Cooling System
(Fans)
Dual Hot Swappable
Dual Hot Swappable
Dual Hot Swappable
Dual Hot Swappable
Visual Information
Display
Yes
Yes
Yes
Yes
Console Port
Yes
Yes
Yes
Yes
Yes (Future Use)
Yes (Future Use)
Yes (Future Use)
Yes (Future Use)
Node Count
SonicOS Version
Modular Expandability
* These are preliminary numbers subject to change // UTM, GAV, IPS tests performed using industry standard Spirent WebAvalance HTTP performance test
Next Generation Protection, Today
1.
The NSA and E-Class Series Integrates Security To Cover The Widest
Spectrum of Content-based, File-based & Application Layer Attacks
2.
The NSA and E-Class Series Is Designed to Increase Application
Visibility - Delivering Real-time & Latency Sensitive Applications/Traffic
For Future Proofed Investment
3.
The NSA and E-Class Series Is the Most Highly Performing & Scalable
Solution In Class
The Industry’s First Multi-core UTM Appliance delivering application visibility &
deep packet inspection without significantly impacting network throughput
SonicWALL CONFIDENTIAL All Rights Reserved
Competition
Better Protection & Performance
Solutions Are Not Created Equal
4500
4000
Performance (Mbps)
3500
3000
2500
2000
1500
1000
500
0
NSA
3500
NSA
4500
NSA
5000
FW Performance
ASA
5520
ASA
5510
FG
FG
300A 200A
w HD w HD
VPN Performance
FG
100A
IPS Performance
SSG- SSG- SSG UTM350M 320M 140M 1-450
GAV Performance
Deeper Inspection & Greater Performance
SonicWALL CONFIDENTIAL All Rights Reserved
*Competitive data obtained from vendor datasheet.
Better Protection & Performance
Solutions Are Not Created Equal
5000
4500
4000
Performance
(Mbps)
3500
3000
2500
2000
1500
1000
500
0
SonicWALL Juniper ISG
NSA E7500
2000
Firew all Performance
Fortinet
FortiGate
3000
Cisco ASA Checkpoint
5550
UTM-1 2050
VPN Performance
GAV Performance
Nokia IP
390
IPS Performance
Deeper Inspection & Greater Performance
General USP’s
 Total-protection – (GAV/IPS/Anti-Spyware) + AppF
 Connectivity Fail-Over (W/W – UMTS)
 Certified & Standards based – EAL4+
 Price/Quality!
 Distributed environments (many locations)
 10% extra discount for government / schools
 Secure Wireless Connectivity
 Filtering on internet use (Content Filtering)
 Offer support and licenses included
WHAT TO FIND – WHERE?
 3 main resources:
 www.sonicwall.com
 https://partnerlink.sonicwall.com/emea/
 www.mysonicwall.com