Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia Firewall and UTM Overview What is Firewall ? Refreshing Basic Concept.
Download ReportTranscript Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia Firewall and UTM Overview What is Firewall ? Refreshing Basic Concept.
Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia Firewall and UTM Overview What is Firewall ? Refreshing Basic Concept for a While…. A dedicated appliance, or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules What is UTM ? A term coined by Charles Kolodgy of International Data Corporation (IDC) in 2004 which is used to describe network firewalls that have many features in one box, including junk e-mail filtering, anti-virus capability, an intrusion detection (or prevention) system (IDS or IPS), and World Wide Web content filtering, along with the traditional activities of a firewall Today Challenges Inner Threats: Loop Connection, Rogue DHCP Server, IP/MAC Spoofing, Unauthorized Access, Overwhelming switch, Botnet, Worm, Trojan, DDOS, etc Wireless Guest Client Server Outer Threats: DDOS, Key logger, Zero Day Attack, Trojan, Virus, Worm, SPAM, etc Switch Router Applications DHCP Kiosk Mobile User Telecommuter Partner Thieves Hackers D-Link presenting : E2ES (End-to-End Security) Solution Joint Security Enterprise Network Gateway Security Endpoint Security D-Link E2ES Solution Presenting Features Gateway Security – – – – IPS Anti-Virus WCF Anti-Spam Endpoint Security – – – – Loopback Detection Safeguard Engine IMP Binding (IP-MAC-Port Binding) MAC Joint Security – – Microsoft NAP D-Link ZoneDefense IPS (Intrusion Prevention Systems) NetDefend IPS Service: Take control, turn the victim into zombie and flood the network Guest Powered by professional security vendor: Endeavor Security Comprehensive signature database, update frequency guaranteed Wireless Client Unpatched Server NetDefend IPS could block intrusion away!! xStack Switch Sell valuable information to competitors, damage company’s competence, Target the unpached reputation and business machine, launch attack NetDefend IPS NetDefend ERP / CRM Unpatched Database Take control, steal valuable information DHCP Hacker Applications Mobile User Hackers Telecommuter Malicious Web Site Thieves D-Link Confidential Anti-Virus (AV) NetDefend AV Service: User connects Malicious files to the Web site for downloaded, and downloading files user gets infected Wireless Powered by professional security vendor: Kaspersky No file size limitation in file transferring HTTP, FTP, SMTP and POP3 Guest Client Server NetDefend could Virus floods the AV whole network block virus away!! xStack Switch Hacker infects files and turns them into malicious ones NetDefend AV NetDefend ERP / CRM Mail Server DHCP Malicious Web Site Mobile User Applications Hackers Telecommuter Malicious FTP Site Thieves D-Link Confidential Web Content Filtering (WCF) NetDefend WCF Service: Powered by professional security Content Keeper visitslimited harmfulbandwidthvendor: User uses within company of configuring URL one by website non-business-relevant by curiosity Instead visiting websites, such one manually, simply select or accident like: chatting, finance, shopping, politics, sports, travel, stock trading specific and etc. categories Millions of also URL in database, real It not only against company policy but time update downgrade employee’s productivity Wireless Guest Client Infected Server NetDefend WCF could block any malicious/forbidden web access away!! xStack Switch NetDefend WCF NetDefend Applications Remediation DHCP Hacker Applications Mobile User Hackers Forbidden Website Malicious Website Thieves Hacker Worm Virus Malicious website could use ActiveX, JAVA Applet, XSS or other malicious code fragments to infect user Trojan Pornography Gambling Malicious Sport D-Link Confidential Web Content Filtering (WCF) D-Link categorizes millions of URLs into 32 groups, enables network administrators a flexible configuration to block unwanted website access simply via add and remove action D-Link Confidential D-Link ZoneDefense Self-Defense Network with Collaboration of Switch and Firewall The growth of network communication is business is increasing rapidly. It is a challenge for enterprise to protect the network from attacks and virus threats from hackers. Enterprise uses a single device to reject the network connection based on the access rules defined by the network administrator. However, this device does not detect illegal spreading of virus and worms within the network. D-Link ZoneDefense that raises the network security can resolve this issue. D-Link Confidential D-Link ZoneDefense Whenever there’s an infected user It will try to broadcast to all networks NetDefend D-Link ZoneDefense (Patent Pending) Server Farm xStack Switch Further, when Firewall detects virus/ worm activities, it will notify the access layer switches to block the suspected host to effectively stop the mutual infection or virus/ worm outbreak in time D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) What is VPN? A Virtual Private Network (VPN) is a private network connection that occurs through a public network. VPNs can be used to connect LANs together across the Internet or other public networks. With a VPN, the remote end appears to be connected to the network as if it were connected locally. VPN has attracted the attention of many organizations looking to both expand their networking capabilities and reduce their costs. D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) The Benefits of VPN Encryption : Cryptography provides the means to create VPNs across the Internet with no additional investments in connectivity. Cryptography is an umbrella expression covering 3 techniques and benefits: Confidentiality Authentication and Integrity Non-repudiation VPNs are normally only concerned with confidentiality and authentication. Non-repudiation is normally not handled at the network level but rather on a transaction (document-by-document) basis. D-Link Confidential Popular Application for Business : Virtual Private Network (VPN) A Typical Scenario of VPN Solutions Client Local Network Spoke Internet Road Warriors Branch Office 1 Hub Client Local Network Spoke Tunneling Protocol: • L2TP Branch Office 2 Local Network Head Office • PPTP • IPSec D-Link Confidential D-Link NetDefend Product Line Ideal for 600 users Enterprise Ideal for 300 users DFL-2500 / 2560* Medium Business Ideal for 150 users DFL-1600 / 1660* Small Business Ideal for 50 users DFL-800 / 860 Ideal for 30 users Branch Office DFL-210 / 260 SOHO Performance DFL-160(W)* 50 Mbps 80 Mbps 150 Mbps 320/400 Mbps 600/700 Mbps • In Development D-Link Confidential D-Link NetDefendOS Stemming from NetDefendOS Target SMB to Enterprise Markets Sufficient Security Features High Firewall and VPN Performance Hardware-based VPN Acceleration Unrestricted User Support Firewall Software Modified TCP/IP Stack Windows/Linux based OS Device handler Proprietary NetDefendOS Structure Interface Interface Interface Network Drivers Traditional Firewall Structure D-Link Confidential D-Link NetDefendOS Features : Integrated Functions • • • • • • • • • • • • • Support IPSec/ PPTP/ L2TP VPN Security Static DHCP assignment ZoneDefense for Joint Security Content Filtering/Intrusion Detection Layer 2 Transparent mode OSPF Dynamic Routing Protocol Support IGMP v1/ v2/ v3 Web-based User Authentication Instant Message/P2P Blocking SIP ALG Anti-Spam (FREE) Anti-Virus3 Web-Content Filtering3 Content Filtering Fault Tolerance • Route Fail-Over • Active/Passive Modes for High Availability¹ Bandwidth Management and Routing • • • • • 802.1p QoS, Map IP DSCP (ToS) Traffic Load Sharing Outbound Traffic Load Balancing² Policy-Based Routing Server Load Balancing • URL/E-Mail Filtering • Java Script/Active X/Cookie Filtering • IM/P2P Program Filtering ¹Only available in DFL-1600/2500 ²Firmware upgraded feature. 3UTM only D-Link Confidential Question ?? D-Link Confidential Thanks !! D-Link Confidential