Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia Firewall and UTM Overview What is Firewall ? Refreshing Basic Concept.

Download Report

Transcript Business Solution Seminar 2008 NetDefend : Security Defined by D-Link October – November 2008 D-Link Indonesia Firewall and UTM Overview What is Firewall ? Refreshing Basic Concept.

Business Solution Seminar 2008
NetDefend : Security Defined by D-Link
October – November 2008
D-Link Indonesia
Firewall and UTM Overview
What is Firewall ?
Refreshing
Basic Concept for a While….
A dedicated appliance, or software running on another
computer, which inspects network traffic passing through
it, and denies or permits passage based on a set of rules
What is UTM ?
A term coined by Charles Kolodgy of International Data
Corporation (IDC) in 2004 which is used to describe
network firewalls that have many features in one box,
including junk e-mail filtering, anti-virus capability, an
intrusion detection (or prevention) system (IDS or IPS),
and World Wide Web content filtering, along with the
traditional activities of a firewall
Today Challenges
Inner Threats:
Loop Connection,
Rogue DHCP Server, IP/MAC
Spoofing, Unauthorized
Access,
Overwhelming switch,
Botnet, Worm, Trojan, DDOS,
etc
Wireless
Guest
Client
Server
Outer Threats:
DDOS, Key logger,
Zero Day Attack,
Trojan, Virus, Worm,
SPAM, etc
Switch
Router
Applications
DHCP
Kiosk
Mobile User
Telecommuter
Partner
Thieves
Hackers
D-Link presenting :
E2ES (End-to-End Security) Solution
 Joint Security
Enterprise Network
 Gateway Security
 Endpoint Security
D-Link E2ES Solution
Presenting Features
Gateway Security
–
–
–
–
IPS
Anti-Virus
WCF
Anti-Spam
Endpoint Security
–
–
–
–
Loopback Detection
Safeguard Engine
IMP Binding (IP-MAC-Port Binding)
MAC
Joint Security
–
–
Microsoft NAP
D-Link ZoneDefense
IPS (Intrusion Prevention Systems)
NetDefend IPS Service:
Take control, turn the
victim into zombie and
flood the network Guest

Powered by professional
security vendor: Endeavor
Security
Comprehensive signature
database, update frequency
guaranteed
Wireless

Client
Unpatched
Server
NetDefend IPS could
block intrusion away!!
xStack Switch
Sell valuable information
to competitors, damage
company’s
competence,
Target the unpached
reputation
and business
machine, launch
attack
NetDefend IPS
NetDefend
ERP / CRM
Unpatched
Database
Take control, steal
valuable information
DHCP
Hacker
Applications
Mobile User
Hackers
Telecommuter
Malicious
Web Site
Thieves
D-Link Confidential
Anti-Virus (AV)
NetDefend AV Service:

User
connects
Malicious
files to
the
Web site for
downloaded,
and
downloading
files
user gets infected
Wireless
Powered by professional
security vendor: Kaspersky
No file size limitation in file
transferring
HTTP, FTP, SMTP and POP3

Guest

Client
Server
NetDefend
could
Virus floods
the AV
whole
network
block virus away!!
xStack Switch
Hacker infects files
and turns them into
malicious ones
NetDefend AV
NetDefend
ERP / CRM
Mail Server
DHCP
Malicious
Web Site
Mobile User
Applications
Hackers
Telecommuter
Malicious
FTP Site
Thieves
D-Link Confidential
Web Content Filtering (WCF)
NetDefend WCF Service:

Powered by professional security
Content Keeper
visitslimited
harmfulbandwidthvendor:
User uses
within company
of configuring
URL one by
website non-business-relevant
by curiosity  Instead
visiting
websites,
such
one
manually,
simply
select
or accident
like:
chatting, finance, shopping, politics,
sports, travel, stock trading specific
and etc. categories

Millions
of also
URL in database, real
It not only against company policy but
time
update
downgrade employee’s productivity
Wireless
Guest
Client
Infected
Server
NetDefend WCF could block
any malicious/forbidden web
access away!!
xStack Switch
NetDefend WCF
NetDefend
Applications
Remediation
DHCP
Hacker
Applications
Mobile User
Hackers
Forbidden
Website
Malicious
Website
Thieves
Hacker
Worm
Virus
Malicious website could use
ActiveX, JAVA Applet, XSS or
other malicious code fragments
to infect
user
Trojan Pornography Gambling
Malicious
Sport
D-Link Confidential
Web Content Filtering (WCF)
D-Link categorizes millions of URLs into 32 groups, enables network
administrators a flexible configuration to block unwanted website access
simply via add and remove action
D-Link Confidential
D-Link ZoneDefense
Self-Defense Network with Collaboration of Switch and Firewall
The growth of network communication is business is increasing rapidly. It
is a challenge for enterprise to protect the network from attacks and virus
threats from hackers.
Enterprise uses a single device to reject the network connection based on
the access rules defined by the network administrator.
However, this device does not detect illegal spreading of virus and worms
within the network.
D-Link ZoneDefense that raises the network security can resolve this issue.
D-Link Confidential
D-Link ZoneDefense


Whenever there’s an infected user
It will try to broadcast to all networks
NetDefend
D-Link ZoneDefense
(Patent Pending)
Server Farm
xStack Switch

Further, when Firewall detects virus/ worm activities, it will
notify the access layer switches to block the suspected host
to effectively stop the mutual infection or virus/ worm
outbreak in time
D-Link Confidential
Popular Application for Business :
Virtual Private Network (VPN)
What is VPN?
A Virtual Private Network (VPN) is a private network
connection that occurs through a public network.
VPNs can be used to connect LANs together across the
Internet or other public networks. With a VPN, the remote end
appears to be connected to the network as if it were
connected locally.
VPN has attracted the attention of many organizations
looking to both expand their networking capabilities and
reduce their costs.
D-Link Confidential
Popular Application for Business :
Virtual Private Network (VPN)
The Benefits of VPN Encryption :
Cryptography provides the means to create VPNs across the Internet
with no additional investments in connectivity. Cryptography is an
umbrella expression covering 3 techniques and benefits:
Confidentiality
Authentication and Integrity
Non-repudiation
VPNs are normally only concerned with confidentiality and
authentication. Non-repudiation is normally not handled at the network
level but rather on a transaction (document-by-document) basis.
D-Link Confidential
Popular Application for Business :
Virtual Private Network (VPN)
A Typical Scenario of VPN Solutions
Client
Local Network
Spoke
Internet
Road Warriors
Branch Office 1
Hub
Client
Local Network
Spoke
Tunneling Protocol:
• L2TP
Branch Office 2
Local Network
Head Office
• PPTP
• IPSec
D-Link Confidential
D-Link NetDefend Product Line
Ideal for 600 users
Enterprise
Ideal for 300 users
DFL-2500 / 2560*
Medium
Business
Ideal for 150 users
DFL-1600 / 1660*
Small
Business
Ideal for 50 users
DFL-800 / 860
Ideal for
30 users
Branch
Office
DFL-210 / 260
SOHO
Performance
DFL-160(W)*
50 Mbps
80 Mbps
150 Mbps
320/400 Mbps
600/700 Mbps
• In Development
D-Link Confidential
D-Link NetDefendOS
Stemming from NetDefendOS
 Target SMB to Enterprise Markets
 Sufficient Security Features
 High Firewall and VPN Performance
 Hardware-based VPN Acceleration
 Unrestricted User Support
Firewall Software
Modified TCP/IP Stack
Windows/Linux
based OS
Device handler
Proprietary NetDefendOS Structure
Interface
Interface
Interface
Network Drivers
Traditional Firewall Structure
D-Link Confidential
D-Link NetDefendOS
Features :
Integrated Functions
•
•
•
•
•
•
•
•
•
•
•
•
•
Support IPSec/ PPTP/ L2TP VPN Security
Static DHCP assignment
ZoneDefense for Joint Security
Content Filtering/Intrusion Detection
Layer 2 Transparent mode
OSPF Dynamic Routing Protocol
Support IGMP v1/ v2/ v3
Web-based User Authentication
Instant Message/P2P Blocking
SIP ALG
Anti-Spam (FREE)
Anti-Virus3
Web-Content Filtering3
Content Filtering
Fault Tolerance
• Route Fail-Over
• Active/Passive Modes for
High Availability¹
Bandwidth Management and
Routing
•
•
•
•
•
802.1p QoS, Map IP DSCP (ToS)
Traffic Load Sharing
Outbound Traffic Load Balancing²
Policy-Based Routing
Server Load Balancing
• URL/E-Mail Filtering
• Java Script/Active X/Cookie Filtering
• IM/P2P Program Filtering
¹Only available in DFL-1600/2500
²Firmware upgraded feature.
3UTM only
D-Link Confidential
Question ??
D-Link Confidential
Thanks !!
D-Link Confidential