Westcon / Juniper 5

Download Report

Transcript Westcon / Juniper 5

Junos Rising
Westcon / Juniper 5-daagse
Pieter van Dijk
MAJOR MARKET TRENDS…
DATA MOBILITY AND SCALE AT AN ALL TIME HIGH, AND GROWING
Cloud Computing
Mobile Internet
Explosive Growth
Explosion of data, users, and
devices.
Total Spend on
Public Cloud Services:
Smartphones Have
Surpassed PCs –
as the Mobile Experience
Usurps the Desktop Model
120
Million
$59
Billion
$148
Billion
90
60
30
2009
PCs
2014
Smartphones
2009
2
2010
Copyright © 2009 Juniper Networks, Inc.
Source: Gartner
www.juniper.net
Source: IDC
2011
2016
SECURITY IS IMPACTED BY TWO TRENDS
Industry Trends
Compliance
Requirements
Business
Workforce Behavior
IT Infrastructure
Business Drivers
Security Trends
Attacker Behavior
3
Company Confidential
Evolving Threat Vectors
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
New Attack Targets
SECURITY MARKET TREND – EVOLVING THREATS
Notoriety
Profitability
.gov /.com
.me / .you
Threats
Sophistication
(Maturity)
Attacker
Type of Attack
APT
Botnets
Malware
DOS
Trojans
Virus
Worms
New Devices
New Applications
Internet Information Services
Target
ERP
4
Company Confidential
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
ADDRESSING THE EVOLVING THREAT LANDSCAPE
Customer Priorities
Visibility into Web 2.0 Threats
Control of Application Usage
Rapid Response to New
Threats
Scalable Policy Enforcement &
Management
Juniper Security Solutions
AppSecure Software
SRX
6
Company Confidential
Copyright © 2009 Juniper Networks, Inc.
Security Research Teams
www.juniper.net
VISIBILITY
Comprehensive Application
Visibility and Control
Global High Performance Network
Branch
What User
User Location
Campus
Mobile Clients
7
Company Confidential
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Data Center
WhatSource
Application
to
Destination
User Device
APPSECURE: AN IMPORTANT COMPONENT
TO A LAYERED SECURITY APPROACH
Processing
Intensity & Cost
Inspection Depth
ACLs & Stateless
Firewall
• Decisions made based
on packet header info
such as Source and
Destination addresses
• Very fast
8
Company Confidential
Stateful
Firewall
Application
Security
Intrusion
Prevention
• More context incorporated • Looks at every bit for
into decision process
threats—thorough but
• Better at identifying
intensive processing
unauthorized or forged
• Best used sparingly
communications
• Still fast
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
BUILDING INTELLIGENT SECURITY
Introducing AppSecure
Suite of application based services designed for deploying security in
a knowledgeable manner
 Builds on existing SRX integrated services to deliver finer-grain policies
 Leverages integrated application intelligence
9
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
ADDRESSING THE NGFW MARKET WITH APPSECURE
Security at Scale for 800+ Applications
AppTrack
Visibility
AppFW
Enforcement
AppQoS
Control
AppSecure
Identity Management with
Application Access control
10
Company Confidential
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
AppDoS
Protection
APPTRACK VISIBILITY FOR
INFORMED RISK ANALYSIS
AppTrack
Monitor & Track Applications
AppTrack
View application by protocol, Web
application, and utilization
Analyze usage and trends
Web 2.0 application visibility
Customize application monitoring
App usage monitoring
Scalable, flexible logging &
reporting
11
Copyright © 2010 Juniper Networks, Inc.
Log and report across security
solutions and systems
www.juniper.net
APPTRACK MAKES APPLICATION VISIBILITY AND
CONTROL AS EASY AS 1-2-3
1
Traffic analyzed
by AppTrack as it
traverses the SRX
3
1
DC
Firewall(s)
2
2
STRM or
3rd Party
SIEM
STRM
Reports
Server
Farms
12
Operations Center
Data Center
DC
Switching
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
SRX sends
application logs
to a SIEM/Log
collector
3
SIEM reports
analyzed by IT
staff
APPTRACK DRIVES FIREWALL, QOS, DDOS, IDP
POLICY
Flow
Processing
AppTrack
AppFW
Permit or deny
based on user
and application
13
AppQoS
Adjust QOS
based on user
and application
AppDoS
IPS
App Based
DOS detection
Require further
traffic inspection
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
APPFW: BEYOND JUST FW OR APP CONTROL
AppFW
Control & Enforce Web 2.0 Apps
AppFW
Inspect ports and protocols
Uncover tunneled apps
HTTP
Stop multiple threat types
Dynamic application security
Control nested apps, chat, file
sharing and other Web 2.0 activities
Web 2.0 policy enforcement
Threat detection & prevention
14
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
APPFW – 3 DIMENSIONAL SECURITY POLICES
• Easily restrict application access to necessary users
• Reduce the spread of confidential information
• Stop high-risk and unwanted applications
DC
Firewall(s)
AppTrack
Traditiona
l Firewall
Policy
User and
Group
Awareness
Application
Awareness
User Store
(special UAC)
15
Match Criteria
Rule Source
Dest
Dynamic#
Zone
Zone Source IP User/Role Dest IP
Application
1 Zone-1
Zone-2 1.1.1.0
Amy
Any
Facebook
2 Zone-1
Zone-2 1.1.2.0
Finance Any
LinkedIn
3 Zone-1
Zone-2 any
any
Any
none
kazza,,Yahoo IM,
4 Zone-1
Zone-2 any
any
Any
Facebook
Then
Action
Permit
Permit
permit
Service Options
None Log
None Log
none
Log
Deny
none
DC
Switching
Log
Data Center
Operations Center
STRM
Copyright © 2010 Juniper Networks, Inc.
Server
Farms
www.juniper.net
APPQOS FOR SCALE & PERFORMANCE
AppQoS
Prioritize & Control App Bandwidth
AppQoS
Monitor Web 2.0 bandwidth
consumption
X
Throttle bit rates based on security
and usage insights
Dynamic application
quality-of-service (QoS)
Application prioritization
Performance management
16
Copyright © 2010 Juniper Networks, Inc.
Prioritize business critical apps
www.juniper.net
APPQOS – BANDWIDTH MANAGEMENT FOR BUSINESSES
Prioritize traffic based on application type
Limit the amount of bandwidth an application can consume
Mark the DSCP values for proper QoS treatment
Leverage Junos Class-of-Service feature set to fully control
application handling at the interface queue level
Give highest priority to
financial applications for
finance and sales
Approved applications
receive normal priority
AppTrack
Traditional
Firewall Policy
17
User and Group
Awareness
Application
Awareness
Copyright © 2010 Juniper Networks, Inc.
Lower priority for
multimedia applications,
except for the MM content
group
www.juniper.net
BOTNET & DOS THREAT MITIGATION
AppDoS
Protect Valuable On-line Business
AppDoS
Detect and mitigate botnet activity
Uncover misuse of routine Web
functionality
Purchase Item
Check bill
Select Item
View Item
Botnet detection & remediation
DoS monitoring & remediation
Adapt security policy and QOS
based on insights
Benchmark “normal” behavior to
detect anomalies
On-going anomaly detection
18
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
DDOS ATTACK EVOLUTION
Traditional DDoS Attacks
Saturation DDoS Attack
 Bandwidth saturation causing service
outages
 Synflood, packet floods
ack req ack req ack req
ack req ack req ack req
ack req ack req ack req
 Detectable – statistical/behavioral
 Effective containment
Now: stateful/meaningful
 Mimic legitimate traffic and
Stateful DDoS Attack
transactions
 Applications process legitimate
requests that are intended to disrupt
or overload service
 Can’t distinguish bad traffic/requests
from good
19
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
place in cart . . .
place in cart . . .
place in cart . . .
place in cart . . .
place in cart . . .
place in cart . . .
APPLICATION DDOS PROTECTION
Introducing Application Denial of Service AppDoS
Identifies attacking botnet traffic vs. legitimate clients based on
application layer metrics and remediates against botnet traffic
Employs multi-stage approach from server connection monitoring,
deep protocol analysis to bot-client classification.
 Server connection monitoring
 Protocol analysis
 Bot-client classification
Available on the SRX5000 and SRX3000 Series Gateways
20
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
WITHOUT ADDOS POLICY
GOOD TRAFFIC (1000CPS) + ADDOS TRAFFIC (4000CPS) = 5000CPS
Server
Threashold
4500CPS
DDoS,
degraged
performance
21
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
WITH APPDDOS POLICY ACTIVATED: BAD TRAFFIC IS BLOCKED, ONLY
GOOD TRAFFIC IS ALLOWED THROUGH (1000CPS)
Server
Threashold
4500CPS
AppDDoS,
Mitigated
22
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
IPS FOR CUSTOMIZABLE PROTECTION
Monitor & Mitigate Custom Attacks
IPS
AppSecure IPS
Detect and monitor suspicious
behavior
VULNERABILITY
Tune open signatures to detect and
mitigate tailored attacks
Exploits
Other
IPS’s
On-going threat protection
Mobile traffic monitoring
Custom attack mitigation
23
IPS
Copyright © 2010 Juniper Networks, Inc.
Uncover attacks exploiting encrypted
methods
Address vulnerabilities instead of
ever-changing exploits of the
vulnerability
www.juniper.net
FULL IDP CAPABILITIES
IPS




24
Full featured detection
Constant inspection
Decoder based updates
Geared for evasive application
detection
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
APPSECURE SERVICE MODULES
Flow
Processing
Ingress
AI
NAI
Egress
Application Identification Engine
Application
ID Results
IPS
AppTrack
AppDoS
AppFW
AppQoS
25
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
THE JUNIPER APPSECURE DIFFERENCE
SCALABLE
Performance up to 100G
Log storage up to 1.3TB
Advanced HA
COMPREHENSIVE
Traditional & Web 2.0
security
Adds botnet & DoS
detection
QOS & IPS
FLEXIBILE
Open attack signatures
Scriptable CLI
Modular hardware
Runs on SRX & Junos
Extensible FRU design
26
Mobile & fixed user
protection
Copyright © 2010 Juniper Networks, Inc.
www.juniper.net
Compatible Syslog format
JUNOS SPACE APPSECURE DEMO
27
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
SRX Branch and High End Platform update
28
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Branch SRX
29
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Branch SRX
30
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
SRX FEATURES MATRIX
Security






Wireless LAN and 3G
WAN
Firewall
VPN
IDP
Antivirus
Web filtering
Antispam
 802.11n
 3G/4G
Routing & Switching
 RIP, OSPF, BGP,
Multicast, IPv6
 MPLS; Full BGP table
 J Flow, RPM
 L2 Switching
 POE Options
31
Company Confidential
Physical Interfaces




Copyright © 2009 Juniper Networks, Inc.
T1/E1, Serial, DS3/E3
VDSL, ADSL, G.SHDSL
DOCSIS Cable Modem
Ethernet 10/100/1000
& 10G, Copper or Fiber
www.juniper.net
32
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Dynamic Services Architecture ™
Separate I/O and Services
Dedicated Control Plane
Plug-and-Play Modules
Dedicated Control Plane
Carrier-class Reliability
AppQoS
Firewall
VPN
AppTrack
IDP
ALG
LSYS
AppFW
More
I/O Cards
33
Screens
LLF
QoS
D/DoS
SYN Prot
Others?
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Terabit Fabric
Services Cards
Integrated Terabit Fabric
SECURITY FOUNDATION WITH SRX
120 Gbps
 Portfolio covers wide range
of customer requirements
 Integrated services gateway offering
up to 120 Gbps FW, 100Gbps
AppFW and 30 Gbps IPS
High End SRX
SRX5800
SRX5600
SRX3600
Branch SRX
SRX3400
10 Gbps
SRX650
SRX240
SRX210
SRX1400
SRX220
SRX100
Telecommuter
Small Office
34
Company Confidential
Small/Medium
Branch
Large Branch
Regional Office
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Large Enterprise
Service Provider
THE JUNOS PORTFOLIO
Junos Space
Junos Pulse
T Series
EX8216
MX Series
EX8208
SRX5000 Line
SRX1400
SRX3000 Line
EX4500 Line
SRX650
M Series
SRX100
J Series
EX3200 Line
LN1000
SRX210
10.2
10.3
core
One OS
35
Company Confidential
One Release Track
Copyright © 2009 Juniper Networks, Inc.
EX2200 Line
10.4
Frequent Releases
branch
EX4200 Line
www.juniper.net
Module
x
–API–
SRX240
SRX220
One Architecture
HIGH AVAILABILITY
36
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
CARRIER-GRADE AVAILABILITY
In Service Software Upgrade
 Perform software upgrade while SRX cluster is



in production
Typical traffic loss times ~1sec*
Single command triggered upgrade not
requiring manual intervention
ISSU is supported in HA cluster mode only
Cluster Mode




Active/Active and Active/Passive support
Multi-Datacenter compatible
Fully Stateful – sessions persist across failover
Robust system health criteria


37
Company Confidential
Hardware/Software/Control Link/IP Tracking
Graceful Restart support for routing protocols
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
WHY HIGH AVAILABILITY?
All High End SRX Deployments Use HA
 Continuity of Services
 Provide Availability through redundancy
 Avoids single point of failure
How the SRX provides HA
 Utilizing JUNOS Services redundancy Protocol, JSRP (similar to NSRP in
screen OS)
 Control and data plane redundancy
 Single system View- Same config on both nodes
 Stateful traffic failovers with routing, firewall, NAT, VPN, and security services
Flexible Deployment Scenarios
 Basic/full mesh Active Passive
 Various Active/Active scenarios
 Asymmetric support
38
Company Confidential
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
SRX HA CONCEPT
JUNOS






New
Development
 Distributed
Parallel packet
Processing
 Control
port
redundancy
39
Routing
Graceful Restart
NSR
Flexibility in
Interfaces
Asymmetric Routing
Configuration Sync.
ScreenOS





RTO Sync
Stateful Failover
NSRP State
Machine
Keep-alive
Mechanism
IP Tracking
JSRP Model

JSRPD


Redundant
Interfaces




Control and

Fabric link
infrastructure
Copyright © 2009 Juniper Networks, Inc.

Routing
GRES

Graceful Restart

NSR (future)

Asymmetric Routing
Flexibility in

Interfaces
RTO
Synchronization
Stateful Failover
NSRP State
Machine
Keep-alive
Mechanism
IP Tracking
www.juniper.net
39
HIGH AVAILABILITY CHARACTERISTICS OVERVIEW
Redundancy
 Control Plane
 Active-passive
 Data Plane
 Active-passive
 Active-Active
Stateful Session Failover
 NAT
 ALG
Synchronization
 IPSec
 Authentication
 Configuration
 Session State
40
Company Confidential
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
HIGH AVAILABILITY REDUNDANCY
Solution Architecture
GRES provides nonstop failover
NODE 1
NODE 0
Control
Plane
Daemons
RE ACTIVE
Node 0
Forwarding
Daemon
PFE ACTIVE
41
Company Confidential
Control
fxp1 fxp1 Plane
CONTROL Daemons
RE BACKUP
LINK
Node 1
fab0 fab1
DATALINK
 Single device abstraction
 Clean separation of control and
forwarding planes
 Unified configuration with
configuration sync
 Maximum of 2 devices
 Devices must be of the same
Hardware Model
Forwarding
Daemon
Control Plane
Data Plane + RTOs
Flowd
PFE BACKUP
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
TWO CHASSIS CONNECTED TOGETHER
node1
(secondary)
node0
(primary)
Control Plane
Connection
SPC-to-SPC
RE 0
RE 1
Data Plane
Connection
IOC to IOC
42
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
CLUSTER CONNECTIONS
Platform
Fxp0 (mgmt)
Fxp1 (HA control)
Fabric (Must be
configured)
J-Series
ge-0/0/2
ge-0/0/3
Any available GE interface
SRX 100/210
fe-0/0/6
fe-0/0/7
Any available FE or GE
Interface
SRX 220
ge-0/0/6
ge-0/0/7
Any available GE interface
SRX 240/650
ge-0/0/0
ge-0/0/1
Any available GE Interface
SRX 1400
onboard RE
ge-0/0/10 and/or ge0/0/11
Any available GE or XE
Interface
SRX 3400/3600
onboard RE
Built-in front-panel RE Any available GE or XE
ports
Interface
SRX 5600/5800
onboard RE
SPC control port
(must be configured)
43
Company Confidential
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Any Available GE or XE
Interface. Must be Fiber
VIRTUALIZATION
44
Copyright © 2011 Juniper Networks, Inc.
www.juniper.net
VIRTUALIZATION CHALLENGES
Physical Network
Hidden Traffic
Complexity
Dynamic Applications
V-Motion
=
•
•
•
One server is
one server
Firewall can
see all traffic
Applications
don’t move
much
45
•
Traffic on the
same
hypervisor isn’t
sent to the
physical
firewall
•
One physical
server
represents
many virtual
ones
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
•
As applications move,
how does the physical
security follow?
46
Copyright © 2011 Juniper Networks, Inc.
www.juniper.net
VGW MODULES
Main
Firewall
Dashboard view of
virtual data center
Firewall policy
and logs
Network
Traffic flows
AntiVirus
AV protection w/
quarantine
IDS
View of IDS alerts
Complian
ceVM/host
Alerts on
non-compliance
Introspect
ion
VM “x-ray”
(OS, apps, etc.)
47
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
Reports
Granular reports
and scheduler
THE VGW PURPOSE-BUILT APPROACH
Service Provider & Enterprise Grade
 Three-tiered Model
1
 VMware Certified
 Protects each VM and the hypervisor
Virtual
Center
2
Security
Design
for vGW
VM
 Fault-tolerant architecture (i.e., HA)
VM1
VM2
VM3
ESX or ESXi Host
Virtualization-aware
 “Secure VMotion” scales to
3
Packet Data
THE vGW ENGINE
VMWARE API’s
Any vSwitch
(Standard, DVS, 3rd Party)
Granular, Tiered Defense
 Stateful firewall, integrated IDS,
HYPERVISOR
and AV
 Flexible Policy Enforcement
48
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
VMware Kernel
1,000+ hosts
 “Auto Secure” detects/protects
new VMs
Partner Server
(IDS, SIM,
Syslog, Netflow)
PERFORMANCE & SCALABILITY
49
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net
VGW <-> SRX SERIES INTEGRATION
SRX Firewall Zones
Integration
 Imports zone configuration
from SRX Series into vGW
 Use imported zones as a
template for vGW security
Benefits
 Guarantee integrity of
Zones on hypervisor
 Automate and verify no
“policy violation” of VMs
 Empower SRX Series with
VM awareness
50
Copyright © 2009 Juniper Networks, Inc.
www.juniper.net