Internet

Transcription

Internet
WatchGuard Technologies, Inc.
Fireware XTM
Updated for Fireware XTM 11.6
XTM Portfolio
ƒ
XTM 2050
CPU : Dual 2.4 GHz 6-Core Xeons
M
Memory
(SDRAM/Fl
(SDRAM/Flash)
h) :
12Gb/2Gb
Fireware XTM runs on
all XTM devices
XTM 1050
CPU : Dual 2.33 GHz Quad Core Xeons
Memory (SDRAM/Flash) : 4Gb/1Gb
8 Series
CPU : 2.66
2 66 GHz Quad Core
Memory (SDRAM/Flash) : 2Gb/1Gb
5 Series
CPU : 2 GHz Single Core
Memory (SDRAM/Flash) : 1GB/1GB
3 Series: XTM 330
CPU : 1 GHz Single Core
Memory (SDRAM/Flash) : 1 GB/512 MB
CPU : Power Architecture Dual Core
Memory (SDRAM/Flash) : 1GB/512
MB
2 Series : XTM 21/22/23
2 Series: XTM 25/26
CPU : 667 MHz Single Core
Memory (SDRAM/Flash) : 256MB/256MB
CPU : Power Architecture Single Core
Memory (SDRAM/Flash) : 512MB/256MB
XTMv
Small / Medium / Large / DataCenter Editions
2
3 Series: XTM 33
WatchGuard System Manager
3
ƒ
WatchGuard System Manager
(WSM) is a suite of management
tools for XTM appliances
ƒ
WSM provides client software for
monitoring and configuration
ƒ
Policy Manager (configuration)
ƒ
Firebox System Manager
(monitoring)
ƒ
HostWatch (advanced
(
Monitoring)
ƒ
Log and Report Manager
((advanced monitoring)
g)
WSM — WatchGuard Server Center
ƒ
4
You can also install and
WatchGuard servers
and configure them
from the WatchGuard
Server Center
ƒ
Management
Server
ƒ
Log Server
ƒ
Report Server
ƒ
Quarantine Server
ƒ
WebBlocker Server
Web Management
ƒ
5
Any XTM device can also be managed through the
Fireware XTM Web UI
Command Line Interface (CLI)
6
ƒ
Most configuration and monitoring options are also
available from the command line using SSH client
(port 4118)
ƒ
Di t access tto th
Direct
the d
device
i without
ith t software
ft
ƒ
Scriptable
ƒ
TCPDUMP
Localization
ƒ
7
Management user interfaces and Help systems are
regularly translated into:
ƒ
French (France)
ƒ
Japanese
ƒ
Latin American Spanish (es-419)
ƒ
Si lifi d Chinese
Simplified
Chi
(PRC)
ƒ
Traditional Chinese (Web UI only)
ƒ
Korean (Web UI only)
ƒ
Data input fields accept ASCII characters only
ƒ
Log messages remain in English
Security
y Policies
8
Policy Manager
9
ƒ
Policy Manager is an
offline.xml editing tool
ƒ
You can work on a
configuration
fi
ti without
ith t
being connected to a
device
ƒ
Easy configuration
archiving
Policy Auto-Ordering
10
ƒ
In Auto-Ordering
Auto Ordering mode
mode, Fireware XTM applies an algorithm to
determine where in the policy list the new policy is inserted
ƒ
Speeds up configuration
ƒ
Policy Manager is responsible for maintaining the consistency of the
security policy, without human errors
ƒ
Easier to maintain when there are several administrators (no need to
check what has been done previously to add a new policy)
ƒ
Easier to support
Manual Policy Ordering
11
ƒ
When you disable Auto
Auto-Ordering
Ordering Mode
Mode, you can move the policy
where you want
ƒ
Adds flexibility for tricky configurations
“From–To”
12
ƒ
Policy matching is simply the result
of matching the “From” and “To”
fields from the IP packet
ƒ
A single tab per policy to specify its
source and destination
ƒ
Source and destination can be
associated to multiple physical
interfaces so the total number of
policies remains as low as possible
ƒ
Any-Trusted
A
T t d for
f example
l means
any physical interface configured
as “trusted”. There can be multiple
trusted interfaces.
interfaces
Allow or Deny Policies
13
ƒ
In the Policy tab
tab, the policy
can be Allowed, Denied, or
Denied (send reset)
ƒ
A Denied policy drops the
traffic
ƒ
A Denied (send reset) policy
drops the traffic and closes
the TCP connection
Denied Policy
14
ƒ
Denied policies can be fully
configured by defining the From and
To addresses
ƒ
You can allow some traffic for the
majority and deny it for specific users
much more easily
ƒ
In this example,
example all the users can
access the web, except 10.0.0.100
Policy Logging
15
ƒ
A policy either denies or allows
traffic, so packets appear as
either denied packets or
allowed p
packets in the log
g file.
ƒ
Log messages can also be
activated in a proxy action
applied to a policy to create
log messages
for reports.
These detailed
transaction log
messages are
available in
proxy policies
li i
and ALGs.
Policy Scheduling
16
ƒ
You can apply a schedule to
any policy.
ƒ
For example, you can
configure
fi
a security
it policy
li th
thatt
allows incoming FTP
connections only on Monday
from 8 AM to 10 AM
AM.
Policy Debugging
ƒ
17
You can disable a policy
for troubleshooting
purposes, but keep the
policy
p
y in yyour
configuration in case you
want to activate it again
later.
Transparent Proxies
IIntelligent
t lli
t Layered
L
dS
Security
it
Architecture
18
Traditional Security
ƒ
High cost and complexity
complexity, limited protection and performance
Normal Traffic
Security Threat
19
Firewall/VPN
Intrusion detection/
intrusion prevention
Authentication
Spam solution
Antivirus
Intelligent Layered Security (ILS)
ƒ
Lower cost
cost, higher performance
performance, better protection
Intelligent Layered Security engine
Normal Traffic
Security Threat
20
Content security
Application security
Stateful firewall
VPN
Data integrity
E t
External
l security
it services
i
ILS — Behavioral Analysis and Shunning
Intelligent Layered Security engine
DETECT
SHUN
21
ƒ
Detects IP and Port Scanning
ƒ
Remembers attackers
ƒ
Shuns known scanners and
attackers
tt k
(low
(l
processing
i cost)
t)
Exploit Lifecycle
ƒ
ILS proactively blocks many threats
threats, such as spyware and
viruses
ƒ
Gateway AV and IPS protect affected systems
Vulnerability
found and
exposed
Hacker
builds attack
t leverage
to
l
vulnerability
Attack is
l
launched
h d
ILS
provides
zero-day
protection
22
Vendor
builds
patch
Attack
signature
developed
and
distributed
Vendor
distributes
patch
IT admin
queues patch
update
d t based
b
d
on severity
IT admin
installs
patch
WatchGuard Application Proxy
ƒ
ƒ
Unlike simple and stateful packet-filters,
packet filters
which inspect but do not alter packets,
a proxying firewall acts as an
intermediary in all transactions that
traverse it.
Diff
Different
t proxy ffor each
h application:
li ti
ƒ
SMTP, POP3, HTTP, FTP, DNS…
“The original value proposition of a proxy firewall is that the proxy is essentially a
security-oriented reference implementation of the application protocol “
Marcus Ranum
23
Protocol Anomaly Detection
24
ƒ
The WatchGuard application proxies closely examine
data streams, including packet headers and the data
payload, for anomalies and errors.
ƒ
Any suspicious
A
i i
iinformation
f
ti iis di
discarded.
d d Thi
This prevents
t
many forms of attack (for example, buffer overflows).
ƒ
In addition, the firewall performs:
ƒ
Packet Handling — Prevents packets from entering
the network until they are reassembled and examined.
ƒ
Packet Reassembly — Reassembles packet
fragments to prevent fragment overlap attacks such as
Teardrop and other Layer 3 protocol anomaly based
attacks.
attacks
Example of Fragmentation Attack —
TearDrop
p
1 – Source sends a
fragmented packet
packet,
e.g. 2 parts of a
packet
2 – The offset is false in
order
d to make
k the
h fragments
f
overlap
Internet
Source
IP Header
Data 2
IP Header
Private Network
Data 1
3 – Destination Server
reassembles the frame using
the two fragmented parts but
the result is not correct.
Many TCP/IP stacks then
crash or freeze
25
IP Header
Data 1
IP Header
Data 2
Destinatio
n Server
IP Header
Data 1 Data 2
Packet Reassembly by an XTM Device
There are two ways a firewall can reassemble a packet:
ƒ
In a virtual pipe, without really modifying the packet
ƒ
ƒ
Easier because the packet is not modified; it’s just a memory
calculation
l l ti
Reassemble the packet and then refragment it (what WatchGuard
does!)
ƒ
Can prevent sequence attacks in fragmentation by normalizing the
fragmented packet size and fields
IP Header
Data 1
IP Header
Data 2
IP Header
Internet
Source
Private Network
IP Header
Data 1
IP Header
IP Header
26
Data 2
Data 3
Data 3
Destination
Server
Enhanced Transparent Proxies
27
ƒ
All Transparent Proxies can be used and are
fully configured for both client side/direction
and server side/direction
ƒ
HTTP Server proxy can be used to protect
Web Servers from Attacks
ƒ
SMTP Client Proxy can be used to filter
content and scan viruses within user emails
ƒ
A full POP3 proxy for customers without a
local email server
ƒ
FTP and DNS Proxies give full granular
control over the protocols (content, commands, queries, etc.)
ƒ
TCP-UDP p
proxy
y offers g
generic p
protection for all p
ports
ƒ
Signature-Based IPS for all policies adds dynamic protection from
attacks that comply with protocol standards
Enhanced
E
h
d Transparent
T
t Proxies
P
i —
Default Settings
ƒ
28
All Transparent Proxies can be fully configured for incoming and
outgoing traffic, but the default settings are different
ƒ
HTTP Client,, SMTP Incoming,
g, FTP Client are secured,, with default
Content Types already defined
ƒ
HTTP Server, SMTP Outgoing, FTP Server are more permissive
Enhanced Transparent Proxies —
Full Flexibility
29
ƒ
All Transparent Proxies are completely flexible
ƒ
Default action can be modified to be deny, allow, or strip for any
configurable components in a proxy policy (content types,
commands, request, response, headers, etc.)
ƒ
For example, you can allow all mime types for HTTP, except
some specific ones
HTTP Transparent Proxy
30
ƒ
Fully configurable
configurable, HTTP
request and response
ƒ
URL Paths can be used to
block complete URL
ƒ
Configurable header
fields, protocol settings,
methods (request and
response)
ƒ
Content Types with
enhanced
h
dD
Default
f lt S
Settings
tti
ƒ
Specific Cookies can be
allowed or denied
ƒ
Proxy Exceptions (used
for Microsoft updates for
example)
ƒ
WebDav Support
HTTP Transparent Proxy —
Body Content Types
31
ƒ
Real content type blocking,
not based on file extension
but on file binary code
ƒ
XTM device checks if the file
is an EXE / DLL / ZIP / CAB
or JAVA using the Byte code
code,
and is not fooled by a file
with a renamed extension
ƒ
For example,
example if an
executable file is renamed
*.pdf, the proxy still knows
tthat
at the
t e file
e iss an
a .exe
e e file
ea
and
d
prevents the file download
ƒ
New binary types can be
added for more protection
HTTP Transparent Proxy —
Deny Message
ƒ
32
Configurable HTML Deny Message for users who are
blocked by the proxy
Redirect HTTP to Caching Proxy Server
ƒ
33
No configuration necessary in the user browser
Redirect HTTP to Caching Proxy Server (cont.)
Internet
HTTP Response
p
to
Proxy
HTTP Request from
Proxy
HTTP request
redirected
automatically
y
HTTP request
Client PC, no proxy configuration
HTTP Response
Caching Pro
Proxy Ser
Server
er
34
SMTP Transparent Proxy
35
ƒ
Fully configurable
ƒ
ESMTP settings and
Authentication
ƒ
Attachment filtering by
Content Types or Filename
patterns
ƒ
Access List for email
addresses (From and To)
ƒ
Header Filtering
g
SMTP Transparent Proxy —
Address Filtering
36
ƒ
Access List
A
Li t ffor domains
d
i
or email address
patterns
ƒ
Can be used to prevent
the email server being
used as an Open Relay
ƒ
Email / Domain
addresses can be
rewritten
SMTP Transparent
T
t Proxy
P
—
Deny Message
ƒ
37
Configurable SMTP Deny Message when an action is
denied (attachment denied because of virus detected,
content type
yp not allowed,, email address blocked,, etc.))
HTTPS Transparent Proxy
ƒ
Blocks access to
objectionable HTTPS
sites using
WebBlocker
ƒ
Allow or deny access
to sites based on
Domain Names
ƒ
38
Fireware XTM
matches Domain
Name patterns
against the
Subject field in
the web site’s
site s
SSL certificate
HTTPS Content Inspection
39
ƒ
Inspects SSL
SSL-encrypted
encrypted
HTTP content
ƒ
Bypass List
HTTPS Content Inspection
A new SSL certificate
with the web site details,
signed with the XTM
device HTTPS inspection
Certificate, is created
Import the XTM
device HTTPS
inspection
Certificate in
the client
Browser
XTM Device HTTPS Inspection
INTERNET
Secured Web Site
SSL connection retrieving
details of the web site
certificate
Client access to HTTPS
web site
SSL connection
established with the
resigned web certificate
40
Client
FTP Transparent Proxy
41
ƒ
Fully configurable
ƒ
All FTP commands can be
blocked
ƒ
Control file download and
upload
FTP Transparent Proxy —
Download and Upload Control
ƒ
42
Use file name patterns to
control the files that can be
uploaded
p
or downloaded
through FTP
DNS Transparent Proxy
43
ƒ
Fully configurable
ƒ
Control OPCodes
ƒ
Block Query Types and
Query Names
DNS Transparent Proxy
ƒ
44
You can block Query
Names to easily block
a user from connecting
to Internet Mail,
Mail IM’s
IM s,
P2P applications, or
any Internet software
that forces users to
connect to a server by
its DNS name
Import and Export Proxy Actions and
Rulesets
45
ƒ
Useful when you manage many boxes
ƒ
Copy back and forth between XML device
configurations
ƒ
Must be from the same version of WSM/Policy
Manager
g
ƒ
For example, you cannot import a v11.5.2 proxy
action into v11.6 Policy Manager
ƒ
Convert the older configuration before you export
proxy actions for use in a newer version
Import and Export Proxy Actions and
Rulesets (cont.)
ƒ
46
You can import/export any of these objects:
ƒ
Proxy actions
ƒ
Individual rulesets within proxy actions
ƒ
Custom policies
ƒ
W bBl k exceptions
WebBlocker
ti
ƒ
spamBlocker exceptions
ƒ
Schedules
VoIP and VideoVideo
Conferencing
g
47
Application Layer Gateways —
SIP & H.323
48
ƒ
The Fireware XTM SIP and H.323 application layer gateways
(ALGs) are similar to proxies. These ALGs dynamically open
only the correct ports for the SIP & H
H.323
323 protocols (solves the
firewall Issue)
ƒ
ALGs address the NAT issue, processing and modifying the
signaling
i
li with
ith the
th public
bli IP addresses
dd
and
d ports
t
VoIP Security
ƒ
49
Call setup security
ƒ
Limit to only certain codecs
ƒ
Limit calls to/from onlyy certain addresses
VoIP Security (cont.)
50
ƒ
Directory Harvesting
ƒ
Maximum number of sessions
ƒ
User-Agent masking
ƒ
Idle media session timeout
ƒ
Header Normalization
(SIP only)
ƒ
Topology Hiding (SIP only)
WebBlocker
51
WebBlocker — Web Content Filtering
52
ƒ
Keeps malicious web content out of your network through 15+
million blocked URLs and 54 categories
ƒ
Works with HTTP and HTTPS proxy policies
ƒ
Reduces unproductive web surfing and potential liability
ƒ
Blocks access to IM/P2P download sites
ƒ
Blocks access to 9000+ sp
spyware
are sites
ƒ
Easily configurable and integrated with WSM
ƒ
Helps schools to attain CIPA compliancy
ƒ
Stays current through daily incremental database updates
ƒ
Global URL database — English, German, Spanish, French,
I li
Italian,
D
Dutch,
h JJapanese, T
Traditional
di i
l Chi
Chinese, and
d Si
Simplified
lifi d
Chinese sites
WebBlocker
ƒ
WebBlocker blocks URLs based
on a WebSense URL database
featuring a selection of categories
and white/black lists
ƒ
WebBlocker requires a server on
installed on your management
computer to host the database
(can be in hosted mode for
2 Series or 3 Series)
ƒ
The WebBlocker Server database
is automatically updated daily
WebBlocker
Updates
Internet
WebBlocker Server
53
URL Checking
User Surfing restricted by
WebBlocker URL filtering
WebBlocker Override
ƒ
54
You can bypass WebBlocker with authentication
RED
(Reputation Enabled
Defense))
55
Reputation Enabled Defense for HTTP
56
ƒ
Cloud-based
Cloud
based analysis of web sites using the WatchGuard
ReputationAuthority servers
ƒ
Improves HTTP performance
ƒ
Improves security
WatchGuard ReputationAuthority
57
WatchGuard ReputationAuthority
58
WatchGuard ReputationAuthority
59
Reputation Enabled Defense for HTTP
60
ƒ
URLs are assigned a reputation score with a value between 1
and 100 by the ReputationAuthority
ƒ
RED configuration must specify threshold values for “bad
reputation”
t ti ” and
d ““good
d reputation”
t ti ”
ƒ
URLs with a reputation score that exceeds your “bad reputation”
threshold are blocked before any virus scanning occurs, reducing
resource load on device
ƒ
URLs with a reputation score that lower than your “good
reputation”
p
threshold bypass
yp
virus scanning,
g, improving
p
g speed
p
of
loading web pages
Send Feedback to ReputationAuthority
Servers
61
ƒ
When you enable Reputation Enabled Defense, the default
configuration enables the XTM device to send the results of your
local
oca Ga
Gateway
e ay AntiVirus
us sca
scans
s to
o WatchGuard
a c Gua d se
servers
es
ƒ
If you have Gateway AntiVirus,
but do not have
Reputation Enabled
Defense, you can still
send Gateway
Anti-Virus
Anti
Virus scan results
to WatchGuard
ƒ
Scan results are sent
to WatchGuard as
encrypted data
Application Control
62
Application Control
63
ƒ
Monitor and block application usage on your network
ƒ
Signature-based service identifies over 1500 applications, including
IM, P2P, Facebook, Skype, and many more
ƒ
Configure Application Control to drop traffic for applications you do
not want to allow
ƒ
For some applications,
applications
you can block specific
application behaviors
((for example,
p , you
y can
allow the use of MSN for
chat, but block file
transfers))
ƒ
Monitor the use of
allowed applications
Application Control
64
ƒ
Create multiple Application Control
actions to control different applications
or application categories.
ƒ
Apply
A
l A
Application
li ti C
Control
t l actions
ti
tto
specific policies.
ƒ
Log files and reports show which
applications were detected and what
action was taken.
Application Control
65
ƒ
Control applications by users or
groups within your policies
ƒ
Control applications b
by time of da
day
using policy scheduling features
Application Control Reporting
ƒ
Reports are available to help you identify how
applications are being used on your network
ƒ Application Use S
Summary
mmar
ƒ Blocked Application Summary
ƒ Top Clients by Application Usage
ƒ Top Clients by Blocked Applications
ƒ Top Clients by Blocked Categories
66
Intrusion Prevention
Service
67
Intrusion Prevention Service
68
ƒ
In-line
In
line protection from attacks
that comply with protocol
standards but carry malicious
content
ƒ
Blocks attack sources
automatically
False Positives
69
ƒ
False Positives are the biggest danger in using IPS
because IPS blocks legacy traffic.
ƒ
Try to normalize the traffic to reduce false positives. For example:
ƒ If a header is not correct, remove it but don’t discard the
entire frame
ƒ If Fragmentation
g
has a bad sequence,
q
, refragment
g
it in a
“normal” way
ƒ If a Content type is dangerous, remove it but don’t discard
the entire frame
ƒ If some protocol parameters or requests are not correct,
override them but don’t discard the entire frame
ƒ
Most firewalls jjust check traffic and application
pp
layers,
y , but cannot
clean the traffic. This generates too many false positives.
ƒ
Fireware XTM modifies the traffic at all layers to reduce false
positives and optimize the signature database.
G t
Gateway
AntiVirus
A tiVi
70
Gateway AntiVirus
71
ƒ
Signature-based
Signature
based service to
identify and block worms,
spyware, and trojans in
e-mail
e
mail attachments or content
ƒ
Protection at the gateway:
Blocks threats from entering
your network
network, executing
dangerous payloads, or
disabling desktop AV
ƒ
Inbound and outbound HTTP /
SMTP / FTP / POP3 scanning
ƒ
Flexible user-defined actions:
Allow, Deny, Quarantine and
Lock
Gateway AntiVirus
72
ƒ
Locks or quarantines infected
attachments
ƒ
Prevents self
self-executing
executing or
accidental execution of
malicious payloads at the
desktop
p
spamBlocker
Bl k
73
spamBlocker
74
ƒ
Spam blocking service for XTM
devices
ƒ
Partnered with Commtouch, an
i d t lleader
industry
d iin spam prevention
ti
and mitigation
ƒ
Value:
ƒ
It’s the best service in the
industry at distinguishing
legitimate
g
communication from
spam attacks, blocking 97% of
unwanted e-mails
ƒ
Processing is done off the
appliance so there is minimal
impact to other network traffic
processing
spamBlocker Architecture
ƒ
Securely simply detects mass outbreaks in real time
Securely,
ƒ
How it works:
ƒ
Detects the repetitive
p
component
p
of each outbreak
ƒ
Uniquely identifies the DNA of each outbreak
ƒ
Compares incoming messages with spam DNA in real-time
Analyzing Internet Traffic
Classification
DNA
Real Time
Detection Center
75
Query
RPD™ (Recurrent Pattern Detection) Patent
Pending Technology
spamBlocker Configuration
ƒ
76
Simple to set up
ƒ
WSM makes it easy
to set up; it takes
only
l a ffew minutes
i t
ƒ
Just a few screens
to configure
ƒ
Flexible enough to
handle spam in
several different
ways
ƒ
Easily route tagged
mail to dedicated
spam / bulk folders
ƒ
Quarantine Server
available (user and
admin access)
spamBlocker Quarantine
77
ƒ
Quarantine for SMTP Spam
ƒ
Install server software with WSM
ƒ
User notification and localized access
spamBlocker Quarantine (cont.)
78
ƒ
Set the spamBlocker action to quarantine
ƒ
Quarantine based on:
ƒ
spam
p
category
g y
ƒ
Exception
Real-Time Virus Outbreak Detection
ƒ
79
spamBlocker s Real-time
spamBlocker’s
Real time Virus Outbreak Detection feature offers
protection from unknown (zero day) threats
ƒ
Real-time security technology that identifies and blocks nearly 100%
off allll email-based
il b
d malware
l
attacks
tt k iincluding
l di spam, viruses
i
and
d
phishing
ƒ
Provides an additional layer of security and shields your network in
the earliest moments of new malware outbreaks—complements
existing systems
ƒ
Signature-based
g
solutions can take
days to catch up!
Ad
Advanced
d Networking
N t
ki
80
Fireware XTM Interface Modes
ƒ
3 different modes to integrate an
XTM device in network
infrastructures
ƒ
Mixed
Mi
dR
Routing
ti Mode
M d (diff
(differentt
subnets on each interface)
ƒ
Drop-In Mode (proxy ARP
mode)
ƒ
Bridge Mode (transparent
mode))
Internet
XTM Device
81
LAN
Interface Independence
ƒ
82
Any interface can be External
External, Trusted
Trusted, Optional,
Optional VLAN
VLAN, or Bridge
Network Address Translation
ƒ
Fireware XTM supports Dynamic NAT
NAT,
1-to-1 NAT, and Port forwarding (or
incoming Static NAT)
NAT Enabled
INTERNET
POP
XTM device
Public IP Address
83
Private IP Address Range
Network Address Translation (cont.)
ƒ
84
Dynamic NAT can be disabled per policy
User-defined
U
d fi d Dynamic
D
i Network
N t
k
Address Translation
85
ƒ
By default, the IP address used for
Dynamic NAT is the interface IP address
ƒ
User defined Dynamic NAT can be
User-defined
configured with a different source IP
address
Server Load Balancing
ƒ
XTM devices support Server Load Balancing
Public IP Address used as
a Virtual
Vi t l IP Address
Add
INTERNET
XTM device
86
Servers for
the same
service
Server Load Balancing
87
ƒ
Supports up to 10
servers
ƒ
Algorithms
ƒ
Weighted Roundrobin
ƒ
Weighted Least
Connections
Routing
ƒ
XTM devices support static routing and dynamic routing
ƒ
ƒ
RIP v1, RIP v2, OSPF, and BGP4
Dynamic routing increases network reliability by dynamically updating
routing tables
Public Network
XTM device
automatically learns
10.0.0.0/24
Dynamic Route exchange
192.168.0.0/24
172.16.0.0/24
10.0.0.0/24
88
192.168.0.0/24
172.16.0.0/24
Virtual LAN Support (802.1Q)
ƒ
VLANs are security zones
defined on the LAN backbone
switch
ƒ
VLANs can b
VLAN
be d
defined
fi d di
directly
tl
on the appliance (trusted,
optional or external type)
802.1Q Link
-
Only one cable
Layer 2 Switch
Or
Routing Switch
VLAN 1
VLAN 5
Sales
DMZ 2
VLAN 3
VLAN 4
VLAN 2
Admin
DMZ 1
Finance
Data
89
Data
Data
Data
Data
Data
VLAN Support — Virtual Interfaces
ƒ
VLAN support increases the number of potential
security zones on your XTM device
ƒ
Number of physical interfaces of the appliance is not
a limit
li it
ƒ
When you define a VLAN, you define a new Virtual
Interface
Only 2 physical ports used
on the appliance
Finance
Admin
90
Sales
DMZ 2
DMZ 1
Network Time Protocol
ƒ
Fireware XTM supports NTP — up to
three configurable NTP servers
ƒ
XTM device networks can be time
synchronized to have a consistent
logging architecture
ƒ
An XTM device can still use WSM
to get its time
NTP Server
NTP Server
Time synchronization
y
Internet
91
NTP Server
IPv6 Support
ƒ
Fireware XTM v11.6 has achieved IPv6 Ready
Phase 2 Gold Logo certification for IPv6 Core Protocols.
ƒ
ƒ
The Phase 2 Logo is a req
requirement
irement for e
extended
tended test
categories, including IPSec, IKEv2, MIPv6, NEMO,
DHCPv6, SIP, SNMP-MIBs, and MLDv2
IPv6 support in Fireware XTM v11.6
ƒ Static configuration of IPv6 addresses and DNS
ƒ Router Advertisement for stateless address autoconfiguration
ƒ Static routes
92
FireCluster
93
FireCluster
ƒ
Clustering solution
ƒ
Active / Passive
ƒ
Active / Active
ƒ
Active / Active provides
Load Sharing
ƒ
Active
A
ti / Passive
P
i uses
Unicast Mac addresses;
Active / Active uses
Multicast Mac Addresses
Public Network
HA dedicated Ports
Private Network
94
FireCluster (cont.)
ƒ
You can define one or two
dedicated ports for Cluster link
(used to send heartbeats and
data synchronization)
y
)
ƒ
Configuration file is synchronized
between the two peers
ƒ
Public Network
Each XTM device has its own
Management IP address
HA dedicated Ports
Private Network
95
FireCluster — Interface Monitoring
ƒ
The XTM device monitors
network interfaces to force the
failover when the link is down
Internet
Router
Hub
Hub
96
Hub
FireCluster — FW Sessions and
Tunnels Synchronization
ƒ
Firewall packet filter sessions and Branch Office
VPNs are synchronized on the peer
Employee
Email server
DHCP Server
Remote Site
XTM Device
Backup XTM Device
Internal
network
Application Servers
XTM Device
INTERNET
Remote Site
XTM Device
Citrix Server
97
M lti WAN
Multi-WAN
98
Multi-WAN
ƒ
Multi WAN is activated automatically
Multi-WAN
when you configure multiple external
interfaces, with multiple algorithms
available
ƒ
Increases reliability by allowing up to
four ISP connections
Public Network
ISP 1
ISP 2
Private Network
99
ISP 3
ISP 4
Multi-WAN Port Configuration
100
ƒ
When you configure
Wh
fi
a second
d
external interface, you have to
select the default gateway of
this ISP connection
ƒ
WAN connections can also use
dynamic DHCP or PPPoE
Multi-WAN Link Monitor
ƒ
101
Link health can be
evaluated by:
ƒ
External Interface
Link status
ƒ
Response to ICMP
request
ƒ
TCP session
handshake
ƒ
Both ICMP and TCP
methods
Failover / Failback
ƒ
ƒ
102
Internet
Use Failover mode when
you want to have a backup
external interface
Configure Failback behavior
to make sure a WAN link is
used only when the primary
link is not available:
ƒ
Immediate Failback —
immediately resets all
open TCP connections
ƒ
Gradual Failback —
active connections use
the same WAN
interface until they time
out or are closed by the
application
pp
Failback
Failover
ISP 1
M i Link
Main
Li k
Private Network
ISP 2
Backup Link
Weighted Round Robin
ƒ
Round-robin algorithm is
weighted
ƒ
Better result for Internet lines
with different bandwidths
ƒ
The weight is used to determine
the bandwidth distribution
Public Network
ISP 1
ISP 2
Private Network
103
ISP 3
ISP 4
Interface Overflow
104
ƒ
Restricts bandwidth use for one
or more interfaces
ƒ
Provides one or more alternate
routes for excess bandwidth
ƒ
Limits link saturation (less
congestion, lower latency for
sensitive applications)
Policy-Based Routing
105
ƒ
Routes outgoing traffic based on
the policy, instead of the
destination
ƒ
Force specific applications to use
a specific internet link
ƒ
Better quality WANs can be used
for critical applications
Policy-Based Routing (Example)
ƒ
Example:
You can force SMTP traffic to
the ISP link that hosts the
provider’s SMTP relay
ISP 1
HTTP traffic
Private Network
106
ISP 2
SMTP traffic
Combine PBR and Dynamic Multi-WAN
P li
Policy
matching
t hi
ffor IIncoming
i
packet
k t
Packet sent to the
specified interface
Policy-Based
y
Routing?
g
yes
No
Apply Multi-WAN
Dynamic Algorithm
Weighted Round Robin
Failover
Interface Overflow
Routing Table
107
Traffic Management
108
Traffic Management
109
ƒ
Traffic Management is directly applied
to a policy
ƒ
Traffic Management actions can be
named cloned
named,
cloned, and edited
Quality of Service Mechanisms
ƒ
110
QoS mechanisms:
ƒ
Marking
ƒ
Prioritization
ƒ
Rate limiting / traffic shaping
ƒ
Connection rate limiting
ƒ
Guaranteed
G
t d Minimum
Mi i
Bandwidth
QoS Marking
ƒ
Fireware XTM supports
Diffserv / TOS marking
ƒ
Ability to mark or clear the
t ffi according
traffic
di to
t the
th policy
li
ƒ
Or, simply read the priority
field and prioritize
accordingly
ƒ
ƒ
111
Other devices on the
network can use this
marking to prioritize or
allocate bandwidth for
specific applications,
such as VoIP
QoS Marking can also be
done for IPSec packets
QoS Prioritization
112
ƒ
Fireware XTM has eight priority
queues
ƒ
Granularity for traffic management
QoS Minimum Bandwidth
113
ƒ
Ability to apply a minimum
bandwidth to a policy or interface
ƒ
Guaranteed Minimum Bandwidth
f key
for
k applications
li ti
(V
(VoIP,
IP etc.)
t )
Virtual Private
Networking
114
Branch Office VPN
115
ƒ
Fireware XTM supports IKE and IPSec (DES / 3DES / AES)
ƒ
Use Policy Manager to configure Branch Office tunnels manually, or use
the Management Server to create drag-and-drop VPNs
ƒ
WSM requires licenses for Managed Branch Office VPN
ƒ
No license required for Manual Branch Office VPN
VPN Branch Office (cont.)
DHCP Server
Employee
Email Server
MAIN SITE
XTM Device
Remote Site
INTERNET
XTM Device
Remote Site
Application Servers
XTM Device
Citrix Server
116
VPN and External Interfaces
ƒ
VPN tunnels can be
terminated on any
External interfaces
ƒ
VPN tunnels can be used
with Multi-WAN
INTERNET
Ext1 Ext2 Ext3
MAIN SITE
117
VPN Branch Office — Manual Configuration
ƒ
118
RFC compliant IKE and IPSec configuration
RFC-compliant
ƒ
IKE Phase 1 & 2, defines the Gateway
and Tunnel
ƒ
Multiple Routing Policies can be applied
to a tunnel
Branch Office VPN Wizard
ƒ
119
New BOVPN wizard to help you create policies for tunnels
Branch Office VPN Failover
ƒ
ƒ
Redundant VPN
Gateways to
provide full
secured VPN
Primary Tunnel
Architectures
Fireware XTM
can use either
IKE Keep -alive
or Dead Peer
Detection to
detect the failure
ISP 1
ISP 2
ISP 1
ISP 2
Secondary Tunnel
Private Network
120
Branch Office VPN Failover (cont.)
ƒ
121
Failover is triggered if one of
those events occurs:
ƒ
A WAN interface link
state is down
ƒ
Multi-WAN health
monitor detects network
is down
ƒ
Fireware XTM does not
receive an IKE keepalive
li response or DPD
ƒ
IKE keep-alive response
causes failback to the
primary
i
gateway
t
X.509 External Certificates Support
ƒ
Fireware XTM supports external
X.509 certificates from:
ƒ
VeriSign
ƒ
Entrust
ƒ
RSA KEON
ƒ
Microsoft Windows server
INTERNET
External Certificate Authority
122
Mobile VPN with IPSec
ƒ
Remote users use a Mobile VPN with IPSec client to
connect remotely to a corporate network
DHCP Server
Employee
Email server
INTERNET
MAIN SITE
XTM Device
Compatible with Windows 7
Application servers
Citrix Server
123
Mobile
M
bil VPN —
Wizard & Configuration Profile
ƒ
124
Mobile VPN with IPSec Wizard generates .wgx and .vpn files
ƒ
Import the .vpn configuration file to the Shrew Soft VPN Client
ƒ
I
Import
t the
th .wgx file
fil to
t the
th Mobile
M bil VPN with
ith IPSec
IPS VPN Client
Cli t
Mobile VPN with IPSec Failover
ƒ
The WatchGuard Mobile VPN with IPSec client can reconnect to a
backup IP address (not available with the Shrew Soft VPN client)
ISP 1
Primary
Tunnel
ISP 2
Secondary
Tunnel
125
Mobile VPN With SSL
ƒ
Remote users can use Mobile VPN with SSL to connect
remotely to a corporate network
DHCP Server
Employee
Email Server
INTERNET
MAIN SITE
XTM Device
Application Servers
Citrix Server
126
SSL VPN — Why Use SSL Technology?
ƒ
ƒ
ƒ
127
Replacement and evolution of
IPSec technology
ƒ
Light Client / Easy
Maintenance and auto
autoconfiguration
ƒ
Access from everywhere
(HTTPS instead of IKE/IPSec
IKE/IPSec,
Firewall pass-through)
IPSec technology used to be the
reference
f
in
i tterm off Mobile
M bil VPN
technology but has many
constraints
SSL VPN ttechnology
h l
b
brings
i
th
the
same level of security, but
without the constraints
ISP 1
ISP 2
Internet
SSL VPN Tunnel
Mobile VPN with SSL Portal
128
ƒ
Client available for both PC and Mac
ƒ
Deployment Portal
Mobile VPN with SSL Failover
ƒ
Possibility for the Mobile VPN with SSL
client to reconnect to a backup IP address
ISP 1
ISP 2
Primary
Tunnel
Secondary
Tunnel
129
User Authentication
130
User Authentication
131
ƒ
Fireware XTM supports user
authentication
ƒ
Authentication servers:
ƒ
Firebox (internal database)
ƒ
RADIUS
ƒ
Vasco (use RADIUS tab)
ƒ
SecurID
ƒ
LDAP
ƒ
Activate Directory (native)
User Policies
132
ƒ
Security policies apply to users and not only to IP addresses
ƒ
You can build different sets of policies for different people in the
company, even in networks that use DHCP
Authentication Portal
133
ƒ
User can authenticate to the XTM device through an
authentication web portal
ƒ
Use the auto-redirect feature to send users to the authentication
web
b portal
t l
ƒ
Configure the XTM device to redirect traffic sent to the XTM
device IP address to
a host name
ƒ
Redirect authenticated
users to a specifiable
p
URL
ƒ
User is authenticated
with a two hour
timeout (configurable)
Fireware XTM Web Server Certificate
ƒ
134
Customizable certificate for the authentication portal
Single Sign-On
135
ƒ
Automatic authentication of Active Directory users
users, no manual
authentication on the firewall required anymore
ƒ
Install WatchGuard Authentication Gateway software on a domain
server (SSO A
Agent)
t)
ƒ
Install SSO Client on user’s computers or the Event Log Monitor on
the domain controller
ƒ
The SSO Agent queries the computers on the domain receives user
credentials from the SSO Client or Event Log Monitor, and sends the
user credentials the XTM device
Single Sign-On
Alice
Ali
logged
in
Alice authorized
without having to log
on manually
SSO
Client
Event Log
Monitor
SSO
Query
SSO Info
User Alice = IP
10.0.1.100
SSO
Agent
136
Single Sign-On Settings
ƒ P
Policy
li M
Manager > Setup
S t >
Authentication > Authentication
Settings
ƒ IP address of the PC running
WatchGuard Authentication
Gateway software
(the SSO Agent)
ƒ How long the SSO Agent
should cache responses
p
it gets from PCs it queries
ƒ IP addresses that the
XTM device will not ask
about
137
Benefits of User Authentication
138
ƒ
User names can be resolved in HostWatch and Log and Report
Manager
ƒ
Network admin can monitor users and modify policies to increase
security
it and
d productivity
d ti it
Authentication Portal
139
ƒ
Can specify which
authentication server
appears first in the list of
servers in the
Authentication Portal
ƒ
User’s browser is
redirected to a URL you
specify five seconds
after successful
authentication
ƒ
Can specify a host name
to redirect traffic to
ƒ
Can be used to
automatically redirect
traffic to intranet web
servers,, business sites,,
etc.
Authentication Support
ƒ
140
Authentication
A
th ti ti
servers supported
by key features of
Fireware XTM
ƒ
— Fully
supported by
WatchGuard
ƒ
— Not yet
supported, but
successfully
tested by
WatchGuard
customers
Monitoring Tools
141
Firebox System Manager
ƒ
Traffic Monitor:
Real-time log monitoring
ƒ
Bandwidth Meter:
Real-time
Real
time bandwidth use
display
ƒ
Service Watch:
Connection/bandwidth
monitoring of your security
policies
ƒ
Subscription Services:
Gateway AV, IPS,
Application Control,
Reputation
p
Enabled
Defense, and spamBlocker
status
ƒ
Performance Console:
System parameters
graphical tracing
142
Traffic Monitor
143
ƒ
Displays XTM device
log messages in a
scrolling, interactive
interface
ƒ
Eliminates the need
to iteratively pull and
view log files
ƒ
Allows you to ping,
traceroute, or block
a site
ƒ
Allows you to
download a PCAP
file for use in thirdthird
party tools
ƒ
Allows you to run the
VPN Diagnostic
Report
Bandwidth Meter
ƒ
144
Shows real
real-time
time
sent and received
traffic for all
interfaces
Service Watch
145
ƒ
Shows the number of
connections or
bandwidth used for
each security policy
ƒ
Automatically uses the
policies configured in
Policy Manager
ƒ
Configure Service
Watch Settings to
specify the policies to
monitor
Performance Console
146
ƒ
Monitors performance
across system parameters
ƒ
Gives you a real-time view
of the XTM device
resources and use
Subscription Services
ƒ
ƒ
147
See the status of:
ƒ
Gateway Antivirus
ƒ
Application
pp
Control
and Intrusion
Prevention Service
ƒ
spamBlocker
ƒ
Reputation Enabled
Defense
Status details include:
ƒ
Activity
ƒ
Virus, Intrusion
Virus
Intrusion, or
spam detected
ƒ
Signatures details
L
Logging
i
and
d Reporting
R
ti
148
Logging Servers
ƒ
ƒ
149
WatchGuard Log Server
ƒ
Proprietary protocol based on
TCP (connection status shown
on the server)
ƒ
Encrypted with 3DES (no need
for dedicated IPSec tunnels)
ƒ
Backup mechanism and multiple
backup servers possible
ƒ
WatchGuard Log
g Server is
included with WSM
Syslog Server
ƒ
Recommended on LAN side only
ƒ
Not secure for sending log
messages over Internet
Log / Report Architecture
Logs are stored in a SQL Database
XTM device connects to Log
Server to store the logs
Log Server
Log
g and Report
p
Manager
XTM Device
Automatic
Refresh of reports
Report Server
150
Scalable Report Distributed Architecture
for MSSP
Log Server 1
Log Server 2
Log and
R
Report
t
Manager
151
Log Server 3
Report Server
Reading
R
di Log
L Messages
M
—
Traffic Monitor & Log and Report Manager
152
ƒ
Log messages are stored in a SQL Database
ƒ
Human Readable
ƒ
Traffic Monitor displays the log messages in real
real-time
time
ƒ
Review log messages with Log and Report Manager
Playing Log Messages — HostWatch
153
ƒ
Graphical display of
live connections
ƒ
Watch network traffic
in real time
ƒ
One-click access to
more details on any
connection
ƒ
Prevent unauthorized
access by blocking
sites
it iinstantly
t tl
Report Server & Log and Report Manager
154
ƒ
Automatic daily
reporting, weekly
summary,
Per Client,
Client or
On-Demand
reports
ƒ
Multi device
Multi-device
ƒ
Fast and reliable
(SQL DB benefits)
ƒ
Report on full set of
UTM capabilities
((Firewall / AV /
Antispam / Web
Filtering / etc.)
Alarms and Notifications
155
ƒ
Notifications by SNMP traps,
traps email,
email or popup window on the
management computer
ƒ
Log Server configuration includes email notification settings
SNMP
156
ƒ
Fireware XTM supports SNMP
ƒ
SNMP MIBs can be polled by an SNMP management computer
ƒ
SNMP v3 supported
pp
((encryption)
yp
)
Management Server
157
Management Server
158
ƒ
Managementt Server
M
S
is
i th
the WSM
multi-box management tool
ƒ
Management Server requires a
license depending on the
number of devices you want to
manage
ƒ
The Management Server
provides:
ƒ
X509 PKI infrastructure
ƒ
Drag-and-drop managed
branch office VPN
ƒ
Configuration templates
ƒ
Scheduled tasks
ƒ
Role based access control
Role-based
Management Server and WSM
159
ƒ
Connect to the
Management Server
instead of connecting to a
single device in WSM
WSM.
ƒ
When connected to the
server, all the devices
managed by the
Management Server
appear.
ƒ
No need to use status and
configuration passphrases
– they are centrally stored
b th
by
the M
Managementt
Server. Only the
Management Server
credentials are needed
needed.
Certificate Authority
ƒ
ƒ
160
The Management Server is a
Certificate Authority
ƒ
For Branch Office VPN
ƒ
For Mobile VPN
The Management Server can
automatically generate
certificates for drag-and-drop
branch office VPN tunnels
Drag-and-Drop Branch Office VPN
161
ƒ
Drag one device to
another to create a
secure branch office
VPN tunnel
ƒ
Support for multiple
WatchGuard platforms
ƒ
Simplicity lowers
administrative costs
ƒ
VPN configurations
g
are
distributed automatically
by the Management
Server
Configuration Templates
ƒ
Device Configuration Templates are applied to XTM devices
ƒ
Template policies supplement policies already on the XTM device,
do not replace
ƒ
Drag-and-drop to apply a template to an XTM device of the same
version
Management Server
Client XTM Device
Template Application
Internet
Client XTM Device
Management XTM Device
Client XTM Device
162
Configuration Templates (cont.)
ƒ
163
Template properties include:
ƒ
Policies (including
proxies)
ƒ
Logging settings
ƒ
Application
Blocking
ƒ
Schedules
ƒ
spamBlocker
ƒ
Gateway AV/IPS
ƒ
WebBlocker
ƒ
Q
Quarantine
i settings
i
ƒ
Inheritance Settings
ƒ
Object Deletion Settings
Scheduled Tasks
164
ƒ
OS updates
ƒ
Template application for policy updates
ƒ
Feature keyy synchronization
y
ƒ
Scheduled reboot
ƒ
Lease
expiration
i ti
Role-Based Administration
ƒ
Allows different XTM administrators to have different levels of
access to different firewalls
ƒ
Integration with AD or local users
ƒ
Requires Management Server
XTM Device Paris
XTM Device Paris Admin
XTM Device Seattle
XTM Device London
Super Admin
WebBlocker Admin
165
Role-Based Administration (cont.)
ƒ
166
Custom and predefined roles
Thanks!
167