index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
100
Palo Alto Networks PAN-OS 10.2 CCECG 101 7. Configure as shown above. 8. Click on the IPv6 Drop. 9. Configure as shown above. 10. Click OK to create the profile object. 11. Now associate that profile object with a security zone. 12. Select Network > Zones. Create a new zone or modifying an existing zone. 13. Go to th...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
101
Palo Alto Networks PAN-OS 10.2 CCECG 102 14. Click OK. 15. Commit the changes. 7.10.2 Denial of Service (DoS) Protection Profile The DoS protection profiles, and DoS protection policy rules combine to protect specific groups of critical resources and individual critical resources against session floods such as TCP SY...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
102
Palo Alto Networks PAN-OS 10.2 CCECG 103 4. Click OK. 5. Go to Policies > Dos Protection. Click Add. 6. On the General tab, enter a name and description. 7. Specify the source and destination zones and/or IP addresses. 8. On the Option/Protection tab, specify the service (e.g., web server or service￾http/service-htt...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
103
Palo Alto Networks PAN-OS 10.2 CCECG 104 7.11Configure IKE/IPsec VPN Gateway The administrator can configure the TOE as an IKE/IPsec VPN gateway and specify IKEv1 only mode, IKEv2 only mode, or IKEv2 preferred mode. The gateway begins its negotiation with its peer in the mode specified here. If the administrator se...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
104
Palo Alto Networks PAN-OS 10.2 CCECG 105 A trusted channel is established only if the presented identifier in the peer certificate matches the configured reference identifier, and the peer certificate is signed by a trusted anchor CA specified in the Certificate Profile. Local identification defines the format and i...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
105
Palo Alto Networks PAN-OS 10.2 CCECG 106 When configuring an IKE cryptographic profile: • Only the following Diffie-Hellman (DH) groups are to be used: group14; group19; group20. • Only the following authentication algorithms are to be used: sha1; sha256; sha384; sha512. • Only the following encryption algorithms...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
106
Palo Alto Networks PAN-OS 10.2 CCECG 107 Note also, when configuring and selecting IKE and IPsec cryptographic profiles, that the key strength of the encryption algorithm specified in the IPsec profile is not to be greater than the key strength of the encryption algorithm specified in the IKE profile. For example, i...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
107
Palo Alto Networks PAN -OS 10. 2 CCECG 108
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
108
Palo Alto Networks PAN-OS 10.2 CCECG 109 (1) Configure Zones, Ports, and Interfaces on the Branch Firewall: 1. Login with Administrator Role. 2. Select Network > Zones. Click Add. • Enter the zone name in the Name field. In example above, ISP2. • Select Type as Layer 3. 3. Click OK. 4. Select Network > Interfaces....
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
109
Palo Alto Networks PAN-OS 10.2 CCECG 110 • Click OK. 14. Click OK. (2) Configure Zones, Ports, and Interfaces on the HQ-Central Firewall: 1. Login with Administrator Role. 2. Select Network > Zones. Click Add. • Enter the zone name in the Name field. In example above, ISP2. • Select Type as Layer 3. 3. Click OK. ...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
110
Palo Alto Networks PAN-OS 10.2 CCECG 111 • Enter the Destination field. For example, 172.16.101.0/24. • Enter the Interface field. For example, ethernet1/8. • Select Next Hop as None. • Enter 11 (as different than IPsec route) for Metric. • Click OK. 14. Click OK. (3) Configure PBF Rules for ISP2 on the Branch Fir...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
111
Palo Alto Networks PAN-OS 10.2 CCECG 112 ii. Select ethernet1/1 as in example above. iii. In the Source Address window, Click Add. iv. Enter 172.16.100.87 as in example above. v. Select any for Source User window. • On Destination/Application/Service tab i. In the Destination Address window, click Add. ii. Enter 17...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
112
Palo Alto Networks PAN-OS 10.2 CCECG 113 iii. Enter 30.1.1.40 as Next Hop (IP address of peer device alternative interface). 3. Click OK. 4. Create a policy rule for ISP-IPSEC. • Click Add. • On the General tab, enter a name in Name field. For example, ISP-IPSEC. • On the Source tab, select Interface as Type. i....
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
113
Palo Alto Networks PAN-OS 10.2 CCECG 114 (6) Configure a Security Policy on the HQ-Central Firewall to allow Traffic: 1. Login with Administrator Role. 2. Select Policies > Security. Click Add. • On the General tab, enter a name in Name field. For example, PBF_rule_Allow. • On the Source Zone tab, add ISP2 and Centr...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
114
Palo Alto Networks PAN-OS 10.2 CCECG 115 • On the Application tab, select any as the Applications. • On the Service/URL Category tab, select any as the Service and URL Category. • On the Action tab, select Deny as the Action. 3. Click OK.
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
115
Palo Alto Networks PAN-OS 10.2 CCECG 116 7.12Verify and Update System Software The administrator must verify the TOE version is the evaluated version 10.2.3-h2. The TOE version is verified using the show system info command. If the delivered version is not version 10.2.3-h2 please follow the commands: • request syst...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
116
Palo Alto Networks PAN-OS 10.2 CCECG 117 11. Verify the updated TOE software version. • UI: Dashboard > General Information • CLI: show system info | match sw-version CLI HINT: The equivalent CLI commands are request system software check, request system software download version <Version Number> and request system s...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
117
Palo Alto Networks PAN-OS 10.2 CCECG 118 7.13XML and REST API The Application Programming Interface (API) allows administrators to manage the TOE through a third-party service, application, or script. The TOE supports two types of API: REST API and XML API. • The XML API uses a tree of XML nodes to map TOE function...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
118
Palo Alto Networks PAN-OS 10.2 CCECG 119 To use the API (XML or REST), you must enable API access for your administrators and get your API key. By default, the TOE supports API requests over HTTPS. To enforce key rotation set an API key lifetime; the administrator can also revoke all API keys to protect from acciden...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
119
Palo Alto Networks PAN-OS 10.2 CCECG 120 • Root nodes are top-level nodes with no parent. Requesting the root node returns all child elements. • Element nodes represent containers of information. Element nodes can contain other element nodes or simply act as a container of information. Example: <permissions></permi...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
120
Palo Alto Networks PAN -OS 10. 2 CCECG 121
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
121
Palo Alto Networks PAN-OS 10.2 CCECG 122 7.13.5 Enable API Access The API supports the following types of Administrators and Admin roles: • Dynamic roles: Superuser, Superuser (readonly), Device admin, Device admin (readonly), Vsys admin, Vsys admin (readonly) • Role-based Admins: Device, Vsys. Admin Role profiles en...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
122
Palo Alto Networks PAN-OS 10.2 CCECG 123 <response status="success"> <result> <key>gJlQWE56987nBxIqyfa62sZeRtYuIo2BgzEA9UOnlZBhU</key> </result> </response> A failure API call is shown below. <response status = 'error' code = '403'><result><msg>Invalid Credential</msg></result></response> You can revoke all currently...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
123
Palo Alto Networks PAN-OS 10.2 CCECG 124 LU234T02234565s2Z1FtZWFyWXJOSTdk1234565234565=" -k 'https://<TOE>/api/?type=op&cmd=<show><system><info></info></system></show>' NOTE: Curl requires a backward slash to encode some special character such as a square bracket. For example, curl -k -X GET 'https://10.8.48.106/api...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
124
Palo Alto Networks PAN-OS 10.2 CCECG 125 7.13.7 Structure of REST API Request The PAN-OS REST API URL format includes a base path and the URI for the endpoint. The base path includes the FQDN or IP address of the TOE and the version. The resource URI is the path for the resource or endpoint you want to work with, and...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
125
Palo Alto Networks PAN-OS 10.2 CCECG 126 "member": [ "zone-edge1" ] }, "source-user": { "member": [ "any" ] }, "application": { "member": [ "email-collaboration-apps" ] }, "service": { "member": [ "application-default" ] }, "hip-profiles": { "member": [ "any" ] }, "action": "allow", "category": { "member": [ "any" ] }...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
126
Palo Alto Networks PAN-OS 10.2 CCECG 127 "source": { "member": [ "any" ] }, "destination": { "member": [ "any" ] } } ] }’
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
127
Palo Alto Networks PAN-OS 10.2 CCECG 128 7.14Self-Tests The TOE performs a suite of FIPS self-tests during power-up and on demand (via reboot). If any of the self-test fails, the TOE will enter maintenance mode (i.e., no longer in the evaluated configuration). The TOE enters an error state and outputs an error indic...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
128
Palo Alto Networks PAN-OS 10.2 CCECG 129 The FIPS power-up self-tests that are executed are provided below: • AES Encrypt Known Answer Test • AES Decrypt Known Answer Test • AES GCM Encrypt Known Answer Test • AES GCM Decrypt Known Answer Test • AES CCM Encrypt Known Answer Test • AES CCM Decrypt Known Answer Test • R...
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
129
Palo Alto Networks PAN-OS 10.2 CCECG 130 • Firmware Integrity Test – verified with HMAC-SHA-256 and ECDSA P-256. If the calculated result does not equal the previously generated result, the software/firmware test shall fail.
https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf
0
Lawrence C. Miller, CISSP Brought to you by • Differentiate between “good” and “bad” applications • Identify evasive techniques used by applications • Implement effective application and network controls Learn to: Next-Generation Firewalls Making Everything Easier!™ Open the book and find: • How Enterprise 2.0 app...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
1
About Palo Alto Networks Palo Alto Networks™ is the network security company. Its next￾generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just IP address — at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technol...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
2
Next-Generation Firewalls FOR DUMmIES‰ by Lawrence C. Miller, CISSP 01_939550-ffirs.indd i 10/1/10 1:32 PM These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
3
Next-Generation Firewalls For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana No part of this publication may be reproduced, stored in a retrieval system or t...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
4
Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 About This Book ........................................................................ 1 Foolish Assumptions ................................................................. 2 How This Book Is Organized .........
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
5
Next-Generation Firewalls For Dummies iv Traditional IPS Is a Poor Match for Today’s Threats .......... 30 UTM Only Makes What Is Broken Cheaper ........................... 33 It’s Time to Fix the Firewall .................................................... 33 Chapter 4: Solving the Problem with Next-Generation Firew...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
6
Introduction With new Internet-based threats being launched faster than ever and increasingly targeting “firewall friendly” applications and application-layer vulnerabilities, traditional firewalls are becoming less and less capable of adequately protecting corporate networks. The rapid evolution of applications an...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
7
2 Next-Generation Firewalls For Dummies Foolish Assumptions This book assumes you have a working knowledge of network security. As such, it is written primarily for technical readers who are evaluating potential new solutions to address their organizations’ security challenges. How This Book Is Organized This book ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
8
Introduction 3 Chapter 4: Solving the Problem with Next-Generation Firewalls Chapter 4 takes a deep dive into the advanced features and capabilities of next-generation firewalls. You learn what a next-generation firewall is, what it isn’t, and how it can benefit your organization. Chapter 5: Deploying Next￾Generat...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
9
4 Next-Generation Firewalls For Dummies isn’t available to point this information out for you, so we do it instead! This icon points out information or a concept that may well be worth committing to memory, so don’t make like a wise guy and fuggedaboutit — instead, make wise and don’t ever forget it! You won’t fin...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
10
Chapter 1 Understanding the Evolution of Network Security In This Chapter ▶ Understanding why port-based firewalls have become obsolete ▶ Addressing the data leakage problem ▶ Achieving regulatory compliance Just as antivirus software has been a cornerstone of PC security since the early days of the Internet, firewa...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
11
6 Next-Generation Firewalls For Dummies Why Legacy Firewalls Are No Longer Effective A firewall, at its most basic level, controls traffic flow between a trusted network (such as a corporate LAN) and an untrusted or public network (such as the Internet). The most commonly deployed firewalls today are port-based (o...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
12
Chapter 1: Understanding the Evolution of Network Security 7 with a computer or server on the untrusted network, a con￾nection is established. On stateful packet inspection firewalls, a dynamic rule is temporarily created to allow responses or replies from the computer or server on the untrusted network. Otherwise,...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
13
8 Next-Generation Firewalls For Dummies are not isolated: the U.S. Army’s Walter Reed Medical Center, a U.S. Government contractor working on Marine One, and Pfizer Corporation all had earlier high-profile breaches of a similar nature. In all of these cases, sensitive data was leaked via an application that was ex...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
14
Chapter 1: Understanding the Evolution of Network Security 9 port- and protocol-based firewalls can’t do anything about any of this — being ignorant of applications, users, and content. To effectively address data leakage with a firewall solution, organizations should ✓ Gain control over the applications on their ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
15
10 Next-Generation Firewalls For Dummies cards), regardless of the number or amount of transactions processed. Companies that do not comply can be subject to stiff penalties including fines of up to $25,000 per month for minor violations, fines of up to $500,000 for violations that result in actual lost or stolen ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
16
Chapter 2 Defining the Application and Threat Landscape In This Chapter ▶ Identifying applications as good, bad, or good and bad ▶ Understanding accessibility tactics ▶ Recognizing the speed and sophistication of today’s threats Network security used to be relatively simple — every￾thing was more or less black and whi...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
17
12 Next-Generation Firewalls For Dummies Applications Are Not All Good or All Bad Over the past decade, the application landscape has changed dramatically for organizations. Corporate productivity applications have been joined by a plethora of personal and consumer-oriented applications. This convergence of corpo...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
18
Chapter 2: Defining the Application and Threat Landscape 13 combined with the fact that today’s knowledge workers are accustomed to using them, points toward a continuation of the consumerization trend. Defined by Appopedia (www.theapp gap.com) as “a system of web-based technologies that pro￾vide rapid and agile col...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
19
14 Next-Generation Firewalls For Dummies ✓ In that same time period, Twitter use in enterprises jumped 252 percent in terms of sessions and 775 percent in terms of bandwidth. Unsure of how to leverage the consumerization trend in their business processes, many organizations either implicitly allow these personal ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
20
Chapter 2: Defining the Application and Threat Landscape 15 For example, using a social networking application to share product documentation with a prospective customer would be “good” (medium risk, high reward), while using the same application to forward details of an upcoming release to a “friends list” that i...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
21
16 Next-Generation Firewalls For Dummies 1. Find out who’s using Facebook. There are many cases where there may already be a “corpo￾rate” Facebook presence estab￾lished by marketing or sales, so it is critical that IT determine which social networking appli￾cations are in use, who is using them, and the associate...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
22
Chapter 2: Defining the Application and Threat Landscape 17 Applications Are Evasive Although “distinguishing one type of application from the next” sounds simple, it really isn’t — for a number of reasons. In order to maximize their accessibility and use, many appli￾cations are designed from the outset to circumven...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
23
18 Next-Generation Firewalls For Dummies Google applications: The epitome of Enterprise 2.0? To a certain extent, many of the applications that Google publishes epitomize Enterprise 2.0 (Web 2.0 and Internet-based applications that are used for business pur￾poses). The Spring 2010 Application Usage and Risk Repo...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
24
Chapter 2: Defining the Application and Threat Landscape 19 When compared to Palo Alto Networks’ Fall 2009 Application Usage and Risk Report, several facts support the trend toward increased usage of Enterprise 2.0 applications: ✓ Google Docs consumed 55 per￾cent more bandwidth and 42 percent more sessions on a ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
25
20 Next-Generation Firewalls For Dummies Finally, many new business applications also use these same techniques to facilitate ease of operation while minimizing dis￾ruptions for customers, partners, and the organization’s own security and operations departments. For example, RPC and Sharepoint use port hopping beca...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
26
Chapter 2: Defining the Application and Threat Landscape 21 traditional security infrastructure. Specifically, the wide variety of higher-order applications riding on top of HTTP and HTTPS — whether or not they actually serve a legitimate business purpose — are practically indistinguishable for older network secur...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
27
22 Next-Generation Firewalls For Dummies and those tools that rely on threat signatures (such as antivirus software and intrusion prevention), are unable to keep up — at least during the early phases of a new attack. This speed-based approach is facilitated in large part by the widespread availability of threat dev...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
28
Chapter 2: Defining the Application and Threat Landscape 23 MSN Gnutella Ares Direct￾Connect Kazaa Imesh Emule BitTorrent 10% 30% 50% 70% 90% 89% 67% 58% 54% 44% 21% 16% Top Mariposa Spreaders Found 20% ✓ 312 (86 percent) of the organiza￾tions had at least one of the P2P applications used by Mariposa. ✓ An average ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
29
24 Next-Generation Firewalls For Dummies Many of today’s threats are built to run covertly on networks and systems, quietly collecting sensitive or personal data, and going undetected for as long as possible. This approach helps to preserve the value of the stolen data and enables repeated use of the same exploits...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
30
Chapter 3 Recognizing the Challenges of Legacy Security Infrastructures In This Chapter ▶ Inspecting weaknesses in legacy port-based firewalls ▶ Examining the shortcomings of intrusion prevention ▶ Addressing device sprawl As the application and threat landscape has quickly evolved, the impact within many organizati...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
31
26 Next-Generation Firewalls For Dummies requests from the business and its end-users. Unfortunately, traditional network security infrastructures have failed to keep pace and are unable to provide this functionality. In this chapter, you find out how the new application and threat landscape has challenged these le...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
32
Chapter 3: The Challenges of Legacy Security Infrastructures 27 Port-based firewalls have poor vision Because they are deployed in-line at critical network junctions, firewalls see all traffic and, therefore, are the ideal resource to provide granular access control. The problem, however, is that most firewalls ar...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
33
28 Next-Generation Firewalls For Dummies The net result is that traditional, “port-based” firewalls have basically gone blind. Besides being unable to account for common evasion techniques such as port hopping, protocol tunneling, and the use of nonstandard ports, these firewalls simply lack the visibility and int...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
34
Chapter 3: The Challenges of Legacy Security Infrastructures 29 with its complete lack of application awareness, is still used for initial classification of all traffic. The problems and limita￾tions this leads to include ✓ Applications that should not be on the network are allowed onto the network. ✓ Not everythi...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
35
30 Next-Generation Firewalls For Dummies Then comes the kicker: device sprawl. As one “solution” after another is added to the network, the device count, degree of complexity, and total cost of ownership all continue to rise. Capital costs for the products themselves and all of the support￾ing infrastructure that i...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
36
Chapter 3: The Challenges of Legacy Security Infrastructures 31 most IPS products support them all. These techniques include protocol anomaly detection, stateful pattern matching, statistical anomaly detection, heuristic analy￾sis, blocking of invalid or malformed packets, and IP defragmentation and TCP reassembly ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
37
32 Next-Generation Firewalls For Dummies various threats, encrypted attacks still need a conduit — enter user-centric applications. Users are easily duped into clicking on encrypted links (too many users think that HTTPS means “safe”), which can send encrypted threats sailing through enterprise defenses. This is i...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
38
Chapter 3: The Challenges of Legacy Security Infrastructures 33 UTM Only Makes What Is Broken Cheaper Unified Threat Management (UTM) devices are another new approach to modern security challenges that are based on traditional techniques. UTM solutions were born as security vendors began bolting intrusion preventi...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
39
34 Next-Generation Firewalls For Dummies some incremental value, but it’s getting harder to justify their additional cost and complexity — especially during challeng￾ing economic times. More security appliances don’t necessarily mean a more secure environment. In fact, the complexity and inconsistency associated wi...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
40
Chapter 4 Solving the Problem with Next-Generation Firewalls In This Chapter ▶ Identifying applications, users, and content ▶ Comparing performance between next-generation and legacy firewall architectures ▶ Recognizing the security and business benefits of next-generation firewalls Network security in most enterpri...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
41
36 Next-Generation Firewalls For Dummies enterprise networks. The essential functional requirements for an effective next-generation firewall include the ability to: ✓ Identify applications regardless of port, protocol, evasive techniques, or SSL encryption before doing anything else ✓ Provide visibility of and gr...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
42
Chapter 4: Solving the Problem with Next-Generation Firewalls 37 tactics. Application identification techniques used in NGFWs (see Figure 4-2) include ✓ Application protocol detection and decryption. Determines the application protocol (for example, HTTP) and, if SSL is in use, decrypts the traffic so that it can b...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
43
38 Next-Generation Firewalls For Dummies ✓ Heuristics. For traffic that eludes identification by sig￾nature analysis, heuristic (or behavioral) analyses are applied — enabling identification of any troublesome applications, such as P2P or VoIP tools that use propri￾etary encryption. webex ORACLE skype meebo You Tub...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
44
Chapter 4: Solving the Problem with Next-Generation Firewalls 39 User identification User identification technology links IP addresses to specific user identities, enabling visibility and control of network activity on a per-user basis. Tight integration with LDAP direc￾tories, such as Microsoft Active Directory (AD...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
45
40 Next-Generation Firewalls For Dummies Paul Engineering Steve Finance Finance Group Nancy Marketing 10.0.0.27 10.0.0.21 10.0.0.182 10.0.0.29 10.0.0 10.0.0.242 10.0.0.26 10.0.0. 10.0.0.187 10.0.0.2 10.0.0.227 Login Monitoring User Identification End Station Polling Role Discovery Captive Portal Figure 4-3: User id...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
46
Chapter 4: Solving the Problem with Next-Generation Firewalls 41 monitor and control Web surfing activities of employees and guest users. Employed in conjunction with user iden￾tification, Web usage policies can even be set on a per￾user basis, further safeguarding the enterprise from an array of legal, regulatory, ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
47
42 Next-Generation Firewalls For Dummies Policy control Identifying the applications in use (application identifica￾tion), who is using them (user identification), and what they are using them for (content identification) is an important first step in learning about the traffic traversing the net￾work. Learning what...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
48
Chapter 4: Solving the Problem with Next-Generation Firewalls 43 the tremendous traffic volume confronting today’s security infrastructure, not to mention the latency sensitivity of many applications. Rated throughput and reasonable latency should be sustainable under heavy loads, even when all application and thr...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
49
44 Next-Generation Firewalls For Dummies In contrast, a NGFW that uses a single-pass architecture eliminates repetitive handling of packets, reducing the burden placed on hardware and minimizing latency. Other innovations, such as customized hardware architecture that maintains separate data and control planes, he...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
50
Chapter 4: Solving the Problem with Next-Generation Firewalls 45 ✓ Proxy-based products. Proxies (both firewall and cach￾ing) sit between source and destination, intercepting traffic and inspecting it by terminating the application session and reinitiating it to the target destination. The proxy establishes the co...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
51
46 Next-Generation Firewalls For Dummies Benefits of Next-Generation Firewalls Next-generation firewalls produce numerous benefits over traditional network security infrastructures and solutions. These include ✓ Visibility and control. The enhanced visibility and control provided by NGFWs enable enterprises to fo...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
52
Chapter 5 Deploying Next-Generation Firewalls In This Chapter ▶ Implementing employee, desktop, and network controls ▶ Asking the right questions to help you choose the best solution ▶ Designing your network for optimum performance and security Far too often, technical solutions are implemented without considering th...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
53
48 Next-Generation Firewalls For Dummies Safe Enablement through Smart Policies Enablement is first and foremost about education and knowl￾edge of applications, behavior, risks, and users. In the case of Enterprise 2.0 applications, the users have long since decided on the benefits, although there continue to be op...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
54
Chapter 5: Deploying Next-Generation Firewalls 49 trading, the use of instant messaging may be prone to reten￾tion and auditability rules. IT’s role is to educate the traders on the implications of each of the tools, participate in the development of the use policy, and subsequently monitor and enforce its use. In ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
55
50 Next-Generation Firewalls For Dummies The development of policy guidelines is often challenging as tension between risk and reward has polarized opinions about what should be allowed and what should be prohibited. At the core of the issue is the fact that the two organizational groups that are typically involve...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
56
Chapter 5: Deploying Next-Generation Firewalls 51 Network controls At the network level, what is needed is a means to identify Enterprise 2.0 applications and block or control them. By implementing network level controls, IT is able to minimize the possibility of threats and disruptions stemming from the use of En...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
57
52 Next-Generation Firewalls For Dummies mimic the application they are trying to control so they struggle with updates to existing applications as well as development of proxies for new applications. A final issue that plagues proxy solutions is throughput per￾formance brought on by how the proxy terminates the a...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
58
Chapter 5: Deploying Next-Generation Firewalls 53 Next, define your organization’s technical requirements. Fortunately, you don’t necessarily have to reinvent the wheel here. Begin by taking a look at your organization’s security poli￾cies (see the previous section) to see what capabilities will be needed in order ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
59
54 Next-Generation Firewalls For Dummies • If a new application is needed, what is the process for adding it to the device? • Can an end-user submit an application for iden￾tification and analysis and/or define custom applications? • Does the product support URL filtering? Describe the URL filtering database. Is th...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
60
Chapter 5: Deploying Next-Generation Firewalls 55 ✓ Management. Describe the management capabilities and visibility tools that enable a clear picture of the traffic on the network. • Does device management require a separate server or device? • Are application policy controls, firewall policy con￾trols, and threat...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
61
56 Next-Generation Firewalls For Dummies Deployment Flexibility Matters It’s important to design your network to maximize perfor￾mance and efficiency. Properly deploying a NGFW in the most optimal location or locations on your network is no less impor￾tant. Segmentation is a key concept in the proper design of netwo...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
62
Chapter 5: Deploying Next-Generation Firewalls 57 Many different technologies can be used to segment the network, but when looking at segmentation as a way to iso￾late the sensitive data or critical infrastructure, several key requirements need to be taken into account. ✓ Flexibility. To segment the network for sec...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
63
58 Next-Generation Firewalls For Dummies ✓ Endpoint security suites. Distribution and installation are often problematic, while overloaded feature sets typically create challenges in terms of client-side performance, resource requirements, and ongoing administration. ✓ Cloud or CPE-based proxies. Associated Web ...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
64
Chapter 6 Ten Evaluation Criteria for Next-Generation Firewalls In This Chapter ▶ Knowing what features to look for in a next-generation firewall! This chapter gives you a few answers to look for from the vendors you are considering, once you’ve developed your RFP. Note: If you haven’t yet developed an RFP to define...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
65
60 Next-Generation Firewalls For Dummies Identify Users, Not IP Addresses Seamless integration with enterprise directory services (such as Active Directory, LDAP, and eDirectory) enables adminis￾trators to tie network activity to users and groups, not just IP addresses. When used with application- and content iden￾t...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
66
Chapter 6: Ten Evaluation Criteria for Next-Generation Firewalls 61 Identify Content, Not Packets With employees using any application they desire and surf￾ing the Web with impunity, it’s no wonder that enterprises struggle to protect the network from threat activity. The first step in regaining control over the thr...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
67
62 Next-Generation Firewalls For Dummies • Heuristic-based analysis • Block invalid or malformed packets • IP defragmentation and TCP reassembly • Custom vulnerability and spyware signatures Traffic is normalized to eliminate invalid and malformed packets, while TCP reassembly and IP defragmentation is performed t...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
68
Chapter 6: Ten Evaluation Criteria for Next-Generation Firewalls 63 Control A robust next-generation firewall solution provides granular application usage control policies, such as any combination of ✓ Allow or deny ✓ Allow certain application functions and apply traffic shaping ✓ Allow but scan ✓ Decrypt and in...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf
69
64 Next-Generation Firewalls For Dummies ✓ IPSec and SSL VPN support ✓ High-capacity interfaces and multiple, mixed modes (such as tap, Layer 1, Layer 2, and Layer 3) Reliability Reliability helps ensure nonstop operations and entails fea￾tures such as: ✓ Active-passive and/or active-active failover ✓ State and c...
https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf