index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
100 | Palo Alto Networks PAN-OS 10.2 CCECG
101
7. Configure as shown above.
8. Click on the IPv6 Drop.
9. Configure as shown above.
10. Click OK to create the profile object.
11. Now associate that profile object with a security zone.
12. Select Network > Zones. Create a new zone or modifying an existing zone.
13. Go to th... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
101 | Palo Alto Networks PAN-OS 10.2 CCECG
102
14. Click OK.
15. Commit the changes.
7.10.2 Denial of Service (DoS) Protection Profile
The DoS protection profiles, and DoS protection policy rules combine to protect specific groups
of critical resources and individual critical resources against session floods such as TCP SY... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
102 | Palo Alto Networks PAN-OS 10.2 CCECG
103
4. Click OK.
5. Go to Policies > Dos Protection. Click Add.
6. On the General tab, enter a name and description.
7. Specify the source and destination zones and/or IP addresses.
8. On the Option/Protection tab, specify the service (e.g., web server or servicehttp/service-htt... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
103 | Palo Alto Networks PAN-OS 10.2 CCECG
104
7.11Configure IKE/IPsec VPN Gateway
The administrator can configure the TOE as an IKE/IPsec VPN gateway and specify IKEv1 only
mode, IKEv2 only mode, or IKEv2 preferred mode. The gateway begins its negotiation with its
peer in the mode specified here. If the administrator se... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
104 | Palo Alto Networks PAN-OS 10.2 CCECG
105
A trusted channel is established only if the presented identifier in the peer certificate matches
the configured reference identifier, and the peer certificate is signed by a trusted anchor CA
specified in the Certificate Profile. Local identification defines the format and i... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
105 | Palo Alto Networks PAN-OS 10.2 CCECG
106
When configuring an IKE cryptographic profile:
• Only the following Diffie-Hellman (DH) groups are to be used: group14; group19;
group20.
• Only the following authentication algorithms are to be used: sha1; sha256; sha384;
sha512.
• Only the following encryption algorithms... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
106 | Palo Alto Networks PAN-OS 10.2 CCECG
107
Note also, when configuring and selecting IKE and IPsec cryptographic profiles, that the key
strength of the encryption algorithm specified in the IPsec profile is not to be greater than the
key strength of the encryption algorithm specified in the IKE profile. For example, i... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
107 | Palo Alto Networks PAN
-OS 10.
2 CCECG
108 | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
108 | Palo Alto Networks PAN-OS 10.2 CCECG
109
(1) Configure Zones, Ports, and Interfaces on the Branch Firewall:
1. Login with Administrator Role.
2. Select Network > Zones. Click Add.
• Enter the zone name in the Name field. In example above, ISP2.
• Select Type as Layer 3.
3. Click OK.
4. Select Network > Interfaces.... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
109 | Palo Alto Networks PAN-OS 10.2 CCECG
110
• Click OK.
14. Click OK.
(2) Configure Zones, Ports, and Interfaces on the HQ-Central Firewall:
1. Login with Administrator Role.
2. Select Network > Zones. Click Add.
• Enter the zone name in the Name field. In example above, ISP2.
• Select Type as Layer 3.
3. Click OK.
... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
110 | Palo Alto Networks PAN-OS 10.2 CCECG
111
• Enter the Destination field. For example, 172.16.101.0/24.
• Enter the Interface field. For example, ethernet1/8.
• Select Next Hop as None.
• Enter 11 (as different than IPsec route) for Metric.
• Click OK.
14. Click OK.
(3) Configure PBF Rules for ISP2 on the Branch Fir... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
111 | Palo Alto Networks PAN-OS 10.2 CCECG
112
ii. Select ethernet1/1 as in example above.
iii. In the Source Address window, Click Add.
iv. Enter 172.16.100.87 as in example above.
v. Select any for Source User window.
• On Destination/Application/Service tab
i. In the Destination Address window, click Add.
ii. Enter 17... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
112 | Palo Alto Networks PAN-OS 10.2 CCECG
113
iii. Enter 30.1.1.40 as Next Hop (IP address of peer device alternative
interface).
3. Click OK.
4. Create a policy rule for ISP-IPSEC.
• Click Add.
• On the General tab, enter a name in Name field. For example, ISP-IPSEC.
• On the Source tab, select Interface as Type.
i.... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
113 | Palo Alto Networks PAN-OS 10.2 CCECG
114
(6) Configure a Security Policy on the HQ-Central Firewall to allow Traffic:
1. Login with Administrator Role.
2. Select Policies > Security. Click Add.
• On the General tab, enter a name in Name field. For example, PBF_rule_Allow.
• On the Source Zone tab, add ISP2 and Centr... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
114 | Palo Alto Networks PAN-OS 10.2 CCECG
115
• On the Application tab, select any as the Applications.
• On the Service/URL Category tab, select any as the Service and URL Category.
• On the Action tab, select Deny as the Action.
3. Click OK. | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
115 | Palo Alto Networks PAN-OS 10.2 CCECG
116
7.12Verify and Update System Software
The administrator must verify the TOE version is the evaluated version 10.2.3-h2. The TOE
version is verified using the show system info command. If the delivered version is not version
10.2.3-h2 please follow the commands:
• request syst... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
116 | Palo Alto Networks PAN-OS 10.2 CCECG
117
11. Verify the updated TOE software version.
• UI: Dashboard > General Information
• CLI: show system info | match sw-version
CLI HINT: The equivalent CLI commands are request system software check, request system
software download version <Version Number> and request system s... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
117 | Palo Alto Networks PAN-OS 10.2 CCECG
118
7.13XML and REST API
The Application Programming Interface (API) allows administrators to manage the TOE through a
third-party service, application, or script. The TOE supports two types of API: REST API and XML
API.
• The XML API uses a tree of XML nodes to map TOE function... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
118 | Palo Alto Networks PAN-OS 10.2 CCECG
119
To use the API (XML or REST), you must enable API access for your administrators and get your
API key. By default, the TOE supports API requests over HTTPS. To enforce key rotation set an
API key lifetime; the administrator can also revoke all API keys to protect from acciden... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
119 | Palo Alto Networks PAN-OS 10.2 CCECG
120
• Root nodes are top-level nodes with no parent. Requesting the root node returns all child
elements.
• Element nodes represent containers of information. Element nodes can contain other
element nodes or simply act as a container of information. Example:
<permissions></permi... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
120 | Palo Alto Networks PAN
-OS 10.
2 CCECG
121 | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
121 | Palo Alto Networks PAN-OS 10.2 CCECG
122
7.13.5 Enable API Access
The API supports the following types of Administrators and Admin roles:
• Dynamic roles: Superuser, Superuser (readonly), Device admin, Device admin (readonly),
Vsys admin, Vsys admin (readonly)
• Role-based Admins: Device, Vsys.
Admin Role profiles en... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
122 | Palo Alto Networks PAN-OS 10.2 CCECG
123
<response status="success">
<result>
<key>gJlQWE56987nBxIqyfa62sZeRtYuIo2BgzEA9UOnlZBhU</key>
</result>
</response>
A failure API call is shown below.
<response status = 'error' code = '403'><result><msg>Invalid Credential</msg></result></response>
You can revoke all currently... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
123 | Palo Alto Networks PAN-OS 10.2 CCECG
124
LU234T02234565s2Z1FtZWFyWXJOSTdk1234565234565=" -k
'https://<TOE>/api/?type=op&cmd=<show><system><info></info></system></show>'
NOTE: Curl requires a backward slash to encode some special character such as a square
bracket. For example, curl -k -X GET
'https://10.8.48.106/api... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
124 | Palo Alto Networks PAN-OS 10.2 CCECG
125
7.13.7 Structure of REST API Request
The PAN-OS REST API URL format includes a base path and the URI for the endpoint.
The base path includes the FQDN or IP address of the TOE and the version. The resource URI is
the path for the resource or endpoint you want to work with, and... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
125 | Palo Alto Networks PAN-OS 10.2 CCECG
126
"member": [
"zone-edge1"
]
},
"source-user": {
"member": [
"any"
]
},
"application": {
"member": [
"email-collaboration-apps"
]
},
"service": {
"member": [
"application-default"
]
},
"hip-profiles": {
"member": [
"any"
]
},
"action": "allow",
"category": {
"member": [
"any"
]
}... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
126 | Palo Alto Networks PAN-OS 10.2 CCECG
127
"source": {
"member": [
"any"
]
},
"destination": {
"member": [
"any"
]
}
}
]
}’ | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
127 | Palo Alto Networks PAN-OS 10.2 CCECG
128
7.14Self-Tests
The TOE performs a suite of FIPS self-tests during power-up and on demand (via reboot). If any
of the self-test fails, the TOE will enter maintenance mode (i.e., no longer in the evaluated
configuration). The TOE enters an error state and outputs an error indic... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
128 | Palo Alto Networks PAN-OS 10.2 CCECG
129
The FIPS power-up self-tests that are executed are provided below:
• AES Encrypt Known Answer Test
• AES Decrypt Known Answer Test
• AES GCM Encrypt Known Answer Test
• AES GCM Decrypt Known Answer Test
• AES CCM Encrypt Known Answer Test
• AES CCM Decrypt Known Answer Test
• R... | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
129 | Palo Alto Networks PAN-OS 10.2 CCECG
130
• Firmware Integrity Test – verified with HMAC-SHA-256 and ECDSA P-256. If the
calculated result does not equal the previously generated result, the software/firmware
test shall fail. | https://www.niap-ccevs.org/MMO/ProductAM/st_vid11284-agd.pdf |
0 | Lawrence C. Miller, CISSP
Brought to you by
• Differentiate between “good”
and “bad” applications
• Identify evasive techniques used
by applications
• Implement effective application
and network controls
Learn to:
Next-Generation Firewalls
Making Everything Easier!™
Open the book and find:
• How Enterprise 2.0
app... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
1 | About Palo Alto Networks
Palo Alto Networks™ is the network security company. Its nextgeneration firewalls enable unprecedented visibility and
granular policy control of applications and content — by user,
not just IP address — at up to 10Gbps with no performance
degradation. Based on patent-pending App-ID™ technol... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
2 | Next-Generation
Firewalls
FOR
DUMmIES‰
by Lawrence C. Miller, CISSP
01_939550-ffirs.indd i 10/1/10 1:32 PM
These materials are the copyright of Wiley Publishing, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited. | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
3 | Next-Generation Firewalls For Dummies®
Published by
Wiley Publishing, Inc.
111 River Street
Hoboken, NJ 07030-5774
Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana
Published by Wiley Publishing, Inc., Indianapolis, Indiana
No part of this publication may be reproduced, stored in a retrieval system or t... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
4 | Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
About This Book ........................................................................ 1
Foolish Assumptions ................................................................. 2
How This Book Is Organized ......... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
5 | Next-Generation Firewalls For Dummies iv
Traditional IPS Is a Poor Match for Today’s Threats .......... 30
UTM Only Makes What Is Broken Cheaper ........................... 33
It’s Time to Fix the Firewall .................................................... 33
Chapter 4: Solving the Problem with
Next-Generation Firew... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
6 | Introduction
With new Internet-based threats being launched faster
than ever and increasingly targeting “firewall friendly”
applications and application-layer vulnerabilities, traditional
firewalls are becoming less and less capable of adequately
protecting corporate networks.
The rapid evolution of applications an... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
7 | 2 Next-Generation Firewalls For Dummies
Foolish Assumptions
This book assumes you have a working knowledge of network
security. As such, it is written primarily for technical readers
who are evaluating potential new solutions to address their
organizations’ security challenges.
How This Book Is Organized
This book ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
8 | Introduction 3
Chapter 4: Solving the Problem
with Next-Generation Firewalls
Chapter 4 takes a deep dive into the advanced features and
capabilities of next-generation firewalls. You learn what a
next-generation firewall is, what it isn’t, and how it can benefit
your organization.
Chapter 5: Deploying NextGenerat... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
9 | 4 Next-Generation Firewalls For Dummies
isn’t available to point this information out for you, so we do
it instead!
This icon points out information or a concept that may well
be worth committing to memory, so don’t make like a wise
guy and fuggedaboutit — instead, make wise and don’t ever
forget it!
You won’t fin... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
10 | Chapter 1
Understanding
the Evolution of
Network Security
In This Chapter
▶ Understanding why port-based firewalls have become obsolete
▶ Addressing the data leakage problem
▶ Achieving regulatory compliance
Just as antivirus software has been a cornerstone of PC
security since the early days of the Internet, firewa... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
11 | 6 Next-Generation Firewalls For Dummies
Why Legacy Firewalls Are
No Longer Effective
A firewall, at its most basic level, controls traffic flow between
a trusted network (such as a corporate LAN) and an untrusted
or public network (such as the Internet). The most commonly
deployed firewalls today are port-based (o... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
12 | Chapter 1: Understanding the Evolution of Network Security 7
with a computer or server on the untrusted network, a connection is established. On stateful packet inspection firewalls,
a dynamic rule is temporarily created to allow responses
or replies from the computer or server on the untrusted
network. Otherwise,... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
13 | 8 Next-Generation Firewalls For Dummies
are not isolated: the U.S. Army’s Walter Reed Medical Center,
a U.S. Government contractor working on Marine One, and
Pfizer Corporation all had earlier high-profile breaches of a
similar nature. In all of these cases, sensitive data was leaked
via an application that was ex... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
14 | Chapter 1: Understanding the Evolution of Network Security 9
port- and protocol-based firewalls can’t do anything about any
of this — being ignorant of applications, users, and content.
To effectively address data leakage with a firewall solution,
organizations should
✓ Gain control over the applications on their ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
15 | 10 Next-Generation Firewalls For Dummies
cards), regardless of the number or amount of transactions
processed.
Companies that do not comply can be subject to stiff penalties
including fines of up to $25,000 per month for minor violations,
fines of up to $500,000 for violations that result in actual lost or
stolen ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
16 | Chapter 2
Defining the Application
and Threat Landscape
In This Chapter
▶ Identifying applications as good, bad, or good and bad
▶ Understanding accessibility tactics
▶ Recognizing the speed and sophistication of today’s threats
Network security used to be relatively simple — everything was more or less black and whi... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
17 | 12 Next-Generation Firewalls For Dummies
Applications Are Not
All Good or All Bad
Over the past decade, the application landscape has changed
dramatically for organizations. Corporate productivity
applications have been joined by a plethora of personal
and consumer-oriented applications. This convergence of
corpo... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
18 | Chapter 2: Defining the Application and Threat Landscape 13
combined with the fact that today’s knowledge workers are
accustomed to using them, points toward a continuation of the
consumerization trend. Defined by Appopedia (www.theapp
gap.com) as “a system of web-based technologies that provide rapid and agile col... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
19 | 14 Next-Generation Firewalls For Dummies
✓ In that same time period, Twitter use in enterprises
jumped 252 percent in terms of sessions and 775 percent
in terms of bandwidth.
Unsure of how to leverage the consumerization trend in their
business processes, many organizations either implicitly
allow these personal ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
20 | Chapter 2: Defining the Application and Threat Landscape 15
For example, using a social networking application to share
product documentation with a prospective customer would
be “good” (medium risk, high reward), while using the same
application to forward details of an upcoming release to a
“friends list” that i... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
21 | 16 Next-Generation Firewalls For Dummies
1. Find out who’s using Facebook.
There are many cases where
there may already be a “corporate” Facebook presence established by marketing or sales, so
it is critical that IT determine
which social networking applications are in use, who is using
them, and the associate... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
22 | Chapter 2: Defining the Application and Threat Landscape 17
Applications Are Evasive
Although “distinguishing one type of application from the
next” sounds simple, it really isn’t — for a number of reasons.
In order to maximize their accessibility and use, many applications are designed from the outset to circumven... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
23 | 18 Next-Generation Firewalls For Dummies
Google applications:
The epitome of Enterprise 2.0?
To a certain extent, many of the
applications that Google publishes
epitomize Enterprise 2.0 (Web 2.0
and Internet-based applications
that are used for business purposes). The Spring 2010 Application
Usage and Risk Repo... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
24 | Chapter 2: Defining the Application and Threat Landscape 19
When compared to Palo Alto
Networks’ Fall 2009 Application
Usage and Risk Report, several facts
support the trend toward increased
usage of Enterprise 2.0 applications:
✓ Google Docs consumed 55 percent more bandwidth and 42
percent more sessions on a ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
25 | 20 Next-Generation Firewalls For Dummies
Finally, many new business applications also use these same
techniques to facilitate ease of operation while minimizing disruptions for customers, partners, and the organization’s own
security and operations departments. For example, RPC and
Sharepoint use port hopping beca... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
26 | Chapter 2: Defining the Application and Threat Landscape 21
traditional security infrastructure. Specifically, the wide
variety of higher-order applications riding on top of HTTP
and HTTPS — whether or not they actually serve a legitimate
business purpose — are practically indistinguishable for older
network secur... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
27 | 22 Next-Generation Firewalls For Dummies
and those tools that rely on threat signatures (such as antivirus
software and intrusion prevention), are unable to keep up —
at least during the early phases of a new attack.
This speed-based approach is facilitated in large part by the
widespread availability of threat dev... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
28 | Chapter 2: Defining the Application and Threat Landscape 23
MSN
Gnutella
Ares
DirectConnect
Kazaa
Imesh
Emule
BitTorrent
10% 30% 50% 70% 90%
89%
67%
58%
54%
44%
21%
16%
Top Mariposa Spreaders Found
20%
✓ 312 (86 percent) of the organizations had at least one of the P2P
applications used by Mariposa.
✓ An average ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
29 | 24 Next-Generation Firewalls For Dummies
Many of today’s threats are built to run covertly on networks
and systems, quietly collecting sensitive or personal data,
and going undetected for as long as possible. This approach
helps to preserve the value of the stolen data and enables
repeated use of the same exploits... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
30 | Chapter 3
Recognizing the Challenges
of Legacy Security
Infrastructures
In This Chapter
▶ Inspecting weaknesses in legacy port-based firewalls
▶ Examining the shortcomings of intrusion prevention
▶ Addressing device sprawl
As the application and threat landscape has quickly
evolved, the impact within many organizati... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
31 | 26 Next-Generation Firewalls For Dummies
requests from the business and its end-users. Unfortunately,
traditional network security infrastructures have failed to
keep pace and are unable to provide this functionality.
In this chapter, you find out how the new application and
threat landscape has challenged these le... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
32 | Chapter 3: The Challenges of Legacy Security Infrastructures 27
Port-based firewalls
have poor vision
Because they are deployed in-line at critical network junctions,
firewalls see all traffic and, therefore, are the ideal resource
to provide granular access control. The problem, however, is
that most firewalls ar... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
33 | 28 Next-Generation Firewalls For Dummies
The net result is that traditional, “port-based” firewalls have
basically gone blind. Besides being unable to account for
common evasion techniques such as port hopping, protocol
tunneling, and the use of nonstandard ports, these firewalls
simply lack the visibility and int... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
34 | Chapter 3: The Challenges of Legacy Security Infrastructures 29
with its complete lack of application awareness, is still used
for initial classification of all traffic. The problems and limitations this leads to include
✓ Applications that should not be on the network are
allowed onto the network.
✓ Not everythi... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
35 | 30 Next-Generation Firewalls For Dummies
Then comes the kicker: device sprawl. As one “solution” after
another is added to the network, the device count, degree of
complexity, and total cost of ownership all continue to rise.
Capital costs for the products themselves and all of the supporting infrastructure that i... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
36 | Chapter 3: The Challenges of Legacy Security Infrastructures 31
most IPS products support them all. These techniques
include protocol anomaly detection, stateful pattern
matching, statistical anomaly detection, heuristic analysis, blocking of invalid or malformed packets, and IP
defragmentation and TCP reassembly ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
37 | 32 Next-Generation Firewalls For Dummies
various threats, encrypted attacks still need a conduit —
enter user-centric applications. Users are easily duped
into clicking on encrypted links (too many users think that
HTTPS means “safe”), which can send encrypted threats
sailing through enterprise defenses. This is i... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
38 | Chapter 3: The Challenges of Legacy Security Infrastructures 33
UTM Only Makes What
Is Broken Cheaper
Unified Threat Management (UTM) devices are another new
approach to modern security challenges that are based on
traditional techniques. UTM solutions were born as security
vendors began bolting intrusion preventi... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
39 | 34 Next-Generation Firewalls For Dummies
some incremental value, but it’s getting harder to justify their
additional cost and complexity — especially during challenging economic times.
More security appliances don’t necessarily mean a more
secure environment. In fact, the complexity and inconsistency
associated wi... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
40 | Chapter 4
Solving the Problem with
Next-Generation Firewalls
In This Chapter
▶ Identifying applications, users, and content
▶ Comparing performance between next-generation and legacy firewall
architectures
▶ Recognizing the security and business benefits of next-generation
firewalls
Network security in most enterpri... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
41 | 36 Next-Generation Firewalls For Dummies
enterprise networks. The essential functional requirements
for an effective next-generation firewall include the ability to:
✓ Identify applications regardless of port, protocol, evasive
techniques, or SSL encryption before doing anything else
✓ Provide visibility of and gr... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
42 | Chapter 4: Solving the Problem with Next-Generation Firewalls 37
tactics. Application identification techniques used in NGFWs
(see Figure 4-2) include
✓ Application protocol detection and decryption.
Determines the application protocol (for example, HTTP)
and, if SSL is in use, decrypts the traffic so that it can b... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
43 | 38 Next-Generation Firewalls For Dummies
✓ Heuristics. For traffic that eludes identification by signature analysis, heuristic (or behavioral) analyses are
applied — enabling identification of any troublesome
applications, such as P2P or VoIP tools that use proprietary encryption.
webex
ORACLE
skype
meebo
You Tub... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
44 | Chapter 4: Solving the Problem with Next-Generation Firewalls 39
User identification
User identification technology links IP addresses to specific
user identities, enabling visibility and control of network
activity on a per-user basis. Tight integration with LDAP directories, such as Microsoft Active Directory (AD... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
45 | 40 Next-Generation Firewalls For Dummies
Paul
Engineering
Steve
Finance
Finance
Group
Nancy
Marketing
10.0.0.27
10.0.0.21
10.0.0.182
10.0.0.29 10.0.0
10.0.0.242
10.0.0.26 10.0.0.
10.0.0.187
10.0.0.2
10.0.0.227
Login
Monitoring
User Identification
End Station
Polling
Role
Discovery
Captive
Portal
Figure 4-3: User id... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
46 | Chapter 4: Solving the Problem with Next-Generation Firewalls 41
monitor and control Web surfing activities of employees
and guest users. Employed in conjunction with user identification, Web usage policies can even be set on a peruser basis, further safeguarding the enterprise from an
array of legal, regulatory, ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
47 | 42 Next-Generation Firewalls For Dummies
Policy control
Identifying the applications in use (application identification), who is using them (user identification), and what they
are using them for (content identification) is an important
first step in learning about the traffic traversing the network. Learning what... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
48 | Chapter 4: Solving the Problem with Next-Generation Firewalls 43
the tremendous traffic volume confronting today’s security
infrastructure, not to mention the latency sensitivity of many
applications. Rated throughput and reasonable latency should
be sustainable under heavy loads, even when all application
and thr... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
49 | 44 Next-Generation Firewalls For Dummies
In contrast, a NGFW that uses a single-pass architecture
eliminates repetitive handling of packets, reducing the
burden placed on hardware and minimizing latency. Other
innovations, such as customized hardware architecture that
maintains separate data and control planes, he... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
50 | Chapter 4: Solving the Problem with Next-Generation Firewalls 45
✓ Proxy-based products. Proxies (both firewall and caching) sit between source and destination, intercepting
traffic and inspecting it by terminating the application
session and reinitiating it to the target destination. The
proxy establishes the co... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
51 | 46 Next-Generation Firewalls For Dummies
Benefits of Next-Generation
Firewalls
Next-generation firewalls produce numerous benefits over
traditional network security infrastructures and solutions.
These include
✓ Visibility and control. The enhanced visibility and control
provided by NGFWs enable enterprises to fo... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
52 | Chapter 5
Deploying Next-Generation
Firewalls
In This Chapter
▶ Implementing employee, desktop, and network controls
▶ Asking the right questions to help you choose the best solution
▶ Designing your network for optimum performance and security
Far too often, technical solutions are implemented without
considering th... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
53 | 48 Next-Generation Firewalls For Dummies
Safe Enablement through
Smart Policies
Enablement is first and foremost about education and knowledge of applications, behavior, risks, and users. In the case of
Enterprise 2.0 applications, the users have long since decided
on the benefits, although there continue to be op... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
54 | Chapter 5: Deploying Next-Generation Firewalls 49
trading, the use of instant messaging may be prone to retention and auditability rules. IT’s role is to educate the traders
on the implications of each of the tools, participate in the
development of the use policy, and subsequently monitor and
enforce its use. In ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
55 | 50 Next-Generation Firewalls For Dummies
The development of policy guidelines is often challenging
as tension between risk and reward has polarized opinions
about what should be allowed and what should be prohibited.
At the core of the issue is the fact that the two organizational
groups that are typically involve... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
56 | Chapter 5: Deploying Next-Generation Firewalls 51
Network controls
At the network level, what is needed is a means to identify
Enterprise 2.0 applications and block or control them. By
implementing network level controls, IT is able to minimize
the possibility of threats and disruptions stemming from the
use of En... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
57 | 52 Next-Generation Firewalls For Dummies
mimic the application they are trying to control so they
struggle with updates to existing applications as well
as development of proxies for new applications. A final
issue that plagues proxy solutions is throughput performance brought on by how the proxy terminates the
a... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
58 | Chapter 5: Deploying Next-Generation Firewalls 53
Next, define your organization’s technical requirements.
Fortunately, you don’t necessarily have to reinvent the wheel
here. Begin by taking a look at your organization’s security policies (see the previous section) to see what capabilities will be
needed in order ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
59 | 54 Next-Generation Firewalls For Dummies
• If a new application is needed, what is the process
for adding it to the device?
• Can an end-user submit an application for identification and analysis and/or define custom
applications?
• Does the product support URL filtering? Describe
the URL filtering database. Is th... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
60 | Chapter 5: Deploying Next-Generation Firewalls 55
✓ Management. Describe the management capabilities and
visibility tools that enable a clear picture of the traffic on
the network.
• Does device management require a separate server
or device?
• Are application policy controls, firewall policy controls, and threat... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
61 | 56 Next-Generation Firewalls For Dummies
Deployment Flexibility Matters
It’s important to design your network to maximize performance and efficiency. Properly deploying a NGFW in the most
optimal location or locations on your network is no less important. Segmentation is a key concept in the proper design of
netwo... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
62 | Chapter 5: Deploying Next-Generation Firewalls 57
Many different technologies can be used to segment the
network, but when looking at segmentation as a way to isolate the sensitive data or critical infrastructure, several key
requirements need to be taken into account.
✓ Flexibility. To segment the network for sec... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
63 | 58 Next-Generation Firewalls For Dummies
✓ Endpoint security suites. Distribution and installation
are often problematic, while overloaded feature sets
typically create challenges in terms of client-side
performance, resource requirements, and ongoing
administration.
✓ Cloud or CPE-based proxies. Associated Web ... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
64 | Chapter 6
Ten Evaluation Criteria for
Next-Generation Firewalls
In This Chapter
▶ Knowing what features to look for in a next-generation firewall!
This chapter gives you a few answers to look for from the
vendors you are considering, once you’ve developed your
RFP. Note: If you haven’t yet developed an RFP to define... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
65 | 60 Next-Generation Firewalls For Dummies
Identify Users, Not IP Addresses
Seamless integration with enterprise directory services (such
as Active Directory, LDAP, and eDirectory) enables administrators to tie network activity to users and groups, not just
IP addresses. When used with application- and content ident... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
66 | Chapter 6: Ten Evaluation Criteria for Next-Generation Firewalls 61
Identify Content, Not Packets
With employees using any application they desire and surfing the Web with impunity, it’s no wonder that enterprises
struggle to protect the network from threat activity. The first
step in regaining control over the thr... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
67 | 62 Next-Generation Firewalls For Dummies
• Heuristic-based analysis
• Block invalid or malformed packets
• IP defragmentation and TCP reassembly
• Custom vulnerability and spyware signatures
Traffic is normalized to eliminate invalid and malformed
packets, while TCP reassembly and IP defragmentation is
performed t... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
68 | Chapter 6: Ten Evaluation Criteria for Next-Generation Firewalls 63
Control
A robust next-generation firewall solution provides granular
application usage control policies, such as any combination of
✓ Allow or deny
✓ Allow certain application functions and apply traffic
shaping
✓ Allow but scan
✓ Decrypt and in... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
69 | 64 Next-Generation Firewalls For Dummies
✓ IPSec and SSL VPN support
✓ High-capacity interfaces and multiple, mixed modes
(such as tap, Layer 1, Layer 2, and Layer 3)
Reliability
Reliability helps ensure nonstop operations and entails features such as:
✓ Active-passive and/or active-active failover
✓ State and c... | https://media.paloaltonetworks.com/documents/ebook_NGFW_dummies.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.