SlideShare uma empresa Scribd logo
1 de 42
#ATM16
Policy
Enforcement
Firewall
Amish Shah, PLM @ArubaNetworks |
2#ATM16
Agenda
– Trends and Challenges
– Aruba’s Policy Enforcement Firewall
– AppRF
– WebCC
– IP Rep
– Geo Location
– Demo
@ArubaNetworks |
3#ATM16
Growing demands for the Digital Workplace
BYOD Video
68%
employee owned
(BYOD) devices
access business
apps 1
>50%
of mobile traffic in
the next 5 years
will be from video 3
269B
application
downloads by
20174
1 IDC: Enhancing Business Value with HP Wireless Networking
Solutions (October 2013)
2Sources: Internet of Things 2015, Statista.com
3 Mobile Data and Video Traffic, 2012, Gartner, August 2012
4 Gartner press release January 22, 2014
Applications
User experience Connectivity Video quality Download speed
24B
IoT devices by
2020 1
IoT
7
Policy Enforcement Firewall
8#ATM16
PEF
VLAN
Pool
EmployeeSSID
AAA Server
Role A
(200 Users)
Role B
(300 Users)
Multi-Service Mobility Controller
User
Applications
Role A
Role B
Aruba WLAN Architecture with PEF
9#ATM16
Aruba Firewall Advantages
– Identity-based Stateful firewall
– Role/identity based
– Application Aware
– Stateful policies versus “access control lists”
– Bi-directional
– Session aware; more difficult to spoof
– Dynamic
10#ATM16
Rules, Policies, Roles and Users
Rule 1
Rule 2
Rule 3
Rule n
Rule 1
Rule 2
Rule 1 Rule 1
Rule 2
Rule 3
Rule 4
Rule 1
Rule 2
Rule 3
Rule 4
Policy 1 Policy 2 Policy 3 Policy 4 Policy 5
Role 1
Policy 1
Policy 2
Role 2
Policy 1
Policy 3
Policy 4
Role 3
Policy 4
Policy 5
Role 4
Policy 4
User1 User2 User3 User4 User5 User6 …………UserN
Role Derivation: 1) Locally Derived
2) Server Assigned
3) Default Role
Assigns users
to a role
Methods:
PoliciesRolesDerivation
11#ATM16
Policy Implementation Overview
– Policies are a group of firewall rules
– Evaluated top down
– First rule matched is applied; more specific items at top of list
– All other rules are ignored
– Implicit “deny all” rule at the end of the firewall policy
<source> <destination> <service> <action> <extended action>
Addresses HTTP
FTP
DNS
Application
Etc
Deny
Permit
Nat
Log
Queue
802.1p assignment
TOS
Time Range
13#ATM16
Aliases
– Represent one or
more networks,
host addresses or
services
– Types of aliases
– Destination
– Network services
14#ATM16
Aruba Firewall Actions
– Basic actions: Permit, Drop, Reject
– NAT’ing actions: Src-nat, dst-nat, dual-nat
– Re-direct actions: Redirect to tunnel (group)
15#ATM16
Advanced Policy Actions
– Log: generate a message if rule gets applied
– Mirror: traffic is mirrored to another destination
– Time-Range: create policies based on time
– Pause ARM Scanning: delays ARM scanning for real time sessions
– Black list: deny access AND blacklist a client matching this rule
– TOS: set DSCP bits in IP header
– 802.1p-priority: assign CoS (Class of Service) priority
– Classify Media: monitor all untagged UDP flows to classify them as media and tag
accordingly
16#ATM16
Roles
– Every user in an Aruba Mobility Controller is assigned a role
– Roles
– Each role has one or more firewall policies applied
– Role Derivation
– User-derived
– Server-derived
– Default based on access method (802.1X, VPN etc.)
17#ATM16
Role Assignment Workflow
User associates
to an SSID
User placed in the initial role
(logon by default)
Check for user derived rule If
present user gets new role
User Authentication
Check for Server derived rules,
if present assign role
No server derived rules present,
then assign Default Role
18#ATM16
Role Derivation (in sequence)
– Initial Role
– Pre-authenticated Role
– Always assigned
– User-Derived Roles
– Assigned using device specific attributes
– Executed before client authentication
P
R
E
-
A
U
T
H
E
N
T
I
C
A
T
E
D
19#ATM16
Role Derivation
–VSA-Derived Roles (Vendor Specific Attributes)
–Provide features not supported in standard RADIUS attributes
–Can derive user role and VLAN for RADIUS authenticated clients
–Server Derived Roles
–Different access privileges based on security policy
–Can use single SSID for all users/devices
–Role assignment based on attributes from authentication server
–Default Roles
–Configurable by authentication method (AAA Profile)
–Captive Portal
–802.1X
–VPN
–MAC
P
O
S
T
-
A
U
T
H
E
N
T
I
C
A
T
E
D
20#ATM16
Controller - AAA Server communication
Radius Request
+ attributes
• Guests
• Employees
• Mobile Devices
Radius Reply
+ Radius attributes
Or
+ Aruba VSA
Derivation Based on
User
BSSID
Location
Authentication type
Device type
Time of day
Depending on
type of server
7220
22#ATM16
ClearPass Downloadable Roles
Aggregated device info:
- Profiling
- Posture
- Onboarding
- Guests
- AD Attributes
Enforcement Action
Role Finance, VLAN, Bandwidth limits
Redirect to Web page
Download ACL,
(Aruba VSA)
Radius Attributes, Aruba VSA
7220
29#ATM16
PEF for Wired Access Control
– The Aruba solution provides the ability to control
– Wired side access
– And Wireless access
– Policies may be applied to individual Port and/or VLAN
– No authentication
– Authentication on the wired side can be handled by
– 802.1X
– Captive Portal authentication
– No Authentication, initial Role assignment
– Wired access control is available on
– APs with more than one Ethernet jack,
– All ports on APs as Mesh Points
– Mobility Controllers
30#ATM16
Secure Wired Access on Aruba Products
– Trusted Ports (default)
- Acts like an L2 switch
- Policy may be added
– Non-Trusted Ports or VLANs
- Wired access AAA Profile
- Assign Initial role
- Initiate Authentication
– APs
–The second Ethernet port on an AP with Dual Ethernet ports
–Single or Dual port APs as Mesh Points
35
AppRF
35
36#ATM16
DPI/AppRF
Simple Control
• Select by:
• app group
• app,
• role
• address
• Apply policy (block,
throttle, prioritize)
• Eliminates complexity of
configuration
37#ATM16
How does classification work?
– Website URL information identifies popular websites
– Signatures are used for “easy to identify” applications
– Uses protocol grammar analysis to understand complex
applications and their current state
– Uses advanced heuristics when required
– Detects encrypted applications via certificate common
names
38#ATM16
Application Categories
• Antivirus
• Gaming
• Streaming
• Etc.
42#ATM16
New Policy Containers
• To simplify security rules, we have created a “Global Policy” and a “Role-Specific” policy
• These are the first two Policies in every Role
– Global policy is applied first
– Role-Specific policy is applied second
– All other configured policies are applied in turn afterwards
• Use of these is optional – if left empty, nothing changes about how the configuration is
applied and the rules enforced
46#ATM16
Application Bandwidth Contracts
• Bandwidth contracts for applications or application groups
• Only Role-Based Bandwidth contracts will be supported
–Not User or AP Group
• “Traditional” and “Dashboard” methods can be used to configure bandwidth
contracts
• Global and Role-Based BW contracts are supported
46
47
Web Content Classification
48#ATM16
Web Content Classification
Simple Control
• Select by:
• Web category
• URL
• Role
• Apply policy (block,
throttle, prioritize)
• Web reputation scores
49#ATM16
High Level Feature set
• New dashboard for URL classification and reputation classification
• Classifies web browsing history by categories and risks
• 82 web categories and 5 web reputation groups
• Web traffic can be blocked, QoS, mirrored etc. based on ACLs created.
• Works in the cloud with a local cache file
• Supported on both controller and Instant product lines
• Database includes five security categories that identify malware,
phishing, botnet, and other malicious sites
• Very simple web notification to users who violate policy
51#ATM16
Web Policy database includes 82 categories
52#ATM16
Web Reputation Scores
• Provides a reputation score for
each website
• Score based on risk of malware,
phishing, etc – NOT on morality
• Recent malware infections, age
of site, linking to bad sites are
major influencers of the score
53#ATM16
Web Content Security Categories
Blocking these categories will help protect end users against malware
58#ATM16
• Re-direct WebCC blocked sessions to an external web server
• Ability to work in the presence of a web proxy
AOS 6.5.0 : WebCC Enhancements
WebCC Policy: Block “adult” category
Re-direct user to splash page
www.adult.com External web server hosting a customizable splash page
WEBROOT
CLOUD
www.urlx.com
WebCC cache on controller
does not know about urlx.com
Proxy Server
Controller
Controller
59
Blocked Session Dashboard
60#ATM16
AOS 6.5.0: Blocked Session Enhancements
• Visualize blocked sessions with info like user, role, destination/app, reason, policy rule etc.
61
IP Reputation
62#ATM16
IP Reputation
WEBROOT
• Ability to detect threats associated with an IP
address
• Leverages Webroot's cloud based service that
has visibility into 4.3 billion IP addresses
• Both IPv4 and IPv6
• IP threat types detected: Spam Sources,
Windows Exploits, Web Attacks, Botnets,
Scanners, Denial of Service, Reputation,
Phishing, Proxies, and Mobile Threats
• Controller has a cache of 12 million IP addresses
• Periodic and real time updates
• PEF can be leveraged to apply policies
• NEW dashboards on controller and AirWave*
12 million IP database
Real time
checks
every 30
min
Database
update every
24 hours
63#ATM16
AOS 6.5.0: Firewall Enhancements: IP Reputation
• Visualize threats &
other associated
metadata on a NEW
dashboard
• Associate threats
with the origin
66
Geo-Location Filtering
67#ATM16
Geo-location Filtering
WEBROOT
• Ability to associate source/destination IP addresses
with location
• Leverages Webroot's cloud based service that has
geo-location database
• IP ranges can be tied with countries
• Controller has a cache of half a million IP addresses
• Periodic updates
• PEF can be leveraged to apply policies to
permit/drop inbound/outbound communication with
certain countries
• NEW dashboards on controller and AirWave*
500k IP database
Database
update
every 24
hours
68#ATM16
Geo-location Filtering
• Visualize the
in-bound and
out-bound flow of
traffic on a NEW
dashboard
69#ATM16
Join Aruba’s Titans of Tomorrow
force in the fight against network
mayhem. Find out what your
IT superpower is.
Share your results with friends
and receive a free superpower
t-shirt.
www.arubatitans.com
@ArubaNetworks
THANK YOU

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Packets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 framesPackets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 frames
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Aruba Remote Access Point (RAP) Networks Validated Reference Design
Aruba Remote Access Point (RAP) Networks Validated Reference DesignAruba Remote Access Point (RAP) Networks Validated Reference Design
Aruba Remote Access Point (RAP) Networks Validated Reference Design
 
Optimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming DevicesOptimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming Devices
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Adapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear passAdapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear pass
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
EMEA Airheads - Aruba Remote Access Point (RAP) TroubleshootingEMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
Roaming behavior and Client Troubleshooting
Roaming behavior and Client TroubleshootingRoaming behavior and Client Troubleshooting
Roaming behavior and Client Troubleshooting
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Aruba Mobility Controllers
Aruba Mobility ControllersAruba Mobility Controllers
Aruba Mobility Controllers
 
Aruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPassAruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPass
 
Apple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass GuestApple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass Guest
 
Advanced Aruba ClearPass Workshop
Advanced Aruba ClearPass WorkshopAdvanced Aruba ClearPass Workshop
Advanced Aruba ClearPass Workshop
 
Clear pass policy manager advanced_ashwath murthy
Clear pass policy manager advanced_ashwath murthyClear pass policy manager advanced_ashwath murthy
Clear pass policy manager advanced_ashwath murthy
 
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshootingEMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
 
ClearPass Guest 6.4 User Guide
ClearPass Guest 6.4 User GuideClearPass Guest 6.4 User Guide
ClearPass Guest 6.4 User Guide
 
Virtual Intranet Access (VIA)
Virtual Intranet Access (VIA)Virtual Intranet Access (VIA)
Virtual Intranet Access (VIA)
 

Destaque

Integrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkIntegrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkAruba, a Hewlett Packard Enterprise company
 
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...Aruba, a Hewlett Packard Enterprise company
 
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...Aruba, a Hewlett Packard Enterprise company
 
Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...Aruba, a Hewlett Packard Enterprise company
 
Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Aruba, a Hewlett Packard Enterprise company
 
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Aruba, a Hewlett Packard Enterprise company
 
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...Aruba, a Hewlett Packard Enterprise company
 
Best practices in deploying and managing aruba bluetooth low energy (ble) bea...
Best practices in deploying and managing aruba bluetooth low energy (ble) bea...Best practices in deploying and managing aruba bluetooth low energy (ble) bea...
Best practices in deploying and managing aruba bluetooth low energy (ble) bea...Aruba, a Hewlett Packard Enterprise company
 

Destaque (20)

Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
 
Wireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the CampusWireless LAN Design Fundamentals in the Campus
Wireless LAN Design Fundamentals in the Campus
 
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep DiveWi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
 
Integrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkIntegrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access Network
 
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
 
Anatomy of an AP
Anatomy of an APAnatomy of an AP
Anatomy of an AP
 
Working with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based servicesWorking with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based services
 
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
 
Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...
 
Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...
 
Multi-Vendor Access Network Management with Aruba Airwave
Multi-Vendor Access Network Management with Aruba AirwaveMulti-Vendor Access Network Management with Aruba Airwave
Multi-Vendor Access Network Management with Aruba Airwave
 
Take a Walk on the Wired Side
Take a Walk on the Wired SideTake a Walk on the Wired Side
Take a Walk on the Wired Side
 
Securing the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access networkSecuring the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access network
 
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
 
Benefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centersBenefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centers
 
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
 
The new imperative in the data center with workload centric networking
The new imperative in the data center with workload centric networkingThe new imperative in the data center with workload centric networking
The new imperative in the data center with workload centric networking
 
Best practices in deploying and managing aruba bluetooth low energy (ble) bea...
Best practices in deploying and managing aruba bluetooth low energy (ble) bea...Best practices in deploying and managing aruba bluetooth low energy (ble) bea...
Best practices in deploying and managing aruba bluetooth low energy (ble) bea...
 
Deep visibility to secure network access with aruba ClearPass Insight
Deep visibility to secure network access with aruba ClearPass InsightDeep visibility to secure network access with aruba ClearPass Insight
Deep visibility to secure network access with aruba ClearPass Insight
 

Semelhante a Getting the most out of the aruba policy enforcement firewall

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightManageEngine, Zoho Corporation
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsFab Fusaro
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...ManageEngine, Zoho Corporation
 
Building a SaaS using WSO2 Stratos
Building a SaaS using WSO2 StratosBuilding a SaaS using WSO2 Stratos
Building a SaaS using WSO2 StratosWSO2
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutionsNUVX
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service ProvidersBAKOTECH
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Aruba, a Hewlett Packard Enterprise company
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 
Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Aruba, a Hewlett Packard Enterprise company
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined NetworkingPrasenjit Sarkar
 
ClearPass_Design Info.pptx
ClearPass_Design Info.pptxClearPass_Design Info.pptx
ClearPass_Design Info.pptxssuser63c018
 

Semelhante a Getting the most out of the aruba policy enforcement firewall (20)

EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
Getting the most out of the Aruba Policy Enforcement Firewall
Getting the most out of the Aruba Policy Enforcement FirewallGetting the most out of the Aruba Policy Enforcement Firewall
Getting the most out of the Aruba Policy Enforcement Firewall
 
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings right
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
 
Building a SaaS using WSO2 Stratos
Building a SaaS using WSO2 StratosBuilding a SaaS using WSO2 Stratos
Building a SaaS using WSO2 Stratos
 
Hpe Intelligent Management Center
Hpe Intelligent Management CenterHpe Intelligent Management Center
Hpe Intelligent Management Center
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service Providers
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...
 
Unified access with Aruba Mobility Access Switches – Live Demo
Unified access with Aruba Mobility Access Switches – Live DemoUnified access with Aruba Mobility Access Switches – Live Demo
Unified access with Aruba Mobility Access Switches – Live Demo
 
Mobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjaliMobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjali
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined Networking
 
ClearPass_Design Info.pptx
ClearPass_Design Info.pptxClearPass_Design Info.pptx
ClearPass_Design Info.pptx
 

Mais de Aruba, a Hewlett Packard Enterprise company

Mais de Aruba, a Hewlett Packard Enterprise company (20)

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs  in Aruba 8.x EMEA Airheads - Configuring different APIs  in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
 
EMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgradeEMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgrade
 
Bringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access PointBringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access Point
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Getting the most out of the aruba policy enforcement firewall

  • 2. 2#ATM16 Agenda – Trends and Challenges – Aruba’s Policy Enforcement Firewall – AppRF – WebCC – IP Rep – Geo Location – Demo @ArubaNetworks |
  • 3. 3#ATM16 Growing demands for the Digital Workplace BYOD Video 68% employee owned (BYOD) devices access business apps 1 >50% of mobile traffic in the next 5 years will be from video 3 269B application downloads by 20174 1 IDC: Enhancing Business Value with HP Wireless Networking Solutions (October 2013) 2Sources: Internet of Things 2015, Statista.com 3 Mobile Data and Video Traffic, 2012, Gartner, August 2012 4 Gartner press release January 22, 2014 Applications User experience Connectivity Video quality Download speed 24B IoT devices by 2020 1 IoT
  • 5. 8#ATM16 PEF VLAN Pool EmployeeSSID AAA Server Role A (200 Users) Role B (300 Users) Multi-Service Mobility Controller User Applications Role A Role B Aruba WLAN Architecture with PEF
  • 6. 9#ATM16 Aruba Firewall Advantages – Identity-based Stateful firewall – Role/identity based – Application Aware – Stateful policies versus “access control lists” – Bi-directional – Session aware; more difficult to spoof – Dynamic
  • 7. 10#ATM16 Rules, Policies, Roles and Users Rule 1 Rule 2 Rule 3 Rule n Rule 1 Rule 2 Rule 1 Rule 1 Rule 2 Rule 3 Rule 4 Rule 1 Rule 2 Rule 3 Rule 4 Policy 1 Policy 2 Policy 3 Policy 4 Policy 5 Role 1 Policy 1 Policy 2 Role 2 Policy 1 Policy 3 Policy 4 Role 3 Policy 4 Policy 5 Role 4 Policy 4 User1 User2 User3 User4 User5 User6 …………UserN Role Derivation: 1) Locally Derived 2) Server Assigned 3) Default Role Assigns users to a role Methods: PoliciesRolesDerivation
  • 8. 11#ATM16 Policy Implementation Overview – Policies are a group of firewall rules – Evaluated top down – First rule matched is applied; more specific items at top of list – All other rules are ignored – Implicit “deny all” rule at the end of the firewall policy <source> <destination> <service> <action> <extended action> Addresses HTTP FTP DNS Application Etc Deny Permit Nat Log Queue 802.1p assignment TOS Time Range
  • 9. 13#ATM16 Aliases – Represent one or more networks, host addresses or services – Types of aliases – Destination – Network services
  • 10. 14#ATM16 Aruba Firewall Actions – Basic actions: Permit, Drop, Reject – NAT’ing actions: Src-nat, dst-nat, dual-nat – Re-direct actions: Redirect to tunnel (group)
  • 11. 15#ATM16 Advanced Policy Actions – Log: generate a message if rule gets applied – Mirror: traffic is mirrored to another destination – Time-Range: create policies based on time – Pause ARM Scanning: delays ARM scanning for real time sessions – Black list: deny access AND blacklist a client matching this rule – TOS: set DSCP bits in IP header – 802.1p-priority: assign CoS (Class of Service) priority – Classify Media: monitor all untagged UDP flows to classify them as media and tag accordingly
  • 12. 16#ATM16 Roles – Every user in an Aruba Mobility Controller is assigned a role – Roles – Each role has one or more firewall policies applied – Role Derivation – User-derived – Server-derived – Default based on access method (802.1X, VPN etc.)
  • 13. 17#ATM16 Role Assignment Workflow User associates to an SSID User placed in the initial role (logon by default) Check for user derived rule If present user gets new role User Authentication Check for Server derived rules, if present assign role No server derived rules present, then assign Default Role
  • 14. 18#ATM16 Role Derivation (in sequence) – Initial Role – Pre-authenticated Role – Always assigned – User-Derived Roles – Assigned using device specific attributes – Executed before client authentication P R E - A U T H E N T I C A T E D
  • 15. 19#ATM16 Role Derivation –VSA-Derived Roles (Vendor Specific Attributes) –Provide features not supported in standard RADIUS attributes –Can derive user role and VLAN for RADIUS authenticated clients –Server Derived Roles –Different access privileges based on security policy –Can use single SSID for all users/devices –Role assignment based on attributes from authentication server –Default Roles –Configurable by authentication method (AAA Profile) –Captive Portal –802.1X –VPN –MAC P O S T - A U T H E N T I C A T E D
  • 16. 20#ATM16 Controller - AAA Server communication Radius Request + attributes • Guests • Employees • Mobile Devices Radius Reply + Radius attributes Or + Aruba VSA Derivation Based on User BSSID Location Authentication type Device type Time of day Depending on type of server 7220
  • 17. 22#ATM16 ClearPass Downloadable Roles Aggregated device info: - Profiling - Posture - Onboarding - Guests - AD Attributes Enforcement Action Role Finance, VLAN, Bandwidth limits Redirect to Web page Download ACL, (Aruba VSA) Radius Attributes, Aruba VSA 7220
  • 18. 29#ATM16 PEF for Wired Access Control – The Aruba solution provides the ability to control – Wired side access – And Wireless access – Policies may be applied to individual Port and/or VLAN – No authentication – Authentication on the wired side can be handled by – 802.1X – Captive Portal authentication – No Authentication, initial Role assignment – Wired access control is available on – APs with more than one Ethernet jack, – All ports on APs as Mesh Points – Mobility Controllers
  • 19. 30#ATM16 Secure Wired Access on Aruba Products – Trusted Ports (default) - Acts like an L2 switch - Policy may be added – Non-Trusted Ports or VLANs - Wired access AAA Profile - Assign Initial role - Initiate Authentication – APs –The second Ethernet port on an AP with Dual Ethernet ports –Single or Dual port APs as Mesh Points
  • 21. 36#ATM16 DPI/AppRF Simple Control • Select by: • app group • app, • role • address • Apply policy (block, throttle, prioritize) • Eliminates complexity of configuration
  • 22. 37#ATM16 How does classification work? – Website URL information identifies popular websites – Signatures are used for “easy to identify” applications – Uses protocol grammar analysis to understand complex applications and their current state – Uses advanced heuristics when required – Detects encrypted applications via certificate common names
  • 23. 38#ATM16 Application Categories • Antivirus • Gaming • Streaming • Etc.
  • 24. 42#ATM16 New Policy Containers • To simplify security rules, we have created a “Global Policy” and a “Role-Specific” policy • These are the first two Policies in every Role – Global policy is applied first – Role-Specific policy is applied second – All other configured policies are applied in turn afterwards • Use of these is optional – if left empty, nothing changes about how the configuration is applied and the rules enforced
  • 25. 46#ATM16 Application Bandwidth Contracts • Bandwidth contracts for applications or application groups • Only Role-Based Bandwidth contracts will be supported –Not User or AP Group • “Traditional” and “Dashboard” methods can be used to configure bandwidth contracts • Global and Role-Based BW contracts are supported 46
  • 27. 48#ATM16 Web Content Classification Simple Control • Select by: • Web category • URL • Role • Apply policy (block, throttle, prioritize) • Web reputation scores
  • 28. 49#ATM16 High Level Feature set • New dashboard for URL classification and reputation classification • Classifies web browsing history by categories and risks • 82 web categories and 5 web reputation groups • Web traffic can be blocked, QoS, mirrored etc. based on ACLs created. • Works in the cloud with a local cache file • Supported on both controller and Instant product lines • Database includes five security categories that identify malware, phishing, botnet, and other malicious sites • Very simple web notification to users who violate policy
  • 29. 51#ATM16 Web Policy database includes 82 categories
  • 30. 52#ATM16 Web Reputation Scores • Provides a reputation score for each website • Score based on risk of malware, phishing, etc – NOT on morality • Recent malware infections, age of site, linking to bad sites are major influencers of the score
  • 31. 53#ATM16 Web Content Security Categories Blocking these categories will help protect end users against malware
  • 32. 58#ATM16 • Re-direct WebCC blocked sessions to an external web server • Ability to work in the presence of a web proxy AOS 6.5.0 : WebCC Enhancements WebCC Policy: Block “adult” category Re-direct user to splash page www.adult.com External web server hosting a customizable splash page WEBROOT CLOUD www.urlx.com WebCC cache on controller does not know about urlx.com Proxy Server Controller Controller
  • 34. 60#ATM16 AOS 6.5.0: Blocked Session Enhancements • Visualize blocked sessions with info like user, role, destination/app, reason, policy rule etc.
  • 36. 62#ATM16 IP Reputation WEBROOT • Ability to detect threats associated with an IP address • Leverages Webroot's cloud based service that has visibility into 4.3 billion IP addresses • Both IPv4 and IPv6 • IP threat types detected: Spam Sources, Windows Exploits, Web Attacks, Botnets, Scanners, Denial of Service, Reputation, Phishing, Proxies, and Mobile Threats • Controller has a cache of 12 million IP addresses • Periodic and real time updates • PEF can be leveraged to apply policies • NEW dashboards on controller and AirWave* 12 million IP database Real time checks every 30 min Database update every 24 hours
  • 37. 63#ATM16 AOS 6.5.0: Firewall Enhancements: IP Reputation • Visualize threats & other associated metadata on a NEW dashboard • Associate threats with the origin
  • 39. 67#ATM16 Geo-location Filtering WEBROOT • Ability to associate source/destination IP addresses with location • Leverages Webroot's cloud based service that has geo-location database • IP ranges can be tied with countries • Controller has a cache of half a million IP addresses • Periodic updates • PEF can be leveraged to apply policies to permit/drop inbound/outbound communication with certain countries • NEW dashboards on controller and AirWave* 500k IP database Database update every 24 hours
  • 40. 68#ATM16 Geo-location Filtering • Visualize the in-bound and out-bound flow of traffic on a NEW dashboard
  • 41. 69#ATM16 Join Aruba’s Titans of Tomorrow force in the fight against network mayhem. Find out what your IT superpower is. Share your results with friends and receive a free superpower t-shirt. www.arubatitans.com