SlideShare uma empresa Scribd logo
1 de 48
AGENDA PA-5000 Series GlobalProtect PAN-OS 4.0
PA-5000 Series
PA-5000 Series PA-5060 PA-5050 PA-5020
Introducing the PA-5000 Series High performance Next Gen Firewall 3 Models, up to 20Gbps throughput, 10Gbps threat
RAM FPGA (Security Profiles) RAM RAM RAM Process Breakdown (PA-4000 Series) FPGA ,[object Object]
File and data filtering signatures10Gbps Cavium Multi-Core Security Processor ,[object Object]
Decoders
Session setup and tear-down
Session table
Segment reassembly, normalization
100k URL filtering cache
Disabled fast-path flows: ‘set session offload no’RAM CPU 3 CPU 16 CPU 1 CPU 2 . . Dual-core CPU RAM RAM RAM SSL IPSec De-Compression HDD 10Gbps Device Server ,[object Object],QoS Route, ARP, MAC lookup NAT EZ Chip 10 Gig Network Processor ,[object Object]
Fast-path flows
Zone Protection Profiles
QOS
PBFControl Plane Data Plane
PA-5000 Series Architecture ,[object Object]
High speed logging and route update
Dual hard drivesRAM RAM Signature Match Signature Match Signature Match HW Engine ,[object Object]
Vulnerability exploits (IPS), virus, spyware, CC#, SSN, and moreRAM RAM RAM RAM RAM RAM Core 2 Core 1 RAM 10Gbps 10Gbps RAM CPU 12 CPU 1 CPU 2 CPU 12 CPU 1 CPU 2 CPU 12 CPU 1 CPU 2 RAM RAM RAM ... ... ... Core 4 Core 3 SSD RAM RAM RAM SSD SSL IPSec De-Compress. SSL IPSec De-Compress. SSL IPSec De-Compress. Control Plane 20Gbps ,[object Object]
20 Gbps QoS engineSecurity Processors ,[object Object]
Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression)Flow  control Route, ARP, MAC lookup NAT Network Processor ,[object Object]
Hardware accelerated per-packet route lookup, MAC lookup and NATSwitch Fabric QoS Data Plane Switch Fabric
PA-5000 Series Features Redundant, hot swap AC or DC power supplies SFP+ transceivers Hard Disks Two disk bays Solid State Drives  Single 120GB included, additional 120 or 240GB drives are available.  RAID 1 when two drives installed (must be identical) Hot-swappable fan tray
Global Protect
What is Global Protect? Global Protect applies security policy to end points regardless of their location Runs as a client on Windows PC Gathers host information (OPSWAT based) Creates VPN for remote clients Locates nearest portal for VPN connection Transparent operation to user
GP Architecture The Portal authenticates the user and directs them to a gateway where policy is Enforced. Portal 2 1 Gateway Gateway 2
Initial GP connection Laptop user makes an initial connection to the Portal and authenticates. Portal provides the software, HIP configuration, and gateway list. The downloaded Agent is installed and configured.  Agent gathers host information, and finds closest Gateway If the closest Gateway is "internal” then no VPN If the closest Gateway is "external” then builds VPN HIP data is sent to Gateway The Gateway enforces security policy based on user, application, content AND the HIP submitted from the client.
HIP – Host Information Profile HIP Objects define an end point  “Does the client have AV and is it enabled?” “Does the client have updated Microsoft patches?” “Is the client running notepad.exe?” End points return this information to the gateway HIP Profiles are defined by the objects an endpoint matches Security policy can be defined based on HIP profile “VPN clients who are members of HR can only access the HR database if they have disk encryption enabled”
HIP Object options Patch Management        IsEnabled? LastScanTime MissingPatchList Vendor/Product Disk Encryption        DiskState for each volume Vendor/Product Antivirus        DataFileTime Vendor/Product LastFullScanTime RealTimeScanEnabled? Anti-Spyware        DataFileTime Vendor/Product LastFullScanTime Firewall        IsFirewallEnabled? Vendor/Product Host Info        Machine Name Domain Organization
HIP Objects and Profile examples
Configuring Global Protect Portal Portal has many of the same authentication configuration of a SSL VPN Portal They can interoperate with some 3rd party VPN clients 3rd party clients can be set to override the GP tunnel Administrator can control what HIP objects are returned to the portal The portal determine what settings the UI of the client will use
Configuring Global Protect Gateway Gateway provides client addressing information Can provide basic messages to clients that pass / fail HIP profiles Contains all client VPN configuration
Policy Example using GP
PAN-OS 4.0: A Significant Milestone
PAN-OS 4.0: More Control… App-ID Custom App-IDs for unknown protocols App and threats stats collection SSH tunneling control (for port forwarding control) 6,000 custom App-IDs User-ID Windows 2003 64-bit, Windows 2008 32- and 64-bit Terminal Server support; XenApp 6 support Client certificates for captive portal Authentication sequence flow Strip x-forwarded-for header Destination port in captive portal rules Threat Prevention & Data Filtering ,[object Object]
PDF virus scanning
Drive by download protection
Hold-down time scan detection
Time attribute for IPS and custom signatures
DoS protection rulebaseURL Filtering ,[object Object]
Seamless URL activation
“Full” URL logging
Manual URL DB uploads (weekly),[object Object]
Dynamic log storage via NFS
Panorama HA
UAR from Panorama
Exportable config backups

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Roaming behavior and Client Troubleshooting
Roaming behavior and Client TroubleshootingRoaming behavior and Client Troubleshooting
Roaming behavior and Client Troubleshooting
 
6 pan-os software update & downgrade instruction
6 pan-os software update & downgrade instruction6 pan-os software update & downgrade instruction
6 pan-os software update & downgrade instruction
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
 
15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
 
5 initial access to palo alto using cli
5 initial access to palo alto using cli5 initial access to palo alto using cli
5 initial access to palo alto using cli
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
 
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
EMEA Airheads- ArubaOS - High availability with AP Fast FailoverEMEA Airheads- ArubaOS - High availability with AP Fast Failover
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issuesEMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Optimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming DevicesOptimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming Devices
 
Useful cli commands v1
Useful cli commands v1Useful cli commands v1
Useful cli commands v1
 
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice ConfigurationEMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
 
Bringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access PointBringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access Point
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Training ims sip
Training ims sipTraining ims sip
Training ims sip
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 

Semelhante a Palo Alto Networks PAN-OS 4.0 New Features

CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
Maliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
Baqar kazmi
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
Maliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
bakar kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
Baqar Kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
Baqar kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
Maliha Ali
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
bakar kazmi
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
NYversity
 

Semelhante a Palo Alto Networks PAN-OS 4.0 New Features (20)

CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
Websecurity
Websecurity Websecurity
Websecurity
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
 
Web Security
Web SecurityWeb Security
Web Security
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
Software defined network and Virtualization
Software defined network and VirtualizationSoftware defined network and Virtualization
Software defined network and Virtualization
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Secure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelSecure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by Intel
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Palo Alto Networks PAN-OS 4.0 New Features

  • 1. AGENDA PA-5000 Series GlobalProtect PAN-OS 4.0
  • 3. PA-5000 Series PA-5060 PA-5050 PA-5020
  • 4. Introducing the PA-5000 Series High performance Next Gen Firewall 3 Models, up to 20Gbps throughput, 10Gbps threat
  • 5.
  • 6.
  • 8. Session setup and tear-down
  • 12.
  • 15. QOS
  • 17.
  • 18. High speed logging and route update
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Hardware accelerated per-packet route lookup, MAC lookup and NATSwitch Fabric QoS Data Plane Switch Fabric
  • 24. PA-5000 Series Features Redundant, hot swap AC or DC power supplies SFP+ transceivers Hard Disks Two disk bays Solid State Drives Single 120GB included, additional 120 or 240GB drives are available. RAID 1 when two drives installed (must be identical) Hot-swappable fan tray
  • 26. What is Global Protect? Global Protect applies security policy to end points regardless of their location Runs as a client on Windows PC Gathers host information (OPSWAT based) Creates VPN for remote clients Locates nearest portal for VPN connection Transparent operation to user
  • 27. GP Architecture The Portal authenticates the user and directs them to a gateway where policy is Enforced. Portal 2 1 Gateway Gateway 2
  • 28. Initial GP connection Laptop user makes an initial connection to the Portal and authenticates. Portal provides the software, HIP configuration, and gateway list. The downloaded Agent is installed and configured. Agent gathers host information, and finds closest Gateway If the closest Gateway is "internal” then no VPN If the closest Gateway is "external” then builds VPN HIP data is sent to Gateway The Gateway enforces security policy based on user, application, content AND the HIP submitted from the client.
  • 29. HIP – Host Information Profile HIP Objects define an end point “Does the client have AV and is it enabled?” “Does the client have updated Microsoft patches?” “Is the client running notepad.exe?” End points return this information to the gateway HIP Profiles are defined by the objects an endpoint matches Security policy can be defined based on HIP profile “VPN clients who are members of HR can only access the HR database if they have disk encryption enabled”
  • 30. HIP Object options Patch Management       IsEnabled? LastScanTime MissingPatchList Vendor/Product Disk Encryption       DiskState for each volume Vendor/Product Antivirus       DataFileTime Vendor/Product LastFullScanTime RealTimeScanEnabled? Anti-Spyware       DataFileTime Vendor/Product LastFullScanTime Firewall       IsFirewallEnabled? Vendor/Product Host Info       Machine Name Domain Organization
  • 31. HIP Objects and Profile examples
  • 32. Configuring Global Protect Portal Portal has many of the same authentication configuration of a SSL VPN Portal They can interoperate with some 3rd party VPN clients 3rd party clients can be set to override the GP tunnel Administrator can control what HIP objects are returned to the portal The portal determine what settings the UI of the client will use
  • 33. Configuring Global Protect Gateway Gateway provides client addressing information Can provide basic messages to clients that pass / fail HIP profiles Contains all client VPN configuration
  • 35. PAN-OS 4.0: A Significant Milestone
  • 36.
  • 38. Drive by download protection
  • 40. Time attribute for IPS and custom signatures
  • 41.
  • 44.
  • 49.
  • 51. Configurable event/log format (including CEF for ArcSight)
  • 54. Extended reporting for VSYS admins (scheduler, UAR, summary reports, email forwarding)
  • 55.
  • 57.
  • 58.
  • 59. Heartbeat Backup Link – Split Brain Protection <Heartbeat/Hello> <Heartbeat/Hello> Redundant path Data Plane status confirmation Supported on full product line
  • 60. DNS Proxy Firewall acts as DNS server for clients Firewall uses DNS based on: Priority (Primary, Secondary) Domain Name ( xxx.local uses internal DNS, xxx.com uses public DNS) Static entry Is enabled by interface
  • 61. IPv6 Support IPv6 Layer 3 interfaces IPv6 addresses in all policy IPv6 static routes in Virtual Routers ICMPv6 support DHCPv6 support Support for Neighbor Discovery
  • 62. Networking enhancements Virtual Systems as routing targets Used in Virtual routers Used in PBF DNS based Address book entries Allow www.apple.com Country based Address book entries Block everything from Canada
  • 64. Active/Active HA Both devices in the cluster are active and passing traffic Devices back each other, taking over primary ownership if either one fails Both devices load share the traffic BUT REMEMBER No increase in session capacity Not designed to increase throughput Supported modes L3 and vwire
  • 65. Packet handling within the cluster Session ownership and session setup can be two different devices in the cluster It is atypical to implement it in this way Session setup Session setup maybe distributed among devices in HA group using IP modulo or hash Layer2 to Layer4 processing is handled by the session setup device This requires a dedicated HA interface- HA3 link Session ownership This device is responsible for all layer 7 processing
  • 66. Session setup options IP modulo One device sets sessions for even numbered IP address and the peer sets sessions for odd numbered IP address This is preferred as it is deterministic IP hash Hash of either source or combination source/destination IP address is used for distributing session setup
  • 67. Deployment topologies: Floating IP address Redundancy of IP address is accomplished using floating IP address Each interface on device is configured with floating IP addresses Floating IP address ownership is determined based on the device priority Load sharing is done externally via ECMP or configuring the clients with different default gateways RED- BACK GREEN-ACTIVE
  • 68. Deployment topologies: ARP load sharing Firewalls share a virtual IP address Unique Virtual MAC per device is generated for the virtual IP address ARP load sharing is used for load balancing incoming traffic Hash or modulo of the source address of ARP requests to determine which device should handle the requests
  • 70. Agenda - Security Enhancements Client cert auth for Captive Portal Botnet Detection and DDoS policy IPS action enhancements SSH Decryption Updated URL logging and reporting Global Protect Authentication Sequence Kerberos support
  • 71. Client Certificate in Captive Portal Formerly available for SSL VPN and device authentication Now can be used in captive portal configuration Client Certificate can be configured as the only authentication option No Auth profile required Unlike client certs with admin authentication, this will be transparent. Uses the 3.1 “Client Certificate Profile” object
  • 72. Drive-by Download Protection Warn end users about file transfer events New ‘Continue’ file blocking action Customizable response page The response page has a ‘continue’ button. If the user clicks ‘continue’, the file transfer will continue
  • 73. Customizable Brute Force Attack Settings User defined thresholds for brute force signatures. Defined in the profile
  • 74. Custom Combination Signatures Combine multiple signatures to create custom combination signatures Take individual spyware or vulnerability threat IDs and group them into one custom signature Take individual signatures and apply thresholds for number of hits over specified time period
  • 75. Block IP Action (Blackhole) Block all future traffic from a host after triggering a security condition Spyware and vulnerability signatures DoS protection rulebase Zone protection Block time in seconds Max 21600 seconds in DoS protection rulebase Max 3600 seconds in spyware and vulnerability profiles Block method: Based on sourceIP or source-and-destination IP
  • 76. DoS Protection Rulebase Extends existing DoS protections that are currently configurable on a per-zone basis Rules based on source/dest zone, source/dest IP, country, service, and user Two types of profiles are supported: Aggregate: Thresholds apply to all traffic Classified: Thresholds apply either on basis of source IP, destination IP or a combination of both.
  • 77. Behavior-based Botnet Detection Collate information from Traffic, Threat, URL logs to identify potentially botnet-infected hosts A report will be generated each day list of infected hosts, description (why we believe the host to be infected) Confidence level Following parameters (configurable) to detect botnets Unknown TCP/UDP IRC HTTP traffic (malware sites, recently registered, IP domains, Dynamic Domains) Users can configure a query for specific traffic
  • 78. Updated URL Logging Can log just container pages Previously cnn.com created 26 URL logs Can filter to have just one Uses the Container Page setting in the device tab Full URL logging Now logs up to 1023 bytes of the URL Previous max was 256
  • 79. SSH Decryption Uses same tactic as SSL decryption No additional configuration required New “Block if failed to decrypt” option User certificates Unsupported crypto system Can now block the connection Previously we would allow it
  • 80. Authentication Sequence Can configure multiple authentication profiles If the first one in the list fails the next will be attempted Can be used to cycle through multiple RADIUS or Active Directory Forest designs The Authentication Sequence object can be used in the same locations as a regular Authentication profile
  • 81. Native Kerberos Authentication Firewall can now authenticate to AD without the use of an Agent Can be used like RADIUS or LDAP authentication servers Does not retrieve group membership – AD Agent or LDAP server required.

Notas do Editor

  1. Things to talk about:-Moving farther into datacenter coreNotes:-CPS: connections per second
  2. Things to talk about:-What is it and what is the point? -Control outside of the network -Security outside of network
  3. Things to talk about:-Installer is MSI and can be pushed out via GPO-Option to allow user to disable (not recommended), optional password required
  4. Things to talk about:-3rd party supported VPN clients -PAN SSL VPN -Juniper Network Connect -Cisco Systems VPN Adapter
  5. ** Global ProtectDemo After This Slide**
  6. Things to talk about:Touch on all of these as they do not come up again.Notes:User-ID-x-forwarded-for: used by proxies to keep user info when requesting info from web servers -Security hole as it would be sending internal IP addresses out onto the webURL Filtering-URL Logging will now log 1023 bytes of requested url
  7. Things to talk about:UI upgrades on next slide, Explain the rest.
  8. Things to talk about:-Easy Object creation (from within rule creation and also lower left on the rules page)-Switching between tabs saves your place-Commit checks for application dependencies-Policy Viewer-Edit whole policy at once (Security, NAT…)-Regions-Reports is diff (Click on reports and look to the right) -Managing custom reports is much different-PCAP from GUI-Locks -Config-only you can edit config/commit -Commit-people can edit, only you can commit -Can be automatically aquired (device tab, setup, management options)**UI Demo After This Slide**-Security Rules (tagging, drag-n-drop, object value visibility, filtering, rule editing-quick &amp; whole interface, regions)-Tab Switching-Config/commit Locks-Commit app dependency check-PCAP from GUI
  9. Things to talk about:Explain these except for Active/Active, DNS Proxy, VR-VR Routing, Country-based, just touch on those.Notes: Overlapping IP Address Support: To facilitate shared use of a device, the system now supports the use ofthe devices layer 3 services for clients that have the same IP address of interfaces or hosts in anothervirtual router. Untagged Subinterfaces: Multiple untagged layer 3 interfaces can now be created on a single physicalinterface. The source interface will be determined based on the destination IP address as opposed to aVLAN tag.Adjust TCP MSS - maximum segment size (MSS) is adjusted to 40 bytes less than the interface MTU. Addresses the situation in which a tunnel through the network requires a smaller MSS. If a packet cannot fit within the MSS without fragmenting, this setting allows an adjustment to be made.
  10. Things to talk about:Why did we add?To address split brain issues resulting from lost HA1 link. Very common for platforms using in-band HA1.How is this configured?Simple checkbox
  11. The Neighbor Discovery Protocol defines mechanisms for providing the following functionality: Router discovery: hosts can locate routers residing on attached links. Prefix discovery: hosts can discover address prefixes that are on-link for attached links. Parameter discovery: hosts can find link parameters (e.g., MTU). Address autoconfiguration: stateless configuration of addresses of network interfaces. Address resolution: mapping between IP addresses and link-layer addresses. Next-hop determination: hosts can find next-hop routers for a destination. Neighbor unreachability detection (NUD): determine that a neighbor is no longer reachable on the link. Duplicate address detection (DAD): nodes can check whether an address is already in use. Redirect: router can inform a node about better first-hop routers. Recursive DNS Server (RDNSS) assignment via a router advertisement (RA) options.[2]
  12. Things to talk about:-Virtual Systems/Routers as routing targets -Available in Virtual Routers as well as Policy-Based Forwarding rules -SSL VPN/Management of firewall via primary link in WAN failover config
  13. Things to talk about:-Reason for HA3 Link: After session setup packet will be forwarded back to the session owner for Layer 7 processing to preserve the forwarding path
  14. Notes:ECMP = Equal Cost Multi Path routing.
  15. Things to talk about:-SSH V2 with interactive auth
  16. **Authentication, Reporting (Custom &amp; Default), Botnet, DoS, and Drive by Download Demo After This Slide**