SlideShare a Scribd company logo
1 of 15
ZoneRanger  Management Through Firewalls Jeff Olson Regional Sales Manager [email_address] Improve Security.  Remove Complexity.  Reduce Cost.
Network Management Evolution ,[object Object]
True Security = No Traffic The only completely risk-free solution is  NOT  passing any protocols through the firewall. Remedy Concord CiscoWorks NNM Trusted Network DMZ / Untrusted Network SNMP ICMP Syslog Netflow X X X X X X X X
Security Analysis of Management Protocols ICMP None Authentication Encryption Easy to Spoof None Yes SNMP v1 / v2c Yes SSH Good Good No FTP In the Clear None No Syslog None None Yes NetFlow None None Yes sFlow None None Yes TFTP None None Yes HTTPS Good Good No HTTP In the Clear None No SNMP v3 Simplistic Good None Good No
Defining DMZ / Untrusted Network ,[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Choice 1: Define Firewall Rules DMZ HP NNM Corporate Network Other Mgmt. App. ,[object Object],[object Object],[object Object],[object Object],Opsware
Firewall Rules - 1 Management Application Server DMZ Device The simplified view… The reality Management Application Server DMZ Device ICMP SNMP Syslog SSH NetFlow sFlow …
Simplifying Firewall Configuration - 2 Management Application Servers DMZ Devices Management Application Servers DMZ Devices ZoneRanger Ranger Gateway
Proxy Firewall Example: SNMP Get/Set Get Request Get Response Management Application Server DMZ Device Get Request Get Response Management Application Server DMZ Device Get Response Proxy Firewall Get Request
Proxy Firewall Example: Syslog Forwarding Syslog Message Management Application Server DMZ Device Syslog Message Management Application Server DMZ Device Syslog Message Proxy Firewall
ZR Supported Outbound Requests  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ZR Supported Inbound Requests ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transparent Applications  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ZoneRanger Business Case ,[object Object],[object Object],[object Object],[object Object]
Select Tavve Customers

More Related Content

What's hot

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Firewall
FirewallFirewall
Firewall
Apo
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
Sapna Kumari
 
FireWall
FireWallFireWall
FireWall
rubal_9
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
davebrosnan
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Security Benefits of Firewall Protection
Security Benefits of Firewall ProtectionSecurity Benefits of Firewall Protection
Security Benefits of Firewall Protection
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Firewall notes
Firewall notesFirewall notes
Firewall notes
 
FireWall
FireWallFireWall
FireWall
 
Firewall
FirewallFirewall
Firewall
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Sync in an NFV World (Ram, ITSF 2016)
Sync in an NFV World  (Ram, ITSF 2016)Sync in an NFV World  (Ram, ITSF 2016)
Sync in an NFV World (Ram, ITSF 2016)
 

Viewers also liked

Texas Leadership Forum Ppt 2008
Texas Leadership Forum Ppt 2008Texas Leadership Forum Ppt 2008
Texas Leadership Forum Ppt 2008
Debbie Horres
 
Tobch lecture1
Tobch lecture1Tobch lecture1
Tobch lecture1
Munhchimeg
 
EXAMPLE UNIT 1
EXAMPLE UNIT 1EXAMPLE UNIT 1
EXAMPLE UNIT 1
marina1982
 
Worldcup2010 gs report
Worldcup2010 gs reportWorldcup2010 gs report
Worldcup2010 gs report
pemmott
 

Viewers also liked (20)

Lissajous pattern
Lissajous patternLissajous pattern
Lissajous pattern
 
Protsesor
ProtsesorProtsesor
Protsesor
 
データ集 トマ・ピケティ『21 世紀の資本』
データ集 トマ・ピケティ『21 世紀の資本』データ集 トマ・ピケティ『21 世紀の資本』
データ集 トマ・ピケティ『21 世紀の資本』
 
Presentatie gemeente Groningen Inkoopbeleid
Presentatie gemeente Groningen InkoopbeleidPresentatie gemeente Groningen Inkoopbeleid
Presentatie gemeente Groningen Inkoopbeleid
 
Lecture910
Lecture910Lecture910
Lecture910
 
Hybrid worlds fungi progression 2 - crews
Hybrid worlds   fungi progression 2 - crewsHybrid worlds   fungi progression 2 - crews
Hybrid worlds fungi progression 2 - crews
 
Texas Leadership Forum Ppt 2008
Texas Leadership Forum Ppt 2008Texas Leadership Forum Ppt 2008
Texas Leadership Forum Ppt 2008
 
Lecture910
Lecture910Lecture910
Lecture910
 
Lecture3
Lecture3Lecture3
Lecture3
 
Ded algorithm
Ded algorithmDed algorithm
Ded algorithm
 
Pirates v. Mercenaries: Purely Private Transnational Violence at the Margins ...
Pirates v. Mercenaries: Purely Private Transnational Violence at the Margins ...Pirates v. Mercenaries: Purely Private Transnational Violence at the Margins ...
Pirates v. Mercenaries: Purely Private Transnational Violence at the Margins ...
 
Plot Structure
Plot StructurePlot Structure
Plot Structure
 
Profiting In A LinkedIn Economy
Profiting In A LinkedIn EconomyProfiting In A LinkedIn Economy
Profiting In A LinkedIn Economy
 
Tobch lecture1
Tobch lecture1Tobch lecture1
Tobch lecture1
 
Lecture916
Lecture916Lecture916
Lecture916
 
A N G I E
A N G I EA N G I E
A N G I E
 
EXAMPLE UNIT 1
EXAMPLE UNIT 1EXAMPLE UNIT 1
EXAMPLE UNIT 1
 
Presentazione Wip Racconti Ok
Presentazione Wip Racconti OkPresentazione Wip Racconti Ok
Presentazione Wip Racconti Ok
 
Worldcup2010 gs report
Worldcup2010 gs reportWorldcup2010 gs report
Worldcup2010 gs report
 
Lecture7
Lecture7Lecture7
Lecture7
 

Similar to Tavve Zone Ranger

SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
Srinivasa Addepalli
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 

Similar to Tavve Zone Ranger (20)

Securing Millions of Devices
Securing Millions of DevicesSecuring Millions of Devices
Securing Millions of Devices
 
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua CiscoGiai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
 
Orascom-tehnical study final
Orascom-tehnical study finalOrascom-tehnical study final
Orascom-tehnical study final
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
Nagios Conference 2007 | Nagios in very large Environments by Werner Neunteufl
Nagios Conference 2007 | Nagios in very large Environments by Werner NeunteuflNagios Conference 2007 | Nagios in very large Environments by Werner Neunteufl
Nagios Conference 2007 | Nagios in very large Environments by Werner Neunteufl
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693 SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 

Tavve Zone Ranger

  • 1. ZoneRanger Management Through Firewalls Jeff Olson Regional Sales Manager [email_address] Improve Security. Remove Complexity. Reduce Cost.
  • 2.
  • 3. True Security = No Traffic The only completely risk-free solution is NOT passing any protocols through the firewall. Remedy Concord CiscoWorks NNM Trusted Network DMZ / Untrusted Network SNMP ICMP Syslog Netflow X X X X X X X X
  • 4. Security Analysis of Management Protocols ICMP None Authentication Encryption Easy to Spoof None Yes SNMP v1 / v2c Yes SSH Good Good No FTP In the Clear None No Syslog None None Yes NetFlow None None Yes sFlow None None Yes TFTP None None Yes HTTPS Good Good No HTTP In the Clear None No SNMP v3 Simplistic Good None Good No
  • 5.
  • 6.
  • 7. Firewall Rules - 1 Management Application Server DMZ Device The simplified view… The reality Management Application Server DMZ Device ICMP SNMP Syslog SSH NetFlow sFlow …
  • 8. Simplifying Firewall Configuration - 2 Management Application Servers DMZ Devices Management Application Servers DMZ Devices ZoneRanger Ranger Gateway
  • 9. Proxy Firewall Example: SNMP Get/Set Get Request Get Response Management Application Server DMZ Device Get Request Get Response Management Application Server DMZ Device Get Response Proxy Firewall Get Request
  • 10. Proxy Firewall Example: Syslog Forwarding Syslog Message Management Application Server DMZ Device Syslog Message Management Application Server DMZ Device Syslog Message Proxy Firewall
  • 11.
  • 12.
  • 13.
  • 14.

Editor's Notes

  1. A number of large customers, product features often a result of customer requests and feedback.