SlideShare a Scribd company logo
1 of 24
APPLICATION CENTRIC
SECURITY
Tzoori Tamam
Sr. Field Sales Engineer
tzoori@f5.com
Why do HaCkErz Attack?
• Money
• Fame
• Training
• Politics
• Boredom
• Plain Evil
What do HaCkErz Attack?
What Do HaCkErZ Attack?
• THEY GO FOR YOUR APPLICATIONS!
• Availability
• Responsiveness
• Reputation
How Do HaCkErz Attack?
Enters F5 Networks…
F5 Overview
-
50,000
100,000
150,000
200,000
250,000
300,000
350,000
400,000
$Thousands
Publicly traded on NASDAQ
3,000+ employees
IPO in 1999
F5 Networks is the leading
provider of application and data
delivery networking
Our products sit at strategic
points of control in any
infrastructure
Fiscal Year 2012 Revenue
US$1.38B
1,380,000,000
Local Snapshot
Israel:
• 120+ Local Employees
• Increasing country presence
• 2012 – Acquired Traffix Systems
• Strong regional channel
• Over 400 IL Customers
Gartner Magic Quadrant for ADC
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select
only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and
should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including
any warranties of merchantability or fitness for a particular purpose.
This graphic was published
by Gartner, Inc. as part of a
larger research document
and should be evaluated in
the context of the entire
document. The Gartner
document is available upon
request from F5 Networks.
Magic Quadrant for Application Delivery
Controllers
F5 in Worldwide Advanced Platform ADC
Market for 2Q’12
• Market share leaders
• F5: 59.1%, Citrix: 17.5%, Radware: 9.2%
• Market share revenue leaders
• F5: $186.2M, Citrix: $55.2M, Radware: $29.0M
• Q/Q revenue growth
• F5: 3.9%, Citrix: 12.1%, Radware: 1.3%
• Total market numbers
• Revenue: $315M
• Q/Q revenue growth: 3.2%
• Y/Y revenue growth: 21.5%
*ADC segment includes: Server load balancing/Layers 4-7 switching and advanced (integrated) platforms.
Graphic created by F5 based on Gartner data.
2Q12 Gartner Advanced Platform ADC*
Market Share:
Gartner, Inc. Market Share: Application Acceleration Equipment, Worldwide, CYQ212, Joe Skorupa, Nhat Pham, Sept 2012
Introducing F5’s Application Delivery Firewall
Aligning applications with firewall security
One platform
SSL
inspection
Traffic
management
DNS
security
Access
control
Application
security
Network
firewall
EAL2+
EAL4+ (in process)
DDoS
mitigation
Full Proxy Security
Network
Session
Application
Web application
Physical
Client / Server
L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation
SSL inspection and SSL DDoS mitigation
HTTP proxy, HTTP DDoS and application security
Application health monitoring and performance anomaly detection
Network
Session
Application
Web application
Physical
Client / Server
Network
Session
Application
Web application
Physical
Client / Server
L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation
SSL inspection and SSL DDoS mitigation
HTTP proxy, HTTP DDoS and application security
Application health monitoring and performance anomaly detection
Network
Session
Application
Web application
Physical
Client / Server
Full Proxy Security
High-performance HW
iRules
iControl API
F5’s Approach
• TMOS traffic plug-ins
• High-performance networking microkernel
• Powerful application protocol support
• iControl—External monitoring and control
• iRules—Network programming language
IPv4/IPv6
SSL
TCP
HTTP
Optional modules plug in for all F5 products and solutions
APM
Firewall
…
Traffic management microkernel
Proxy
Client
side
Server
side
SSL
TCP
OneConnect
HTTP
CONSOLIDATE NETWORK AND SECURITY FUNCTIONS
Use case
• Consolidation of
firewall, app
security, traffic
• Protection for data
centers and
application servers
most common inbound
protocols
Before f5
with f5
Load
Balancer
DNS Security
Network DDoS
Web Application Firewall
Web Access
Management
Load
Balancer & SSL
Application DDoS
Firewall
CONSOLIDATE NETWORK AND SECURITY FUNCTIONS
Use case
• Consolidation of
firewall, app
security, traffic
• Protection for data
centers and
application servers
most common inbound
protocols
Before f5
with f5
Load
Balancer
DNS Security
Network DDoS
Web Application Firewall
Web Access
Management
Load
Balancer & SSL
Application DDoS
Firewall
• Provides comprehensive protection for all web
application vulnerabilities
• Delivers out of the box security
• Enables L2->L7 protection
• Unifies security and application delivery
• Logs and reports all application traffic and attacks
• Educates admin. on attack type definitions and examples
• Sees application level performance
• XML FW, L7 DOS, BruteForce and Web Scraping
• Application visibility and reporting
• FREE Vulnerability Scanning from Cenzic/WhiteHat
BIG-IP Application Security Manager
Powerful Adaptable Solution
• Consolidated firewall
and DNS Service
• High
performance, scalable
DNS
• Secure queries with
DNSSEC
SECURE DNS
Use case
with f5
Before f5
65,000 concurrent queries
?
http://www.f5.com
http://www.f5.com
• Cache poisoning
• DNS spoofing
• Man in the middle
• DDoS
• Consolidated firewall
and DNS Service
• High
performance, scalable
DNS
• Secure queries with
DNSSEC
with f5
Before f5
65,000 concurrent queries
?
http://www.f5.com
http://www.f5.com
• Cache poisoning
• DNS spoofing
• Man in the middle
• DDoS
Secure and available DNS
infrastructure:
Up to 10 million concurrent queries
SECURE DNS
Use case
SSL INSPECTION
SSL
!
SSL
• Gain visibility and
detection of SSL-
encrypted attacks
• Achieve high-
scale/high-performance
SSL proxy
• Offload SSL—reduce
load on application
servers
Use case
SSL
SSL
Protect Against Newly Published
Vulnerabilities That Do Not Have a Patch
Hardware Refresh - BIG-IP Platforms Line Up
New
BIG-IP 11000
• 2.5M L7 RPS
• 20K SSL TPS (2K key)
• 1M L4 CPS
• 24 Gbps L7 TPUT
• 10 10 Gigabit Fiber
Ports (SFP+)
BIG-IP 10200v
• 2M L7 RPS
• 42K SSL TPS (2K key)
• 1M L4 CPS
• 40G L7 TPUT
• 16 10 Gigabit Fiber
Ports (SFP+)
• 2 40 Gigabit Fiber
Ports (QSFP+)
VIPRION 2400 / 4 x 2100 Blade
• 4M L7 RPS
• 40K SSL TPS (2K key)
• 1.6M L4 CPS
• 72 Gbps L7 TPUT
• 32 10 Gigabit Fiber Ports (SFP+)
VIPRION 4480 / 4 x 4300 Blade
• 10M L7 RPS
• 120K SSL TPS (2K key)
• 5.6M L4 CPS
• 160G L7 TPUT
• 32 10 Gigabit Fiber Ports (SFP+)
• 8 40 Gigabit Fiber Ports (QSFP+)
BIP-IP 2000s
• 212K L7 RPS
• 2K SSL TPS (2K key)
• 75K L4 CPS
• 5 Gbps L7 TPUT
• 2 10 Gigabit Fiber
Ports (SFP+)
• 8 Gigabit Ethernet
CU ports
BIG-IP 2200s
• 425K L7 RPS
• 4K SSL TPS (2K key)
• 150K L4 CPS
• 5 Gbps L7 TPUT
• 2 10 Gigabit Fiber
Ports (SFP+)
• 8 Gigabit Ethernet
CU ports
BIG-IP 4200v
• 850K L7 RPS
• 9K SSL TPS (2K key)
• 300K L4 CPS
• 10 Gbps L7 TPUT
• 2 10 Gigabit Fiber
Ports (SFP+)
• 8 Gigabit Ethernet CU
ports:
BIG-IP 11050
• 2.5M L7 RPS
• 20K SSL TPS (2K key)
• 1M L4 CPS
• 40 Gbps L7 TPUT
• 10 10 Gigabit Fiber
Ports (SFP+)
VIPRION 4800 / 8 x 4300 Blade
• 20M L7 RPS
• 240K SSL TPS (2K key)
• 10M L4 CPS
• 320G L7 TPUT
• 64 10 Gigabit Fiber Ports (SFP+)
• 16 40 Gigabit Fiber Ports (QSFP+)
BIG-IP 4000s
• 425K L7 RPS
• 4.5K SSL TPS (2K key)
• 150K L4 CPS
• 10 Gbps L7 TPUT
• 2 10 Gigabit Fiber Ports
(SFP+)
• 8 Gigabit Ethernet CU
ports
How Does F5 Protects Your Apps?
tzoori@f5.com
Layer3 – Layer7 Application Centric Security Solution
F5 Infosec Israel  2013 Application Centric Security

More Related Content

What's hot

Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkJuraj Hantak
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer PresentationGilles Lejeune
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 
Fortinet
FortinetFortinet
FortinetABEP123
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentThousandEyes
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solutionKevin Mayo
 
F5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSF5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSMarco Essomba
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chZscaler
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27APNIC
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 

What's hot (20)

Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lk
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
Fortinet
FortinetFortinet
Fortinet
 
Monitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint AgentMonitoring End User Experience with Endpoint Agent
Monitoring End User Experience with Endpoint Agent
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solution
 
F5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSF5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKS
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27Community tools to fight against DDoS, SANOG 27
Community tools to fight against DDoS, SANOG 27
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
BDIX BOF
BDIX BOFBDIX BOF
BDIX BOF
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 

Viewers also liked

Reconocimiento del talento en el equipo de trabajo mediante el empoderamiento
Reconocimiento del talento en el equipo de trabajo mediante el empoderamientoReconocimiento del talento en el equipo de trabajo mediante el empoderamiento
Reconocimiento del talento en el equipo de trabajo mediante el empoderamientoJosé Manuel Vecino P.
 
Santa maría madre de dios a'17
Santa maría madre de dios a'17Santa maría madre de dios a'17
Santa maría madre de dios a'17Stella Giordano
 
Réalité Virtuelle Documentée ALLB 2017
Réalité Virtuelle Documentée ALLB 2017Réalité Virtuelle Documentée ALLB 2017
Réalité Virtuelle Documentée ALLB 2017Benoit Allaire T.P.
 
new updated RESUME
new updated RESUME new updated RESUME
new updated RESUME ruthran r
 
Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...
Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...
Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...Marco Campanini
 
Tarea seminario v
Tarea seminario vTarea seminario v
Tarea seminario vanita351
 
F5 Infosec Israel 2013 Locking the Door in the Clouds
F5 Infosec Israel  2013  Locking the Door in the CloudsF5 Infosec Israel  2013  Locking the Door in the Clouds
F5 Infosec Israel 2013 Locking the Door in the CloudsTzoori Tamam
 
LTE Broadcast - Lessons Learned from Trials and Early Deployments
LTE Broadcast - Lessons Learned from Trials and Early DeploymentsLTE Broadcast - Lessons Learned from Trials and Early Deployments
LTE Broadcast - Lessons Learned from Trials and Early DeploymentsDanny Dicks
 
Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...
Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...
Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...Siddharth Bhatnagar
 
Pasapalabra sobre la Resurrección de Jesús
Pasapalabra sobre la Resurrección de JesúsPasapalabra sobre la Resurrección de Jesús
Pasapalabra sobre la Resurrección de Jesúscristinamoreubi
 
بغداد الرصافة 2
بغداد الرصافة 2بغداد الرصافة 2
بغداد الرصافة 2Nour Elbader
 

Viewers also liked (15)

Reconocimiento del talento en el equipo de trabajo mediante el empoderamiento
Reconocimiento del talento en el equipo de trabajo mediante el empoderamientoReconocimiento del talento en el equipo de trabajo mediante el empoderamiento
Reconocimiento del talento en el equipo de trabajo mediante el empoderamiento
 
Santa maría madre de dios a'17
Santa maría madre de dios a'17Santa maría madre de dios a'17
Santa maría madre de dios a'17
 
CHOvolution_flyer
CHOvolution_flyerCHOvolution_flyer
CHOvolution_flyer
 
Réalité Virtuelle Documentée ALLB 2017
Réalité Virtuelle Documentée ALLB 2017Réalité Virtuelle Documentée ALLB 2017
Réalité Virtuelle Documentée ALLB 2017
 
CST NC
CST NCCST NC
CST NC
 
new updated RESUME
new updated RESUME new updated RESUME
new updated RESUME
 
Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...
Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...
Mozione per l'informazione, la pubblicizzazione e la trasparenza della region...
 
Senior speech
Senior speechSenior speech
Senior speech
 
Tarea seminario v
Tarea seminario vTarea seminario v
Tarea seminario v
 
F5 Infosec Israel 2013 Locking the Door in the Clouds
F5 Infosec Israel  2013  Locking the Door in the CloudsF5 Infosec Israel  2013  Locking the Door in the Clouds
F5 Infosec Israel 2013 Locking the Door in the Clouds
 
LTE Broadcast - Lessons Learned from Trials and Early Deployments
LTE Broadcast - Lessons Learned from Trials and Early DeploymentsLTE Broadcast - Lessons Learned from Trials and Early Deployments
LTE Broadcast - Lessons Learned from Trials and Early Deployments
 
Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...
Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...
Modification and Testing of Parabolic Concentrator Solar Water Distiller Pres...
 
Pasapalabra sobre la Resurrección de Jesús
Pasapalabra sobre la Resurrección de JesúsPasapalabra sobre la Resurrección de Jesús
Pasapalabra sobre la Resurrección de Jesús
 
Overall Equipment Efficiency
Overall Equipment EfficiencyOverall Equipment Efficiency
Overall Equipment Efficiency
 
بغداد الرصافة 2
بغداد الرصافة 2بغداد الرصافة 2
بغداد الرصافة 2
 

Similar to F5 Infosec Israel 2013 Application Centric Security

Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverviewrehanf5
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For VirtualizationPatricio Campos
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
 
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterF5NetworksAPJ
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGDmitry Tikhovich
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteCohesive Networks
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep DiveAlan Percy
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overviewRajesh Kapoor
 

Similar to F5 Infosec Israel 2013 Application Centric Security (20)

Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverview
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CA
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
F5 BigIP v9.ppt
F5 BigIP v9.pptF5 BigIP v9.ppt
F5 BigIP v9.ppt
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overview
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

F5 Infosec Israel 2013 Application Centric Security

  • 1. APPLICATION CENTRIC SECURITY Tzoori Tamam Sr. Field Sales Engineer tzoori@f5.com
  • 2.
  • 3. Why do HaCkErz Attack? • Money • Fame • Training • Politics • Boredom • Plain Evil
  • 4. What do HaCkErz Attack?
  • 5. What Do HaCkErZ Attack? • THEY GO FOR YOUR APPLICATIONS! • Availability • Responsiveness • Reputation
  • 6. How Do HaCkErz Attack?
  • 8. F5 Overview - 50,000 100,000 150,000 200,000 250,000 300,000 350,000 400,000 $Thousands Publicly traded on NASDAQ 3,000+ employees IPO in 1999 F5 Networks is the leading provider of application and data delivery networking Our products sit at strategic points of control in any infrastructure Fiscal Year 2012 Revenue US$1.38B 1,380,000,000
  • 9. Local Snapshot Israel: • 120+ Local Employees • Increasing country presence • 2012 – Acquired Traffix Systems • Strong regional channel • Over 400 IL Customers
  • 10. Gartner Magic Quadrant for ADC Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from F5 Networks. Magic Quadrant for Application Delivery Controllers
  • 11. F5 in Worldwide Advanced Platform ADC Market for 2Q’12 • Market share leaders • F5: 59.1%, Citrix: 17.5%, Radware: 9.2% • Market share revenue leaders • F5: $186.2M, Citrix: $55.2M, Radware: $29.0M • Q/Q revenue growth • F5: 3.9%, Citrix: 12.1%, Radware: 1.3% • Total market numbers • Revenue: $315M • Q/Q revenue growth: 3.2% • Y/Y revenue growth: 21.5% *ADC segment includes: Server load balancing/Layers 4-7 switching and advanced (integrated) platforms. Graphic created by F5 based on Gartner data. 2Q12 Gartner Advanced Platform ADC* Market Share: Gartner, Inc. Market Share: Application Acceleration Equipment, Worldwide, CYQ212, Joe Skorupa, Nhat Pham, Sept 2012
  • 12. Introducing F5’s Application Delivery Firewall Aligning applications with firewall security One platform SSL inspection Traffic management DNS security Access control Application security Network firewall EAL2+ EAL4+ (in process) DDoS mitigation
  • 13. Full Proxy Security Network Session Application Web application Physical Client / Server L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation SSL inspection and SSL DDoS mitigation HTTP proxy, HTTP DDoS and application security Application health monitoring and performance anomaly detection Network Session Application Web application Physical Client / Server
  • 14. Network Session Application Web application Physical Client / Server L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation SSL inspection and SSL DDoS mitigation HTTP proxy, HTTP DDoS and application security Application health monitoring and performance anomaly detection Network Session Application Web application Physical Client / Server Full Proxy Security High-performance HW iRules iControl API F5’s Approach • TMOS traffic plug-ins • High-performance networking microkernel • Powerful application protocol support • iControl—External monitoring and control • iRules—Network programming language IPv4/IPv6 SSL TCP HTTP Optional modules plug in for all F5 products and solutions APM Firewall … Traffic management microkernel Proxy Client side Server side SSL TCP OneConnect HTTP
  • 15. CONSOLIDATE NETWORK AND SECURITY FUNCTIONS Use case • Consolidation of firewall, app security, traffic • Protection for data centers and application servers most common inbound protocols Before f5 with f5 Load Balancer DNS Security Network DDoS Web Application Firewall Web Access Management Load Balancer & SSL Application DDoS Firewall
  • 16. CONSOLIDATE NETWORK AND SECURITY FUNCTIONS Use case • Consolidation of firewall, app security, traffic • Protection for data centers and application servers most common inbound protocols Before f5 with f5 Load Balancer DNS Security Network DDoS Web Application Firewall Web Access Management Load Balancer & SSL Application DDoS Firewall
  • 17. • Provides comprehensive protection for all web application vulnerabilities • Delivers out of the box security • Enables L2->L7 protection • Unifies security and application delivery • Logs and reports all application traffic and attacks • Educates admin. on attack type definitions and examples • Sees application level performance • XML FW, L7 DOS, BruteForce and Web Scraping • Application visibility and reporting • FREE Vulnerability Scanning from Cenzic/WhiteHat BIG-IP Application Security Manager Powerful Adaptable Solution
  • 18. • Consolidated firewall and DNS Service • High performance, scalable DNS • Secure queries with DNSSEC SECURE DNS Use case with f5 Before f5 65,000 concurrent queries ? http://www.f5.com http://www.f5.com • Cache poisoning • DNS spoofing • Man in the middle • DDoS
  • 19. • Consolidated firewall and DNS Service • High performance, scalable DNS • Secure queries with DNSSEC with f5 Before f5 65,000 concurrent queries ? http://www.f5.com http://www.f5.com • Cache poisoning • DNS spoofing • Man in the middle • DDoS Secure and available DNS infrastructure: Up to 10 million concurrent queries SECURE DNS Use case
  • 20. SSL INSPECTION SSL ! SSL • Gain visibility and detection of SSL- encrypted attacks • Achieve high- scale/high-performance SSL proxy • Offload SSL—reduce load on application servers Use case SSL SSL
  • 21. Protect Against Newly Published Vulnerabilities That Do Not Have a Patch
  • 22. Hardware Refresh - BIG-IP Platforms Line Up New BIG-IP 11000 • 2.5M L7 RPS • 20K SSL TPS (2K key) • 1M L4 CPS • 24 Gbps L7 TPUT • 10 10 Gigabit Fiber Ports (SFP+) BIG-IP 10200v • 2M L7 RPS • 42K SSL TPS (2K key) • 1M L4 CPS • 40G L7 TPUT • 16 10 Gigabit Fiber Ports (SFP+) • 2 40 Gigabit Fiber Ports (QSFP+) VIPRION 2400 / 4 x 2100 Blade • 4M L7 RPS • 40K SSL TPS (2K key) • 1.6M L4 CPS • 72 Gbps L7 TPUT • 32 10 Gigabit Fiber Ports (SFP+) VIPRION 4480 / 4 x 4300 Blade • 10M L7 RPS • 120K SSL TPS (2K key) • 5.6M L4 CPS • 160G L7 TPUT • 32 10 Gigabit Fiber Ports (SFP+) • 8 40 Gigabit Fiber Ports (QSFP+) BIP-IP 2000s • 212K L7 RPS • 2K SSL TPS (2K key) • 75K L4 CPS • 5 Gbps L7 TPUT • 2 10 Gigabit Fiber Ports (SFP+) • 8 Gigabit Ethernet CU ports BIG-IP 2200s • 425K L7 RPS • 4K SSL TPS (2K key) • 150K L4 CPS • 5 Gbps L7 TPUT • 2 10 Gigabit Fiber Ports (SFP+) • 8 Gigabit Ethernet CU ports BIG-IP 4200v • 850K L7 RPS • 9K SSL TPS (2K key) • 300K L4 CPS • 10 Gbps L7 TPUT • 2 10 Gigabit Fiber Ports (SFP+) • 8 Gigabit Ethernet CU ports: BIG-IP 11050 • 2.5M L7 RPS • 20K SSL TPS (2K key) • 1M L4 CPS • 40 Gbps L7 TPUT • 10 10 Gigabit Fiber Ports (SFP+) VIPRION 4800 / 8 x 4300 Blade • 20M L7 RPS • 240K SSL TPS (2K key) • 10M L4 CPS • 320G L7 TPUT • 64 10 Gigabit Fiber Ports (SFP+) • 16 40 Gigabit Fiber Ports (QSFP+) BIG-IP 4000s • 425K L7 RPS • 4.5K SSL TPS (2K key) • 150K L4 CPS • 10 Gbps L7 TPUT • 2 10 Gigabit Fiber Ports (SFP+) • 8 Gigabit Ethernet CU ports
  • 23. How Does F5 Protects Your Apps? tzoori@f5.com Layer3 – Layer7 Application Centric Security Solution

Editor's Notes

  1. Source: IBM X-Force 2011 Trend and Risk Report March 2012{NOTE TO SPEAKER: The key points to get across on this slide really are around the fact -- and this can be conveyed and leveraged in multiple different ways. What I like to articulate here is really that if you look at the attack types, you know, major attack types that exist here are application type attacks and web attacks. In addition to that, you can see here that the key thing is every single one of these customers in themselves had a firewall, and it was most likely a next generation firewall. And the reality of the situation is once again due to the fact that they leverage a piece of technology that was not designed to protect their data center, the resulting effect was that they weren't protected and they were exploited. And it's important that the individual conveying the slide, if you're talking to a partner, that you can articulate that you do not want your customers to be one of the next large bubbles or bubbles that exist on this eye chart. Or if you happen to be a customer the last thing that you want is the company that you're working for or protecting to be on this eye chart.}
  2. F5 is the global leader in Application Delivery Networking, and continues to be a solid provider and customer ally as we continue to grow and expand the entire ADC market.
  3. This PPT representation complies with Gartner’s Copyright & Policy as of Nov-08-12. Although the slide may be modified for style & visual consistency, no element should be added, deleted or hidden without contacting r.curran@f5.com
  4.  So one of F5's key differentiators and value-add with regard to security is the fact that we provide it on a full proxy architecture. And the value of a full proxy architecture for those who are not familiar can be analogous to the role that an escrow agent or an escrow officer might play in a real estate transaction. The reason for the escrow officer is to protect the buyer from the seller and the seller from the buyer by acting as an independent third party or a neutral third party to protect the buyer and the seller. And the role of this officer is also to inspect all elements of the transaction before allowing the transaction to be completed, safely and securely. And much in the same way F5's full proxy security looks and examines all elements within the OSI stack, because we are located at strategic points in the network and we are by nature inspecting that traffic, it allows us to understand what's happening and take action on that traffic, from an application perspective, from a session perspective and from a network session perspective, all throughout the stack. {NOTE TO SPEAKER: F5 Mitigation Technologies:Application: BIG-IP ASM:Positive and negative policy reinforcement, iRules, full proxy for HTTP, server performance anomaly detectionSession: BIG-IP LTM and GTM: high scale performance, DNS Express, SSL termination, iRules, SSL renegotiation validationNetwork: BIG-IP LTM: SynCheck, default-deny posture, high-capacity connection table, full proxy traffic visibility, rate-limiting, strict TCP forwarding. Network layer bullets:L4 Stateful firewall – including TCP checksum checks, fragmentation and reassemblyDDoS mitigationSession layer:SSL inspectionSSL DDoS attacksApplication Layer:OWASP top 10Application content scrubbing (S -> C)}
  5. Because we are located in strategic points of the network, and because we do take a full proxy approach, performance is absolutely critical, because you can imagine all of the traffic traveling through this point being inspected. It must be done at very, very high rates of speed. Because F5 combines purpose-built software with purpose-built hardware, we're able to achieve and add multiple services on our intelligent services platform with minimal performance degradation, and we're able to do these at scale much higher, at a scale much higher than can be traditionally done with existing security solutions.
  6. One of the additional functions of the ADF solution is the ability to secure DNS infrastructure. The Application Delivery Firewall with the BIG-IP GTM and DNSSEC module achieves this in a couple of ways. One of the problems or one of the weaknesses of traditional DNS infrastructure is the fact that most DNS infrastructure doesn't have the scale that's necessary to deal with large scale potential attacks in the form of DNS floods or DNS -- in terms of DNS floods. And a typical DNS server might be able to handle say 65,000 concurrent queries. If you start to overwhelm that DNS server, what ends up happening is that an attacker can start to maliciously inject responses for DNS queries. This can result in a number of things such as cache poisoning, DNS spoofing, and generally what it results in is problems for the end website. And it has a real follow-on effect to the brand integrity.  Think about it this way. If you're trying to reach a particular website like www.bank.com, and bank.com is undergoing a DNS attack, if the correct -- is undergoing a DNS denial of service attack, if the correct IP address is not returned and instead it's redirected to a malicious site, that is a real -- that bears a real problem for bank.com's brand and their integrity. Now, our Application Delivery Firewall solves this problem in a couple of ways. The first and foremost is just the sheer scale and ability to handle up to 10 million concurrent queries. So we have this massive scale of DNS -- being able to be a DNS server. The other thing that the ADF can do is also sign DNS queries. This is DNS SEC. What this means is that responses to DNS queries are cryptographically signed so they can't be spoofed. This is a particularly interesting use case for certain federal agencies who have to comply with DNS SEC requirements.
  7. Traditional firewalls are often incapable of looking into SSL traffic. And what this means is that attacks could be embedded within SSL, either in the form of malforms, payloads, or in the case of certain types of denial of service attacks such as slowloris or slowpost. Those attacks could be embedded within encrypted channels. And if the firewall is not looking into the encrypted channel, then those attacks are passed directly to the server, which could then basically fall over. And it's important to note that it's not the case that firewalls can't look into SSL traffic. In fact, today, many if not most of them do have that ability. But the limiting factor is their scale. And most existing firewalls today have a significant performance penalty when they enable SSL inspection, which means that most administrators end up not enabling this. And so in reality what ends up happening is that most firewalls that are deployed end up passing through SSL encrypted traffic. By contrast, the F5 Application Delivery Firewall has a really high performing SSL inspection, and what that means is that as a full proxy and as a full SSL proxy the ADF will be able to decrypt the incoming SSL connections, inspect them for any possible threats, and then forward them on to the application servers. So we're able to block any malicious packets that would be going through. This has a secondary effect, and that's what we call SSL offload, and namely that since we're using the F5 ADF to do the SSL decryption, then we can pass the unencrypted traffic to the application server, which significantly reduces the load on the app servers.
  8. If a client connection attempts to renegotiate more than five times in any 60 second period, that client connection is silently dropped.By silently dropping the client connection, the iRule causes the attack tool to stall for long periods of time, fully negating the attack.  There should be no false-positives dropped, either, as there are very few valid use cases for renegotiating more than once a minute.The tool itself is about 700 lines of readable C code. Actually, it looks better than your typical hack-tool so I have to give “The Hacker’s Choice” props on their craftmanship. The attack tool ramps up to 400 open connections and attempts to do as many renegotiations on each connection as it can. On my dedicated test client, it comes out to 800 handshakes per second (or 2 per connection per second).Moment of IronyWhen you first run the tool against your BIG-IP virtual server, it might say “Server does not support SSL Renegotiation.” That’s because everyone, including F5, is still recovering from last year’s SSL renegotiation vulnerability and by default our recent versions disable SSL renegotiation. So in order to do any testing at all, you have to re-enable renegotiation. But this also means that by default, virtual servers (on 10.x) are already not vulnerable unless they’ve explicitly re-enabled renegotiation. The irony is that the last critical SSL vulnerability provides some protection against this new SSL vulnerability. The iRule CountermeasureEnter DevCentral. After setting up the attack lab, we asked Jason Rahm (blog) for his assistance. He put together a beautiful little iRule that elegantly defeats the attack. Its premise is simple:If a client connection attempts to renegotiate more than five times in any 60 second period, that client connection is silently dropped.By silently dropping the client connection, the iRule causes the attack tool to stall for long periods of time, fully negating the attack. There should be no false-positives dropped, either, as there are very few valid use cases for renegotiating more than once a minute.The iRulewhen RULE_INIT { set static::maxquery 5 set static::seconds 60 } when CLIENT_ACCEPTED { set rand [expr { int(10000000 * rand()) }] } when CLIENTSSL_HANDSHAKE { set reqno [table incr "reqs$rand"] table set -subtable "reqrate:$rand" $reqno "ignored" indefinite $static::seconds if { [table keys -count -subtable "reqrate:$rand"] > $static::maxquery } { after 5000 drop } } when CLIENT_CLOSED { table delete reqs$rand table delete –subtable reqrate:$rand –all } With the iRule in place, you can see its effect within a few seconds of the test restarting.Handshakes 2000 [0.00 h/s], 400 Conn, 0 Err Handshakes 2000 [0.00 h/s], 400 Conn, 0 Err Handshakes 2000 [0.00 h/s], 400 Conn, 0 Err Handshakes 2000 [0.00 h/s], 400 Conn, 0 Err Handshakes 2000 [0.00 h/s], 400 Conn, 0 ErrThe 400 connections each get their five renegotiations and then the iRule waits five seconds (to ack any outstanding client data) before silently dropping the connection. The attack tool believes the connection is still open, so it stalls. Note that the test had to be restarted, because the iRule doesn’t apply to existing connections when it’s attached to a virtual server. Take that into account if you are already under attack.Its understandable if you are thinking “that’s the coolest 20-line iRule I’ve ever seen, I wish I understood it better.” Jason also provided a visual workflow to elucidate its mechanics.iRule DDOS countermeasure workflowConclusionAt a meeting earlier this year here in Seattle we were talking about the previous Renegotiation flaw. The question was posed “What is the next vulnerability that we’re all going to slap our foreheads about?” This particular attack falls into that category. Its a simple attack against a known property of the protocol. Fortunately, BIG-IP can leverage its hardware-offload or use countermeasures like this iRule to counter the attack. There are two take-aways here: first, even long-established and reviewed protocols like SSL/TLS can be used against you and second, iRules are pretty sweet!And thanks again, to Jason Rahm for his invaluable assistance!
  9. Use this slide with new customers