SlideShare a Scribd company logo
1 of 17
Next-Generation Firewall Security
Updated for 2015
Tracy Ashton
Juniper Networks
tashton@juniper.net
Agenda
– Next-generation firewall policies (RBAC)
– Suite B and new IPSec protocols
– Commercial Solutions for Classified (CSfC)
– Real-time reputation-based threat blocking
9/3/2015
Typical stateful firewall policy
• Source and Destination are IP addresses or networks
– can be named, but names are usually local
• Service usually maps to a TCP or UDP port number
– some protocols are more sophisticated and use ALGs
9/3/2015
Source and Destination
• We need a way to replace addresses with a
standardized, organization-wide naming scheme
• DNS names can be difficult to use in firewall policies
– need to iterate through multiple addresses per name
– reverse lookup often fails
• User’s addresses change constantly
• VM-based server addresses can change too
– different techniques for users and servers
9/3/2015
Users
• Firewall polls the domain controller: “best effort”
– not an option for complex domain schemes
• Complete internal security: 802.1x
– local access requires the same security standards as
remote access
– must be implemented on all internal switches and APs
– 802.1x controller can also populate user lists on next-
generation firewalls
– no more “hard on the outside, soft on the inside”
9/3/2015
802.1x
802.1x looks very complex, but it’s easy to understand if you go
step by step, and everyone will be using it soon...
9/3/2015
AD/LDAP/PKI/RSA
Tablet/Notebook/Laptop
Domain A
Domain B
Tablet/Notebook/Laptop
Switches and APs
Network Access Controller
Protected
Resource
802.1x and dynamic firewall policies
• Network access controller can add an authorized
user to one or more firewall rules
• Can be based on AD group membership
• Control user access by adding and removing from AD
groups, not by writing firewall policy per user
• Controller to firewall communication is an emerging
standard, so early implementations are proprietary
9/3/2015
Server movement
• Modern datacenters use virtual machines
• VM controllers move VMs during operation
• Solution: VM controllers must provide an interface
for firewall queries
• Emerging standards, mostly proprietary today
• Using DNS to define internet-based servers is difficult
– but internal DNS is easier to control, and may be an option
9/3/2015
Source and Destination are no longer static, local
objects:
But what about the protocols?
How do we know that TCP port 80 is carrying legitimate
HTTP, not hidden P2P traffic... or worse?
9/3/2015
Track state at all protocol levels
(courtesy of w3.org)
9/3/2015
Firewall plus intrusion detection and prevention
• Advanced intrusion prevention techniques use protocol-
specific state engines
• Every communication between client and server is
carefully matched against expected behavior
• This allows for reliable identification of protocols,
regardless of port number
• We can also prevent the majority of zero-day attacks by
imposing common-sense limits on communication
• Intrusion detection signatures are integrated with state
engines to reduce or eliminate false positives
9/3/2015
Next-generation firewalls:
• Provide multiple methods for replacing static,
address-based policies with dynamic, up-to-date lists
of users and servers
• Examine packets more thoroughly to guarantee that
protocols are not being misused
• Support scripting languages and provide an API for
customization and integration with mgmt systems
• Support advanced VPN features...
9/3/2015
Suite B – new algorithms for IPSec
• NSA’s latest set of cryptographic algorithms:
– 3DES replaced with AES-128, AES-256
– MD5 and SHA1 replaced with SHA-256, SHA-384
– RSA replaced with ECDSA, DH replaced with ECDH
• The NSA never attempted to push weak
algorithms; this was an over-interpretation of
an EC-RNG error that the NSA later corrected
9/3/2015
Commercial Solutions for Classified
http://www.nsa.gov/ia/programs/csfc_program/
If you select FW/VPN products from the NSA’s list...
And layer one IPSec tunnel inside another...
You can carry classified information on commonly
available, off-the-shelf hardware
9/3/2015
Botnets, DDoS, and CnC hosts
• User clicks on something, installs malware
• User’s machine is now a ‘bot
• Malware is quiet, evades detection, occasionally
contacts internet-based Command and Control host
• CnC operator waits for enough hosts to become bots,
then issues attack command
• Bots begin a Distributed Denial of Service attack
against the CnC operator’s target
9/3/2015
Real-time reputation-based threat intelligence
• For many years, DISA has provided a daily list of IP
addresses that were involved in malicious activity
• Service providers and major corporations are now joining
together to produce similar intelligence
• Addresses involved in attacks are uploaded to a
community operated cloud service
• Next-generation firewalls can subscribe to the service,
and dynamically block known baddies
• Still in development, but represents a fundamental
advance in security techniques and capabilities
9/3/2015
Thank you for listening!
Feel free to contact me with
questions: tashton@juniper.net
9/3/2015

More Related Content

What's hot

Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introductionRaghava Sharma
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Rambus
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answersccna4discovery
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Priyanka Aash
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PROIDEA
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and CloudPriyanka Aash
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregationMagnus Jansson
 

What's hot (20)

Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introduction
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 
Firewall
FirewallFirewall
Firewall
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
I ptable
I ptableI ptable
I ptable
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregation
 

Viewers also liked

Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation FirewallsThe eCore Group
 
ePlus Next-Generation Firewalls
ePlus Next-Generation FirewallsePlus Next-Generation Firewalls
ePlus Next-Generation FirewallsePlus
 
Analyst Report for Next Generation Firewall
Analyst Report for Next Generation FirewallAnalyst Report for Next Generation Firewall
Analyst Report for Next Generation FirewallIla Group
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)military
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies sushmil123
 

Viewers also liked (14)

Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation Firewalls
 
ePlus Next-Generation Firewalls
ePlus Next-Generation FirewallsePlus Next-Generation Firewalls
ePlus Next-Generation Firewalls
 
Hogyan méretezzünk tűzfalat?
Hogyan méretezzünk tűzfalat?Hogyan méretezzünk tűzfalat?
Hogyan méretezzünk tűzfalat?
 
Analyst Report for Next Generation Firewall
Analyst Report for Next Generation FirewallAnalyst Report for Next Generation Firewall
Analyst Report for Next Generation Firewall
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Firewall
Firewall Firewall
Firewall
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Next-Generation Network Security: TechNet Augusta 2015

Similar to Next-Generation Network Security: TechNet Augusta 2015 (20)

firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 
Vp ns
Vp nsVp ns
Vp ns
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 

More from AFCEA International

AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015AFCEA International
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015AFCEA International
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015AFCEA International
 

More from AFCEA International (20)

William Halal
William HalalWilliam Halal
William Halal
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
Ben Gibson
Ben GibsonBen Gibson
Ben Gibson
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
Lin Wells
Lin WellsLin Wells
Lin Wells
 
Tod Levitt
Tod LevittTod Levitt
Tod Levitt
 
Major Steven Nielson
Major Steven NielsonMajor Steven Nielson
Major Steven Nielson
 
Lt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, JrLt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, Jr
 
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 

Recently uploaded

(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 

Recently uploaded (20)

(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 

Next-Generation Network Security: TechNet Augusta 2015

  • 1. Next-Generation Firewall Security Updated for 2015 Tracy Ashton Juniper Networks tashton@juniper.net
  • 2. Agenda – Next-generation firewall policies (RBAC) – Suite B and new IPSec protocols – Commercial Solutions for Classified (CSfC) – Real-time reputation-based threat blocking 9/3/2015
  • 3. Typical stateful firewall policy • Source and Destination are IP addresses or networks – can be named, but names are usually local • Service usually maps to a TCP or UDP port number – some protocols are more sophisticated and use ALGs 9/3/2015
  • 4. Source and Destination • We need a way to replace addresses with a standardized, organization-wide naming scheme • DNS names can be difficult to use in firewall policies – need to iterate through multiple addresses per name – reverse lookup often fails • User’s addresses change constantly • VM-based server addresses can change too – different techniques for users and servers 9/3/2015
  • 5. Users • Firewall polls the domain controller: “best effort” – not an option for complex domain schemes • Complete internal security: 802.1x – local access requires the same security standards as remote access – must be implemented on all internal switches and APs – 802.1x controller can also populate user lists on next- generation firewalls – no more “hard on the outside, soft on the inside” 9/3/2015
  • 6. 802.1x 802.1x looks very complex, but it’s easy to understand if you go step by step, and everyone will be using it soon... 9/3/2015 AD/LDAP/PKI/RSA Tablet/Notebook/Laptop Domain A Domain B Tablet/Notebook/Laptop Switches and APs Network Access Controller Protected Resource
  • 7. 802.1x and dynamic firewall policies • Network access controller can add an authorized user to one or more firewall rules • Can be based on AD group membership • Control user access by adding and removing from AD groups, not by writing firewall policy per user • Controller to firewall communication is an emerging standard, so early implementations are proprietary 9/3/2015
  • 8. Server movement • Modern datacenters use virtual machines • VM controllers move VMs during operation • Solution: VM controllers must provide an interface for firewall queries • Emerging standards, mostly proprietary today • Using DNS to define internet-based servers is difficult – but internal DNS is easier to control, and may be an option 9/3/2015
  • 9. Source and Destination are no longer static, local objects: But what about the protocols? How do we know that TCP port 80 is carrying legitimate HTTP, not hidden P2P traffic... or worse? 9/3/2015
  • 10. Track state at all protocol levels (courtesy of w3.org) 9/3/2015
  • 11. Firewall plus intrusion detection and prevention • Advanced intrusion prevention techniques use protocol- specific state engines • Every communication between client and server is carefully matched against expected behavior • This allows for reliable identification of protocols, regardless of port number • We can also prevent the majority of zero-day attacks by imposing common-sense limits on communication • Intrusion detection signatures are integrated with state engines to reduce or eliminate false positives 9/3/2015
  • 12. Next-generation firewalls: • Provide multiple methods for replacing static, address-based policies with dynamic, up-to-date lists of users and servers • Examine packets more thoroughly to guarantee that protocols are not being misused • Support scripting languages and provide an API for customization and integration with mgmt systems • Support advanced VPN features... 9/3/2015
  • 13. Suite B – new algorithms for IPSec • NSA’s latest set of cryptographic algorithms: – 3DES replaced with AES-128, AES-256 – MD5 and SHA1 replaced with SHA-256, SHA-384 – RSA replaced with ECDSA, DH replaced with ECDH • The NSA never attempted to push weak algorithms; this was an over-interpretation of an EC-RNG error that the NSA later corrected 9/3/2015
  • 14. Commercial Solutions for Classified http://www.nsa.gov/ia/programs/csfc_program/ If you select FW/VPN products from the NSA’s list... And layer one IPSec tunnel inside another... You can carry classified information on commonly available, off-the-shelf hardware 9/3/2015
  • 15. Botnets, DDoS, and CnC hosts • User clicks on something, installs malware • User’s machine is now a ‘bot • Malware is quiet, evades detection, occasionally contacts internet-based Command and Control host • CnC operator waits for enough hosts to become bots, then issues attack command • Bots begin a Distributed Denial of Service attack against the CnC operator’s target 9/3/2015
  • 16. Real-time reputation-based threat intelligence • For many years, DISA has provided a daily list of IP addresses that were involved in malicious activity • Service providers and major corporations are now joining together to produce similar intelligence • Addresses involved in attacks are uploaded to a community operated cloud service • Next-generation firewalls can subscribe to the service, and dynamically block known baddies • Still in development, but represents a fundamental advance in security techniques and capabilities 9/3/2015
  • 17. Thank you for listening! Feel free to contact me with questions: tashton@juniper.net 9/3/2015

Editor's Notes

  1. RMS Early days Mainframe login account “rms” Richard Matthew Stallman, often known by his initials, rms, is a software freedom activist and computer programmer. Founder of the GNU project and Free Software Movement He campaigns for software to be distributed in a manner such that its users receive the freedoms to use, study, distribute and modify that software. Million dollar mainframes connected directly to the Internet with no firewalls to inspect traffic Server maintenance and security was costly. A well designed fw could protect poorly-secured Only stateless router filters(ACL’s) were available src; dst; protocol; port; header flags
  2. This policy allows the inside network to contact an internet-based DNS server. Because the firewall is stateful, no policy is needed to allow return packets; the outbound DNS request to the server will create a session, and reply packets will match that session entry, and will be allowed. I could replace the 192.168.1.0/24 with a local name like “home network” and replace the 4.2.2.2/32 with a local name like “DNS server”. In large networks, these firewall-specific naming schemes are hard to maintain and can lead to confusion.
  3. client has no IP address. User connects to physical switch port, or tries to connect to wireless AP switch/AP initiates 802.1x negotiation if client doesn’t support 802.1x, fall back to MAC authentication, or fail to connect if client supports 802.1x, client provides user’s certificate (from CAC) and endpoint security information this data is encapsulated in RADIUS by the switch or AP, then sent to the network access controller the controller performs AAA: verifies user certificate, does revocation checking, looks up the user’s Active Directory entry and downloads details like group membership if 802.1x supplicant supports additional checks, the controller might also examine the endpoint security status controller combines all security and user information received so far, and makes an access decision – normal access, special user group, endpoint needs remediation... controller sends the access decision to the switch or AP, and assigns a VLAN client receives an IP address in that VLAN controller can also send the user’s assigned address and their access rights to a next-generation firewall firewall can now add that user to a dynamic rule – for instance “HR Group” members get access to the “HR database server” resource
  4. A traditional stateful firewall monitors the state of TCP, UDP, and ICMP sessions (at layer 4 of the OSI model), so that reply packets that match an existing session are automatically allowed. A next generation firewall tracks layer 4 state, but also maintains the state of higher levels of protocol communication – NFS, HTTP, DNS, etc. at layers 5-7 of the OSI model. Even protocols that don’t maintain state between client and server (like UDP and HTTP) can be treated as state engines by the firewall. A traditional intrusion detection system examines individual packets for predefined patterns (signatures.) A next generation firewall’s intrusion prevention system examines entire flows, not individual packets, and associates signatures with particular protocol states, greatly reducing false positives. In the case of TCP, the finite state machine can be considered to describe the “life stages” of a connection. Each connection between one TCP device and another begins in a null state where there is no connection, and then proceeds through a series of states until a connection is established. It remains in that state until something occurs to cause the connection to be closed again, at which point it proceeds through another sequence of transitional states and returns to the closed state. The full description of the states, events and transitions in a TCP connection is lengthy and complicated—not surprising, since that would cover much of the entire TCP standard. For our purposes, that level of detail would be a good cure for insomnia but not much else. However, a simplified look at the TCP FSM will help give us a nice overall feel for how TCP establishes connections and then functions when a connection has been created.
  5. Example for state engine: DNS -- examine outbound request, does it look like a legitimate DNS query? Expect server response, examine for legitimacy. Examples for port number changes: HTTP carried over 8080 is just “HTTP”; bit torrent hidden in port 80 is identified as bit torrent, NOT http. Examples for zero-day attack prevention: HTTP queries should never be over 8092 characters, should never contain a binary zero; SMB filenames should only contain human-readable characters. Example for eliminating false positives: “wizard” is only an attempt to break into a mail server if issued at the very beginning of the SMTP session; “wizard” anywhere in an email is definitely not a malicious packet.