Advanced Firewalls Progress Report

33
Next Generation Firewalls: Ready or Not David Strom AITP St. Louis March 2014 [email protected] 1

TAGS:

description

This is the deck for a speech at AITP St Louis chapter in March 2014 about next generation firewalls and using advanced persistent threats

Transcript of Advanced Firewalls Progress Report

Page 1: Advanced Firewalls Progress Report

1

Next Generation Firewalls: Ready or Not

David StromAITP St. Louis March 2014

[email protected]

Page 2: Advanced Firewalls Progress Report

2

Who am I?

• Long time tech journalist, product reviewer and speaker

• IT manager from the dawn of the PC era• Former editor-in-chief at Network Computing,

Tom’s Hardware.com• Author of two books on computer networking• Based here

Page 3: Advanced Firewalls Progress Report

3

Agenda

• Next Gen distinguishing characteristics• Issues with next gen deployment• UTM pro and con• Advanced persistent threat tools

Page 4: Advanced Firewalls Progress Report

4

The older firewall generation

Page 5: Advanced Firewalls Progress Report

5

Cisco ASA: what it used to be like

Page 6: Advanced Firewalls Progress Report

6

Next Gen distinguishing characteristics

• Applications granularity and awareness• Integrated IPS• IP Reputation management• Geolocation

Page 7: Advanced Firewalls Progress Report

7

Page 8: Advanced Firewalls Progress Report

8

Cisco ASA applications granularity

Page 9: Advanced Firewalls Progress Report

9

New Cisco ASA Dashboard

Page 10: Advanced Firewalls Progress Report

10

And another Cisco view

Page 11: Advanced Firewalls Progress Report

11

Palo Alto Networks “Applipedia”

Page 12: Advanced Firewalls Progress Report

12

Page 13: Advanced Firewalls Progress Report

13

Reputation management

Page 14: Advanced Firewalls Progress Report

14

Page 15: Advanced Firewalls Progress Report

15

McAfee Enterprise Firewall geo-location feature

Page 16: Advanced Firewalls Progress Report

16

Deployment issues

• Next gen does things differently from old school:– NAT– QoS– Outbound vs. inbound rule focus

Page 17: Advanced Firewalls Progress Report

17

Page 18: Advanced Firewalls Progress Report

18

Understanding app ID implications for users

Page 19: Advanced Firewalls Progress Report

19

One obstacle to switching to next-gen

Page 20: Advanced Firewalls Progress Report

20

Network documentation isn’t current

Page 21: Advanced Firewalls Progress Report

21

Handling VMs still an issue

Page 22: Advanced Firewalls Progress Report

22

Lots of VM security products…

Page 23: Advanced Firewalls Progress Report

23

Catbird’s compliance radar graph

Page 24: Advanced Firewalls Progress Report

24

Page 25: Advanced Firewalls Progress Report

25

Infrastructure misuse

Page 26: Advanced Firewalls Progress Report

26

What about UTMs?

• Pro:– A lot of protection for the $ nowadays

(Juniper/Check Point)– One box does it all

• Con:– Complex licensing issues– Can get expensive if you have high bandwidth

needs– Latency can kill you if you turn on Anti-Virus

Page 27: Advanced Firewalls Progress Report

27

Juniper SRX dashboard

Page 28: Advanced Firewalls Progress Report

28

SonicWall

Page 29: Advanced Firewalls Progress Report

29

Page 30: Advanced Firewalls Progress Report

30

Watchguard UTM

Page 31: Advanced Firewalls Progress Report

31

APT tools

• Try to catch the bad guys before they actually deploy their payloads, such as from Norse Corp. (local boys) and Cyphort

Page 32: Advanced Firewalls Progress Report

32

Page 33: Advanced Firewalls Progress Report

33

For more info

[email protected]• Twitter: @dstrom• http://strominator.com• TechTarget article: http://bit.ly/1dISmx4• Network World review of UTMs:

http://bit.ly/1fJtmHE