550 likes | 738 Views
Comparing and Contrasting Check Point NGX with Juniper ScreenOS Firewalls Yasushi Kono (ComputerLinks Frankfurt). The Magic Quadrants of the Gartner Group The fundamental architecture of Juniper ScreenOS Configuration of Zone, Interfaces, Policies
E N D
ComparingandContrasting Check Point NGX withJuniperScreenOS Firewalls Yasushi Kono (ComputerLinks Frankfurt)
The Magic Quadrantsofthe Gartner Group The fundamental architectureofJuniperScreenOS Configurationof Zone, Interfaces, Policies The featuresofScreenOScomparedto Check Point Conclusion Agenda
Ability to Execute: Product/Service Overall Viability Sales Execution/Pricing Market Responsiveness Market Execution Customer Experience
Completeness of Vision Market Understanding Marketing Strategy Sales Strategy Business Model Innovation Geographic Strategy
Now, let‘shave a lookatthe Fundamentals oftheJuniperScreenOSArchitecture:
The Framework Configuration: Virtual Router
The Framework Configuration: • Security Zone Virtual Router
The Framework Configuration: Interface Security Zone Virtual Router
The Framework Configuration: IP Address Interface Security Zone Virtual Router
Ofcourse, you will have multiple • IP Addresses, • Interfaces, • Security Zones within a JuniperNetscreen Security Device….
The Framework Configuration:IP Addresses Interfaces Security Zones Virtual Router
The virtualrouteractsas a parentcontainerwhichholdstheelementsofthehierarchicalstructure. The nextlayerconsistsofthe so-called Security Zone. The purposeofthat Security Zone istoconfigure Security Policiesbased on the Security Zone as Source Zone and Destination Zone, respectively. The Security Zone holdsthe Interface(s) Finally, youcanconfigurethe IP address on thatinterface.
The Configuration Order iscrucial in ScreenOS. First, createoneormore Security Zones on top oftheexisting Virtual Router (namelytrust-vr). Thiscanbeeasilydone via the CLI ofthe Security Device: setzonenamesales setzonenameinternet
Then, youhavetoassociate Interfaces tothese Security Zones: setinterface eth0 zonesales setinterface eth1 zoneinternet
Andnow, youcan bind IP addressesto Interfaces: setinterface eth0 ip 10.20.30.1/24 setinterface eth1 dhcpclientenable or setinterface eth1 ip 195.1.1.1/24
Then, youhavetoconfigureyour Default Gateway: setvroutertrust-vr route 0.0.0.0/0 gateway 195.1.1.254
A Security Policyregulatesthetrafficbetweenzones: setpolicyfromsalestointernetanyanyanypermit Shouldyouneed Dynamic NAT: set pol fromsalestointernetanyanyanynatsrcpermit
Shouldyou miss granularity: setaddresssales PC_Sales01 10.1.1.20/32 setpolicyfromsalestointernet PC_Sales01 anydnsnatsrcpermit log
Therearethreewaysofmanaging a ScreenOSinfrastructure: Configuration via CLI Configuration via WebUI Configuation via NSM (Network and Security Manager)
BenefitsofConfiguring via CLI: Easy to understand Youcanpreparethecommandswith an editorandpasteitontoyourproductionenvironment Noneedof MS Internet Explorer
BenefitsofConfiguring via WebUI: Noneedtomemorize CLI commands Intuitive Somepeoplelovetouse Internet Explorer
BenefitsofConfiguring via NSM: Manage multiple Security Devices centrally Noneedtomemorize CLI commands Analyzing log entriescentrally
PossibleDrawbackswith CLI Management of Security on a per Device Basis AnalyzingLogging per Device is not appropriate in Enterprise Environments Youhavetomemorize lots ofcommands
PossibleDrawbackswithWebUI Management of Security on a per Device Basis AnalyzingLogging per Device is not appropriate in Enterprise Environments Somepeoplehatemice!
PossibleDrawbackswith NSM Limitation of a maximumnumberof Devices, whenusingtheNSMXpress Appliance! OnlyRed Hat Linux issupportedas NSM Host Operating System Youhavetohave in depth Linux expertise You still need a mouse!
Introducingsome Features offeredbyJuniperNetscreen: Policy-based Routing Source-based Routing Source-interfacebased Routing Configuring Dynamic Routing Protocols Desaster Recovery Virtual System (VSYS) NSRP (NetScreenRedundancy Protocol)
Policy-Based Routing: PBR enablesyoutoimplementpoliciesthatselectivelycausepacketstotake different paths. Youusethefollowingbuildingblockstocreate a PBR policy: Extended Access List Match Group Action Group
Extended Access List: Lists thematchcriteriayoudefinefor PBR policies. Match criteriainclude: Source IP Destination IP Source Port Destination Port Protocol QoSPriority
Match Group: Match Groups provide a waytoorganizeextendedaccesslists. Itassociates an extended ACL ID numberwith a uniquematchgroupnameand a match-group ID number.
Action Group: An Action Group specifiesthe route thatyouwant a packet totake. Youspecifytheactionforthe route bydefiningthenextinterface, thenexthop, orboth
PBR Policy: After configuringthe Extended Access List, the Match Group, andthe Action Group, youhavetoconfigurethe PBR Policywhichisdonewithinthevirtualroutercontext.
Source-Based Routing: With Source-Based Routing, youareabletospecifythe route to a destinationbased on the Source IP oftheclient.
Source Interface-based Routing: With Source Interface-Based Routing, youareabletospecifythe route to a destinationbased on the Ingress Interface ofthe Security Device usedby a client.
Dynamic Routing: On a JuniperNetscreen Security Device, youcanuse Dynamic Routing Protocolswithoutthenecessityofconfiguring VPN or VTIs. Itismucheasiertoconfigure OSPF astheroutingprotocol (a matter ofminutes).
Sample OSPF Configuration: Juniper->setvroutertrust-vr Juniper(trust-vr)->setrouter-id 172.23.103.11 Juniper(trust-vr)-> setprotocolospf Juniper(trust-vr/ospf)-> setenable Juniper(trust-vr/ospf)-> setarea 10.0.0.0 Juniper(trust-vr/ospf)->exit Juniper(trust-vr)->exit Juniper->setinterface eth0 protocolospfarea 0.0.0.0 Juniper->setinterface eth0 protocolospfenable Juniper->setinterface bgroup0 protocolospfarea 10.0.0.0 Juniper->setinterface bgroup0 protocolospfenable
Desaster Recovery: On someoftheJuniper Security Devices, youcan save therunningconfigurationto an USB stick. save configfromflashtousb juniperconfig.txt Shouldyourunintotrouble, just plugthe USB stick andcopytheconfiguration back tothedevice. save configfromusbtoflash juniperconfig.txt On otherdevices (without USB support) use a TFTP serverinstead. save configfromflashtotftp 10.20.30.1 juniperconfig.txt Per CLI, youcan also copyandpaste a savedconfigurationfromyoureditortothe Terminal window.
So, Desaster Recoveryis a matter ofsecondsratherthanminutes.
Virtual Systems (VSYS) The high-end securitydevices in theScreenOSfamilyprovidetheabilitytocreate Virtual Systems. A Virtual System is a logicalinstanceof a securitydevicewithitsownroutingtable, administrators, zones, policies, and VPN.
Howtoconfigure a VSYS? root->setvsyssales root(sales)->setadminnamesalesadmin root(sales)->setadminpassword juniper1 root(sales)->setzonenamesales root(sales)->setint eth2.11 tag 11 zonesales root(sales)->setvroutertrust-vr route 10.51.1.0/24 vrsales-vr root(sales)->setaddresssaleswebserver 10.51.1.22/32 root(sales)->set pol fromuntrusttosalesanywebserver http permit log root(sales)->set pol fromsalestountrustanyanyanynatsrcpermit log root(sales)->save config root(sales)->exit
Basically, toconfigure a VSYS you will usethecommandsusedforconfiguring non-VSYS systems! Itisthat easy! Noneedtoconfigurevirtualswitchesorvirtualrouters „What in the hell are Warp Interfaces???“
NSRP (NetScreen Remote Protocol)Juniper‘s HA Solution for Gateway High Availability.Quitesimilar in functionalityto Nokia VRRP.Difference: Nounique IP addressestobeconfigured on clusterinterfaces.No IP addressesassignedtoSync InterfaceOnlytwonodessupported per Cluster!
NSRP ConfigurationExample:1. Setting upthe HA Link:setinterface eth2 zone ha2. Configuring Cluster Settings:setnsrpclusterid 0setnsrpclustername ISG_HAsetnsrparp 43. Setting Interfaces forMonitoring:setnsrpmonitorinterface eth0setnsrpmonitorinterface bgroup04. Adjusting VSD Settings:setnsrpvsdid 0 priority 80setnsrpvsdid 0 preemptsetnsrpvdsid 0 preempt hold-down 55. Enabling RTO Synchronization:setnsrprto-mirrorsync
ConclusionSomefeatures (Policy-based Routing, Source-based Routing, Interface-based Routing, …) areofferedbyJuniperwithoutcounterpartat Check Point.Itit easy togetstartedwithJuniperandyoucanimmediatelyconfigureinterfaces, securityzone, routing, addressbookentriesandsecuritypolicies.Itis easy toconfgure VSYS sinceyouare not forcedtolearnnewcommands.
Some Features of Check Point on theotherhand:Youcanuse IKE Main Mode with VPN Clients with Dynamic IP Addresses.The Check Point SecureClientisthebettersolutioncomparedtoJuniper‘sNetscreen Remote Client (morefeature, moresecurity, moreusability)!SMART is smart! WithSmartViewTracker, youcanseethe log informationofthewhole Enterprise at a glance!WithSmartView Monitor, youcansee all Status informationof all firewallswithinyourinfrastructureat a glance!WithSmartUpdate, youcan manage licensescentrally!
Some Features of Check Point on theotherhand (cont.):Before Check Point compilestheRule Base, itdoes a syntaxchecking!ClusterXL, Nokia IP Clustering or Nokia VRRP issupportingmorethantwoclusternodes!
So, whoisthewinneroftheEnterprise Firewall Functionality Contest?