620 likes | 866 Views
Network Security 101. TippingPoint Team Stuart Hatto Spring 2014. What is an IPS???. From the source of all knowledge…. OR more simply put…. IPS. Traffic minus known threats continue. All traffic goes in. Lets greet a HP TippingPoint IPS.
E N D
Network Security 101 TippingPoint Team Stuart Hatto Spring 2014
OR more simply put… IPS Traffic minus known threats continue All traffic goes in
IPS sensors are plugged into the network via Ethernet ports An Ethernet Port
To put an IPS inline (to force the inspection to occur), you need 2 ports that work together as a pair. An Ethernet port pair (A and B)
These port pairs work together to form what we call an inspection segment An Ethernet port pair (A and B) = An Inspection Segment
A simple view of “forcing inspection” through an IPS..(BEFORE IPS) Device A Any Device with an Ethernet port Device B Any Device with an Ethernet port
A simple view of “forcing inspection” through an IPS.. (WITH IPS) Device A Any Device with an Ethernet port Device B Any Device with an Ethernet port
The TP10 appliance has 2 x copper inspection segments More on the “copper” designation in just a minute 2 1
The S110 and S330 (they look the same.. Like a pizza box) 4 segments
A view of a 660N / 1400NSee anything different??? Those are fibre ports
A quick note on fibre types… This is important!!! Multi Mode fibre (MMF) – For Short distances. Typically within the same room, a few hundred metres max. Sometimes referred to as “Short Range” fibre. Single Mode fibre (MMF)– For Long distances. Typically across town/campus. Sometimes referred to as “Long Range” fibre. Also important, short range and long range fibre needs matching SR and LR transceivers!
the NX Platform • Market Leading 2U Port-Density • with Swappable Modules • 6x 1GbE 10/100/1000 (Copper) • 6x 1GbE SFP (Copper or fibre) • 4x 10GbE SFP+ • 1x 40GbE QSFP+ That’s a 10Gig I/O Module for the NX Platform
TippingPoint 7500NX 20.000 20Gbps TippingPoint 7100NX 15Gbps TippingPoint 2600NX, 5200NX, 6200NX 3Gbps, 5Gbps, 10Gbps Inspection Throughput[Mbps] TippingPoint 660N, 1400N 750Mbps, 1,5Gbps TippingPoint 110, 330 100Mbps , 300Mbps 20 TippingPoint 10 20Mbps 2 4 10 24 IPS Segments [Port-Pairs]
OK. It‘s nice that we have plenty of screamin‘ fast hardware appliances... But, where do customers put these bad boys?
HP TippingPoint appliances can be deployed anywhere… • Just “wedge” an IPS segment into any place you want to inspect/enforce network security policy. WLAN Core CampusLAN Edge Internet Tele-workers, partners, and customers
Like.. Between your Internet connection and your LAN (Local Area Network) • Deploy inside the firewall (most common) • Deploy outside the firewall (a fading trend) • Deploy both inside and outside the firewall ( a “firewall sandwich” – Also a fading trend) WLAN Core CampusLAN Edge IPS-Security Zone 2 Internet Tele-workers, partners, and customers IPS-Security Zone 1
And/Or.. Deploy closer to the Core of the network • Between the WLAN (wireless local area network) and the Core • Between the WAN (wide area network) and the Core • On Trunk links between switches (to isolate User networks and/or Server networks from the Core • On “top-of-rack” switches within • your virtualized Datacenter Virtual machines (VMs) Remote offices and branches Data center WAN WLAN Core CampusLAN Edge Internet Tele-workers, partners, and customers
Top Deployment Scenarios 1 Perimeter Internet DMZ LAN IPS IPS IPS IPS IPS IPS 2 Production / Mission Critical LAN/MAN/WAN Remote LAN 3 Compliance PCI LAN SOX
OK. It‘s nice that we have plenty of screamin‘ fast hardware appliances... But, how do we manage all of these devices?
SMS – Security Management System HP Security Management System (JC528A) • HP DL320 based server • 1U device • 1x146Gb hard drive HP Security Management System XL (JC679A) • HP DL380 based server • 2U device • 6x600Gb hard drive • Fault Tolerant (RAID 1+0) vSMS (JC561A) • VMware ESX/ESXiv4.0 or greater Requires vCenter • Requirements: • 146GB avail disk space • 2 virtual CPU • 6GB available memory • 2 virtual network adapters vSMS Manage Multiple Units … IPS IPS ESX(i)
TippingPoint NGIPS Platform Automated, Scalable Threat Protection SMS – Security Management System All traffic Minus known vulnerabilities NGIPS Sensors IPS Platform Designed for future security demands and services • Effective • Leading security research • Fastest coverage • Broadest coverage • Reliable • In-line reliability • In-line performance (throughput/latency) • Filter accuracy • Simple • Quick to deploy • Automated threat blocking • Easy to manage
Settings are defined and distributed to the appliances HP TippingPointSecurity Profile Cyber-Attacks Availability - Protocol Anomalies- Denial-Of-Service- (Distributed) Denial-Of-Service... - Reconnaissance - Trojan- Backdoor- Virus- Worm- Spyware- Phishing- Buffer Overflow- Heap Heap Overflow- SQL-Injection- Cross-Site-Scripting- Cross Site Rquest Forgery- Malicious Documents... Bandwidth Mgmt. - App. Rate Limiter Corporate-Policy - Security Policy- Access Validation- Tunneling- Rogue Applications- Peer-to-Peer - Streaming Media...
Blah.. Blah.. Blah... How much does this stuff cost and who‘s gonna buy it so I can make lots of £$€
And don’t forget Support, Training and RepDV! Mandatory List price* Nice To Know 1Gbps Ethernet Copper 40Gbps Ethernet fibre 1Gbps Ethernet fibre 10Gbps Ethernet fibre *EMEA pricing, February 2014
NGIPS Drivers • APT- Data Breach- Brand and Reputation Damage • (D)DoS- Bots- Ransomware • Operations- Confidentiality, Integrity, Availability- Recovery Costs- Penalties (Compliance) Asset THREAT VULNERABILITY Personal Information Intellectual Property Customer Data Financial Data etc. Unpatched Systems- Known SW Vulnerabilities Zero-Day-Exploits- Unknown SW Vulnerabilities
Effectiveness Matters • SANS, CERT, NIST, OSVDB, software, and reputation vendors • ~3000 researchers • 2000+ customers sharing data • 7000+ managed networks globally Ecosystem partner Actionable security intelligence ~3,000+ independent researchers DVLabs Research & QA • Automatically integrated into HP products • HP finds more vulnerabilities than the rest of the market combined • Top security vulnerability research organization for the past three years • - Frost & Sullivan HP Security Research 2,000+ customers participating ESS Thought leadership Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan
Effectiveness Matters • Over 8,600 filters of network protection right out of the box • Over 3,000 security researchers focused on emerging threats • Proven accuracy with no false positives • Optimize network performance and protect business critical applications ~3,000+ independent researchers DVLabs Research & QA 2,000+ customers participating “0 false positives since being enabled 15 months ago.” – Sr. Network Security Engineer from Financial Services Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan
Industry Leading Security Intelligence Public Vulnerability Research Market: Business Application Vulnerabilities by Reporting Source, Global, 2012
Definition - Zero-Day Exploit Proactive IPS Protection t1 t2 t3 t4 Software Vendorreleases Patch Exploit-Code is „In-The-Wild“ Vulnerability Is found Patch Rollout
Exploit of Vulnerable Application HP TippingPoint Vulnerability Filter Vulnerability False Positives HP TippingPoint Vulnerability Filter Standard IPS Exploit Filter for Exploit A Exploit B (missed by Exploit Filter A) Exploit A
Our Zero-day Coverage Compared to Competition Compiled from publicly verifiable data at http://www.microsoft.com/technet/security/current.aspx
http://www.zerodayinitiative.com/advisories/upcoming/ • See how many 0-days there are that ONLY WE KNOW ABOUT for software from: • Microsoft • Adobe • Apple • Oracle • Cisco • HP (Yes. We too have our flaws.) • IBM • EMC • Novell • Citrix • Mozilla (Firefox)
Bot and Fraud Detection: Cyber Reputation Reputation HP Next Gen IPS Countermeasures • DVLabs Reputation Database • Millions of entries • Reputation Score 0-100 • IPv4 & IPv6 Address • DNS Name • Meta data Detects mail traffic containing phishing attack techniques Content Awareness RepDV blocks mail traffic from known sources of phishing emails Context Awareness Corp. LAN Internet TippingPoint NGIPS • Botnet Trojan downloads • Malware, spyware & worm downloads • Access to botnetCnC sites • Access to phishing sites • Spam and phishing emails • DDoS attacks from botnet hosts • Web App attacks from botnet hosts Block Outbound Traffic Block Inbound Traffic
Bot and Fraud Detection: Cyber Reputation • Notes – TippingPoint • Designed as inline IPSHA, Minimal False-Positives • Easy to Install and ManageLow TCO, Fast ROI • Recommended SettingsSince 2001 • More than an IPSNFGW features, Rate Limiter • Purpose-Build HardwareWith very mature Deep Inspection Engine • Build-In High-AvailabilityThe IPS *must* be transparent for valid traffic • Zero-Day-Exploit Protection is the *greatest possible* benefit an IPS can offer Reputation Source: IT-Harvest Next Generation IPS and Reputation Services
HP Network Security TippingPoint Product Family Protects the data and applications that matter • Next-Gen Firewall • SMS Next Gen IPS DVLabs research and feeds • Next-Generation IPS • Inspects network traffic and blocks against known vulnerabilities • 99.99999% of network uptime track record • Digital Vaccine Labs • Industry-leading security research • Delivers zero-day coverage IntegratedPolicy • Next-Generation Firewall • Marries NGIPS with enterprise firewall • Granular application visibility and control • Security Management System • Centralized management console across NGIPS and NGFW • Single console to deploy devices and policies Next Gen FW
Definitions Firewall- Firewalls provide access control between two networks of varying trust levels. They control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set.
Of course not! Legacy firewalls (not talking NGFW here) only take IP addresses and TCP/UDP ports into account when making policy decisions. Like the mailman.. Legacy firewalls are oblivious to the CONTENTS of the packets on which they are making their decisions (only checks 4 layers deep) Intrusion Prevention Systems look DEEPER into the packet payloads to make its policy decisions (checks all 7 layers). Uhhh… Isn’t that the same thing that IPS does?
Holistic Customer First Approach • Support Training Services • Services • Site deployment review • Onsite installation • Configuration, tuning and best practices • Training • In-person, web-based and in your office • 2-day and 5-day classes • Across NGIPS & NGFW • More information: tippingpoint.training@hp.com • Customer Support • Premium, Premium Plus and Platinum offerings • Above 35 NPS score over the last 5 quarters • Consistently ranked at or above industry benchmark in 5 of 8 categories