SlideShare une entreprise Scribd logo
1  sur  48
AGENDA PA-5000 Series GlobalProtect PAN-OS 4.0
PA-5000 Series
PA-5000 Series PA-5060 PA-5050 PA-5020
Introducing the PA-5000 Series High performance Next Gen Firewall 3 Models, up to 20Gbps throughput, 10Gbps threat
RAM FPGA (Security Profiles) RAM RAM RAM Process Breakdown (PA-4000 Series) FPGA ,[object Object]
File and data filtering signatures10Gbps Cavium Multi-Core Security Processor ,[object Object]
Decoders
Session setup and tear-down
Session table
Segment reassembly, normalization
100k URL filtering cache
Disabled fast-path flows: ‘set session offload no’RAM CPU 3 CPU 16 CPU 1 CPU 2 . . Dual-core CPU RAM RAM RAM SSL IPSec De-Compression HDD 10Gbps Device Server ,[object Object],QoS Route, ARP, MAC lookup NAT EZ Chip 10 Gig Network Processor ,[object Object]
Fast-path flows
Zone Protection Profiles
QOS
PBFControl Plane Data Plane
PA-5000 Series Architecture ,[object Object]
High speed logging and route update
Dual hard drivesRAM RAM Signature Match Signature Match Signature Match HW Engine ,[object Object]
Vulnerability exploits (IPS), virus, spyware, CC#, SSN, and moreRAM RAM RAM RAM RAM RAM Core 2 Core 1 RAM 10Gbps 10Gbps RAM CPU 12 CPU 1 CPU 2 CPU 12 CPU 1 CPU 2 CPU 12 CPU 1 CPU 2 RAM RAM RAM ... ... ... Core 4 Core 3 SSD RAM RAM RAM SSD SSL IPSec De-Compress. SSL IPSec De-Compress. SSL IPSec De-Compress. Control Plane 20Gbps ,[object Object]
20 Gbps QoS engineSecurity Processors ,[object Object]
Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression)Flow  control Route, ARP, MAC lookup NAT Network Processor ,[object Object]
Hardware accelerated per-packet route lookup, MAC lookup and NATSwitch Fabric QoS Data Plane Switch Fabric
PA-5000 Series Features Redundant, hot swap AC or DC power supplies SFP+ transceivers Hard Disks Two disk bays Solid State Drives  Single 120GB included, additional 120 or 240GB drives are available.  RAID 1 when two drives installed (must be identical) Hot-swappable fan tray
Global Protect
What is Global Protect? Global Protect applies security policy to end points regardless of their location Runs as a client on Windows PC Gathers host information (OPSWAT based) Creates VPN for remote clients Locates nearest portal for VPN connection Transparent operation to user
GP Architecture The Portal authenticates the user and directs them to a gateway where policy is Enforced. Portal 2 1 Gateway Gateway 2
Initial GP connection Laptop user makes an initial connection to the Portal and authenticates. Portal provides the software, HIP configuration, and gateway list. The downloaded Agent is installed and configured.  Agent gathers host information, and finds closest Gateway If the closest Gateway is "internal” then no VPN If the closest Gateway is "external” then builds VPN HIP data is sent to Gateway The Gateway enforces security policy based on user, application, content AND the HIP submitted from the client.
HIP – Host Information Profile HIP Objects define an end point  “Does the client have AV and is it enabled?” “Does the client have updated Microsoft patches?” “Is the client running notepad.exe?” End points return this information to the gateway HIP Profiles are defined by the objects an endpoint matches Security policy can be defined based on HIP profile “VPN clients who are members of HR can only access the HR database if they have disk encryption enabled”
HIP Object options Patch Management        IsEnabled? LastScanTime MissingPatchList Vendor/Product Disk Encryption        DiskState for each volume Vendor/Product Antivirus        DataFileTime Vendor/Product LastFullScanTime RealTimeScanEnabled? Anti-Spyware        DataFileTime Vendor/Product LastFullScanTime Firewall        IsFirewallEnabled? Vendor/Product Host Info        Machine Name Domain Organization
HIP Objects and Profile examples
Configuring Global Protect Portal Portal has many of the same authentication configuration of a SSL VPN Portal They can interoperate with some 3rd party VPN clients 3rd party clients can be set to override the GP tunnel Administrator can control what HIP objects are returned to the portal The portal determine what settings the UI of the client will use
Configuring Global Protect Gateway Gateway provides client addressing information Can provide basic messages to clients that pass / fail HIP profiles Contains all client VPN configuration
Policy Example using GP
PAN-OS 4.0: A Significant Milestone
PAN-OS 4.0: More Control… App-ID Custom App-IDs for unknown protocols App and threats stats collection SSH tunneling control (for port forwarding control) 6,000 custom App-IDs User-ID Windows 2003 64-bit, Windows 2008 32- and 64-bit Terminal Server support; XenApp 6 support Client certificates for captive portal Authentication sequence flow Strip x-forwarded-for header Destination port in captive portal rules Threat Prevention & Data Filtering ,[object Object]
PDF virus scanning
Drive by download protection
Hold-down time scan detection
Time attribute for IPS and custom signatures
DoS protection rulebaseURL Filtering ,[object Object]
Seamless URL activation
“Full” URL logging
Manual URL DB uploads (weekly),[object Object]
Dynamic log storage via NFS
Panorama HA
UAR from Panorama
Exportable config backups

Contenu connexe

Tendances

5 initial access to palo alto using cli
5 initial access to palo alto using cli5 initial access to palo alto using cli
5 initial access to palo alto using cliMostafa El Lathy
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSridhar Kumar N
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall conceptsMostafa El Lathy
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id conceptMostafa El Lathy
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall introRich Helton
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention conceptMostafa El Lathy
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!Niasta Learning
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfTaherAzzam2
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configurationAlberto Rivai
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data CentersCisco Russia
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 

Tendances (20)

Nmap basics
Nmap basicsNmap basics
Nmap basics
 
20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
 
19 high availability
19 high availability19 high availability
19 high availability
 
5 initial access to palo alto using cli
5 initial access to palo alto using cli5 initial access to palo alto using cli
5 initial access to palo alto using cli
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id concept
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention concept
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdf
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 

Similaire à PA-5000 Series Next Gen Firewall Features and GlobalProtect Overview

CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetMaliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetBaqar kazmi
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetMaliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetbakar kazmi
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Firoze Hussain
 
Solera Networks
Solera NetworksSolera Networks
Solera Networksgigamon
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetBaqar Kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetBaqar kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetMaliha Ali
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetbakar kazmi
 
Software defined network and Virtualization
Software defined network and VirtualizationSoftware defined network and Virtualization
Software defined network and Virtualizationidrajeev
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)NYversity
 
Secure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelSecure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelAmazon Web Services
 

Similaire à PA-5000 Series Next Gen Firewall Features and GlobalProtect Overview (20)

CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
Websecurity
Websecurity Websecurity
Websecurity
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
 
Web Security
Web SecurityWeb Security
Web Security
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
Software defined network and Virtualization
Software defined network and VirtualizationSoftware defined network and Virtualization
Software defined network and Virtualization
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Secure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelSecure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by Intel
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

PA-5000 Series Next Gen Firewall Features and GlobalProtect Overview

  • 1. AGENDA PA-5000 Series GlobalProtect PAN-OS 4.0
  • 3. PA-5000 Series PA-5060 PA-5050 PA-5020
  • 4. Introducing the PA-5000 Series High performance Next Gen Firewall 3 Models, up to 20Gbps throughput, 10Gbps threat
  • 5.
  • 6.
  • 8. Session setup and tear-down
  • 12.
  • 15. QOS
  • 17.
  • 18. High speed logging and route update
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Hardware accelerated per-packet route lookup, MAC lookup and NATSwitch Fabric QoS Data Plane Switch Fabric
  • 24. PA-5000 Series Features Redundant, hot swap AC or DC power supplies SFP+ transceivers Hard Disks Two disk bays Solid State Drives Single 120GB included, additional 120 or 240GB drives are available. RAID 1 when two drives installed (must be identical) Hot-swappable fan tray
  • 26. What is Global Protect? Global Protect applies security policy to end points regardless of their location Runs as a client on Windows PC Gathers host information (OPSWAT based) Creates VPN for remote clients Locates nearest portal for VPN connection Transparent operation to user
  • 27. GP Architecture The Portal authenticates the user and directs them to a gateway where policy is Enforced. Portal 2 1 Gateway Gateway 2
  • 28. Initial GP connection Laptop user makes an initial connection to the Portal and authenticates. Portal provides the software, HIP configuration, and gateway list. The downloaded Agent is installed and configured. Agent gathers host information, and finds closest Gateway If the closest Gateway is "internal” then no VPN If the closest Gateway is "external” then builds VPN HIP data is sent to Gateway The Gateway enforces security policy based on user, application, content AND the HIP submitted from the client.
  • 29. HIP – Host Information Profile HIP Objects define an end point “Does the client have AV and is it enabled?” “Does the client have updated Microsoft patches?” “Is the client running notepad.exe?” End points return this information to the gateway HIP Profiles are defined by the objects an endpoint matches Security policy can be defined based on HIP profile “VPN clients who are members of HR can only access the HR database if they have disk encryption enabled”
  • 30. HIP Object options Patch Management       IsEnabled? LastScanTime MissingPatchList Vendor/Product Disk Encryption       DiskState for each volume Vendor/Product Antivirus       DataFileTime Vendor/Product LastFullScanTime RealTimeScanEnabled? Anti-Spyware       DataFileTime Vendor/Product LastFullScanTime Firewall       IsFirewallEnabled? Vendor/Product Host Info       Machine Name Domain Organization
  • 31. HIP Objects and Profile examples
  • 32. Configuring Global Protect Portal Portal has many of the same authentication configuration of a SSL VPN Portal They can interoperate with some 3rd party VPN clients 3rd party clients can be set to override the GP tunnel Administrator can control what HIP objects are returned to the portal The portal determine what settings the UI of the client will use
  • 33. Configuring Global Protect Gateway Gateway provides client addressing information Can provide basic messages to clients that pass / fail HIP profiles Contains all client VPN configuration
  • 35. PAN-OS 4.0: A Significant Milestone
  • 36.
  • 38. Drive by download protection
  • 40. Time attribute for IPS and custom signatures
  • 41.
  • 44.
  • 49.
  • 51. Configurable event/log format (including CEF for ArcSight)
  • 54. Extended reporting for VSYS admins (scheduler, UAR, summary reports, email forwarding)
  • 55.
  • 57.
  • 58.
  • 59. Heartbeat Backup Link – Split Brain Protection <Heartbeat/Hello> <Heartbeat/Hello> Redundant path Data Plane status confirmation Supported on full product line
  • 60. DNS Proxy Firewall acts as DNS server for clients Firewall uses DNS based on: Priority (Primary, Secondary) Domain Name ( xxx.local uses internal DNS, xxx.com uses public DNS) Static entry Is enabled by interface
  • 61. IPv6 Support IPv6 Layer 3 interfaces IPv6 addresses in all policy IPv6 static routes in Virtual Routers ICMPv6 support DHCPv6 support Support for Neighbor Discovery
  • 62. Networking enhancements Virtual Systems as routing targets Used in Virtual routers Used in PBF DNS based Address book entries Allow www.apple.com Country based Address book entries Block everything from Canada
  • 64. Active/Active HA Both devices in the cluster are active and passing traffic Devices back each other, taking over primary ownership if either one fails Both devices load share the traffic BUT REMEMBER No increase in session capacity Not designed to increase throughput Supported modes L3 and vwire
  • 65. Packet handling within the cluster Session ownership and session setup can be two different devices in the cluster It is atypical to implement it in this way Session setup Session setup maybe distributed among devices in HA group using IP modulo or hash Layer2 to Layer4 processing is handled by the session setup device This requires a dedicated HA interface- HA3 link Session ownership This device is responsible for all layer 7 processing
  • 66. Session setup options IP modulo One device sets sessions for even numbered IP address and the peer sets sessions for odd numbered IP address This is preferred as it is deterministic IP hash Hash of either source or combination source/destination IP address is used for distributing session setup
  • 67. Deployment topologies: Floating IP address Redundancy of IP address is accomplished using floating IP address Each interface on device is configured with floating IP addresses Floating IP address ownership is determined based on the device priority Load sharing is done externally via ECMP or configuring the clients with different default gateways RED- BACK GREEN-ACTIVE
  • 68. Deployment topologies: ARP load sharing Firewalls share a virtual IP address Unique Virtual MAC per device is generated for the virtual IP address ARP load sharing is used for load balancing incoming traffic Hash or modulo of the source address of ARP requests to determine which device should handle the requests
  • 70. Agenda - Security Enhancements Client cert auth for Captive Portal Botnet Detection and DDoS policy IPS action enhancements SSH Decryption Updated URL logging and reporting Global Protect Authentication Sequence Kerberos support
  • 71. Client Certificate in Captive Portal Formerly available for SSL VPN and device authentication Now can be used in captive portal configuration Client Certificate can be configured as the only authentication option No Auth profile required Unlike client certs with admin authentication, this will be transparent. Uses the 3.1 “Client Certificate Profile” object
  • 72. Drive-by Download Protection Warn end users about file transfer events New ‘Continue’ file blocking action Customizable response page The response page has a ‘continue’ button. If the user clicks ‘continue’, the file transfer will continue
  • 73. Customizable Brute Force Attack Settings User defined thresholds for brute force signatures. Defined in the profile
  • 74. Custom Combination Signatures Combine multiple signatures to create custom combination signatures Take individual spyware or vulnerability threat IDs and group them into one custom signature Take individual signatures and apply thresholds for number of hits over specified time period
  • 75. Block IP Action (Blackhole) Block all future traffic from a host after triggering a security condition Spyware and vulnerability signatures DoS protection rulebase Zone protection Block time in seconds Max 21600 seconds in DoS protection rulebase Max 3600 seconds in spyware and vulnerability profiles Block method: Based on sourceIP or source-and-destination IP
  • 76. DoS Protection Rulebase Extends existing DoS protections that are currently configurable on a per-zone basis Rules based on source/dest zone, source/dest IP, country, service, and user Two types of profiles are supported: Aggregate: Thresholds apply to all traffic Classified: Thresholds apply either on basis of source IP, destination IP or a combination of both.
  • 77. Behavior-based Botnet Detection Collate information from Traffic, Threat, URL logs to identify potentially botnet-infected hosts A report will be generated each day list of infected hosts, description (why we believe the host to be infected) Confidence level Following parameters (configurable) to detect botnets Unknown TCP/UDP IRC HTTP traffic (malware sites, recently registered, IP domains, Dynamic Domains) Users can configure a query for specific traffic
  • 78. Updated URL Logging Can log just container pages Previously cnn.com created 26 URL logs Can filter to have just one Uses the Container Page setting in the device tab Full URL logging Now logs up to 1023 bytes of the URL Previous max was 256
  • 79. SSH Decryption Uses same tactic as SSL decryption No additional configuration required New “Block if failed to decrypt” option User certificates Unsupported crypto system Can now block the connection Previously we would allow it
  • 80. Authentication Sequence Can configure multiple authentication profiles If the first one in the list fails the next will be attempted Can be used to cycle through multiple RADIUS or Active Directory Forest designs The Authentication Sequence object can be used in the same locations as a regular Authentication profile
  • 81. Native Kerberos Authentication Firewall can now authenticate to AD without the use of an Agent Can be used like RADIUS or LDAP authentication servers Does not retrieve group membership – AD Agent or LDAP server required.

Notes de l'éditeur

  1. Things to talk about:-Moving farther into datacenter coreNotes:-CPS: connections per second
  2. Things to talk about:-What is it and what is the point? -Control outside of the network -Security outside of network
  3. Things to talk about:-Installer is MSI and can be pushed out via GPO-Option to allow user to disable (not recommended), optional password required
  4. Things to talk about:-3rd party supported VPN clients -PAN SSL VPN -Juniper Network Connect -Cisco Systems VPN Adapter
  5. ** Global ProtectDemo After This Slide**
  6. Things to talk about:Touch on all of these as they do not come up again.Notes:User-ID-x-forwarded-for: used by proxies to keep user info when requesting info from web servers -Security hole as it would be sending internal IP addresses out onto the webURL Filtering-URL Logging will now log 1023 bytes of requested url
  7. Things to talk about:UI upgrades on next slide, Explain the rest.
  8. Things to talk about:-Easy Object creation (from within rule creation and also lower left on the rules page)-Switching between tabs saves your place-Commit checks for application dependencies-Policy Viewer-Edit whole policy at once (Security, NAT…)-Regions-Reports is diff (Click on reports and look to the right) -Managing custom reports is much different-PCAP from GUI-Locks -Config-only you can edit config/commit -Commit-people can edit, only you can commit -Can be automatically aquired (device tab, setup, management options)**UI Demo After This Slide**-Security Rules (tagging, drag-n-drop, object value visibility, filtering, rule editing-quick &amp; whole interface, regions)-Tab Switching-Config/commit Locks-Commit app dependency check-PCAP from GUI
  9. Things to talk about:Explain these except for Active/Active, DNS Proxy, VR-VR Routing, Country-based, just touch on those.Notes: Overlapping IP Address Support: To facilitate shared use of a device, the system now supports the use ofthe devices layer 3 services for clients that have the same IP address of interfaces or hosts in anothervirtual router. Untagged Subinterfaces: Multiple untagged layer 3 interfaces can now be created on a single physicalinterface. The source interface will be determined based on the destination IP address as opposed to aVLAN tag.Adjust TCP MSS - maximum segment size (MSS) is adjusted to 40 bytes less than the interface MTU. Addresses the situation in which a tunnel through the network requires a smaller MSS. If a packet cannot fit within the MSS without fragmenting, this setting allows an adjustment to be made.
  10. Things to talk about:Why did we add?To address split brain issues resulting from lost HA1 link. Very common for platforms using in-band HA1.How is this configured?Simple checkbox
  11. The Neighbor Discovery Protocol defines mechanisms for providing the following functionality: Router discovery: hosts can locate routers residing on attached links. Prefix discovery: hosts can discover address prefixes that are on-link for attached links. Parameter discovery: hosts can find link parameters (e.g., MTU). Address autoconfiguration: stateless configuration of addresses of network interfaces. Address resolution: mapping between IP addresses and link-layer addresses. Next-hop determination: hosts can find next-hop routers for a destination. Neighbor unreachability detection (NUD): determine that a neighbor is no longer reachable on the link. Duplicate address detection (DAD): nodes can check whether an address is already in use. Redirect: router can inform a node about better first-hop routers. Recursive DNS Server (RDNSS) assignment via a router advertisement (RA) options.[2]
  12. Things to talk about:-Virtual Systems/Routers as routing targets -Available in Virtual Routers as well as Policy-Based Forwarding rules -SSL VPN/Management of firewall via primary link in WAN failover config
  13. Things to talk about:-Reason for HA3 Link: After session setup packet will be forwarded back to the session owner for Layer 7 processing to preserve the forwarding path
  14. Notes:ECMP = Equal Cost Multi Path routing.
  15. Things to talk about:-SSH V2 with interactive auth
  16. **Authentication, Reporting (Custom &amp; Default), Botnet, DoS, and Drive by Download Demo After This Slide**