firewall end-to-end network access protection for ibm i

26
Firewall End-to-End Network Access Protection for IBM i

Upload: cornelia-bates

Post on 12-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Firewall End-to-End Network Access Protection for IBM i

FirewallEnd-to-End Network AccessProtection for IBM i

Page 2: Firewall End-to-End Network Access Protection for IBM i

Market Need

Hacking• Open TCP/IP environment has increased IBM i risks

• Many remote activities are now easy• Initiating commands• Installing programs• Changing data• Moving files

• Limited ability to log/block unauthorized access

Internal Fraud

• FBI Study: the most significant threat to an organization's information systems comes from inside the company

• Control and log all user access - a necessity, not “nice to have”

Page 3: Firewall End-to-End Network Access Protection for IBM i

Firewall Features

• Airtight protection from both external and internal threats• Covers more exit points than any other product • Protects from User Level to Object Level• Protects both Incoming and Outgoing IP addresses

• Unique layered architecture- easy to use and to maintain• Proven excellent performance, especially in large environments• User friendly Wizards streamline rule definitions

• Real historical data enable effective rule definitions• Best Fit algorithm formulates rule to suit each security event

• Detailed log of all accesses and actions• Simulation mode

• Tests all Firewall rules• Enables defining rules based upon simulation results

• Reports in various formats: print, outfile, e-mail with HTML/CSV/PDF attachments

Page 4: Firewall End-to-End Network Access Protection for IBM i

Firewall Recent Technical Additions(1/2, not a comprehensive list)

• SQL• Supports entire SQL statement- no maximum length limitation• Skip SQL parsing for specific users• Performance improvement (up to 80%) for much more faster detection of

Firewall rules using special technology for complex SQL update for writing log files

• SQL long names, using “model libraries” for defining security rules

• Basic SSH support• Activity recorded in real time• Supported as a standard Firewall server exit

• Real time alerts sent as Operator, Syslog, SNMP, Twitter, etc. messages, also e-mail and CL script execution

• Log retrieval via dataqueues provide performance and resource improvements

Page 5: Firewall End-to-End Network Access Protection for IBM i

Firewall Recent Technical Additions(2/2, not a comprehensive list)

• Report Generator & Scheduler • Report of summarized transaction counts per time period• Numerous reports and improvements made

• Indicate Telnet connection SSL (Y/N)

• New features for Best Fit algorithm; if selected, the change allows obtaining authority from preceding directories, or from any level of a higher generic name

• Pre-checking library replacements enables defining once and later checking access rules against a single library of authorization rules, instead of defining equivalent rules for many individual libraries

Page 6: Firewall End-to-End Network Access Protection for IBM i

Firewall Gateways

i5 server

Other firewalls

iSecurity Firewall Criteria • IP Address• User• Verb• File • Library• Commands

iSecurity Firewall

Page 7: Firewall End-to-End Network Access Protection for IBM i

Firewall Adds Another Security Layer

• Native IBM i security: suitable for stand-alone systems

• External access bypasses IBM security

• IBM i is vulnerable in network environments

Menu

& Programs

Power i

Telnet

FTP Internet

Network PC ODBC

Before FirewallWith Firewall

Native IBM i Security

Firewall

Page 8: Firewall End-to-End Network Access Protection for IBM i

Secured?Yes

Security Level

Allow AllReject All

IP/SSLSubnet Mask

According to services

)option – skip tests(

Log can be optionally obtained

Using User Algorithm Check

Native

IFS

No product check

Client Transaction

IBM Exit

Point

Transaction executed

No

Exit Program

AllowReject

Logon

User to Service

Verb Device IP

Firewall Flow-Chart

Page 9: Firewall End-to-End Network Access Protection for IBM i

Layered Security Design – Object Access

Exit Point SecurityExit Point Security

Generic Names to Users, Group/Supplemental

Profiles, Internal Groups

IBM Group Profiles &Supplemental Group Profiles

Internal User Groups

FYI Simulation ModeEmergency Override

User/ServiceUser/Service

ObjectObject

IP/SNA FirewallIP/SNA Firewall IP / SNA Nameto Service

User-to-ObjectManagement Rights

Data Rights

User-to-Service /Verb/IP/Device/

Application

Allow, Reject, Level of Control

Subnet Mask Support

Page 10: Firewall End-to-End Network Access Protection for IBM i

Layered Security Design – Logon

Exit Point SecurityExit Point Security

FTP: Set Home Dir, Alternate User, Name Format…

Telnet: Assign Terminal Name, Keyboard Layout, Auto-Signon

Passthrough: Auto-Signon, Force-Signon

FYI Simulation ModeEmergency Override

Remote Remote LogonLogon

IP/SNA FirewallIP/SNA Firewall IP / SNA Nameto Service

FTP: Authorities Based on IP

Telnet: IP, Terminal, Encryption

Passthrough: User* to System / IP

Allow, Reject, Level of Control

Subnet Mask Support

Page 11: Firewall End-to-End Network Access Protection for IBM i

Firewall GUI: Navigation Options & Server Settings

Page 12: Firewall End-to-End Network Access Protection for IBM i

Firewall shipped with tens of built-in reports

Page 13: Firewall End-to-End Network Access Protection for IBM i

13

Generate New Firewall Query

Page 14: Firewall End-to-End Network Access Protection for IBM i

14

Edit a Firewall Query- Note Filter Conditions

Page 15: Firewall End-to-End Network Access Protection for IBM i

15

Firewall log entries to Create Detection Rule

Page 16: Firewall End-to-End Network Access Protection for IBM i

16

Edit a Firewall Query- Note Report Tabs & Filter Conditions

Page 17: Firewall End-to-End Network Access Protection for IBM i

17

Modify existing rule or Create a Detection Rule

Firewall Log as the basis for defining Rules

Results

(historical log entries)

Page 18: Firewall End-to-End Network Access Protection for IBM i

Visualizer for Firewall

Page 19: Firewall End-to-End Network Access Protection for IBM i

19

VisualizerVisualizer- and GUI Navigation Tree

Page 20: Firewall End-to-End Network Access Protection for IBM i

20

Nightly Maintenance Job

AuditStatistics

File

FirewallStatistics

File

Firewall Audit

Visualizer

How Visualizer obtains Firewall & Audit Data

Daily Log Files Daily Log Files

Page 21: Firewall End-to-End Network Access Protection for IBM i

Visualizer – Analysis of Firewall Log

Page 22: Firewall End-to-End Network Access Protection for IBM i

22

Example: Select Object…

Page 23: Firewall End-to-End Network Access Protection for IBM i

23

Continue investigating, filtering by User. See which users access the object

Page 24: Firewall End-to-End Network Access Protection for IBM i

Drill to log data and build a Rule

Page 25: Firewall End-to-End Network Access Protection for IBM i

Firewall Rules

Page 26: Firewall End-to-End Network Access Protection for IBM i

Please visit us at www.razlee.com

Thank You !