firewall end-to-end network access protection for system i

35
Firewall End-to-End Network Access Protection for System i

Upload: eleanor-parsells

Post on 01-Apr-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Firewall End-to-End Network Access Protection for System i

FirewallEnd-to-End Network AccessProtection for System i

Page 2: Firewall End-to-End Network Access Protection for System i

Overview

Page 3: Firewall End-to-End Network Access Protection for System i

Firewall

A solution which secures every type of access to and from System i, within & outside the organization

Page 4: Firewall End-to-End Network Access Protection for System i

Market Need

Hacking• Open TCP/IP environment has increased System i risks

• Many remote activities are now easy• Initiating commands• Installing programs• Changing data• Moving files

• Limited ability to log/block unauthorized access

Internal Fraud

• FBI Study: the most significant threat to an organization's information systems comes from inside

• Control and follow-up on user access - a necessity

Page 5: Firewall End-to-End Network Access Protection for System i

Firewall Features

Airtight protection from both internal and external threatsCovers more exit points than any other productProtection from User Level to Object LevelProtects both incoming and outgoing IP addresses

Unique layered architecture - easy to use and maintain

Excellent performance - especially in large environments

User-friendly Wizards streamline rule definitionsHistorical data statistics enable effective rule definition

Best-Fit feature formulates rule to suit each security event

Detailed log of all access and actions

Simulation ModeTests existing Firewall rulesEnables defining rules based on the simulation

Reports in various formats: e-mail, print-out, HTML/PDF/CSV

Page 6: Firewall End-to-End Network Access Protection for System i

Firewall Scenario

Page 7: Firewall End-to-End Network Access Protection for System i

Monday, Midnight

“OK, I’m bored…Let’s do some quick hacking…”

Rob BlackHacker

Page 8: Firewall End-to-End Network Access Protection for System i

5 Minutes Later

“Got it! I’m inside IronTrust Bank systems. I really need a new sports car…

Let’s extract a few hundred thousands...

Page 9: Firewall End-to-End Network Access Protection for System i

Tuesday, Midnight

“OK, now let’s try SMART Insurance… this should take about 5 minutes!

Rob BlackHacker

Page 10: Firewall End-to-End Network Access Protection for System i

One Minute Later

Glenda Wright,Information Security Manager,

SMART Insurance

“Our Firewall just blocked a break-in attempt.I’ll have the identity, time and IP address in a minute.”

Page 11: Firewall End-to-End Network Access Protection for System i

5 Hours Later

“Hey, what are all those security layers? And all these protected exit points…I can’t get through… there goes my new car!”

Rob BlackHacker

Page 12: Firewall End-to-End Network Access Protection for System i

Firewall Info

Page 13: Firewall End-to-End Network Access Protection for System i

Firewall Gateways

i5 server

Other products’ Gateways• IP Address

Oth

er p

rodu

cts

iSecurity Firewall Gateways • IP Address• User• Verb• File • Library• Commands

iSec

urity

Fire

wal

l

Page 14: Firewall End-to-End Network Access Protection for System i

Firewall Adds Another Security Layer

• Native IBM System i security – suitable for stand-alone systems

• External access bypasses IBM security• System i is vulnerable in network

environments

Firewall

System i

FTP Internet

Network PC Telnet ODBC

Before FirewallWith Firewall

Native IBM System i Security

Page 15: Firewall End-to-End Network Access Protection for System i

Firewall - Layered Security Design

Exit Point SecurityExit Point Security

IP / SNA Nameto Service

Subnet Mask Support

User-to-ObjectManagement Rights

Data RightsUser/Group/

Supplemental/ internal groups & Generic Names

User-to-Service/Verb/IP/Device/

Application

Firewall User GroupsIBM Group Profiles

RejectAllow

Level of Control

FYI Simulation ModeEmergency Override

User/VerbUser/Verb

ObjectObject

IP/SNA FirewallIP/SNA Firewall

Page 16: Firewall End-to-End Network Access Protection for System i

• FTP: Authorities Based on IP & User

• Telnet: Terminal based on IP-Automatic Signon

• Internet (WSG): User to IP address

• Passthrough: User to System name (SNA)

RemoteRemote LogonLogon

Firewall - Layered Security Design (2)

Exit Point ControlExit Point Control

Standard FirewallStandard Firewall

User/VerbUser/Verb

ObjectObject

• FTP: Authorities Based on IP & User, Home dir, CCSID, Encrypt…

• Telnet: Terminal based on IP-SSL, Automatic Signon, Naming…

• Internet (WSG): User to IP address…

• Passthrough: User* to System (SNA), Replace user…

Page 17: Firewall End-to-End Network Access Protection for System i

Client Access File Transfer

3 Ways to Steal Your Data

Network NeighborhoodDrag & Drop

Page 18: Firewall End-to-End Network Access Protection for System i

Firewall GUI

Page 19: Firewall End-to-End Network Access Protection for System i

GUI Example

Page 20: Firewall End-to-End Network Access Protection for System i

User Management

Page 21: Firewall End-to-End Network Access Protection for System i

21

Generate Firewall Query

Page 22: Firewall End-to-End Network Access Protection for System i

22

Edit a Firewall Query

Page 23: Firewall End-to-End Network Access Protection for System i

23

Edit a Firewall Query

Page 24: Firewall End-to-End Network Access Protection for System i

24

Results

(historical log entries)

Current FW definitions

Firewall Suggests an Appropriate New Rule based on Log Entry

Page 25: Firewall End-to-End Network Access Protection for System i

25

From Log: Get an Appropriate Rule Definition

Page 26: Firewall End-to-End Network Access Protection for System i

26

From Log: Create Real-Time Detection Rule

Page 27: Firewall End-to-End Network Access Protection for System i

27

From Log: “Create Detection rule” Populates the Filter with Data from Request

Page 28: Firewall End-to-End Network Access Protection for System i

Visualizer for Firewall

Page 29: Firewall End-to-End Network Access Protection for System i

29

• Tool for presenting at-a-glance graphic views of log data from Firewall • Immediate response to queries for any database size• Analyzes network access activity (Firewall) and system journal events

(Audit) to pinpoint breaches and trends

VisualizerVisualizer

Page 30: Firewall End-to-End Network Access Protection for System i

30

Night Maintenance Job Audit

Statistics File

FirewallStatistics

File

Firewall Audit

Visualizer

How Visualizer obtains Firewall & Audit Data

Daily Log Files Daily Log Files

Page 31: Firewall End-to-End Network Access Protection for System i

Visualizer – Analysis of Firewall Log

Page 32: Firewall End-to-End Network Access Protection for System i

32

Example: Select Object…

Page 33: Firewall End-to-End Network Access Protection for System i

33

Or: Select the Server

Page 34: Firewall End-to-End Network Access Protection for System i

34

And Continue investigating, filtering by Directory & down to the SQL Verb level!

Page 35: Firewall End-to-End Network Access Protection for System i

Please visit us at www.razlee.com

Thank You !