SlideShare a Scribd company logo
AGENDAPA-5000 SeriesGlobalProtectPAN-OS 4.0
PA-5000 Series
PA-5000 SeriesPA-5060PA-5050PA-5020
Introducing the PA-5000 SeriesHigh performance Next Gen Firewall3 Models, up to 20Gbps throughput, 10Gbps threat
RAMFPGA (Security Profiles)RAMRAMRAMProcess Breakdown (PA-4000 Series)FPGAAV, Anti Spyware, and Vulnerability protection signatures
File and data filtering signatures10GbpsCavium Multi-Core Security ProcessorApp-ID
Decoders
Session setup and tear-down
Session table
Segment reassembly, normalization
100k URL filtering cache
Disabled fast-path flows: ‘set session offload no’RAMCPU3CPU16CPU1CPU2. .Dual-coreCPURAMRAMRAMSSLIPSecDe-CompressionHDD10GbpsDevice ServerURL Database (20 million + 1 million dynamic)QoSRoute, ARP, MAC lookupNATEZ Chip 10 Gig Network ProcessorApp-Override flows
Fast-path flows
Zone Protection Profiles
QOS
PBFControl PlaneData Plane
PA-5000 Series ArchitectureQuad-core mgmt
High speed logging and route update
Dual hard drivesRAMRAMSignature MatchSignature MatchSignature Match HW EngineStream-based uniform sig. match
Vulnerability exploits (IPS), virus, spyware, CC#, SSN, and moreRAMRAMRAMRAMRAMRAMCore 2Core 1RAM10Gbps10GbpsRAMCPU12CPU1CPU2CPU12CPU1CPU2CPU12CPU1CPU2RAMRAMRAM.........Core 4Core 3SSDRAMRAMRAMSSDSSLIPSecDe-Compress.SSLIPSecDe-Compress.SSLIPSecDe-Compress.Control Plane20Gbps80 Gbps switch fabric interconnect
20 Gbps QoS engineSecurity ProcessorsHigh density parallel processing for flexible security functionality
Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression)Flow controlRoute, ARP, MAC lookupNATNetwork Processor20 Gbps front-end network processing
Hardware accelerated per-packet route lookup, MAC lookup and NATSwitchFabricQoSData PlaneSwitch Fabric
PA-5000 Series FeaturesRedundant, hot swap AC or DC power suppliesSFP+ transceiversHard DisksTwo disk baysSolid State Drives Single 120GB included, additional 120 or 240GB drives are available. RAID 1 when two drives installed (must be identical)Hot-swappable fan tray
Global Protect
What is Global Protect?Global Protect applies security policy to end points regardless of their locationRuns as a client on Windows PCGathers host information (OPSWAT based)Creates VPN for remote clientsLocates nearest portal for VPN connectionTransparent operation to user
GP ArchitectureThe Portal authenticates the user and directs them to a gateway where policy is Enforced.Portal21GatewayGateway2
Initial GP connectionLaptop user makes an initial connection to the Portal and authenticates.Portal provides the software, HIP configuration, and gateway list.The downloaded Agent is installed and configured. Agent gathers host information, and finds closest GatewayIf the closest Gateway is "internal” then no VPNIf the closest Gateway is "external” then builds VPNHIP data is sent to GatewayThe Gateway enforces security policy based on user, application, content AND the HIP submitted from the client.
HIP – Host Information ProfileHIP Objects define an end point “Does the client have AV and is it enabled?”“Does the client have updated Microsoft patches?”“Is the client running notepad.exe?”End points return this information to the gatewayHIP Profiles are defined by the objects an endpoint matchesSecurity policy can be defined based on HIP profile“VPN clients who are members of HR can only access the HR database if they have disk encryption enabled”
HIP Object optionsPatch Management       IsEnabled?LastScanTimeMissingPatchListVendor/ProductDisk Encryption       DiskState for each volumeVendor/ProductAntivirus       DataFileTimeVendor/ProductLastFullScanTimeRealTimeScanEnabled?Anti-Spyware       DataFileTimeVendor/ProductLastFullScanTimeFirewall       IsFirewallEnabled?Vendor/ProductHost Info       Machine NameDomainOrganization
HIP Objects and Profile examples
Configuring Global Protect PortalPortal has many of the same authentication configuration of a SSL VPN PortalThey can interoperate with some 3rd party VPN clients3rd party clients can be set to override the GP tunnelAdministrator can control what HIP objects are returned to the portalThe portal determine what settings the UI of the client will use
Configuring Global Protect GatewayGateway provides client addressing informationCan provide basic messages to clients that pass / fail HIP profilesContains all client VPN configuration
Policy Example using GP
PAN-OS 4.0: A Significant Milestone
PAN-OS 4.0: More Control…App-IDCustom App-IDs for unknown protocolsApp and threats stats collectionSSH tunneling control (for port forwarding control)6,000 custom App-IDsUser-IDWindows 2003 64-bit, Windows 2008 32- and 64-bit Terminal Server support; XenApp 6 supportClient certificates for captive portalAuthentication sequence flowStrip x-forwarded-for headerDestination port in captive portal rulesThreat Prevention & Data FilteringBehavior-based botnet C&C detection
PDF virus scanning
Drive by download protection
Hold-down time scan detection
Time attribute for IPS and custom signatures
DoS protection rulebaseURL FilteringContainer page filtering, logging, and reporting
Seamless URL activation
“Full” URL logging
Manual URL DB uploads (weekly)PAN-OS 4.0: Easy to Use Gets Easier…New UI ArchitectureStreamline policy management workflowRule tagging, drag-n-drop, quick rule editing, object value visibility, filtering, and morePanoramaExtended config sharing (all rulebases, objects & profiles shared to device)
Dynamic log storage via NFS
Panorama HA
UAR from Panorama
Exportable config backups

More Related Content

PDF
Presentation f5 – beyond load balancer
PPT
Palo alto networks next generation firewalls
PPTX
Palo Alto Networks 28.5.2013
PDF
01- intro to firewall concepts
PDF
F5 DDoS Protection
DOCX
VERİTABANI SIZMA TESTLERİ
PDF
Palo alto networks product overview
PDF
Cisco umbrella overview
Presentation f5 – beyond load balancer
Palo alto networks next generation firewalls
Palo Alto Networks 28.5.2013
01- intro to firewall concepts
F5 DDoS Protection
VERİTABANI SIZMA TESTLERİ
Palo alto networks product overview
Cisco umbrella overview

What's hot (20)

PDF
How BGP Works
PDF
10 palo alto nat policy concepts
PPT
BIG IP F5 GTM Presentation
PPTX
Cisco Security portfolio update
PDF
Ccnp3 lab 3_4_en
PPTX
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
PDF
3 palo alto ngfw architecture overview
PDF
Easy, Secure, and Fast: Using NATS.io for Streams and Services
PPTX
Cisco Identity Services Engine (ISE)
PDF
PPTX
Temel ağ bilgisi
PPTX
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
PPTX
Cisco ASA Firewalls
DOCX
GÜVENLİK SİSTEMLERİNİ ATLATMA
PDF
Configuring global infrastructure in terraform
PPTX
AWS VS AZURE VS GCP.pptx
PPTX
Azure Fundamentals || AZ-900
PPTX
Rip presentation
PDF
12 palo alto app-id concept
PDF
Azure Arc Overview from Microsoft
How BGP Works
10 palo alto nat policy concepts
BIG IP F5 GTM Presentation
Cisco Security portfolio update
Ccnp3 lab 3_4_en
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
3 palo alto ngfw architecture overview
Easy, Secure, and Fast: Using NATS.io for Streams and Services
Cisco Identity Services Engine (ISE)
Temel ağ bilgisi
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
Cisco ASA Firewalls
GÜVENLİK SİSTEMLERİNİ ATLATMA
Configuring global infrastructure in terraform
AWS VS AZURE VS GCP.pptx
Azure Fundamentals || AZ-900
Rip presentation
12 palo alto app-id concept
Azure Arc Overview from Microsoft
Ad

Similar to Palo Alto Networks PAN-OS 4.0 New Features (20)

PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PPT
Websecurity
PDF
Bloombase StoreSafe Specifications
PPS
Cs Wif I System Overview 2009
PPT
Solera Networks
PPT
Web Security
PPTX
NodeGrid Flex
PDF
UTM Cyberoam
PDF
CyberoamNGSeriesUTMTechSheet
PDF
CyberoamNGSeriesUTMTechSheet
PDF
CyberoamNGSeriesUTMTechSheet
PDF
CyberoamNGSeriesUTMTechSheet
PPT
Software defined network and Virtualization
PDF
Computer network (4)
PPT
WLAN and IP security
PPT
Implementing 802.1x Authentication
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
Websecurity
Bloombase StoreSafe Specifications
Cs Wif I System Overview 2009
Solera Networks
Web Security
NodeGrid Flex
UTM Cyberoam
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
Software defined network and Virtualization
Computer network (4)
WLAN and IP security
Implementing 802.1x Authentication
Ad

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Palo Alto Networks PAN-OS 4.0 New Features

  • 4. Introducing the PA-5000 SeriesHigh performance Next Gen Firewall3 Models, up to 20Gbps throughput, 10Gbps threat
  • 5. RAMFPGA (Security Profiles)RAMRAMRAMProcess Breakdown (PA-4000 Series)FPGAAV, Anti Spyware, and Vulnerability protection signatures
  • 6. File and data filtering signatures10GbpsCavium Multi-Core Security ProcessorApp-ID
  • 8. Session setup and tear-down
  • 12. Disabled fast-path flows: ‘set session offload no’RAMCPU3CPU16CPU1CPU2. .Dual-coreCPURAMRAMRAMSSLIPSecDe-CompressionHDD10GbpsDevice ServerURL Database (20 million + 1 million dynamic)QoSRoute, ARP, MAC lookupNATEZ Chip 10 Gig Network ProcessorApp-Override flows
  • 15. QOS
  • 18. High speed logging and route update
  • 19. Dual hard drivesRAMRAMSignature MatchSignature MatchSignature Match HW EngineStream-based uniform sig. match
  • 20. Vulnerability exploits (IPS), virus, spyware, CC#, SSN, and moreRAMRAMRAMRAMRAMRAMCore 2Core 1RAM10Gbps10GbpsRAMCPU12CPU1CPU2CPU12CPU1CPU2CPU12CPU1CPU2RAMRAMRAM.........Core 4Core 3SSDRAMRAMRAMSSDSSLIPSecDe-Compress.SSLIPSecDe-Compress.SSLIPSecDe-Compress.Control Plane20Gbps80 Gbps switch fabric interconnect
  • 21. 20 Gbps QoS engineSecurity ProcessorsHigh density parallel processing for flexible security functionality
  • 22. Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression)Flow controlRoute, ARP, MAC lookupNATNetwork Processor20 Gbps front-end network processing
  • 23. Hardware accelerated per-packet route lookup, MAC lookup and NATSwitchFabricQoSData PlaneSwitch Fabric
  • 24. PA-5000 Series FeaturesRedundant, hot swap AC or DC power suppliesSFP+ transceiversHard DisksTwo disk baysSolid State Drives Single 120GB included, additional 120 or 240GB drives are available. RAID 1 when two drives installed (must be identical)Hot-swappable fan tray
  • 26. What is Global Protect?Global Protect applies security policy to end points regardless of their locationRuns as a client on Windows PCGathers host information (OPSWAT based)Creates VPN for remote clientsLocates nearest portal for VPN connectionTransparent operation to user
  • 27. GP ArchitectureThe Portal authenticates the user and directs them to a gateway where policy is Enforced.Portal21GatewayGateway2
  • 28. Initial GP connectionLaptop user makes an initial connection to the Portal and authenticates.Portal provides the software, HIP configuration, and gateway list.The downloaded Agent is installed and configured. Agent gathers host information, and finds closest GatewayIf the closest Gateway is "internal” then no VPNIf the closest Gateway is "external” then builds VPNHIP data is sent to GatewayThe Gateway enforces security policy based on user, application, content AND the HIP submitted from the client.
  • 29. HIP – Host Information ProfileHIP Objects define an end point “Does the client have AV and is it enabled?”“Does the client have updated Microsoft patches?”“Is the client running notepad.exe?”End points return this information to the gatewayHIP Profiles are defined by the objects an endpoint matchesSecurity policy can be defined based on HIP profile“VPN clients who are members of HR can only access the HR database if they have disk encryption enabled”
  • 30. HIP Object optionsPatch Management       IsEnabled?LastScanTimeMissingPatchListVendor/ProductDisk Encryption       DiskState for each volumeVendor/ProductAntivirus       DataFileTimeVendor/ProductLastFullScanTimeRealTimeScanEnabled?Anti-Spyware       DataFileTimeVendor/ProductLastFullScanTimeFirewall       IsFirewallEnabled?Vendor/ProductHost Info       Machine NameDomainOrganization
  • 31. HIP Objects and Profile examples
  • 32. Configuring Global Protect PortalPortal has many of the same authentication configuration of a SSL VPN PortalThey can interoperate with some 3rd party VPN clients3rd party clients can be set to override the GP tunnelAdministrator can control what HIP objects are returned to the portalThe portal determine what settings the UI of the client will use
  • 33. Configuring Global Protect GatewayGateway provides client addressing informationCan provide basic messages to clients that pass / fail HIP profilesContains all client VPN configuration
  • 35. PAN-OS 4.0: A Significant Milestone
  • 36. PAN-OS 4.0: More Control…App-IDCustom App-IDs for unknown protocolsApp and threats stats collectionSSH tunneling control (for port forwarding control)6,000 custom App-IDsUser-IDWindows 2003 64-bit, Windows 2008 32- and 64-bit Terminal Server support; XenApp 6 supportClient certificates for captive portalAuthentication sequence flowStrip x-forwarded-for headerDestination port in captive portal rulesThreat Prevention & Data FilteringBehavior-based botnet C&C detection
  • 38. Drive by download protection
  • 40. Time attribute for IPS and custom signatures
  • 41. DoS protection rulebaseURL FilteringContainer page filtering, logging, and reporting
  • 44. Manual URL DB uploads (weekly)PAN-OS 4.0: Easy to Use Gets Easier…New UI ArchitectureStreamline policy management workflowRule tagging, drag-n-drop, quick rule editing, object value visibility, filtering, and morePanoramaExtended config sharing (all rulebases, objects & profiles shared to device)
  • 51. Configurable event/log format (including CEF for ArcSight)
  • 54. Extended reporting for VSYS admins (scheduler, UAR, summary reports, email forwarding)
  • 55. PCAP configuration in UIPAN-OS 4.0: New UI ArchitectureStreamline policy management workflowRule: taggingdrag-n-dropquick rule editingobject value visibilityFilteringMuch more
  • 57. PAN-OS 4.0: Improved Deployment Flexibility…NetworkingActive/Active HAHA enhancements (link failover, next-hop gateway for HA1, more)IPv6 L2/L3 basic supportDNS proxyDoS source/dest IP session limitingVSYS resource control (# rules, tunnels, more)Country-based policiesOverlapping IP support (across multiple VRs)VR to VR routingVirtual System as destination of PBF ruleUntagged subinterfacesTCP MSS adjustmentNetConnect SSL-VPNPassword expiration notification
  • 58. Mac OS support (released w/ PAN-OS 3.1.4)HA EnhancementsAdded back up link for HA1 and HA2 to protect against “Split Brain”Support for devices with HA links on different subnetsEnhanced timers for better fail over controlActive / Active HA clusters
  • 59. Heartbeat Backup Link – Split Brain Protection<Heartbeat/Hello><Heartbeat/Hello>Redundant pathData Plane status confirmationSupported on full product line
  • 60. DNS ProxyFirewall acts as DNS server for clientsFirewall uses DNS based on:Priority (Primary, Secondary)Domain Name ( xxx.local uses internal DNS, xxx.com uses public DNS)Static entryIs enabled by interface
  • 61. IPv6 SupportIPv6 Layer 3 interfacesIPv6 addresses in all policyIPv6 static routes in Virtual RoutersICMPv6 supportDHCPv6 supportSupport for Neighbor Discovery
  • 62. Networking enhancementsVirtual Systems as routing targetsUsed in Virtual routersUsed in PBFDNS based Address book entriesAllow www.apple.comCountry based Address book entriesBlock everything from Canada
  • 64. Active/Active HABoth devices in the cluster are active and passing trafficDevices back each other, taking over primary ownership if either one failsBoth devices load share the trafficBUT REMEMBERNo increase in session capacityNot designed to increase throughputSupported modesL3 and vwire
  • 65. Packet handling within the clusterSession ownership and session setup can be two different devices in the cluster It is atypical to implement it in this waySession setupSession setup maybe distributed among devices in HA group using IP modulo or hashLayer2 to Layer4 processing is handled by the session setup deviceThis requires a dedicated HA interface- HA3 linkSession ownershipThis device is responsible for all layer 7 processing
  • 66. Session setup options IP moduloOne device sets sessions for even numbered IP address and the peer sets sessions for odd numbered IP addressThis is preferred as it is deterministicIP hashHash of either source or combination source/destination IP address is used for distributing session setup
  • 67. Deployment topologies: Floating IP addressRedundancy of IP address is accomplished using floating IP addressEach interface on device is configured with floating IP addressesFloating IP address ownership is determined based on the device priorityLoad sharing is done externally via ECMP or configuring the clients with different default gatewaysRED- BACK GREEN-ACTIVE
  • 68. Deployment topologies: ARP load sharingFirewalls share a virtual IP addressUnique Virtual MAC per device is generated for the virtual IP addressARP load sharing is used for load balancing incoming trafficHash or modulo of the source address of ARP requests to determine which device should handle the requests
  • 70. Agenda - Security EnhancementsClient cert auth for Captive PortalBotnet Detection and DDoS policyIPS action enhancementsSSH DecryptionUpdated URL logging and reportingGlobal ProtectAuthentication SequenceKerberos support
  • 71. Client Certificate in Captive PortalFormerly available for SSL VPN and device authenticationNow can be used in captive portal configurationClient Certificate can be configured as the only authentication optionNo Auth profile requiredUnlike client certs with admin authentication, this will be transparent.Uses the 3.1 “Client Certificate Profile” object
  • 72. Drive-by Download ProtectionWarn end users about file transfer eventsNew ‘Continue’ file blocking actionCustomizable response pageThe response page has a ‘continue’ button. If the user clicks ‘continue’, the file transfer will continue
  • 73. Customizable Brute Force Attack SettingsUser defined thresholds for brute force signatures. Defined in the profile
  • 74. Custom Combination SignaturesCombine multiple signatures to create custom combination signaturesTake individual spyware or vulnerability threat IDs and group them into one custom signatureTake individual signatures and apply thresholds for number of hits over specified time period
  • 75. Block IP Action (Blackhole)Block all future traffic from a host after triggering a security condition Spyware and vulnerability signaturesDoS protection rulebaseZone protectionBlock time in secondsMax 21600 seconds in DoS protection rulebaseMax 3600 seconds in spyware and vulnerability profilesBlock method: Based on sourceIP or source-and-destination IP
  • 76. DoS Protection RulebaseExtends existing DoS protections that are currently configurable on a per-zone basisRules based on source/dest zone, source/dest IP, country, service, and userTwo types of profiles are supported:Aggregate: Thresholds apply to all traffic Classified: Thresholds apply either on basis of source IP, destination IP or a combination of both.
  • 77. Behavior-based Botnet DetectionCollate information from Traffic, Threat, URL logs to identify potentially botnet-infected hostsA report will be generated each day list of infected hosts, description (why we believe the host to be infected)Confidence levelFollowing parameters (configurable) to detect botnetsUnknown TCP/UDP IRCHTTP traffic (malware sites, recently registered, IP domains, Dynamic Domains)Users can configure a query for specific traffic
  • 78. Updated URL LoggingCan log just container pagesPreviously cnn.com created 26 URL logsCan filter to have just oneUses the Container Page setting in the device tabFull URL loggingNow logs up to 1023 bytes of the URLPrevious max was 256
  • 79. SSH DecryptionUses same tactic as SSL decryptionNo additional configuration requiredNew “Block if failed to decrypt” optionUser certificatesUnsupported crypto systemCan now block the connectionPreviously we would allow it
  • 80. Authentication SequenceCan configure multiple authentication profilesIf the first one in the list fails the next will be attemptedCan be used to cycle through multiple RADIUS or Active Directory Forest designsThe Authentication Sequence object can be used in the same locations as a regular Authentication profile
  • 81. Native Kerberos AuthenticationFirewall can now authenticate to AD without the use of an AgentCan be used like RADIUS or LDAP authentication serversDoes not retrieve group membership – AD Agent or LDAP server required.

Editor's Notes

  • #5: Things to talk about:-Moving farther into datacenter coreNotes:-CPS: connections per second
  • #9: Things to talk about:-What is it and what is the point? -Control outside of the network -Security outside of network
  • #12: Things to talk about:-Installer is MSI and can be pushed out via GPO-Option to allow user to disable (not recommended), optional password required
  • #16: Things to talk about:-3rd party supported VPN clients -PAN SSL VPN -Juniper Network Connect -Cisco Systems VPN Adapter
  • #18: ** Global ProtectDemo After This Slide**
  • #20: Things to talk about:Touch on all of these as they do not come up again.Notes:User-ID-x-forwarded-for: used by proxies to keep user info when requesting info from web servers -Security hole as it would be sending internal IP addresses out onto the webURL Filtering-URL Logging will now log 1023 bytes of requested url
  • #21: Things to talk about:UI upgrades on next slide, Explain the rest.
  • #22: Things to talk about:-Easy Object creation (from within rule creation and also lower left on the rules page)-Switching between tabs saves your place-Commit checks for application dependencies-Policy Viewer-Edit whole policy at once (Security, NAT…)-Regions-Reports is diff (Click on reports and look to the right) -Managing custom reports is much different-PCAP from GUI-Locks -Config-only you can edit config/commit -Commit-people can edit, only you can commit -Can be automatically aquired (device tab, setup, management options)**UI Demo After This Slide**-Security Rules (tagging, drag-n-drop, object value visibility, filtering, rule editing-quick &amp; whole interface, regions)-Tab Switching-Config/commit Locks-Commit app dependency check-PCAP from GUI
  • #24: Things to talk about:Explain these except for Active/Active, DNS Proxy, VR-VR Routing, Country-based, just touch on those.Notes: Overlapping IP Address Support: To facilitate shared use of a device, the system now supports the use ofthe devices layer 3 services for clients that have the same IP address of interfaces or hosts in anothervirtual router. Untagged Subinterfaces: Multiple untagged layer 3 interfaces can now be created on a single physicalinterface. The source interface will be determined based on the destination IP address as opposed to aVLAN tag.Adjust TCP MSS - maximum segment size (MSS) is adjusted to 40 bytes less than the interface MTU. Addresses the situation in which a tunnel through the network requires a smaller MSS. If a packet cannot fit within the MSS without fragmenting, this setting allows an adjustment to be made.
  • #26: Things to talk about:Why did we add?To address split brain issues resulting from lost HA1 link. Very common for platforms using in-band HA1.How is this configured?Simple checkbox
  • #28: The Neighbor Discovery Protocol defines mechanisms for providing the following functionality: Router discovery: hosts can locate routers residing on attached links. Prefix discovery: hosts can discover address prefixes that are on-link for attached links. Parameter discovery: hosts can find link parameters (e.g., MTU). Address autoconfiguration: stateless configuration of addresses of network interfaces. Address resolution: mapping between IP addresses and link-layer addresses. Next-hop determination: hosts can find next-hop routers for a destination. Neighbor unreachability detection (NUD): determine that a neighbor is no longer reachable on the link. Duplicate address detection (DAD): nodes can check whether an address is already in use. Redirect: router can inform a node about better first-hop routers. Recursive DNS Server (RDNSS) assignment via a router advertisement (RA) options.[2]
  • #29: Things to talk about:-Virtual Systems/Routers as routing targets -Available in Virtual Routers as well as Policy-Based Forwarding rules -SSL VPN/Management of firewall via primary link in WAN failover config
  • #32: Things to talk about:-Reason for HA3 Link: After session setup packet will be forwarded back to the session owner for Layer 7 processing to preserve the forwarding path
  • #34: Notes:ECMP = Equal Cost Multi Path routing.
  • #46: Things to talk about:-SSH V2 with interactive auth
  • #48: **Authentication, Reporting (Custom &amp; Default), Botnet, DoS, and Drive by Download Demo After This Slide**